Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    December 2014
    S M T W T F S
    « Nov    
     123456
    78910111213
    14151617181920
    21222324252627
    28293031  
  • Email Subscription

  • About Us

    We have recently witnessed the arrival of a worm that takes advantage of the Windows Plug and Play vulnerability in order for it to propagate. It utilizes MS 05-039 and is given the name WORM_ZOTOB. As of the moment we currently have 6 detections of this said worm. What’s interesting about this new malware are the news indicating that flawed versions prevented the worm from propagating more effectively and more efficiently. These samples instead caused the infected system to enter into a reboot loop. Thus failing to maintain one of the cardinal rules of maliciousness… That is, to remain as discreet and as unknown to the target as possible. Obvious signs of infection would leave the target suspicious, and a continuous reboot would certainly be enough to stir up more than suspicions.

    Those that were hit by the “unwormly” worms “were ‘lucky’ because it gave them more time to stop the infection taking hold.” Well, ‘lucky’ may be a way to put it…

    Click this for the news.





    Share this article
    Get the latest on malware protection from TrendLabs
    Email this story to a friend   Technorati   NewsVine   MySpace   Google   Live   del.icio.us   StumbleUpon




    Comments are closed.



     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice