Feeds

CIH virus hits Taiwan hardest

Pirate software to blame for unchecked spread

  • alert
  • submit to reddit

Internet Security Threat Report 2014

The CIH virus struck hardest among countries where pirated software was most prolific, according to software company Data Fellows. The bug, which hit about 300 users – or 20 known companies - in the UK, caused most damage in Asia. Thousands of hard disks were overwritten overnight on 25 and 26 May in Taiwan alone, says the anti-virus and encryption company. Jason Holloway, Data Fellows UK country manager, described these traditional centres for counterfeit software as breeding grounds for CIH. "In countries like Taiwan, where users are not reluctant to use illegal software, the CIH virus has done the most damage. This is because viruses can be carried in the copied software," he said. CIH was also believed to have disabled 230 PCs at one police force in Africa. Holloway warned: "Users think that once they have bought anti-virus software, they are safe. But it must be updated to be effective - we discover six to seven new viruses per day." The author of CIH – or the Chernobyl virus as it is also known – has been identified as one Chen Ing-hau. The former student of the Tatung Institute of Technology named the virus using his initials. Just as well he didn't name it after the initials of his former college. ®

Security for virtualized datacentres

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?