Dear Clients, Suppliers & Others
We offer the following information as to assist our associates in being aware of the ongoing threat of computer viruses.
On the 10th June 2015 at 10:05am, we received communication from various associates advising us that they were in receipt of a seemingly illegitimate and potentially infected email from one of our Trojanhorse.net.au email addresses. We enlisted the support of our I.T. consultants who began scanning our computer infrastructure in the attempt to locate a potential rogue virus on our systems.
A virus was not discovered within the Trojan Horse Interiors corporate network.
Trojan Horse Interiors performs yearly reviews on its I.T. infrastructure (including security) and adapts its technologies where required to best combat emergent threats. Our corporate firewall router’s security policies and configuration were reviewed and signed off with no reported weaknesses or issues. Our software platforms are maintained regularly with by our anti-virus provider and is based on current and historical industry benchmarks and testing. Our antivirus platform, (Kaspersky Anti-Virus) is frequently rated within the top three security products as detailed at AV-Comparatives.org and other industry reviews.
In this particular instance, the virus was eventually detected on a business-use home PC after the staff member received, and subsequently opened, a seemingly legitimate invoice email that was being expected from a regular supplier. The virus inside this email was a ‘zero-day’ virus infection, hence why it was able to slip through our Anti-Spam protection undetected. A zero-day virus is a previously unknown computer virus that is so new, the anti-virus companies have not yet updated their software to be able to effectively detect and combat the threat.
Kaspersky Antivirus is configured to update automatically every two hours but in this instance, it was not able to identify and stop the virus in effective time. The virus was then picked up 24 hours after initial infections and reported as UDS:DangerousObject.Multi.Generic residing in a temporary folder on the user’s C: drive and was subsequently removed.
We sincerely apologise for any inconvenience and hope that this information may be valuable to you in the maintenance of your own IT systems.
Nikki Cooper - Office Manager