China Jails Malware Scumbag, Forces Author to Write Removal Tool
When Chinese officials warned Internet users of a new worm inching around online earlier this week, little was known about the virus. The source of the worm has now been identified as a direct descendant of the "Panda Burning Incense" virus which had infected millions of Chinese PCs almost three years ago.
Also called Fujacks, the original Panda worm was initially launched during a time when public knowledge about computer security was lesser known than it is today. Not surprisingly, national panic ran wild as users sat back and watched in vain as the image of a panda bear holding three incense sticks danced across their monitor.
The virus proceeded to manipulate icons and files, all-the-while installing password-stealing Trojan horses unbeknownst to the targeted user.
Poetic Justice Leads to Arrest, Removal Tool
In a bit of poetic justice, the person responsible for the virus was apprehended, ordered to write a virus removal tool for the worm and was later sentenced to four years in prison. This was to be one of the first Chinese virus-writing arrests ever recorded. (Source: yahoo.com)
McAfee lab researcher Vu Nguyen believes that the new incarnation of "Panda Burning Incense" is much more devious. Said Nguyen, "It has gotten more complex with the addition of a rootkit. It definitely makes it more challenging for users to clean up and even to know that their systems have been compromised." (Source: pcworld.com)
Not Initially Linked With Panda
When Chinese officials had first discovered the new version of the bug, it was called "Worm_Piloyd.B" and was not connected with Panda. All that was known about the "new" attack was that it blocked a PC from restoring infected files, disabled the antivirus software and directed the machine to malware-infected havens.
Luckily, many believe that the new worm will not likely infect as many computers as the original panda virus did. The Internet community has now become much more aware of lurking malware, while anti-virus companies continue to churn out the latest in defense software.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.