![]() XHost |
Oferim servicii de instalare, configurare si monitorizare servere linux (router, firewall, dns, web, email, baze de date, aplicatii, server de backup, domain controller, share de retea) de la 50 eur / instalare. Pentru detalii accesati site-ul BluePink. |
A new malicious worm began infecting systems last week, which promises to launch an attack on February 3rd – and the 3rd of every month thereafter, according to threat researchers at antivirus and content security firm Trend Micro. The new worm, known by such names as Nyxem, BlackMal, Mywife, and CME-24, has infected hundreds of thousands of machines over the past week, most from unsuspecting users who do not yet know they are infected. Like most worms, WORM_GREW.A propagates via email attachments and network shares, including popular P2P file sharing services. The email method of transmission employs common social engineering techniques – including the promise of pictures, pornographic content, or a joke – to entice users to open the corresponding attachment. According to Jamz Yaneza, Senior Threat Analyst at Trend Micro, though this worm utilizes common propagation techniques, the code itself is anything but common. “This is a destructive virus that deletes and overwrites any number of files present on a user’s system, by targeting the most popular file formats – including .DOC, .XLS, .PPT, .PDF, and .ZIP, to name just a few” says Yaneza. “In addition to losing a great deal of data, this virus also renders the keyboard and mouse inoperable, thereby leaving the user’s system dead in the water.” Yaneza adds that this is a truly global threat, affecting computer systems in over 150 countries, to date. There is good news, though. Since this threat is relatively well-known to the security industry, most major security vendors – including Trend Micro – detect this worm and its variants. Trend Micro has specific detection for all currently-known variants of this worm, and successfully detects all new variants generically, thereby providing broad protection against this threat. Additionally, Trend Micro has the capability to automatically remove this worm, via its Damage Cleanup Services. Trend Micro customers can visit: http://ro.trendmicro-europe.com/enterprise/support/tsc.php to utilize this service. Security Guidance: “The best defense is for users to run a scan of their systems, to ensure they haven’t been infected” says Jeffrey Aboud, Trend Micro’s Threat Response Manager. “The attack is hard-coded in the Worm, so if they haven’t been infected, then there’s no need to worry about the February 3rd attack, as long as they stay clean.”
Accesed for 204 times.
[Click on any headline for the full story].