Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
The Yamanner worm activates by just opening an infected email message with Internet Explorer. To do this it uses a 0-day vulnerability in the Yahoo! Mail system.
Yamanner builds its email messages and sends them to the infected user's contacts. The sent emails look as follows:
The worm resides inside the email body. It also tries to open a web page in another browser window.