USB Flash Drives May Contain Malware, IBM Warns

3May - by Dawood Khan - 0 - In News

IBM has issued a security alert last week, warning customers that some USB flash drives shipped with IBM Storwize products may contain malicious code.

What happened to Google’s Plan to make every Book searchable Google Books was the company’s first moonshot. But 15 years later, the project is stuck in low-Earth orbit. Books can do anything. As Franz Kafka once said, “A book must be the axe for the frozen sea inside us.”It was Kafka, wasn’t it? Google confirms this. But where did he s...

The USB flash drive is said to store the Initialization Tool for IBM Storwize, a big data storage system (rack-based disks system) for data centres.

The part number of the infected flash drives is 01AC585. IBM says these USB sticks have been shipped with products such as:

IBM Storwize V3500 - 2071 models 02A and 10A
IBM Storwize V3700 - 2072 models 12C, 24C and 2DC
IBM Storwize V5000 - 2077 models 12C and 24C
IBM Storwize V5000 - 2078 models 12C and 24C

IBM Initialization Tool USB (left); IBM Storwize rack (right)

"Neither the IBM Storwize storage systems nor data stored on these systems are infected by this malicious code," said IBM.

Hackers Are Using An Effective Way to Spread Fake News From Verified Accounts Social media networks are no doubt a quick and powerful way to share information and ideas, but not everything shared on Facebook or Twitter is true.Misinformation, or "Fake News," has emerged as a primary issue for social media platforms, seeking to influence millions of peo...

Furthermore, USB flash drives used for Encryption Key management, which also ships with Storwize equipment, are not affected by this issue.

Malicious code is copied, but not executed

According to IBM, when users run the IBM Storwize Initialization Tool, the malicious code is copied, along with the rest of the Initialization Tool, on the user's device. The location where this data is copied is:

On Windows systems: %TMP%initTool
On Linux and Mac systems: /tmp/initTool

IBM says the malicious code is only copied to user devices, but not executed. The company didn't provide details about the nature of this malicious code, or how it got on its USB flash drives, but based on current detections on antivirus engines, this appears to be a basic malware downloader.

IBM recommends formatting USB sticks

The company recommends that Storwize customers scan their system for the aforementioned folders and remove the directories.

Once the malicious code has been removed from infected devices, IBM recommends that users format their USB flash drive, download a safe copy of the Storwize Initialization Tool, and unzip its content on the original USB flash drive.

U.S. foreign intelligence surveillance requests has more than doubled Microsoft Corp (MSFT.O) said on Thursday it had received at least a thousand surveillance requests from the U.S. government that sought user content for foreign intelligence purposes during the first half of 2016.The scope of spying authority granted to U.S. intelligence agen...

Leave a Reply

Your email address will not be published. Required fields are marked *