Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Mobile Vulnerabilities

  • Zero-Day Alerts

  • Recent Posts

  • Calendar

    August 2015
    S M T W T F S
    « Jul    
  • Email Subscription

  • About Us

    We have recently witnessed the arrival of a worm that takes advantage of the Windows Plug and Play vulnerability in order for it to propagate. It utilizes MS 05-039 and is given the name WORM_ZOTOB. As of the moment we currently have 6 detections of this said worm. What’s interesting about this new malware are the news indicating that flawed versions prevented the worm from propagating more effectively and more efficiently. These samples instead caused the infected system to enter into a reboot loop. Thus failing to maintain one of the cardinal rules of maliciousness… That is, to remain as discreet and as unknown to the target as possible. Obvious signs of infection would leave the target suspicious, and a continuous reboot would certainly be enough to stir up more than suspicions.

    Those that were hit by the “unwormly” worms “were ‘lucky’ because it gave them more time to stop the infection taking hold.” Well, ‘lucky’ may be a way to put it…

    Click this for the news.

    Share this article
    Get the latest on malware protection from TrendLabs
    Email this story to a friend   Technorati   NewsVine   MySpace   Google   Live   StumbleUpon

    Comments are closed.


    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice