Symantec: Phel Trojan horse attacks on Windows XP
It can affect systems, even if the latest XP service pack has been installed
Computerworld - Security firm Symantec Corp. is warning users of a newly discovered Trojan horse named Phel -- an anagram of the word help -- that attacks Windows XP. The Trojan is capable of remotely controlling a user's system even if the latest Windows XP Service Pack, SP2, has been installed.
The Trojan horse, distributed as an HTML file, attempts to exploit a vulnerability in Internet Explorer's HTML Help Control component in all versions of Windows. The vulnerability was discovered in October.
Microsoft is actively investigating new public reports of a criminal attack, according to a Microsoft spokesperson.
For the exploit to succeed, an attacker would need to entice a user to visit a malicious Web site and then would have to place the Trojan horse on the user's machine. If the Trojan executes successfully, potentially malicious software could be downloaded and run on the user's system, the spokesperson said.
Microsoft is working to forensically analyze the malicious code in Phel and will work with law enforcement agencies to identify and bring to justice those responsible for the malicious activity, he said.
"Microsoft is taking this vulnerability very seriously, and an update to correct the vulnerability is currently in development," the spokesperson said in an e-mail message. "We will release the security update when the development and testing process is complete, and the update is found to effectively correct the vulnerability."
Microsoft said customers in North America who think they may have been affected can receive help with security update issues or viruses at no charge by calling Product Support Services at 866-727-2338. International customers can receive the same level of support online at http://support.microsoft.com.
Customers in the U.S. who believe they have been attacked should contact their local FBI office or post their complaint online at www.ifccfbi.gov. Customers outside the U.S. should contact the national law enforcement agency in their country, the spokesperson said.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Infographic: Converged Infrastructure Benefits This Infographic quantifies the savings organizations are realizing from increased deployment speed, higher availability, and lower annual costs.
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control.
Enhance Your Virtualization Infrastructure With IBM and Vmware
Date: Wednesday, May 14, 2014, 1:00 PM EDT
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage...
All Malware and Vulnerabilities White Papers |