Feeds

Autocad attacks return after four years in wilderness

The virus makes a comeback

Next gen security for virtualised datacentres

Viruses attacking users of the Autocad computer assisted design application have recently resurfaced after taking a four-year hiatus, prompting a call from one security watcher for more to be done to done to prevent such outbreaks.

And indeed, that's exactly what Autodesk, the California-based maker of the high-end program, has pledged to do.

Over the past few weeks, Sophos Senior Threat Researcher Paul Baccas has spotted two viruses that target Autocad. One of them, dubbed AL/Utax-A, attempts to create new users, a sign that the virus writers are acting out of malicious intent, he said. A newer pest called AL/Logo-A is more of a nuisance. According to an analysis that isn't yet complete, it copies itself to Autocad files, but it isn't believed to modify or delete any data.

To be sure, the resurgence is small, but Baccas says it highlights a very real vulnerability in Autocad and other applications that employ user-generated scripts to automate repetitive tasks. While Microsoft made significant changes to its Office 2007 to blunt the threat of macro-borne attacks, many other application makers have yet to follow suit.

"It's always good for developers to think about security and security holes, especially if they are providing an automated scripting language to automate tasks," Baccas told The Register. "I would like to talk to people from Autodesk about this problem."

Autocad developers are already on the case, said Noah Cole, a senior communications manager at Autodesk. The next version of the program will be redesigned so scripts are loaded in a "more secure and trusted manner," he said.

The most recently discovered virus spreads through a scripting file called acad.vlx, which is transmitted when designers exchange their work. Once it's on a user's machine, it gets loaded each time Autocad is started. Similar Autocad viruses were reported in 2005, but have largely been dormant since then.

Sophos and most other anti-virus programs detect the viruses, Cole said.

More about the viruses is here and here. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.