Dell System Boards replaced with Malware

PeterWallace

It seems to never end as to how Malware get spread around or the war to prevent you from infection.

In a post on the Dell Community Website (http://en.community.dell.com/support-forums/servers/f/956/t/19339458.aspx) that was brought to my attention today it stated that for a short period four different servers replacement mother boards were infected with the W32.Spybot.Worm (http://www.symantec.com/security_response/writeup.jsp?docid=2003-053013-5943-99) . It was found on 4 server models: PowerEdge R310, PowerEdge R410, PowerEdge R510 and PowerEdge T410. Dell was quick at pulling the lot and going out and replacing the others. They claim it was less than 1% of the servers out there.

I have a few problems with this. Just how does a system board get infected with W32.Spybot.Worm that is a from a family of worms that spreads using the Kazaa file-sharing network and mIRC? This worm can also spread to computers that are compromised by common back door Trojan horses and on network shares protected by weak passwords. Does the system manufactures not have systems in place to catch this kind of things? How many other times have you received something that is infected? Just when you thought it would be safe you read more about careless companies not protecting themselves and others.

How can you keep yourself safe from Virus or Malware?

1) Know who you are dealing with

2) Use Security software that updates automatically and scans incoming and outgoing files

3) Protect YOUR Personal Information. It’s your most valuable asset

4) Backup your important files. Don’t forget about your pictures and home movies you have stored

5) Keep your Computer Operating system and software fully patched and use the automatic settings to update them

6) Run a firewall on your PC

7) Keep your passwords safe, strong and secure. Also don’t use the same password for everything!

8) Be careful about what you download. Many “file sharing” sites are full of virus and malware software

9) Think before opening the e-mail attachments and ask yourself would that person send that or do I know that person.

10) If you think you are infected work at removing it or take it to a professional.

Now I just need to run and fill out this form I just received for the 20 Million Dollars left to me from the Late Dr. DoWeCheatemAndHow. I’m finally rich! J

Thanks and safe surfing

Peter Wallace

By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers
By Eberly Systems July 9, 2024
Keeping you abreast of security news