Klez: One of the Most Widespread and Evasive Email Worms of the Early 2000s

Klez is a Windows-based mass-mailing email worm first discovered in October 2001, known for its polymorphic code, aggressive spread, and ability to disable antivirus tools and spoof email identities. Several variants were released throughout 2001–2002, with Klez.H becoming particularly notorious for combining worm behavior with virus-dropping and payload execution. It used its own SMTP engine, scanned address books for targets, and often masqueraded as security updates or documents.

Introduction to Klez

Klez set new standards for malware persistence and annoyance, distributing itself not just through email, but also via network shares and file attachments. It frequently spoofed the sender’s identity, making victims believe trusted contacts were behind the messages. The worm’s polymorphism made it hard to detect, while some variants even mocked antivirus vendors or tried to disable their products.


1. How Klez Works

Infection Mechanism:
Klez spread through:

Payload Execution:
Once activated, Klez:


2. History and Notable Campaigns

Origin and Discovery:
Klez was first identified in October 2001, and new variants (like Klez.E, Klez.G, Klez.H) continued into mid-2002. It was created by unknown malware authors and is not tied to any known APT or financially motivated group.

Notable Campaigns:


3. Targets and Impact

Targeted Victims and Sectors:

Consequences:


4. Technical Details

Payload Capabilities:

Evasion Techniques:


5. Preventing Klez Infections

Best Practices (then and now):

Recommended Security Tools:


6. Detecting and Removing Klez

Indicators of Compromise (IoCs):

Removal Steps:

  1. Run a fully updated antivirus scanner
  2. Delete Klez binaries and associated registry entries
  3. Restore disabled antivirus services or reinstall them
  4. Clear temporary folders and review email queues
  5. Notify contacts if spoofed messages were sent from your address

Professional Help:
If systems were heavily infected or AV was fully disabled, a managed incident response team or IT professional should assist with cleanup and restoration.


7. Response to a Klez Infection

Immediate Steps:


8. Legal and Ethical Implications

Legal Considerations:
Klez infections caused millions of dollars in damages globally but were not tied to an identifiable threat actor. Its propagation would now be prosecuted under cybercrime laws, including unauthorized access, system impairment, and identity spoofing.

Ethical Considerations:
Klez exploited human trust in email communication. By mimicking friends, coworkers, and antivirus providers, it highlighted the ethical danger of blending technical trickery with social manipulation.


9. Resources and References


10. FAQs about Klez

Q: What is Klez?
A mass-mailing Windows worm that spreads via email and shared drives, using spoofed messages and polymorphic code.

Q: How did Klez spread?
Through infected emails, often with attachments that triggered on open — sometimes even via preview alone.

Q: Was Klez destructive?
Mostly disruptive. Some variants corrupted files or dropped other malware, but its main damage was email flooding and antivirus disabling.

Q: Can Klez still infect systems today?
Modern systems are protected, and the worm no longer circulates, but it remains a textbook example of early email-based threats.


11. Conclusion

Klez was a milestone in early 2000s malware, combining technical evasion, spoofing, and mass mailing to create a massive and prolonged global disruption. Its polymorphic nature made it hard to detect, while its deceptive emails exploited trust on a personal level. Though long since neutralized, Klez helped shape modern antivirus strategies and email security policies still in use today.

 

 

« Back to the Virus Information Library

« Back to the Security Center