Attempted virus fumbles attack on F-Secure

Posted by   Virus Bulletin on   Nov 6, 2007

Flawed file-infector fails to frighten Finns.

A highly buggy intended virus has been found to include an attempt to launch a DDoS attack on the websites of Finnish security firm F-Secure, alongside a suggestion that the firm's head of labs Mikko Hyppönen needs a haircut.

The flawed parasitic malware, which appears to have been written by an old-style hobbyist virus writer and submitted directly to virus labs, corrupts files rather than infecting them and cannot launch its intended payload due to further bugs. The writer claims to be based in Iraq, and the code includes the words 'Sadam Was God' backwards.

Had it worked, infected systems were supposed to have launched their attack on the 28th of the month, and displayed a popup including the words 'Mikko cut ur ponytail', a reference to the company's chief research officer Hyppönen, ranked one of the 50 most important people on the web by PC World earlier this year.

More details, including screenshots, are in a Sophos blog entry here.

Posted on 06 November 2007 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

New article: Dissecting the design and vulnerabilities in AZORult C&C panels

In a new article, Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his team's findings related to the C&C design and some security issues they identified.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.