Door Anoniem: Heeft iemand enig idee om welke malware het precies gaat, en hoe de malware in de firmware van de server terecht is gekomen (opzettelijk t.b.v. spionage, danwel per ongeluk door een geinfecteerde computer waarop aan de firmware werd gewerkt) ?
Ooit gehoord van google, ooit gehoord van dell.com, ooit gehoord van een support forum?
http://en.community.dell.com/support-forums/servers/f/956/t/19339458.aspx
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Here are further details regarding the instance of malware introduced on some service motherboards discussed on this forum that affects a very small set of customers. We are proactively contacting identified customers and are working with them to quickly resolve any potential exposure.
There are important pieces of information to note:
1. This issue does not affect any Dell PowerEdge servers shipped from our factories and is limited to a small number of the replacement motherboards only which were sent via Dell’s service and replacement process for four servers: PowerEdge R310, PowerEdge R410, PowerEdge R510 and PowerEdge T410. The maximum potential exposure is less than 1% of these server models.
2. Dell has removed all impacted motherboards from the service supply. New shipping replacement stock does not contain the malware.
3. The W32.Spybot worm was discovered in flash storage on the motherboard during Dell testing. The malware does not reside in the firmware.
4. All industry-standard antivirus programs on the market today have the ability to identify and prevent the code from infecting the customer’s operating system.
5. Systems running non-Microsoft Windows operating systems cannot be affected.
6. Systems with the iDRAC Express or iDRAC Enterprise card installed cannot be affected.
7. Remaining systems can only be exposed if the customer chooses to run an update to either Unified Server Configurator (USC) or 32-bit Diagnostics.
Dell takes customer security and privacy very seriously. Although we are not aware of any reports of customer related issues, we are proactively working with customers to resolve any potential exposure.
Concerned customers can contact Dell technical support at: US_EEC_escalations@dell.com
Ik zelfs stel hier ook wel eens wat vraagjes, maar soms kun je zelf ook een hoop achterhalen
Met bovenstaande is de vraag niet beantwoord hoe de worm erop is gekomen, maar daar je zelf
ook misschien achterkomen. Hoe?? e-mail, bellen, fax, support forum.
Dus zoek zelf ook eens wat uit, soms is het niet eens zo moeilijk.