Energizer bunny in hacker scare
By Hani Megerisi
Posted on 8 Mar 2010 at 13:44
The Energizer bunny has finally been stopped – by a Trojan horse.
A USB-powered battery charger, available from the company, was found to contain the Arucer.dll Trojan, according to the US Computer Emergency Readiness Team (CERT) – a branch of the country’s Homeland Security.
An attacker is able to remotely control a system, including the ability to list directories, send and receive files, and execute programs. The backdoor operates with the privileges of the logged-on user
The file was hidden in the Windows driver software provided with the Energizer DUO charger. It listens for commands on port 7777 and, once activated, could download and execute files as well as send information to a remote hacker. Mac users are unaffected.
“An attacker is able to remotely control a system, including the ability to list directories, send and receive files, and execute programs," said the CERT statement. "The backdoor operates with the privileges of the logged-on user."
The Energizer DUO charger and its software have been sold throughout Europe, Asia and the US since 2007.
Energizer said in a statement that it had discontinued the unit and was “working with both CERT and US Government officials to understand how the code was inserted in the software”. The company has warned any users who have the DUO charger to uninstall it immediately.
CERT has also advised that blocking the 7777 port on a computer will block network connectivity through the backdoor.
Is your business a social business? For helpful info and tips visit our hub.
- The 5 most interesting UK businesses at SXSW
- Quickest way to upload 1GB? Hop on a train
- Move over Delia: IBM Watson is cooking tonight
- Eric Schmidt on the double-edged smartphone: friend and foe
- Getty joins the race to the bottom
- Hour of Code: five steps to learn how to code
- Sony Xperia Z2 Tablet review: first look
- Sony Xperia Z2 review: first look
- Samsung Galaxy Gear 2 review: first look
- Nokia XL review: first look
- Headings vs headers: how to use both in Word
- Windows Server 2012 R2: how the Datacenter edition could change SMBs
- Invoices and VAT: how to set up your documents correctly
- Nexus 5 vs Samsung Galaxy S4 Active: the best phone for avoiding screen burn
- How much is a social user worth?
- The key to choosing a secure password
- Thunderbolt Bridge: a fast Mac migration tool
- Should you advertise on Twitter?
- How to track a lost smartphone
- Self-publishing success: the best way to sell your book