JS.Yamanner@m

Printer Friendly Page

Discovered: June 12, 2006
Updated: June 12, 2006 12:51:44 PM
Also Known As: JS/Yamanner@MM [McAfee], JS_YAMANER.A [Trend], Yamanner.A [F-Secure], JS/Yamann-A [Sophos], Yamanner.A [Computer Associates]
Systems Affected: Windows

JS.Yamanner@m is a worm that is written in JavaScript. It exploits a vulnerability in the Yahoo email service to send a copy of itself to the user's Yahoo email contacts.

Antivirus Protection Dates

  • Initial Rapid Release version June 12, 2006
  • Latest Rapid Release version September 28, 2010 revision 054
  • Initial Daily Certified version June 12, 2006
  • Latest Daily Certified version September 28, 2010 revision 036
  • Initial Weekly Certified release date June 12, 2006

Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Discovered: June 12, 2006
Updated: June 12, 2006 12:51:44 PM
Also Known As: JS/Yamanner@MM [McAfee], JS_YAMANER.A [Trend], Yamanner.A [F-Secure], JS/Yamann-A [Sophos], Yamanner.A [Computer Associates]
Systems Affected: Windows

JS.Yamanner@m is a worm that is written in JavaScript. It exploits a vulnerability in the Yahoo email service to send a copy of itself to the user's Yahoo email contacts.

The worm cannot run on the newest version of Yahoo Mail Beta.

The worm arrives on the compromised computer as an HTML email containing Javascript. The email may have the following characteristics:
From: Varies
Subject: New Graphic Site
Message body: Note: forwarded message attached.

It exploits a vulnerability in the Yahoo email service to run a script and send a copy of itself to certain email addresses gathered from the Yahoo email folders.

The worm targets email addresses from the @yahoo.com and @yahoogroups.com domains.

The worm may also contact the following URL:
http://www.av3.net/index.htm

It sends a list of email addresses gathered to the above URL.