{"id":55,"date":"2008-01-14T00:11:27","date_gmt":"2008-01-14T08:11:27","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/01\/14\/digital-photo-frames-infected-with-a-trojan-horse\/"},"modified":"2008-01-14T00:19:07","modified_gmt":"2008-01-14T08:19:07","slug":"digital-photo-frames-infected-with-a-trojan-horse","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/14\/digital-photo-frames-infected-with-a-trojan-horse\/","title":{"rendered":"Digital Photo Frames Infected With a Trojan Horse"},"content":{"rendered":"<p>Reports of three photo frames that came infected with a Trojan Horse were received by the Internet Storm Center this Christmas.\u00a0 The photo frames made by Advanced Design Systems were bought from different Sam&#8217;s Club stores.&#8221;It propagates to any connected device by copying a script, a com file and an autorun file,&#8221; one consumer reported to the ISC. &#8220;It hides all systems files and itself while completely eliminating the user admin ability to show hidden files. It creates processes that negate any attempt to go to anti virus and anti spam web sites.\u00a0 It prevents the remote installation of any antivirus components&#8221; (Robert Lemos, Security Focus).<\/p>\n<p>\u00a0Both Advanced Design Systems and Sam&#8217;s Club representatives could not be reached for comment by Security Focus, but it is suspected that the malware could have come in the manufacturing plant or from frames that were put back on shelves after being infected and returned to the stores.\u00a0 Often stores do not have very stringent policies on returns and will not know that an electronic has been compromised.\u00a0 Manufacturing plants can introduce a virus through an infected computer in the plant or perhaps an insider.\u00a0 Some manufacturers have made efforts to stem this rising trend by making sure all equipment and computers are not attached to any outside network.<\/p>\n<p>This is not the first time that consumer electronics have been infected with malware and viruses.\u00a0 Anything with on-board memory has the potential to be infected including MP3 players, USB drives, hard drives, and even musical sunglasses.<\/p>\n<p>Some examples of past incidents due to mistakes in manufacturing processes include a hard\u00a0drive from Seagate in October 2007 and\u00a0Apple&#8217;s iPods in 2006.\u00a0 The Seagate hard drives\u00a0had a Trojan horse program that stole\u00a0account\u00a0identification and passwords for a\u00a0Chinese online game.\u00a0 \u00a0They had been infected at the manufacturing plant in China because of a computer at the plant that\u00a0was infected.\u00a0 The iPods had a Windows virus sneak on board the hard drive.<\/p>\n<p>It is not known whether this most recent attack was a mishap or intentional, but certainly there is a possibility of intentional attacks on consumer electronics.\u00a0 With the\u00a0proliferation of personal electronics, this will be an increasing problem in the coming years.<\/p>\n<p>\u00a0Lemos, Robert. &#8220;Malware Hitches a Ride on Digital Devices,&#8221; Security Focus, Jan. 9 2008. <a href=\"http:\/\/www.securityfocus.com\/news\/11499\">http:\/\/www.securityfocus.com\/news\/11499<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reports of three photo frames that came infected with a Trojan Horse were received by the Internet Storm Center this Christmas.\u00a0 The photo frames made by Advanced Design Systems were bought from different Sam&#8217;s Club stores.&#8221;It propagates to any connected &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/14\/digital-photo-frames-infected-with-a-trojan-horse\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[40,44,41,43,45],"class_list":["post-55","post","type-post","status-publish","format-standard","hentry","category-current-events","tag-advanced-design-systems","tag-malware","tag-photo-frames","tag-sams-club","tag-trojan-horse"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/55","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=55"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/55\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=55"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=55"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}