Adam Biviano, premium services manager at Trend Micro A/NZ, stated that the worm enters a machine and hides itself, downloads a trojan, and logs passwords and other user activities.
“It’s not designed to target .gov, Microsoft or other well known files. It’s trying to hide itself from those that can source it. It’s still proving that the user is the weakest link,” said Biviano.
Biviano estimates a thousand Australian computers have been infected by the worm since it was first detected a few months ago.

iTnews Cloud Covered Breakfast Summit
Huntress _declassified Virtual Event
Live & Hands On Demo: Navigating the BMC AMI DevX Platform to Understand Code Faster Using AI
Melbourne Cloud & Datacenter Convention 2026
iTnews Executive Retreat - Data & AI Edition



