Feeds

Sex starved virus writers go for revenge

Release worm that heaps abuse on AV expert

  • alert
  • submit to reddit

High performance access to file storage

A well-known figure in the antivirus community has become the target of abuse by virus writers after saying they only wrote malicious code because they were spotty teenage nerds that couldn't pull.

Graham Cluley, senior technology consultant at antivirus vendor Sophos, has become the subject of a rant contained in a worm called Parrot, which is currently doing the rounds on the Internet.

One of the effects of the virus is to display a message box which contains the following text. "You better not fuck on the table Graham Cluley, you son of a bitch. I don't even know the lady and she calls me a son of a bitch!". Charming.

Cluley told us that the author of the virus, Gigabyte, claims to be a 17 year-old girl and he suspects 'she' is offended by his oft-quoted disparaging remarks about virus writers. Gigabyte, whose Web site expresses an interest in horse riding and dance music as well as virus writing, has previously replied to messages Cluley has posted to Usenet newsgroup but the two have never spoken or met. For this reason Cluley is not certain Gigabyte is a girl.

As explained in detail here, Parrot is an email-aware worm and companion virus which arrives with the message "Parrot screensaver" and contains an infected attached called parrot.scr.

If users are unwise enough to open the infected attachment the worm will attempt to send copies of itself to all a user's contacts in the Microsoft Outlook address book. It also attempts to spread Internet Relay Chat.

Although incidents of the worm have generated a number of reports to antivirus vendors it doesn't appear to be either particularly prolific or damaging.

At the risk of stating the obvious, users are advised to protect themselves against the bug by deleting files with suspicious attachments and by updating their antiviral protection software. ®

External Links

Write up on Parrot worm by Sophos

Related Stories

SirCam virus hogs connections with spam
Rise in viruses within emails outpacing growth of email
Symantec fails to stop SirCam
Hotmail fails to block SirCam worm
Users haven't learned any lessons from the Love Bug

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.