Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Worms

Top Viruses, Worms and Malware in 2006 74

An anonymous reader writes "HNS is running an article with a list of those malicious codes which, although they may not have caused serious epidemics, stood out in one way or another. Some of the categories are: the biggest snooper, the most moralistic, the worst job applicant and the most tenacious. From the article: 'The most competitive. Once the Popuper spyware has installed itself on a computer, it runs a pirate version of a well-known antivirus application. Far from trying to do the user a favour, it is actually trying to eliminate any possible rival from the computer. It seems that the fight for supremacy has also reached the world of Internet threats.'"
This discussion has been archived. No new comments can be posted.

Top Viruses, Worms and Malware in 2006

Comments Filter:
  • by Anonymous Coward on Saturday December 23, 2006 @08:03AM (#17347496)
    None of which affected me simply because I chose to run linux. When will the rest of the world catch on... *sigh*
  • by Klaidas ( 981300 ) on Saturday December 23, 2006 @08:46AM (#17347588)
    Well, you see, there are viruses for linux. However, they don't spread a lot (because if someone uses linux, he has enough knowledge not to open an attachment/install an unknown file.)
    And well, saying that WIndows is bad because almost all viruses are designed for them is like saying that houses are bad, because thieves might try to break in...
  • by Rakshasa Taisab ( 244699 ) on Saturday December 23, 2006 @09:04AM (#17347644) Homepage
    By your logic we should be seeing dozens of "FIRST VIRUS ON WINDOWS" headlines per year.
  • by LainTouko ( 926420 ) on Saturday December 23, 2006 @09:39AM (#17347728)
    Well, that's only part of the truth. There are three reasons why Linux viruses don't get around like Windows viruses; better security, lower population (also encompasses the lack of monoculture in network applications), and more careful users. And none of those reasons is the "real reason", they work in combination with each other to make the difference really really big.
  • by vtcodger ( 957785 ) on Saturday December 23, 2006 @09:40AM (#17347732)
    ***And well, saying that WIndows is bad because almost all viruses are designed for them is like saying that houses are bad, because thieves might try to break in...***

    No, Windows is a target because it is widely used and vulnerable.

    Windows is bad because there are so many obscure ways to hide malware and restart it on subsequent boots.

  • by the_bard17 ( 626642 ) <theluckyone17@gmail.com> on Saturday December 23, 2006 @09:40AM (#17347734)
    Bad analogy. This is more like saying that your wooden house is bad, since it's very susceptible to fire.

    My stone house, on the other hand, is not very susceptible to fire. That means it's better.

    *Notice that I'm convienently ignoring how difficult it is to run anything through the walls, compared to that wooden house, in addition to how cold the stones get during the winter (and the subsequent lack of insulation), etc.*
  • by bl8n8r ( 649187 ) on Saturday December 23, 2006 @10:01AM (#17347800)
    It sure seems to have come down to a matter of simple denial with the Windows platform. Vista has barely been released yet, and there are exploits[0] out for it. How can anyone claim to be concerned about system integrity[1] *and* be a windows advocate at the same time? It is a blatant contradiction. There are so many different alternatives with a better overall design that it makes no sense to run Windows unless you have been locked-in to the platform. If you are not yet locked-in, it seems Vista will help you with that[2].

    [0] http://www.google.com/search?hl=en&q=vista+virus [google.com]
    [1] http://www.google.com/search?hl=en&lr=&q=vista+sec urity+lacking [google.com]
    [2] http://it.slashdot.org/article.pl?sid=06/11/16/011 2214 [slashdot.org]
  • by oKAMi-InfoSec ( 1043042 ) on Saturday December 23, 2006 @10:28AM (#17347870) Homepage
    The general public generally only hears about the viruses that spread quickly and do damage...but the range of exploits is just amazing. One of my favorites is summarized this way, in the article:

    "- The biggest snooper. In this case, it was not a difficult choice. WebMic.A is a malicious code that can record sounds and images, using a microphone and WebCam connected to the computer. Of course this is not the sort of uninvited guest you would like to have on your PC."

    The average joe really doesn't know how much risk they place themselves in when they connect to the net.

    Nor does the average joe take the steps necessary to slow the onslaught:

    • Anti-virus
    • Anti-spam
    • Firewall
    • Anti-spyware
  • The three S's (Score:4, Insightful)

    by maztuhblastah ( 745586 ) on Saturday December 23, 2006 @11:00AM (#17347986) Journal
    The severity of the virus, the spread of the virus, and the stupidity of the users necessary for the the first two.

    The few viruses (they were actually non self-replicating trojans -- most were modified versions of Opener) that affected people on rumour forums required people to give the trojan/script admin (sudo) privileges. I'm sorry, but no matter what OS you're on, giving a virus sudo means game over.
  • by bmo ( 77928 ) on Saturday December 23, 2006 @03:34PM (#17349160)
    "The first time someone's running as root and downloads an untrustworthy file..."

    But that's not really an issue is it? What Linux distribution has the default user as Root these days? In fact, it's more difficult to run as root in some distributions instead of as a normal user, in that the "root account" is never enabled. Attempt to login to (X,K,Ed)Ubuntu as root at the login screen and it won't work.

    How to get a Windows computer infected:

    Connect to the 'net without a firewall or run IE and visit a bad page. Or, run OE (interesting that Outlook Express has the same initials as "Operator Error") for your mail. Or run p2p software and download a "song" that doesn't play (but is instead an executable file). In fact, I've got a friend whose daughter did exactly the latter, and I'm going to fix it after the weekend. I beginning to think that these days, that's the most common vector of infection, as I see it time and time again.

    Windows gives execute permission based on the file name extension. For this utterly stupid idea held over from the frickin' CP/M days, users are being hosed left, right, up, and down. This bogosity should have died with Windows 3.1 or at least after Bill Gates discovered the 'net and put out Win98. However, the concept is still with us in Vista, so techs everwhere are going to be guaranteed a paycheck for at least the next 5 years.

    How to infect a Unix or Linux machine:

    Automatically through mail? Impossible to do without user interaction, since everything that comes down the pipe doesn't have the execute bits turned on. Anyone who writes an MUA that does that autmatically will be taken out back and hit with the clue bat.

    Visit a web page? There's no such thing as a drive-by install. The user has to download the file and manually set the execute bits high again, through chmod or by right-clicking on the file.

    Use p2p? Everything downloaded has no execute bit. What data file _ever_ deserves an execute bit? Indeed, I have yet to ever receive a file from the wire that has execute bits turned on except when they're contained within an installation package, and for that to work, I need to pause and use root permission if it's an install for the whole machine and I still have to unpack it even if it's going in my home directory.

    In fact, the simple act of user interaction, even if it's the typing of the current user's password (OS/X) prevents a whole lot of evil. It's that short pause that gives the user the chance to _think_, if even for half a second, and say _no_ to random malware. If you're a malware writer and you give your victims the chance to think, your bit of evil goes nowhere. There are only so many times that people are going to install a fucking purple gorilla.

    This ignores the population that will run silly "cupholder" executables and trojan filled "free screensavers," at every opportunity whether in Linux, Unix, or Windows, but then real stupidity trumps artificial intelligence every time. You can only do so much if a user is determined to blow each toe off his foot with a .44 one by one.

    If this means that Unix and Linux are more difficult, (as if typing the current user's password is complex) so bloody what? It's damn inconvenient when a computer gets infected, isn't it?

    --
    BMO
  • by Metasquares ( 555685 ) <slashdot.metasquared@com> on Saturday December 23, 2006 @04:44PM (#17349546) Homepage
    And well, saying that WIndows is bad because almost all viruses are designed for them is like saying that houses are bad, because thieves might try to break in...
    Windows is like a house where all of the doors are unlocked and most of the residents can't figure out how to use the key. It can be made secure, but not if it's being used by an average user. Linux is more secure by default and the users tend to know what they're doing more.
  • by bmo ( 77928 ) on Sunday December 24, 2006 @04:19AM (#17352354)
    "I don't see why privilege separation should help. There is no need to run that spambot as root."

    Because if a spambot is running as an ordinary user, it's ridiculously easy to kill and remove. A userland spambot is next to useless, because it will have a very short life. Where does it get launched? In .profile? How do you hide it? Unless you're root, you can't modify logs, netstat, or ps. And once you've got root privs, it's stupid to run the bot in userland anyway. So you're wrong. Priv separation matters.

    Fer crissakes, I can run Bagle in Wine, but then all I have to do is kill the process, which doesn't hide from me like it does in Windows. Poof. Gone.

    But it's not just privelege separation alone, it's combined with the fact that stuff imported into a system from outside doesn't have _execute_ permission in the first place. Windows attaches execute permission to files because they have the supposed correct extension, and this sin is doubled because _windows hides file extensions by default_ so as to "not confuse the user".

    I'm sorry, but that is just stupid.

    Explain to me why it's beneficial to the user to hide extensions, to hide processes, and to hide files with attributes instead of simply putting a dot before the filename? EXPLAIN TO ME WHY AN OUTDATED CONCEPT FROM CP/M RESIDES IN WINDOWS? WHY DETERMINE THAT A FILE IS A PROGRAM SIMPLY BECAUSE IT ENDS IN THREE MAGIC LETTERS LIKE 'COM' OR 'EXE' OR THE REST OF THE EXECUTABLE FILE EXTENSIONS, OF WHICH THERE ARE TOO MANY?

    Gah...

    Whatever. Vista will continue to use filename extensions to determine executability, so Windows users are hosed for yet another 5 or so years until Microsoft gets its freakin' act together, if ever.

    The security biggies:

    1. Privelege separation
    2. Frugal execute permissions.
    3. User interaction in granting executability and privelege escalation.
    4. No hidden processes.

    You cannot have security until you have all four. If you give execute permission willy-nilly, a file that shouldn't have execution turned on can exploit a buffer overflow and now you've got privelege escalation and a process that can hide itself. If you take away user interaction, you have drive-by installs, as seen all over the Windows world. If you take away privelege separation, everyone is administrator, and we've seen where that's gotten us. If you hide processes, like is done in Windows easily, how do you even know if a bit of malware is running or not? Indeed, since Microsoft has bent over for the entertainment industry, we'll be seeing more Windows rootkits because they'll be using the same hooks that DRM uses to hide itself from the user and system administrator. Good luck with that.

    Windows has done a piss poor job of implementing security in any shape or form. It's about time Microsoft got off its collective ass and done something responsible instead of shoring up its dubious hegemony.

    --
    BMO

An authority is a person who can tell you more about something than you really care to know.

Working...