Feeds

Virus prevents you asking for help

Clever design

  • alert
  • submit to reddit

High performance access to file storage

A virus which blocks victims from reaching antivirus web sites or even emailing for help is spreading around the internet after laying dormant for weeks.

MTX was first identified in August and was thought to pose relatively little risk, but its clever design is now leading to widespread problems.

November statistics from antivirus vendor Sophos will show the virus produced the most calls to its help desk during November, although these figures are skewed by the fact victims had no other means of asking for help.

The virus, which is also known as Apology-B, arrives as an email attachment with a variety of different names designed to entice careful users into opening it including NEW_NAPSTER_site.TXT.pif and the cunningly titled IS_LINUX_GOOD_ENOUGH!.TXT.pif. Opening the attachment triggers an infection.

The virus replaces wsock32.dll with a modified version which monitors network traffic. When the virus detects the user sending an email, it will send another to the same recipient. The message will have no subject or body text, only an attachment.

The virus also has the ability to open up a backdoor on a victim's machine. It places a file, called MTX_.exe, on a victim's hard disc drive which, once executed, tries to connect to a website and download further programs to run.

However the bug's most sinister feature is that a user will be prevented from accessing antivirus website from an infected machine or sending emails to specified security firms.

The bug has one very sinister feature: once it infects a user, it's programmed to stop the victim from visiting antivirus Web sites and sending "mayday" emails to antivirus companies.

Users can be infected by MTX only if they haven't updated their antivirus software for the last two months.

The growing prominence of MTX, and other viruses which have lain dormant for weeks before raising their ugly head, shows that people aren't applying this simply procedure. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.