Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Spam Security

Massive Spam Shot of "Storm Trojan" 260

jcatcw writes "Postini has already counted nearly 5 million copies of the spam in the last 24 hours, and calculated that the run currently accounts for 87% of all malware being spread through email. 'Expect this to grow much larger,' a Postini spokesman said; 'It should top out at 60 million messages within the next 24 hours.' It's the largest attack in the last 12 months, and more than three times the volume of the two biggest in recent memory: a pair of blasts in December and January. The spam carries a ZIP file attachment posing as a patch with subjects such as Worm Alert!, Worm Detected, Spyware Detected!, or Virus Activity Detected."
This discussion has been archived. No new comments can be posted.

Massive Spam Shot of "Storm Trojan"

Comments Filter:
  • by MightyYar ( 622222 ) on Friday April 13, 2007 @11:43AM (#18719179)
    Oh, come on. I am FAAAR from a MS apologist, but this trojan is not really something that they can (or should) prevent! This worm is not exploiting any flaw in MS's programs that I am aware of, it is simply social engineering. Unless you make Windows prevent a user from running arbitrary code, I don't know how you'd fix this.

    If anyone should be sued, it should be the ISPs who allow zombies to sit there on their network. I don't like lawsuits, and would prefer to see some government incentive used to compel ISPs to remove the zombies.
  • by mcpkaaos ( 449561 ) on Friday April 13, 2007 @11:53AM (#18719325)
    By that logic, should Slashdot be sued by sites that suffer the Slashdot Effect? It is a form of DoS, after all, and Slashdot are obviously aware when it occurs yet do little (mirrors after the fact) or nothing (no mirror at all) to prevent it.
  • by ScentCone ( 795499 ) on Friday April 13, 2007 @11:54AM (#18719341)
    All the more reason to get grandma off windows and onto at least a Mac, if not Linux.

    Out of curiosity... since this is a completely social hack, and is just a means to trick somebody into opening up a compressed file and running the included executable... why would a Mac or Linux user be immune? Cannot Mac and Linux users also run executable programs from their desktops? You're confusing the ability to run a program of your choice with the means by which someone is fooling you into thinking you should choose to run it, right?
  • Re:idiot (Score:1, Insightful)

    by Anonymous Coward on Friday April 13, 2007 @11:56AM (#18719377)
    Er.. apart from the fact that this is a major security problem and Vista is advertised as "much more secure" and that it's also supposed to have multiple privilage levels for the same user and this would be exactly the kind of problem which would be stopped by executing programs from email with lower privilages and that a user level trojan would be an ideal case for blocking with an O/S level built in firewall and that if the anti-virus people were able to do low level things on Vista, it would probably also be more easy for them to block this kind of thing at the point where you try to do file access and so many other things that I would probably run out of breath and die trying to write this without using any commas or full stops;

    No; this has nothing to do with Vista.
  • by svendsen ( 1029716 ) on Friday April 13, 2007 @11:59AM (#18719425)
    Agreed. You can not make a system to prevent users from shooting themselves in the fool. I mean I can drive my car into a tree, how dare it let me do that!
  • by Rob the Bold ( 788862 ) on Friday April 13, 2007 @12:07PM (#18719521)

    Out of curiosity... since this is a completely social hack, and is just a means to trick somebody into opening up a compressed file and running the included executable... why would a Mac or Linux user be immune? Cannot Mac and Linux users also run executable programs from their desktops? You're confusing the ability to run a program of your choice with the means by which someone is fooling you into thinking you should choose to run it, right?

    Sure, you could write a trojan targeted toward those OSs. And you could presumably trick users w/o regard to the OS they use. But it's far more likely that the windows user is logged in with full Admin privileges. The Linux and Max users are probably not, limiting the extent that the trojan can mess with their systems. You probably could trick the Mac and Linux users to log in as admin, to change the file mode to executable, and run the trojan. However, at each step, the user might just wise up and have second thoughts. Wouldn't stop all cases, but with something like this, it doesn't hurt to improve the odds in the good guys' favor.

  • by cdrguru ( 88047 ) on Friday April 13, 2007 @12:13PM (#18719621) Homepage
    Wrong - Linux and Mac are completely vulnerable to this type of attack. You go to install something that you were told to do so and it prompts for the root password. The user then types it in and the machine is wide open.

    Don't think that would happen? You must be dealing with a better class of users than exist in the wild. Of course it would happen, and happen at such a frequency that it would be just another massive exploit.

    Windows is targeted because of market penetration. Why bother with less than 5% when you can get 95% in a single effort?
  • by Anonymous Coward on Friday April 13, 2007 @12:18PM (#18719699)
    A BOFH at my company decided that the email server would not accept any M$ executable file attachments (.exe, .src, .zip, etc) four years ago. Yes, yes that was me. Our ClamAV spends most of it's day dumping fishing emails.

  • by Anonymous Coward on Friday April 13, 2007 @12:23PM (#18719769)
    And you know what kind of "DRM" flames show up on Slashdot if you even suggest people not be able to run arbitrary code. We all know social engineering attacks are possible on all platforms that allow users to run code that they want to. I'm agreeing with you here - this is NOT a Windows problem (other than Windows being popular enough that people write these things for it). In cases where it is a Windows flaw - sure, that's MS fault. But here it looks like people are flaming them just for their success.
  • by spaceyhackerlady ( 462530 ) on Friday April 13, 2007 @12:34PM (#18719949)

    Oh, come on. I am FAAAR from a MS apologist, but this trojan is not really something that they can (or should) prevent! This worm is not exploiting any flaw in MS's programs that I am aware of, it is simply social engineering. Unless you make Windows prevent a user from running arbitrary code, I don't know how you'd fix this.

    Actually, there is a technical flaw, not just a human engineering one. The system allows users to install software, with global system implications, with no confirmation. My Mac confirms such things with me, and seems to get it right. My Linux box won't let me touch the global system configuration at all unless I su to root.

    This has always been the problem. I recognize that there is incompetent Windows software out there that won't run without Administrator privileges, but that's another issue. If you really need privilege to do something (like change your password), others systems have ways of temporarily elevating privilege. Like suid on Unix.

    ...laura

  • by pestario ( 781793 ) on Friday April 13, 2007 @12:38PM (#18720003) Journal
    s/g//
  • by adolf ( 21054 ) <flodadolf@gmail.com> on Friday April 13, 2007 @12:49PM (#18720203) Journal
    And you could presumably trick users w/o regard to the OS they use. But it's far more likely that the windows user is logged in with full Admin privileges.

    But it doesn't matter.

    The trojan/worm need not be an administrator to trash a user's computer, even with Linux. Let's use Ubuntu as an example. It can still send mail and propagate just fine as a regular user. It can also trash that user's documents and files (which are likely to be the only important data on the machine). It can use a crontab entry to start a daemon on a high-numbered port, which will run without user interaction, or without them even being logged in. That daemon won't be root, but it will still be capable of being a very proficient zombie.

    After that, for good measure, it can just run gksudo and simply ask the user for root permission. Ubuntu users are absolutely content to enter their own password into gksudo whenever prompted, especially when performing updates and patches (as this claims to be). So, the trojan will readily then gain root and be free to run completely amock. Trashing or rooting the OS is the obvious next step, but it's probably not even needed after all of the damage and infiltration already accomplished as a regular user.

    Seriously - just because it's not Windows does not mean that it's secure. As long as people are able to run arbitrary programs on their own computers, these types of things will continue to be a problem...no matter what kind of computer it is, and no matter if it has root/administrator priveledges or not.

  • by iago-vL ( 760581 ) on Friday April 13, 2007 @12:58PM (#18720367)
    Are you sure you got all the high-risk file types? Here's one or two you should avoid:

    .ade .adp .app .asp .bas .bat .cer .chm .cmd .com .cpl .crt .csh .exe .fxp .hlp .hta .inf .ins .isp .its .js .jse .ksh .lnk .mad .maf .mag .mam .maq .mar .mas .mat .mau .mav .maw .mda .mdb .mde .mdt .mdw .mdz .msc .msi .msp .mst .ops .pcd .pif .prf .prg .pst .reg .scf .scr .sct .shb .shs .tmp .url .vb .vbe .vbs .vsmacros .vss .vst .vsw .ws .wsc .wsf .wsh

    Source: http://support.microsoft.com/kb/925330/en-us [microsoft.com]

  • Re:Nope (Score:3, Insightful)

    by winkydink ( 650484 ) * <sv.dude@gmail.com> on Friday April 13, 2007 @01:46PM (#18721187) Homepage Journal
    Rumor has it that Postini is close to filing their S1 (i.e., getting ready to go public). Coincidence? Hmmm....
  • by alphamugwump ( 918799 ) on Friday April 13, 2007 @05:23PM (#18724775)
    All right. You did it. I finally snapped. Here goes my karma.

    Why the fuck do people keep bashing the UAC? What the fuck is wrong with finally having a real "sudo" in windows? Instead of having to run as administrator all the time, you can now escalate when you want to. Microsoft finally adds better security, and all the whiners come out of the woodwork.

    This sort of shit reminds me of my uncle, who thinks he's a computer person:

    "I really miss windows 98. It was a simple, no-frills operating system."
    "It didn't have a firewall."
    "You can download a free one."
    "It didn't have any kind of access controls."
    "???"

    That kind of thing. The hell of it is, the people who are moaning about the UAC must be running as administrator. This poses two questions. First, why are they running as administrator? Second, if it bugs them so much, why don't they turn it off?

    I'm not a windows fanboy by any means, nor do I like Vista, but this hypocritical bullshit just drives me totally crazy. You wanted security, you got it. Go ahead. Surf the web as root, and get owned. But don't come back and whine about how windows is insecure. You don't know the meaning of the word.

    If you want a reason to complain about Vista, complain about DRM. You can't turn that off in control panel, and its hooks reach deep into the display system. It's a deliberate attempt to lock you out of your own computer. They'd probably love it if PCs were like xboxes, with everything signed out to wazoo. Hell, it's happenning already with hd-dvd.

    But no, you take the time to bitch about window's advantages.

  • by Sancho ( 17056 ) on Friday April 13, 2007 @07:29PM (#18726511) Homepage
    Asking the user for permission to perform administrative actions is good. Asking them 2-3 times per perceived action is bad.

    One of the problems I had with early revisions of UAC (I haven't had the pleasure of trying out Vista's final version much) is that it couldn't figure out what the user was trying to do and anticipate it. When creating a new file, I first was asked if I was sure I wanted to create it, then I was asked if I was sure that I wanted to rename it. Hey Vista! It's a NEW FILE! I probably don't want your stupid default name! This sort of problem was all over the place in RC1, and not much better in RC2. I've heard that UAC didn't change much from RC2 to RTM.

    Turn it off? Sure, but your average user won't know how to do that, and so they'll just be further trained to click Ok to do whatever it is they're trying to do.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...