Microsoft PowerShell targeted by worm


Microsoft PowerShell targeted by worm

Antony Savvas

Austrian virus writers have developed malicious code that targets Windows PowerShell, the new command line interface shell and scripting language being developed by Microsoft.

Internet security software firm McAfee has detected the MSH/Cibyz worm. MSH/Cibyz is designed to be spread using the Kazaa peer-to-peer file-sharing network, with the worm running in PowerShell.

PowerShell is due to ship later this year and will be used in products such as Exchange Server 2007.

The worm abuses PowerShell’s ability to execute scripts, by attempting to trick users into downloading and running malicious code.

To do this, it uses a series of product names that may be attractive to Kazaa users.

When run, the worm will overwrite some file types, change registry details and place itself in the machine's Kazaa shared folder, where it can be further spread to other users.

McAfee warned users to be cautious about what files they allow onto their machines from file-sharing networks.


Vote for your IT greats

Who have been the most influential people in IT in the past 40 years? The greatest organisations? The best hardware and software technologies? As part of Computer Weekly’s 40th anniversary celebrations, we are asking our readers who and what has really made a difference?

Vote now at:

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy