Announcement

Collapse
No announcement yet.

Energizer USB battery charger contains backdoor

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Energizer USB battery charger contains backdoor

    http://blogs.zdnet.com/security/?p=5...g=wrapper;col1
    When the Energizer UsbCharger software executes, it utilizes the UsbCharger.dll component for providing USB communication capabilities. UsbCharger.dll executes Arucer.dll via the Windows rundll32.exe mechanism, and it also configures Arucer.dll to execute automatically when Windows starts by creating an entry in the HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run registry key.

    US-CERT said that Arucer.dll is a backdoor that allows unauthorized remote system access via accepting connections on 7777/tcp.

    Uhh, wow. Remind me not to buy one of those.
    45 5F E1 04 22 CA 29 C4 93 3F 95 05 2B 79 2A B0
    45 5F E1 04 22 CA 29 C4 93 3F 95 05 2B 79 2A B1
    [ redacted ]

  • #2
    Re: Energizer USB battery charger contains backdoor

    http://threatpost.com/en_us/blogs/ht...-client-030910

    The phone, the HTC Magic, runs the Google Android mobile operating system, and is one of the more popular handsets right now. A researcher at Panda Security received one of the handsets recently, and upon attaching it to her PC, found that the phone was pre-loaded with the Mariposa bot client. Mariposa has been in the news of late thanks to some arrests connected to the operation of the botnet.
    I'm sure many of us here have Autorun disabled for damn near everything. But I'm quite certain a large portion of the population at large doesn't.

    I was just reading this one as you were posting that, thought it seemed to apply here.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

    Comment

    Working...
    X