You can enter "Osama Ben-Laden Hanged" in your search engine and check this one 
out for yourself....seems to be real.


Sent: Friday, January 27, 2006 9:16 AM
Subject: Email Virus Warning - Serious.. Osama Ben Laden


I checked on Snopes.com and this appears to be a real threat. You may have 
already heard about this.
----- Original Message ----- 

For my PC friends
----------
Subject: FW: Email Virus Warning - Serious..

This came from my son who supports networks and desktop applications at a 
mortgage company.... 


Emails with pictures of Osama Bin-Laden hanged are being sent and the moment 
that you open these emails your computer will crash and you will not be able to 
fix it!

This e-mail is being distributed through countries around the globe, but mainly 
in the US and Israel.

Don't be inconsiderate; send this warning to whomever you know.

If you get an email along the lines of "Osama bin Laden Captured" or "Osama 
Hanged" don't open the attachment.

Confirmed at: http://www.snopes.com/computer/virus/osamahanged.asp

Origins: There are few headlines that would grab the attention of more computer 
users around the world than "Osama bin Laden Captured," and that's exactly what 
whoever created this lure was counting on to snare unsuspecting victims who use 
Microsoft platforms.

"Osama bin Laden Captured" isn't a virus in itself; it's the text of a message 
that includes a link to a file called EXPLOIT.EXE. When a message recipient 
clicks on this link to view what he thinks are pictures of Osama bin Laden's 
capture, he can end up downloading an executable Trojan known as Backdoor-AZU, 
BKDR_LARSLP.A, Download.Trojan, TrojanProxy.Win32.Small.b,or Win32.Slarp. 
Clicking the embedded link in the "Osama bin Laden Captured" message 
auto-executes a file called "EXPLOIT.EXE," which exploits a known security hole 
to download the Trojan. According to McAfee Security:

The Trojan opens a random port on the victim's machine. It sends the Port 
information to a webpage at IP address 66.139.77.145. The Trojan listens on the 
open port for instructions and redirects traffic to other IP addresses. 
Spammers and hackers can take advantage of compromised systems by using the 
infected computer as a middleman, allowing them to pass information through it 
and remain anonymous