Feeds

Email worm eats security software

ZaCker

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

Computer users returning after the New Year break are in danger from the latest mass mailing email worms.

The ZaCker (or Maldal.D) worm can delete antivirus software protection and a variety of critical system files from the PCs of unwary users.

Typically, the mass mailing worm arrives by email with the subject line ZaCker and an executable, infected attachment which weighs in at 27KB. It uses Outlook to spread itself to everybody in the Outlook address book.

More information about ZaCker can be found here.

Over the holidays another mass mailer, called Sheer.A (or Zoher) did the rounds. This takes advantage of an IE exploit which means an infected attachment could be opened simply by reading or previewing a message.

MessageLabs, a managed services firm which scans its users emails for viruses, reports blocking 8,573 copies of the virus over the holidays. More information on Sheer.A can be found here.

Antivirus vendors advise users to update antiviral protection in order to thwart the spread of both worms. ®

Boost IT visibility and business value

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.