• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 20th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security
Malware

IBM Sent Off USB Sticks Infected with Malware

May 1st, 2017 Ali Raza Security, Malware 0 comments
IBM Sent Off USB Sticks Infected with Malware
Share on FacebookShare on Twitter

A new warning has been issued by IBM and the situation seems to be rather serious. According to the firm, there are a number of infected USB sticks out there with some very dangerous malware. The USB sticks in question were shipped with Storwize flash and they have hybrid storage systems. IBM suggests destroying the USB sticks immediately. Otherwise, your device can be infected with malware making the system vulnerable.

Apparently, the infected USB sticks contain a tool used for Storwize systems and it is the tool that was infected with malicious code, as unveiled by the IBM. The infected models include drives that have part number 01AC585 and that were shipped with Storwize V3500, V3700, and V5000 Generation 1 storage systems.

Related: A USB device can steal login credentials even if the PC is locked

When it comes to dealing with the infected device, the vendor recommended that users should first update their antivirus and then try to use the USB drive. It is also recommended to not to use the drive again and to destroy it, in order to cease the infection via the USB sticks.

Security company Trend Micro’s antivirus detected the malware as PE.WINDEX.A and claimed that it was served up by one of the North Korean websites. Other vendors have also been able to detect this malware, but they classified it as a Trojan that would attempt downloading other malware if executed.

IBM also stated that the malware/Trojan was not executed during the Storwize initialisation.

When it comes to dealing with the infected device, the vendor recommended that users should first update their antivirus and then try to use the USB drive. It is also recommended to not to use the drive again and to destroy it, in order to cease the infection via the USB sticks.

However, for those who do not wish to do so, IBM strongly recommends deletion of the malicious files and to complete reinstall the Storwize initialization package. After that, the users should scan the code with their updated antivirus and hopefully, that should be enough to deal with the malware that’s infecting the drive.

Related: Watch Out – This Killer USB Drive Will Fry Your Laptop

An alert concerning these infected USB drives was also issued by a Chinese PC giant called Lenovo. IBM has originally manufactured equipment that had Storwize systems for this very company, so it’s not strange that they would decide to include this warning as well.

This is another situation where an updated antivirus could be of huge help to the users, and they’re advised once again to update their software regularly, especially when malware are being sent off in every direction lately.


DDoS attacks are increasing, calculate the cost and probability of a DDoS attack on your business with this DDoS Downtime Cost Calculator.

  • Tags
  • hacking
  • IBM
  • internet
  • Malware
  • Privacy
  • security
  • TROJAN
  • USB
  • Vulnerability
Facebook Twitter LinkedIn Pinterest
Previous article Americans No.1 Ransomware Target & Most Likely To Pay Up
Next article Dark Web Hacker Held Netflix to Ransom
Ali Raza

Ali Raza

Ali Raza is a freelance journalist with extensive experience in marketing and management. His work has been featured in many major crypto and tech websites including Hacked, Hackread, ValueWalk, Cryptoslate, CCN, and Globlecoinreport to name a few. Raza is the co-founder of 5Gist.com, too, a site dedicated to educating people on 5G technology.

Related Posts
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Malwarebytes says it was also breached by SolarWinds hackers

Malwarebytes says it was also breached by SolarWinds hackers

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

22
Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping
Security

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

47
Malwarebytes says it was also breached by SolarWinds hackers
Hacking News

Malwarebytes says it was also breached by SolarWinds hackers

60

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us