• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Bad Sites   »   McDonald’s Japan Recalls Promotional MP3 Players

McDonald’s Japan Recalls Promotional MP3 Players

  • Posted on:October 18, 2006 at 7:55 am
  • Posted in:Bad Sites
  • Author:
    Ryan Flores (Threat Research Manager)
1

McDonald’s Japan recalled around 10,000 MP3 players that is part of its promotional prizes, on a statement released by the company last Friday, October 13th 2006.


The recall is due to the fact that some of the MP3 players were found to be infected by WORM_QQPASS.ADH. This worm propagates through removable drives and is the most probable cause of infection.


This worm malware will automatically execute once the infected MP3 player is plugged into the USB drive of the user. This action is caused by the autorun.inf file dropped by the malware which is designed to execute the worm.


There are two other Trojan type malwares that were reportedly found on some MP3 players – TROJ_AGENT.FAO and TROJ_BANLOAD.BGE. The presence of the two malwares may mean that the image used by the MP3 player supplier is already infected.


McDonald’s Japan promptly recalled the promotional MP3 players and opened its phone lines for inquiries.


Trend Micro released OPR 3.845.00 late Friday night to detect all three malwares and prevent any further infection.

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»

Featured Stories

  • systemd Vulnerability Leads to Denial of Service on Linux
  • qkG Filecoder: Self-Replicating, Document-Encrypting Ransomware
  • Mitigating CVE-2017-5689, an Intel Management Engine Vulnerability
  • A Closer Look at North Korea’s Internet
  • From Cybercrime to Cyberpropaganda

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • BlackSquid Slithers Into Servers and Drives With 8 Notorious Exploits to Drop XMRig Miner
  • Infected Cryptocurrency-Mining Containers Target Docker Hosts With Exposed APIs, Use Shodan to Find Additional Victims
  • CVE-2019-0725: An Analysis of Its Exploitability
  • CVE-2019-11815: A Cautionary Tale About CVSS Scores
  • New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices

Popular Posts

  • May’s Patch Tuesday Include Fixes for ‘Wormable’ Flaw in Windows XP, Zero-Day Vulnerability
  • New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices
  • Linux Coin Miner Copied Scripts From KORKERDS, Removes All Other Malware and Miners
  • Trickbot Adds Remote Application Credential-Grabbing Capabilities to Its Repertoire
  • Exposed Docker Control API and Community Image Abused to Deliver Cryptocurrency-Mining Malware

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.