Feeds

MP3 zapping malware worms onto P2P network

Vigilante virus

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Vigilante virus writers have launched an offensive against file traders with the release of a worm that deletes MP3 files on infected PCs.

The Nopir-B worm, which appears to have originated in France, poses on P2P networks as a program to make copies of commercial DVDs. In reality the application offers no such function. Instead it attempts to delete MP3 music files on infected PCs. Nopir-B also attempts to disable various system utilities and wipe .COM programs whilst displaying an anti-piracy graphic. Nopir-B only infects Windows machines.

"The Nopir-B worm targets people it believes may be involved in piracy, but fails to discriminate between the true criminals and those who may have legally obtained MP3 files. Whichever side of the fence you come down on in regards to internet piracy, there's no debate about the criminal nature of this worm," said Graham Cluley, senior technology consultant for Sophos.

Malware capable of zapping MP3 files is rare but not unprecedented. The Klez-F worm, for example, which was widespread in 2002, overwrote MP3 files (and other file types) on certain days of the month. The Scrambler worm was programmed to scramble MP3 files to sound like a scratched record while the Mylife-G worm overwrote MP3 files with the words "my lIfE".

Nopir-B is slightly unusual in this category because it spreads on P2P network, albeit modestly. Few copies of the worm have been spotted and it poses only a low risk. ®

Related stories

Klez tops virus charts again
Fizzer stealth worm spreads via KaZaA
Altnet wakes up as worm spreads through KaZaA

The smart choice: opportunity from uncertainty

More from The Register

next story
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Boffins build FREE SUPERCOMPUTER from free cloud server trials
Who cares about T&Cs when there's LIteCoin to mint?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.