Feeds

Email worm eats security software

ZaCker

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Computer users returning after the New Year break are in danger from the latest mass mailing email worms.

The ZaCker (or Maldal.D) worm can delete antivirus software protection and a variety of critical system files from the PCs of unwary users.

Typically, the mass mailing worm arrives by email with the subject line ZaCker and an executable, infected attachment which weighs in at 27KB. It uses Outlook to spread itself to everybody in the Outlook address book.

More information about ZaCker can be found here.

Over the holidays another mass mailer, called Sheer.A (or Zoher) did the rounds. This takes advantage of an IE exploit which means an infected attachment could be opened simply by reading or previewing a message.

MessageLabs, a managed services firm which scans its users emails for viruses, reports blocking 8,573 copies of the virus over the holidays. More information on Sheer.A can be found here.

Antivirus vendors advise users to update antiviral protection in order to thwart the spread of both worms. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
State Dept shuts off unclassified email after hack. Classified mail? That's CLASSIFIED
Classified systems 'not affected' - but, is this reconnaissance?
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.