A new trojan horse executable with the name google_accessibility.exe is making the rounds. Purporting to enable the blind and visually impaired to work around Google’s inaccessible visual verification scheme, it actually corrupts the data on the attacked system’s hard drives, rendering such systems inaccessible and effectively useless. In addition, all data on any mapped drives connected to the attacked system over a network share is completely erased. Recovery requires a full reformat and clean reinstallation of the operating system and all applications.
Google_accessibility.exe is extremely tempting to those whom have found themselves increasingly locked out of Google’s services due to inaccessible visual verification, but this trojan horse is not our salvation and must be avoided at all costs. A confirmed case of this attack resulted in the following catestrophic consequences:
- JAWS went silent after the program was run.
- A restart resulted in an unbootable operating system.
- The data on the attached hard drive was so corrupted as to be impractical to recover.
- A complete reformat and clean installation of Windows was required in order to restore the system to correct functionality.
- A backup drive connected by way of a network share was wiped clean.
- Approximately 100 GB of accessibility advocacy related materials, contact information, correspondence, documentation, e-mail, financial records, music, podcasts and other similarly critical data were completely lost.
- Tens or perhaps hundreds of hours may be required to restore the Accessibility Command Center to full operation!
Before you give up on the hard drive try SpinRight.
Not sure about accessibility but maybe you can have a sighted co-worker help if it is not.
http://www.grc.com/sr/spinrite.htm
In this case, due to the trojan, I wouldn’t trust any of the data on the drive.
Hey Darrell! That’s pretty scary… It amazes and disturbs me what some people will do. I wanted to learn more about this beast, but some quick searching
turned up nothing. Mind if I ask the source of this info?
Take care.
In all do respect Darel:
What made you think this file was what it claimed to be? Where did you get this file? how did you get it, dl or email? As the technician I “KNOW” you are, I can’t fathum how this happened to “YOU”. You’re an amazing guy in regards to technology and it both angers and sadden’s me that some one in my opinion would target you in this manner if thus the case.
I am looking in to this. It is not good, and I hope to gain some information on this.
Bastards. Glad ya told me cuz I would’ve opened it about five seconds after seeing it. Who created that lil monster?
Yikes! Glad ya posted this cuz i would’ve opened it about five seconds after I read it. Thanx. Now who created that lil monster?
Do you mind if I post your entry on my blog? Absolutely unbelieveable!