Feeds

Flash gets its very own virus

Proof of concept

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Updated A proof of concept virus which has the potential to infect Flash files commonly used on Web sites has been discovered.

The SWF/LFM-926 virus, which could infect surfers if they download and then open a Flash file on their PC, is the first of its kind, according to antivirus vendor Sophos. Simply viewing a Web site or Flash movie fails to cause infection, early tests suggest.

"The virus is not yet in the wild, but it is clear proof that virus writers continue to search for new ways to infect computer users," said Graham Cluley, senior technology consultant for Sophos Anti-Virus.

SWF/LFM-926 only infects other Macromedia Flash files but the technique could be applied to create viruses with more damaging payloads, he warned.

Sophos recommends webmasters put in place procedures and policies to ensure the integrity of the code they place on sites, whether it is obviously executable (in the case of, for instance, exe and com files) or Flash movies.

Existence of the SWF/LFM-926 virus came to light after the virus author emailed a copy of the virus to Sophos, which has exchanged samples of the bug with other security vendors. Apart from making sure AV products check SWF files, the emergence of the technique doesn't mandate changes in security software. ®

Update

Macromedia has issued a statement clarifying that the issue affects only Macromedia Flash and not Shockwave content, which is produced using Director Shockwave studio, a different product.

A patch for Macromedia Flash will be available latter this week, the firm promises. More information can be found here.

Antivirus vendors, and our initial report, referred to Shockwave Flash but this is inaccurate: .SWF used to stand for Shockwave Flash file format, but now it's just Flash.

External links

Analysis of the virus by Sophos

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.