The malware achieves this byĬopying a malicious executable in the drive and modifying theĪUTORUN.INF file so that Windows opens the malicious file silently as The problem is that this feature, widely criticized by the securityĬommunity, is used by malware in order to spread by infecting as soonĪs a new drive is inserted in a computer. ![]() Normally located in the root directory of removable media and contains,Īmong other things, a reference to the icon that will be shownĪssociated to the removable drive or volume, a description of itsĬontent and also the possibility to define a program which should beĮxecuted automatically when the unit is mounted. The AUTORUN.INF file is a configuration file that is Removable drives in order to know which actions to perform when a newĮxternal storage device, such as a USB drive or CD/DVD, is inserted The Microsoft Windows Operating Systems use the AUTORUN.INF file from ![]() Panda USB and AutoRun Vaccine at the Panda Labs Blog
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |