Hewlett-Packard has issued a [Page no longer available – we have linked to the archive.org version instead] detailing a security vulnerability with two types of optional HP USB drives intended for use with some of the ProLiant family of servers. This vulnerability could cause a local ‘W32.Fakerecy’ or ‘W32.SillyFDC’ virus infection. Yes, HP is unwittingly distributing malware.
According to Symantec, both W32.Fakerecy and W32.SillyFDC are worms that replicate by copying themselves to removable and mapped drives. Luckily for HP they are easy to contain and to remove, and the damage they cause seems to be limited to some small performance degradation. It is not known if either of them may also, at some later date, download other malware.
Now while this is on the face of it a minor problem, easily repaired, it exposes a much larger and potentially more dangerous question; namely, how did these viruses (virii?) get there in the first place? The SANS Institute’s Internet Storm Center suspects that the infection originated at HP, but to date there has been no confirmation or denial from HP. If their genesis was indeed the HP factory it begs the supplementary question: how did they evade the test and qualification procedures and find their way into the bill of materials/bill of files? Would these procedures have caught a more virulent and aggressive malware infection before it escaped from HP to wreak havoc? Not in a million years would we have considered HP to be a malware Hot Zone.
|No Paywall Here!
The Internet Patrol is and always has been free. We don't hide our articles behind a paywall, or restrict the number of articles you can read in a month if you don't give us money. That said, it does cost us money to run the site, so if something you read here was helpful or useful, won't you consider donating something to help keep the Internet Patrol free?