Feeds

Hooray, hooray, it’s CIH virus day

Your system is under attack from more bugs than you can shake a stick at

  • alert
  • submit to reddit

3 Big data security analytics techniques

If you can read this -- then you're one of the lucky ones. One of the survivors. For today, Monday 26 April 1999, is the day the deadly flesh-eating Chernobyl virus is set to strike PCs all over the world, coinciding with the thirteenth anniversary of the infamous nuclear accident in Russia. According to the experts, it has the potential to erase hard drives and corrupt a PC's BIOS. Hopefully, the fall-out from today's viral nonsense won't be as devastating as the events in Chernobyl in 1986, but it could still give punters a few sniffles. If you're susceptible, this latest variation of the CIH Virus will give your hard drive such a kicking it may be kinder to trash it and put it out of its misery rather than trying to treat it. The official line from the virus vice squad at bug-busters Symantec is that CIH infects 32-bit Windows 95/98/NT executable files. "When an infected program is run, it infects the computer's memory, then infecting new files as they are opened," said a bug buster. "The virus attempts to modify or corrupt certain types of Flash BIOS, software that initialises and manages relationships and data flow between the system devices, including the hard drive, serial and parallel ports and the keyboard. "By overwriting part of the BIOS, CIH can keep a computer from starting up when the power is turned on. "The virus first infects by looking for empty, unused spaces in the file, then it breaks itself up into smaller pieces and hides in these unused spaces," he said. If you think you've been lucky today and escaped this Chernobyl misery, think again. While Chernobyl is active today, other strains of the virus could become active on 26 June -- or in some cases, on the 26th day of every month. Good grief, is there no respite from this despair? ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.