Feeds

Eighties throwback worm spreads via memory sticks

Danger USB

Build a business case: developing custom apps

Miscreants have created a strain of malware which uses memory sticks as a vector for infection.

The SillyFD-AA worm spreads by copying itself from infected machines onto removable drives such as USB memory sticks before automatically running when the device is next connected to a computer.

The malware, which is also capable of spreading through shared floppy discs, creates a hidden file called autorun.inf that ensures the malware is activated the next time infected media is plugged into a Windows PC.

Infected machines are easily recognised. The title of Internet Explorer windows on infected Windows machines is changed to include the phrase "Hacked by 1BYTE". In both its mode of infection and its lack of profit-driven motive, the SillyFD-AA worm is a throwback to the days when viruses were written for kudos rather than as part of some money-making scheme.

Net security firm Sophos predicted that the growing use of USB drives in direct mailshots and as freebies at trade shows would make them a growing vector for attack.

"With a significant rise in financially motivated malware it could be an obvious backdoor into a company for criminals bent on targeting a specific business with their malicious code," Sophos senior technology consultant Graham Cluley warned.

Firms should disable the autorun facility of Windows so removable devices such as USB keys and CD ROMs do not automatically launch when they are attached to a PC. In addition, any storage device should be checked for viruses and other malware before use. ®

Next gen security for virtualised datacentres

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Scale data protection with your virtual environment
To scale at the rate of virtualization growth, data protection solutions need to adopt new capabilities and simplify current features.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?