Well…it sounds like Dell’s done it again.
In a story released by the Reuters News wire, Dell is having to replace server components, specifically the motherboards used to build them, and that the virus, called the W32.Spybot worm, which was written to steal sensitive information from the client / end – user’s servers and workstations, wasn’t caught because the application Dell uses to test hardware components was itself infected with the bot “as a result of human error”, said Forrest Nerrod, the GM and VP of Dell’s server platforms.
Nerrod also indicated that the virus infected motherboards shipped as replacement parts and not boards shipped with new systems.
What’s at issue is whether hardware components are just as vulnerable to virus and trojan attacks as the software that runs on it. Well, guess what? It is! The W32 bot was originally discovered in 2003 and establishes communications with remote ‘handlers’ who in turn instruct the bot to perform various tasks, including the theft of sensitive data.
Dell said on its website that the issue affects less than 1 percent of four of its server models — PowerEdge R310, R410, R510 and T410. It said customers would be safe from attack if they were running up-do-date anti-virus software.
They probably want people to run the virus software they include on their machines, which I believe is Trend Micro, which, according to PC World doesn’t even rank in the top 10, but there are infinitely better AVs available.