Feeds

Powerpuff Girls catch FunLove Virus

DVD recall

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Warner Bros has recalled a virus-infected DVD featuring hot new cartoon stars, the Powerpuff Girls.

The disc is called Meet the Beat Alls and contains the FunLove Virus. Once installed onto a PC the virus attempts to infect files held on the local hard drive as well as network directories.

So how did FunLove end up on the Powerpuff Girls DVD in the first place? The most likely explanation is that
the machine of one of the developers who worked on the disc was infected by the virus, a ccording Graham Cluley, senior technology consultant at Sophos Anti-Virus. As a result, either a screensaver or an executable file of the DVD became infected with FunLove, allowing the infection to spread.

The FunLove virus stopped production at Dell for two days in November 1999 Hewlett-Packard and Microsoft have also fallen victim to the virus. Even though it is easy to protect against and is not particularly damaging, FunLove is tricky to root out if infection takes hold. Once a network is infected, FunLove can automatically spread between all connected PCs. It also allows all users unrestricted file access.

Warner Bros has recalled all versions of the DVD in countries where it is distributed, which doesn't include the UK (even though the Powerpuff Girls appear on Saturday morning TV here). Anybody who has bought the DVD is advised to return it. ®

External links

Write up on FunLove by Sophos
The Powerpuff girls

Related Stories

Tweenies can't sing and dance on WinXP
WinXP on the wall, who's the most incompatible of them all?
Fun Loving Criminals torpedo Dell factory
HP distributes virus infected drivers
Microsoft security fixes infected with FunLove virus

The smart choice: opportunity from uncertainty

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.