A new version of the virus, originally written for the Macintosh, evaded commercial anti-virus software, catching both IT departments and anti-virus companies off-guard.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Melissa.W, which sends out 50 copies of itself to addresses stored on Microsoft Outlook, struck the UK last week, disrupting e-mail services in some companies.
"Two users opened the attachment and fired the virus off on Wednesday morning, creating a mail storm. We were here until 10pm putting file filters and sweeping the mail database to remove infected files," said an e-mail administrator at one large firm.
The virus struck the company again a day later, forcing its IT department to put a stop on e-mails with Word attachments for three hours, until anti-virus software could be updated.
Although Melissa.W generally caused only limited disruption, the attack has raised concerns that infected companies may be vulnerable to more damaging Macintosh viruses.
"There have been 10 other viruses in the Mac Office format. Anyone who can't detect this virus won't be able to detect those. If you exchange e-mails with people on a Mac, you need to be careful," said Graham Cluley, technical director at virus specialist Sophos.
Like the original, the virus can be recognised by the message "important message fromÉ" in the subject line and the message text "here is that document you asked for".
What to do if hit by Melissa.W