Feeds

Xmas malware frenzy

Security gets stuffed

Intelligent flash storage arrays

Hackers are shamelessly exploiting the festive season to spread malware.

A Christmas-themed jigsaw puzzle game called Christmas_Puzzle.exe doing the rounds is actually a Trojan (Ardamax-E) that uses rootkit technology to hide its presence on compromised systems.

Meanwhile a PowerPoint file named Christmas+Blessing-4.ppt uses an IE vulnerabilities to deposit malicious code on vulnerable Windows boxes. The exploit has been embedded in an innocent Christmas-themed PPT slideshow that's been circulating on the net, security firm F-Secure notes.

F-Secure has also received a malware file - named Christmas.exe - which displays a Christmas-themed image as a decoy for its real purpose, turning compromised machines into compromised zombie PCs under the control of hackers.

Not all this festive malware is related to Christmas.

F-Secure notes that a new Warezov spam run is underway which uses a "Happy New Year" postcard as its disguise. Windows users who run the infected attachment will find their PCs running malware that downloads a new variant of the infamous Warezov Trojan.

Standard defensive precautions against viral attacks apply in defending against these Xmas malware assaults.

Users are urged to patch systems up to date and update anti-virus signature definition files. Resisting the temptation to open unsolicited email attachments is also a good idea, of course.

Xmas hats from crackers made from tin-foil instead of paper might also be a good idea, if things get any worse. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.