Dell Cautions About Malware Infecting Its Motherboards

Dell, on July 21, 2010, asked its consumers to watch out for malicious software that had infected the motherboards of a few of the computer servers it manufactured. Warned the company, cyber-criminals could use the software to access data that were kept on those machines. The Wall Street Journal published this on July 21, 2010.

States Dell, the problem impacts only those consumers who've collected replacement motherboards in connection with 4 different servers namely PowerEdge T410, R510, R410 and R310.

In addition Dell further states that the malware merely inflicts damage on servers that have a particular configuration, while no latest anti-virus software is active on them.

State the security investigators that the virus that has infected the faulty motherboards is W32.Spybot that hasn't been tested with equal strictness like those that went inside the servers at the time of original manufacturing.

General Manager of server platforms, Forrest Norrod said that the detection of the W32.Spybot virus happened when an audit was being done. published this on July 22, 2010.

W32.Spybot reportedly existed from 2003. It penetrates Internet chat mediums to take instructions and this allows hackers to take control over the systems remotely.

Norrod further said that on checking the supply sequence, the company fixed 16 separate extra process stages towards ensuring that the malware attack didn't occur again. Meanwhile, Dell stated that it had listed the names of customers and were getting in touch with them via letters.

Graham Cluley, senior researcher at Sophos contended that the malware episode, though somewhat limited in range, didn't augur for the enterprise's well-being. TG Daily published this on July 21, 2010.

Cluley additionally remarked that despite the malware merely affecting Windows computers, it still put Dell in an embarrassing situation. For, doubts would arise regarding whether sufficiently strict quality control procedures had been adopted so that such unauthorized code could be prevented on the company's hardware products prior to their shipping.

Nevertheless, it's rare to have hardware components arriving pre-contaminated. Still, Dell's instance occurs when US government authorities feel increasingly concerned of foreign-manufactured parts' security during supplies for vital private industries and defense.

Related article: Delhi Police Busted Online Lottery Scam

ยป SPAMfighter News - 8/3/2010

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page