Feeds

New worm tries to bring down Downing Street website

But Windows malware menace cordoned off

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

AV firms are warning of the appearance of a new Internet worm which attempts to launch a distributed denial of service attack on the Downing Street website.

The Quaters worm spreads via email, using a variety of subject lines relating to account information, and by internet chat systems posing as an attempt to break an Internet chain mail world record. Few incidents of the worm have been spotted thus far, and it doesn't appear to be any great risk, nonetheless the overtly political nature of the worm is likely to capture the attention of UK authorities.

The worm, which naturally only affects Windows PCs, displays a message accusing Blair of wasting taxpayer's money on illegal immigrants rather than investing in the National Health Service and schools.

Quaters can overwrite files on the user's computer with the text "Infected by the WIN32.SORT-IT-OUT-BLAIR Virus!". It might also display the following message:

Dear Tony Blair,
Why are you spending all our taxes on illegal immigrants!?!
How about you stop worrying about other countries and worry about ours???
Stop spending money on immigrants and spend it on things like OAP's who fought to keep this country free but are now getting treated worst than illegal immigrants!
How about spend a little money on the NHS or the education system!?!
Think about it Mr Blair. Your career depends on it. We've had enough.

The worm also attempts to launch a DOS attack against number-10.gov.uk, the website of the Prime Minister's official residence, 10 Downing Street, London.

"Tony Blair is having enough problems with his chief spin doctor resigning and the Hutton Inquiry, without having an axe-grinding British virus writer causing mischief too," commented Graham Cluley, senior technology consultant, Sophos Anti-Virus.

It's far from the first time viruses have been included a political message.

Previous worms have highlighted the friction between India and Pakistan and other world leaders such as Bill Clinton and Israeli Prime Minister Sharon have been attacked in the past.

Former UK Prime Minister Margaret Thatcher suffered in the 1990s from the Fu Manchu virus, which replaced her name with an expletive whenever it was typed. ®

Related Stories

Post Blaster, MS floats default auto updates for Windows
MS releases unholy trinity of security fixes
MS alerts users to Windows DirectX vulnerability
Microsoft issues doubleplus critical security fix
IE bugs keep coming
Wakey, Wakey it's Patching Day. Again
If it's Thursday it must be IE patching day
MS releases grand daughter of all IE security patches

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.