Original URL: http://www.theregister.co.uk/2006/08/01/powershell_worm/
Worm targets Windows PowerShell script
Fresh target. Usual dialogue
Virus writers have created an experimental form of malware written in Windows PowerShell script, the command line and scripting language used by Windows.
Cibyz was developed by the same Austrian VXers who developed proof of concept malware targeting Microsoft Command Shell (MSH) technology, later renamed PowerShell.
Cibyz represents a refinement of earlier malware that's capable of infecting Windows XP and Windows Server 2003 machines, as well as Vista boxes.
Although the technique used to develop the Cibyz worm is novel, its propagation techniques are all too familiar. The worm attempts to spread via the Kazaa P2P file sharing application by posing as one of a variety of useful utilities. Users who attempt to open these illicit files (scripts) will find themselves infected. However, the worm does little damage apart from dropping a copy of itself in shared folders used by Kazaa.
The malware isn't spreading. Anti-virus firms classify Cibyz as a low-risk threat. ®