Feeds

Adware slips between pages of e-book

Iliad reader carries unwelcome surprise

Internet Security Threat Report 2014

An adware package has turned up on the latest e-book devices from iRex, and will install itself automatically onto a connected PC if it gets the chance.

The infection appears to be the imgInSOY worm, which copies itself between removable media and uses autorun.inf to infect any Windows system it comes across. In addition to copying itself onto any more removable devices the worm operates as adware.

The Iliad is a Linux-based e-ink device which synchronises with a desktop PC to download books or other documents the user wants to read, as well as uploading sketches or annotations the user has made to existing documents. But when connected over USB the device also appears as a removable drive, and that's when the infection can occur.

iRex has sent out emails to everyone who's recently purchased an Iliad with instructions on identifying and removing the adware from the device, along with a recommendation to run some anti-virus software on their desktop PC (if they're running Windows). The company tells us the infection has been traced to a factory worker in the Philippines, where the Iliad is manufactured, who used a USB key to transfer documents between work and home.

The Iliad is one of the more technically-advanced e-ink devices, with Wi-Fi networking and an open OS, but the infection is a major embarrassment to the company. It does demonstrate that no matter how strong the firewall, there are many ways to get a dose of malware. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.