The Channel logo

News

By | John Leyden 1st August 2006 11:20

Worm targets Windows PowerShell script

Fresh target. Usual dialogue

Virus writers have created an experimental form of malware written in Windows PowerShell script, the command line and scripting language used by Windows.

Cibyz was developed by the same Austrian VXers who developed proof of concept malware targeting Microsoft Command Shell (MSH) technology, later renamed PowerShell.

Cibyz represents a refinement of earlier malware that's capable of infecting Windows XP and Windows Server 2003 machines, as well as Vista boxes.

Although the technique used to develop the Cibyz worm is novel, its propagation techniques are all too familiar. The worm attempts to spread via the Kazaa P2P file sharing application by posing as one of a variety of useful utilities. Users who attempt to open these illicit files (scripts) will find themselves infected. However, the worm does little damage apart from dropping a copy of itself in shared folders used by Kazaa.

The malware isn't spreading. Anti-virus firms classify Cibyz as a low-risk threat. ®

alert Send corrections

Opinion

Alexandre Mesguich

Change is order of day as tech giants shift strategy gears
Partnership

Frank Jennings

Confused? No problem, we have 5, no 6, no 7... lots of standards

Chris Mellor

VC sequence could end not with a bang, but a whimper
Sad man stares glumly over boxed contents of desk. Image via shutterstock (Baranq)

Features

money trap conceptual illustration
Big boys snare the unwary with too-good-to-be-true deals
Angus Highland cow
Pet carriers not wanted for whitebox stampede
FBcoldstoragearray
Sorry OpenStack and Open Compute, we're not all Facebook
Gary Kovacs, CEO of AVG. Pic: World Economic Forum
Scammy download sites? Government snooping? Run of the mill for Gary Kovacs