HP printer drivers hit with Funlove virus
Blast from the past mainly affects Asian market
IDG News Service - Hewlett-Packard Co. on Thursday pulled a printer driver from its Web site after security vendor BitDefender reported that the software was infected with the same computer virus that infected HP's drivers more than five years ago.
A BitDefender partner notified the security vendor of the infected driver software on Wednesday, and the company's security researchers soon determined that it had the same Funlove virus that had plagued HP in December 2000.
BitDefender notified HP of the problem on Wednesday, and the infected printer driver was removed from HP's Web site early Thursday, said BitDefender spokesman Vitor Souza.
Until then, the virus was being distributed with the Korean version of the Windows 95/98 driver for HP's Officejet g85 All-in-One printer. HP no longer sells the all-in-one printer, and the current antivirus products are able to block it. So while the oversight is an embarrassment for HP, it's unlikely that many users were affected by Funlove.
Previously, HP had inadvertently distributed the Funlove virus in Japanese printer drivers that were made available on the company's Web site. Souza believes that HP most likely neglected to remove this particular infected driver back in 2000. "Its just like nobody had run a test against antivirus [software]," he said.
Even for users who fall prey to the virus, the consequences are not severe.
When it gets installed, the Funlove pops up a text message that reads "Fun Loving Criminal," and then attempts to reboot the PC. On Windows NT machines, it attempts to change system settings so that files that can normally be seen only by administrators are visible to all.
HP executives were not immediately available to comment for this story.
BitDefender is owned by Softwin SRL, based in Bucharest, Romania.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Mobile Applications Case Study: 8 Billion Transactions a Day The story documents how the online brokerage company tradeMONSTER created a custom mobile app and the success gleaned from this initiative. Also covered...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Malware and Vulnerabilities White Papers | Webcasts