Feeds

Malware targets computer forensics tool

WinHex spell fails to take

Securing Web Applications Made Simple and Scalable

Virus writers have created a proof-of-concept virus that targets a widely-used computer forensics tool.

Vred-A infects WinHex scripts, preventing these additions to forensics and data recovery tools from doing anything except infecting other scripts. The virus has not been seen in the wild, and probably never will be.

Only Inspector Clouseau-style levels of incompetency would permit a forensics examiner to infect a system he was working on with the virus. WinHex shows a warning before running any script, so the virus can not spread without a user's consent.

Interest in the malware is confined to its curiosity value.

Proof-of-concept viruses can be thought of as an attempt by malware authors to show off to their peers or experiment with what might be possible with their adversaries in the anti-virus community. New platforms, such as smart phones, PDAs, or specialist platforms are the usual targets for attack.

Attempts to unpick computer security tools through this process are rare but not unprecedented. Last year, VXers created a proof-of-concept virus that targeted IDA (Interactive Disassembler Pro), a widely used tool that helps anti-virus researchers understand the behaviour of malware samples. ®

Mobile application security vulnerability report

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.