News

Dell Technicians Find Malicious Code on Motherboards

Dell is warning many of its customers of potential malware embedded in a set of server motherboards.

During Dell testing, technicians found that a small number of server motherboards' flash storage had been loaded with the W32.Spybot worm that may affect Windows OS systems.

According to Dell representative "DELL-Matt M" on the company's support forum, "this issue does not affect any Dell PowerEdge servers shipped from our factories and is limited to a small number of the replacement motherboards only which were sent via Dell's service and replacement process for four servers: PowerEdge R310, PowerEdge R410, PowerEdge R510 and PowerEdge T410. The maximum potential exposure is less than 1 percent of these server models."

The support rep also went on to say that customers can only be exposed to the malware if an update to the unified server configurator is installed or a 32-bit diagnostics is initiated.

Customers with the server motherboards in question have been notified in a call campaign by Dell. However, this warning only looks to be a precautionary action taken by the company. "Dell takes customer security and privacy very seriously," wrote the representative. "Although we are not aware of any reports of customer related issues, we are proactively working with customers to resolve any potential exposure."

As of today, there has been no word from Dell on a possible recall or fix for the infected motherboards. The company's statement did discuss that all standard antivirus programs should be able to spot and contain the malware from doing any damage to customers' systems.

While not a critically hazardous problem, this new security concern comes after negative publicity for Dell. Previously sealed court documents showed Dell had knowingly sold over 11 million computers with faulty motherboards and other internal components.

About the Author

Chris Paoli (@ChrisPaoli5) is the associate editor for Converge360.

Featured

  • Microsoft Offers Support Extensions for Exchange 2016 and 2019

    Microsoft has introduced a paid Extended Security Update (ESU) program for on-premises Exchange Server 2016 and 2019, offering a crucial safety cushion as both versions near their Oct. 14, 2025 end-of-support date.

  • An image of planes flying around a globe

    2025 Microsoft Conference Calendar: For Partners, IT Pros and Developers

    Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss.

  • Notebook

    Microsoft Centers AI, Security and Partner Dogfooding at MCAPS

    Microsoft's second annual MCAPS for Partners event took place Tuesday, delivering a volley of updates and directives for its partners for fiscal 2026.

  • Microsoft Layoffs: AI Is the Obvious Elephant in the Room

    As Microsoft doubles down on an $80 billion bet on AI this fiscal year, its workforce reductions are drawing scrutiny over whether AI's ascent is quietly reshaping its human capital strategy, even as official messaging avoids drawing a direct line.