A malware outbreak is using a new twist on an old infection tactic, security experts have warned.
Many of the attacks take advantage of autorun, a feature in Windows that allows disks and removable media such as USB thumb drives to automatically load content when inserted into a system.
The feature can be disabled, and Microsoft recently released an update for Windows which allows users to set autorun permissions for each drive to prevent devices automatically launching code.
The exploitation of the feature has become a potent way for malware writers to spread infections. Many target thumb drives and other removable media by directing the Trojan to infect the target system, and to reinstall itself on any removable drives along with a specially crafted autorun file.
The infected drive can then either spread the malware to a new host, or reinstall itself on a recently cleaned system.
The tactic brings back memories of some of the earliest computer viruses which, in the days before the internet, spread by infecting floppy disks shared over multiple systems.
"During the past couple of years we have seen malware authors increasingly incorporate the autorun.inf infection vector into malware families, with stunning success," Thomas wrote.
"While the autorun functionality in operating systems does provide some convenience (it saves a couple of clicks), it has single handedly revived the 1980s model of hand-carried malware propagation."
Latest Tesla news: Tesla share price continues to fall after Saudi Arabia's sovereign wealth fund is linked to investment in rival
SEC 'probe' takes its toll on Tesla as new research suggests that Tesla loses $6,000 on every $35,000 Model 3
RTX 280 Ti will come with 11GB of fast GDDR6 video RAM with a 352-bit memory bus offering 616Gbps
The scale of jobs lost to automation will be at least as large as those in the first three industrial revolutions
10nm Cannon Lake Core i3-8121U CPUs make a rare outing with Intel's NUC mini PC