Dell Replaces Server Parts Infected with Virus

By Reuters  |  Posted 2010-07-23 Email Print this article Print
 
 
 
 
 
 
 

Dell is offering replacement parts to customers with servers infected with a computer virus that was designed to steal private data. The W32.Spybot worm infected motherboards that were replacement parts and not shipped with new machines, Dell said.

BOSTON, July 22 (Reuters) - Dell Inc (NASDAQ:DELL) is giving customers replacement parts for servers that were infected with a computer virus designed to steal private data.

The company said it was not aware of any attacks as a result of the rare incident, and that it was replacing the tainted parts as quickly as possible.

"We're going after it very aggressively to make sure that nobody runs into a potential problem," said Forrest Norrod, vice president and general manager of server platforms for Dell.

He said that the virus, known as the W32.Spybot worm, infected motherboards that were replacement parts and not shipped with new machines.

The virus got onto the motherboards after software used to test them was infected due to human error, Norrod said.

The incident underscores the growing threat posed by hackers. While experienced computer users are wary of files that they take off the Internet, few think of their computer hardware as vulnerable.

Dell said on its website that the issue affects less than 1 percent of four of its server models -- PowerEdge R310, R410, R510 and T410. It said customers would be safe from attack if they were running up-do-date anti-virus software.

Businesses use servers to manage large amounts of data. A virus attacking a server can do more harm than one that infects a personal computer.

W32.Spybot, discovered in 2003, is designed to establish communications with remote handlers who instruct it to perform a variety of tasks, said Dean Turner, a research director at computer security software maker Symantec Corp.

"It can do a lot of things based on the directions it receives, but it is primarily designed to steal confidential information," he said. (Reporting by Jim Finkle. Editing by Robert MacMillan and Tim Dobbyn)
 

 
 
 
 
 
 
 
 
 
























 
 
 
 
 
 

Submit a Comment

Loading Comments...
























 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date