Forten is an email worm written in Java, that replicates by replacing the signature of Outlook Express with a link to an infected web site. When an user opens an infected email, the link is activated and the worm code is executed from the web site.
Allow F-Secure Anti-Virus to disinfect the relevant files.
For more general information on disinfection, please see Removal Instructions.
When the JAR file is executed it uses Microsoft Internet Explorer VerifierBug vulnerability to get full privileges by escaping the Java security, and execute its code. Then the JAR will alter the Internet Explorer search settings and add three pages to the Favorities folder.
Further, the worm disables Internet Explorer both Security and Advanced tabs from the settings dialog.
The JAR will then drop two files, "hosts" and "s.htm" to the Windows installation directory. It modifies the registry so that Outlook Express will use the "s.htm" file as the default signature. The "hosts" file contains a set of domain names that will be redirected to a different web site instead of the real addresses. The redirection works only in Windows 95, 98 and Me. The "hosts" file has to be removed manually from the infected system.
Additionally the changes into Internet Explorer setting will cause that the web sites accessed via Internet Explorer without specifying the protocol (http://) will be redirected to another web site. This web site will then redirect the browser to correct address.
Further information about the vulnerability in the Microsoft Java VM, including a fix, is available at: http://www.microsoft.com/technet/security/bulletin/ms03-011.asp
This is a functionally similar to the Forten.A. This variant does not create the "hosts" file to the Windows installation directory, but into Windows' "system32\drivers\etc" directory instead. In this way the "hosts" file is active on Windows NT, 2000 and XP. However, the created "hosts" file is empty.
Additionally this variant adds three buttons to the Internet Explorer toolbar.
This variant is functionally identical to Forten.B
This variant behaves in a same way as Forten.A, however, the exact addresses of the files in the web has been changed as the previous sites were closed.
This variant is functionally identical to Forten.D
This variant is functionally identical to other Forten variants, with the exception that it won't infect systems where browser language is set to Russian.
This variant is functionally identical to Forten.F
Technical Details: Jarno Niemela and Sami Rautiainen, F-Secure Corp., June 18.-July 30., 2003