![]() The executable will make a copy of itself and AUTORUN.INF on all the disk partitions and shared drive connections which it can see, and then open the root folder normally. You can find documentation of some of the possible things which this file can do, but basically, the worm version will either run the executable immediately, or modify the Windows Explorer default behaviour so that the worm will run as soon as you open the stick by double-clicking on it. When you put the stick in the PC, Windows finds AUTORUN.INF "automagically". They have an AUTORUN.INF file and an executable of some kind. These worms pretty much all reproduce the same way, at least in terms of how they jump to and from PCs. (Here's a rule of thumb for you: any time you see stuff which starts without the user asking it to, look for malware to pop up in short order.) The culprit, of course, is Microsoft's desire to make things "simple" - meaning "automatic" - for Joe Sixpack there's a fundamental incompatibility between a home entertainment system, which Windows has become, and an operating system for getting work done. ![]() ![]() For those of us who remember the first MS-DOS viruses, which spread almost exclusively via diskette, it's rather nostalgic. Lately, we've been seeing a lot of worms, and even some genuine viruses (*), coming into our network via USB memory sticks (aka "pen drives"). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |