IBM USB sticks at company supplied, which contain a file infected with malicious code. It’s sticks with an initialization tool for certain devices from IBM’s storage family Storwize . The compromised USB flash drives went on companies Gen 1 who ordered the Storwize systems V3500, V3700 or V5000. “
is the tool to initialize a Storwize-system of the stick started, it copies itself to a temporary folder on the drive of the connected computer – and thus also the malware. On Windows systems, the target folder is TMP%initTool, on Linux or Mac computers / tmp/initTool. The dangerous file has an MD5 hash of 0178a69c43d4c57d401bf9596299ea57.
the number of delivered infected drives IBM not expressed. What kind is actually malware, how she came up with the sticks, and what does it actually remains unclear. In his warning the manufacturer however assured that his Storwize storage systems, nor stored data will be infected with the malicious code.
also a Windows based computer can be compromised only according to IBM, running the malicious file itself. The malware then try to infect the computer – and could download other malicious code from the Internet.
IBM according to current versions of many antivirus solutions detect the copied malware on a computer and remove them automatically. Includes Microsoft common software from Kaspersky, McAfee,and trend micro. Affected customers are recommended to verify the removal of the infected file through their anti virus software or as an alternative to remove the directory with the malicious file itself. For Windows systems, you should also ensure that the directory has been completely deleted and not just moved to the trash folder.
Furthermore, IBM the safe destruction of the USB flash drives or, optionally recommends the complete deletion of the folder, then download the archive with the original initialization tool FixCentral and unzip it on your Flash drive. Security, it is still advisable to manually check the USB flash drive with antivirus software.
“we tend to take more care at companies such as IBM in what they deliver to their customers”, security researcher comments on Graham Cluley . “And assume that it is unkompromittiert and squeaky clean. This confidence is obviously not always attached.”
get to know the building blocks of enterprise cloud platform in this audio Webinar. Learn how to achieve maximum freedom and flexibility for your applications. More outcome achieved with less input – specific application examples. [Update: the webinar has already occurred.] Register now and look at the record.