Email this article   Print article 


Staples Corporate Systems Hit With Malware Attack

By Robert Westervelt
April 05, 2013    6:35 PM ET

Office supply chain Staples is busy containing a quickly spreading malware attack on its corporate systems.

The Framingham, Mass.-based retailer locked down its corporate systems on Thursday when it detected the notorious Changeup worm spreading on its share drives. Employees were notified about the infection in an email message this week, CRN has learned.

Company spokesperson Mark Cautela was reached by CRN and said he would look into the matter but did not respond Friday with details about the incident or indicate whether the infection exposed customer data.

[Related: 5 Factors Fueling Wave Of Java Attacks]

The worm spreads through removable and mapped drives, and the malware author continually changes it, making it difficult for antivirus and some network security appliances to prevent it from infecting systems. The worm installs a file-sharing program removable storage drives and mounted network shares and makes copies of itself in the shared folder, causing it to quickly spread through corporate endpoint machines, said Marc Maiffret, CTO of Carlsbad, Calif.-based identity and threat management firm BeyondTrust.

"Malware doesn't discern between consumers and corporations," Maiffret told CRN. "If companies were doing the right things such as egress filtering to control executables coming in and out of the environment, they should be able to safely mitigate this type of malware."

In many cases, companies isolate network shares from systems containing more sensitive data, but even network shares can and often contain confidential data, he said. However, many times companies ignore even the basics of using antivirus on network shares because of performance reasons or a lack of understanding of how to implement it properly, Maiffret said.

Changeup infections initially spread via spam messages and through malicious links on social networking websites. Symantec warned in November that it had detected increased infections of the worm.

The worm also spreads by exploiting a Windows Shell shortcut file execution vulnerability, which was patched by Microsoft in 2010, Symantec said in its analysis of the worm.

Once it gains a presence on systems, the worm contacts a remote command-and-control server and downloads additional malware. Security firms have identified Changeup downloading banking Trojans, including Zeus and the peer-to-peer Zbot Trojan, but the malware frequently changes.

The Changeup worm exhibits characteristics typically found in a Trojan, according to U.K.-based security firm Sophos, which also provided analysis of it in November.

PUBLISHED APRIL 5, 2013

To continue reading this article, please download the free CRN Tech News app for your iPad or Windows 8 device.
Related: Videos | Slide Shows | Comments

SHARE THIS ARTICLE

More Security

Recent Articles

Name Of The Game: Top 10 States For Identity Theft

A Federal Trade Commission report provides statistics on identity theft and fraud complaints in 2012. Learn which state has the dubious distinction of having the most victims.

5 Ways To Avoid A Stolen Password Pitfall

Avoiding having your email or Facebook account hijacked or bank account drained takes a little work, but following these steps can greatly reduce the risk.

5 Phishing Attack Trends You May Have Missed

Phishing attackers change their tactics often, and a new report issued by the Anti-Phishing Working Group found the latest techniques have boosted the speed and efficiency of their campaigns.

  More Slide Shows




Related Videos
Loading...