Jersey City, NJ (April 01, 2008) - In a startling discovery, Comodo scientists uncovered a new missing link into the source of particularly virulent group of computer viruses called Ze Lo Emes. Based on an analysis of millions of data points, the emergence of these computer viruses can now be linked to super massive black holes in this galaxy that leave behind long-lasting infrared radiation that mutate into viruses affecting core PC functions. The findings conclude that the ultra-high energy released by black holes transforms the binary code of running processes, literally changing zeroes to ones, causing affected computers to irreparably crash or lose data.
Most industry experts routinely attribute viruses and Trojan horses to hackers and basement-inhabiting script kiddies. However, this new evidence provides controversial evidence that the radiation causing viruses has spread quickly in the past few years as a direct correlation to the depletion of the Ozone layer. "It's an amazing process of code mutation," observed Robert Williams, Executive Director for the International Black Hole Radiation Institute in Brussels. "The radiation actually gets into users' computers and changes the binary code in the computer program. What's more, it's almost impossible to block. It originates over 4 million light years away and officially qualifies as the most remote exploit we've ever seen."
Comodo scientists centered their research on the afterglow from black holes which releases energy in the form of radiation waves, causing this form of computer virus. The persistent auras originate from the thick clouds of gas and dust, called accretion discs, which surround and sustain the black holes. Once released, the radiation bounces around in a labyrinth of gas and dust particles before ultimately escaping in the form of a virus radiation shower, causing system failures on a global scale.
To date, 401 variants of the Ze-Lo-Emes Black Hole Virus have been detected - infecting over 104,000 host machines. The viruses operate in a way similar to recently discovered root-kits and is capable of corrupting a computer's read only memory (ROM), making it undetectable by traditional antivirus software. More worrisome is the virus' capacity to survive the most extreme PC conditions, including the re-formatting of a hard drive.
Crashing particles from black holes make user data vulnerable
Some of the effects of these viruses are that user data is so compromised that the user actually receives a new digital identity. While the user may have difficulty determining if they have a new identity, some other telltale signs of contamination include a seemingly random download of "Logan's Run" (Director's cut). The virus will then abruptly shut down the entire computer, but only after a user's credit card had been charged for the movie download. Other systems failures may include the random launching of "Space Balls" movie or a widget appearing on a PC updating the user on recent UFO sightings.
Interestingly, the virus can only execute if a computer is in 'idle' mode, but is inert when the computer is either on or off. Researchers are not clear about the cause, but some employers seem to value the virus' ability to measure how much of an employee's time is not productive time at work. Despite some of the benefits of these viruses, Comodo advises extreme caution should a computer begin to exhibit strange behavior.
Comodo urges IT staffs to take another sweep through their servers and look for any code anomalies. Individual users can protect themselves by rejecting any request to download an unexpected codec or security program. Additionally, Comodo has developed a highly sophisticated, infrared v-shield in the form of a t-shirt that can be used to cover a computer when it is idle to shield it from any radiation. The t-shirt is now available at cafepress.com/comodorocks. As a final precaution, users can download Comodo Firewall Pro, PersonalFirewall.Comodo.com for protection that covers any PC mode.
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificate; award winning PC Security software; Vulnerability Scanning services for PCI Compliance; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet's ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.
For additional information on Comodo - Creating Trust Online® visit Comodo.com
For more information, reporters and analysts may contact:
Office: +1 (888) 266-6361