Feeds

US school in toothless Obama worm infection

Round up the dweebiest suspects

Intelligent flash storage arrays

Security experts reckon a new low-threat worm that displays the image of President Obama on infected desktops is the work of technically-knowledgeable pranksters.

Infections of the worm appear to be confined to scores of desktops at the same (unnamed) Illinois high school, which contacted its anti-virus supplier. The outbreak puzzled security US reseller Walling Data, which in turn brought in the expertise of AVG's Roger Thompson.

Thompson reckons the worm probably exploits the same vulnerability as the infamous Conficker/Downadup worm (MS08-067), and spreads through network shares but is otherwise unrelated. "The worm is probably not a Conficker variant, because as far as we can tell, the source code is not available for Conficker," he writes.

In many ways the Obama worm is a throwback to an earlier, more innocent age when worms were created to gain notoriety out of simple mischief, rather than in order to establish a botnet of compromised PCs that might later be farmed out for profit. The malware does little beyond displaying a small image of Obama on infected desktops, according to preliminary analysis.

Adopting the role of detective, Thompson has some suggestions on likely suspects. "Given that Conficker source is probably not available, and if no one else ends up reporting this, there's some chance one of your students wrote it," he writes. "Find your smartest, geekiest, dweebiest kid, and look hard at him."

Thompson's write-up of the attack, complete with screenshots, can be found here. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.