Windows AutoRun malware spreading : Disable AutoRun and restrict write permissions to share files
Be aware of malware that could infect your systems through a well-known bug in the Windows AutoRun software!
AutoRun software automatically launches programs on a DVD or USB device. The infection is suspected to be increased since the Windows 7 and 8 PCs as they will not launch autorun.inf files and Microsoft has released two patches for older systems. Security experts doubt that unpatched computers, shared folders and files and social media are the main causal entries!
So in-case you are trying to mount an USB or a CD, or even trying to access a shared location form an unpatched system, you are likely to be affected! Reports are also coming with the malware spreading through Facebook.
“I would say the AutoRun part of it is probably not the source of the majority of infections. It’s just an interesting note that [criminals] are still using it. I think spreading through the file shares is probably the primary vector to get people in trouble.”, said Chester Wisniewski, a senior security adviser for Sophos.
Once your system is infected the malware adds a key in your registry to enable to start when your PC is booted up, resulting in disabling to update your Windows! Finally, you will not be able to patch up your PC with the anti-malware update. Which could end up with your online banking credentials being stolen!
Take your steps of precaution, experts recommend to turn off AutoRun on Windows operating systems and restrict write permissions to file shares. Depending on the AV vendor, the malware has several names, including W32/VBNA-X, W32/Autorun.worm.aaeb, W32.ChangeUp and WORM_VOBFUS. Beware!