Gnutella VBS Worm 263
TRingstad writes: "ZDNet has an article about a new worm infecting Gnutella users. The worm changes the gnutella.ini file to accept VBS files and places 23 Trojan files in the Gnutella download directory so that others on the network may find them. It then creates a 'victim' file with some statistics on what generation of the worm infected the user and on what date. Finally, it copies a warning, 'If I was a naughty boy, I could use scripting to get name, email, whatever file I want.'"
Of course, if you run Gnutella (Score:1)
Silly Microsoft users, they almost deserve what they get. Why is no one suing the pants off of MS, since they practically sponsor/condone all these virii by intentionally using insecure technology?
The User was RIGHT (Score:3)
I receive unsolicited e-mail all the time, and I feel free to open it in mutt, because I know that embedded executables are not going to be run.
The user in this situation is absolutely correct. They're running under the assumption that just *looking* at an email should never be dangerous. They're assuming not only that a nobody would write a mail reader stupid enough to execute code without asking, but that if anybody did happen to write such a stupid program, the tech support department where they work would never allow such a program to be loaded on everybody's machine.
In a sane world, that would be a good assumption...
The Power of Freedom (Score:2)
This is the way I see it. And this isn't only about the Gnutella Worm, its about viruses in general. In any truely free system (free as in free speech, of course), you can not fully prevent one person from causing harm onto another. You can restrict the system, create more restrictions and secure, but then some freedom is lost. That is because freedom relies upon people who choose not to cause harm onto other people.
In a specific sense, this guy who created the worm is only exploiting the freedom he was granted. Thus people start locking down and all of us loose a certain amount of freedom.
There is a very good reason why we dislike people who pull these kind of stunts. It is because we know that if we invested that kind time annd effort in creating a virus or worm, we could do it. But we don't. Because we want to keep our freedom on the internet. Because we know that no one ever said we couldn't cause harm to other people's systems. Because as long as we have freedom, we *know* we can cause harm. But we don't because we are moral beings.
The Power of Freedom is directly our ability to influence others and ourselves. If you can't see this---if you only see the internet and other users of the internet as some sort of game, then you do not deserve the little freedom we have left.
Time for a little maturity (speaking from a 17 year old :)
Problem with this worm... (Score:1)
To whoever wrote this: learn C, or C++, or something better than BASIC. Trust me, it'll do you wonders
Re:Not a worm! (Score:1)
I've been noticing the same things in just about every virus-related news story. My favourite mis-definition was one I saw a few weeks ago: "A worm is a virus that can replicate itself".
D. All of the above (Score:1)
Re:Really Clever?? Are you kidding? (Score:1)
Ignorance, thankfully, can be cured with education. Stupidity and arrogance on the other hand...
Besides, getting rid of the 'stupid' would just raise the bar of 'average' higher.
Re:clearing things up (Score:2)
You can get basic to work in Linux. I forgot the name of the program, but IIRC it was on Slackware 3.5. I bet you could port visual basic to Linux, and then set the premissions to 4755 with owner root for the runtime interputer, that should work.
I think most people firgure it like this
GNU == Unix
UNIX == GNU/Linux
GNU/Linux == Linux
(GNU *anything* || anything OpenSource) == Linux
which I am not claiming it is right, but when I first heard GNUtella, I thought it was a Unix program from the Free Software Foundations...
What does the "tella" stand for anyways?
Re:asm (Score:2)
NT has those permissions. For Win9x to have them, they had to change the file system (FAT) and some other things, breaking their whole we-remake-DOS-once-a-year-and-you-better-buy-it compatibility. So, nothing will change.
Re:my favorite is the html generating scripts (Score:2)
Re:And if they run it, then what? (Score:2)
Re:untrue (Score:2)
Doesn't happen on your *nix box.
--
Re:Reminds me of this UNIX "virus" I recieved once (Score:2)
Re:...but remember, Gnutella isn't actually weak.. (Score:2)
And by "trusted", you have to specify not just "I know this person and he doesn't want to hurt me maliciously" but also "I trust whatever he's running on his system not to hurt me". The recent Outlook worms et al have demonstrated that any idiot running an insecure system can spread all sorts of nasties to his friends and colleagues, who normally trust him.
Is this really a worm? (Score:2)
Good viruses? (Score:2)
Ethical "Attack" (Score:4)
This could easily have been a lot worse -- the author could have trashed the systems of victims. However, it is simply a warning created to illustrate a serious security hole. Kudos! This is the ethical side of hacking that was always encouraged by the community as I was learning.
And spare the "hacker v. cracker" definition wars -- IMO, crackers are malevolent, and the author of this worm is certainly not.
--
Conspiracy? (Score:4)
Is it an underground effort by the Linux zealots to undermine Windows? Is it a cunning ploy by Micro$lop to get people to buy W2K?
Or is it the anti-virus vendors drumming up sales?
Or am I just paranoid, and it's all coincidence?
Strong data typing is for those with weak minds.
Re:Linux enters the mainstream? (Score:2)
Re:hrm (Score:2)
Misunderstanding (Score:2)
This is incorrect. First of all, Gnutella's network protocol (half of which is based on HTTP) is documented, and a variety of both open and closed source clients exist.
This trojan doesn't use any kind of a backdoor in Gnutella technology. Rather, it's spread by the users themselves. They download a file (like 'collegesex' or whatever), which is actually a
So, this is no problem with Gnutella. It's just users who don't have a strong enough security background, and who can't decern scripts from other types of files.
This can happen to anyone, on any OS. Just so happens that Microsoft's are the easiest to use, and generally have the users that would fall for it.
Hope this clears up some misinformation. Guys/girls, please try not to jump to conclusions about everything (like how open source would have prevented this.)
Re:malicious no, a moron,.. (Score:2)
Naturally the idea was a complete non-starter. The whole reason they used Outlook in the first place was so they could send each other pretty HTMLified mail with, like, colours ! and fonts ! and stiuff; plus they were always mailing 100Mb Excel and Access docs around to each other.
Camaron de la Isla [flamenco-world.com] 'When I sing with pleasure, my
Re:Ethical "Attack" (Score:2)
[off-topic] Still it doesn't seem to have had much effect on luser's behaviour. I guess we'll just have to wait for the Big One before people start to realise that an office with Microsoft /anywhere/ is a disaster waiting to happen.
Camaron de la Isla [flamenco-world.com] 'When I sing with pleasure, my
Re:When will this run on linux (Score:2)
Do you use spreadsheets alot?
Re:Is this really a worm? (Score:2)
eudas
Re:...but remember, Gnutella isn't actually weak.. (Score:2)
Re:Conspiracy? (Score:2)
Refer to the first line again, AC...
I rest my case...
And posting at +2 because I am prepared to be counted by my words... I could get snotty here but... You're not worth it.
Strong data typing is for those with weak minds.
Re:my favorite is the html generating scripts (Score:2)
Maybe we need, like, a Sony Music Corp Voice of a Generation, and a Warner Brothers Voice of a Generation, a Geffen Voice of a Generation and so on. That way it'd be easier to keep things straight.
anonymous file swapping--no good for executables (Score:2)
Attention ZDNet readers (Score:3)
To take the test, press Alt+F4, now.
Re:Is this really a worm? (Score:5)
To quote the article, it is in files marked "Pamela Anderson movie listing.vbs, collegesex.vbs, Battlefield Earth.vbs, Napster Metallica Crack.vbs and NSync.vbs"
Because of the way windows works, you may see something like "PamelaAndersonMovie.mov.vbs", much like the ILOVEYOU virus had. But more often, Windows defaults to not showing the extension on
Gnutella though, will show the
The problem is that the amount of common sense in the universe is a constant, however, the population keeps rising. This particular one can only really hit your system if you download and run it.
Re:...but remember, Gnutella isn't actually weak.. (Score:2)
Isn't all of Gnutella pretty much an untrusted source?
Also, how would I go about checking a binary file I downloaded to make sure it's what I think it is and not an insidious worm? Size could be a clue sometimes, but not all the time, especially if the programmer is smart and names it to look like appropriately sized binaries. Would virus protection software catch something like this?
Re:Virus hackers becoming Microsoft'ed? (Score:2)
I remeber when the CIH virus came out, I thought to myself "Dam that is pretty cool". I am not malice and I am sorry for the people that had their bios flashed cause of this, but you got to admit, that is atleast (if nothing else) an intresting payload, compared to say "format C:
Re:The User was RIGHT (Score:2)
http://www.securityfocus.com/vdb/bottom.html?vi
Mutt Text/Enriched Handler Buffer Overflow Vulnerability
A buffer overflow vulnerability in Mutt's handlers for the text/enriched MIME type allows malicious
email messages to execute commands as the user running Mutt.
bugtraq id
664
object
mutt (exec)
class
Boundary Condition Error
cve
GENERIC-MAP-NOMATCH
remote
Yes
local
Yes
published
September 27, 1999
updated
April 11, 2000
vulnerable
Mutt Mutt 0.95.6
not vulnerable
Mutt Mutt 1.0pre3
Nothing comparable with Outlook's abominable security model, and of course it could only trash your own files
Camaron de la Isla [flamenco-world.com] 'When I sing with pleasure, my
Where to get Gnutella (Score:2)
Some come with source. My favorite so far is gtk_gnutella that I run on Linux.
The one problem I notice with Gnutella is that if I leave it running for a while - even idle - I will eventually need to reboot my cable modem.
You will need an initial host to begin connecting to GnutellaNet. One is always show on the Gnutella home page.
Re:The User was RIGHT (Score:2)
No offence (well, hell, take offense), but did you even read the post I responded to? It was specifically about email, and it was from somebody in tech support telling a user not to even read email from somebody he/she didn't know.
Assumptions are exactly the problem. They're assuming that the attachment in the message they recieve (or the file that they downlod in THIS case.) is not harmful, and happily clicking away on it.
I disagree, I really do. There's nothing wrong with clicking on an attachment, or at least there shouldn't be. If it's harmful, then my mailreader shouldn't run it. It's that simple. I should be able to read text documents or view pictures from my mail reader, there's no good reason to execute code from there. And if I need to do this, make me be explicit about it, by piping the file to a specific command.
*nix isn't without sin here. Shell archives were a terrible idea, and they've rightly become quite rare. And any *nix mailreader that executed a .shar file merely because I clicked on it would be broken as designed.
As far as Tech Support goes, do you think that they should just disallow access to run any programs on a computer at all?
No, they should disallow the ability to run executable code directly from the mail reader. When somebody says to me "I received an unknown email", I should be able to say "Click on it and see what it is. No harm can come of that." My mailer sure as hell shouldn't execute a file just because it had a .pl extension, especially if the mailer didn't even show me the extensions by default.
More Earthquakes? (Score:2)
I think news stories about attacks are like news stories about any calamity. Earthquakes, terrorist activity, draughts, illegal-alien smugglings, LAPD scandals, whatever.
There isn't really a larger number of tornados per year, looking at the big picture. There are more people, settling in more areas, so more people reporting heretofore-unseen tornados.
If a couple stories are on the same topic in a short time, a news service will develop a "focus" on such stories, and will pick those out from the newsfeeds like Associated Press.
When it comes to people-induced tragedy, the news stories generate a lot of copy-cats. Columbine, Melissa, Oklahoma City, the list goes on.
The fact that the news services sensationalize the stories, with big numbers ($5 billion cost, blah blah), it's worse. Those big numbers are what businesses are putting in their claims forms for insurance claims against lost business, whether they really lost that much business or not.
Self defeating policy (Score:3)
It's kinda like saying
Kinda defeats the purpose doesn't it? Rather, it illustrates the inherent weakness in this whole system and how people's desire to steal software overrides their common sense of not dealing with anonymous users you can't trust.
If someone on the street offered you an opened Coca-cola, who would be stupid enough to drink it? Change the Coca-Cola to Mad Dog 20-20 and almost any alcoholic would drink it showing that common sense is often thrown out the window to get what we think we want/need but what in a lot of cases is not good for us puts us (and in this case, our computers) at serious risk of harm.
Fun with the nuker (Score:2)
microwave started with nothing inside it
Although using the nuker "empty" is not very good for it, it won't damage it either just from one time.
drying paper towls in the microwave which then catch a light when you take them out
Yes, the nuker is indeed a great tool when you run out of matches. Other ways include: pencils (pretty quick), bread (leave it in for a couple of minutes), chocolate (black chocolate works best: wait til it melted, then leave it for one more minute). Pencil mines are interesting too, but you need something disposable to prop them up against.
And the classic: eggs (no fire, but count a quarter of an hour's work to clean away the mess), soap (use a very small quantity, unless you have a really large nuker).
Re:The User was RIGHT (Score:2)
It's not Harmful the client should know about, it's just Executable, and that's not really all that tough. Sure, it's a tiny bit tougher when we're dealing with script files rather than binaries, but there's absolutely no reason the mail client can't know about these. I can seeing missing something like .py if somebody has installed python, but c'mon, .vbs? (I haven't used outlook in years, does the program recognize .vbs as executable and run it anyway, or does it appear to outlook to be a document file for the VBScript interpreter?)
And more importantly, in the corporate environment, there's no excuse for not letting the administrator set these things. I should be able to configure outlook to totally ignore certain types of attachments; if the user is advanced enough to change that setting, fine, but the innocent will be protected.
Whether or not there is a good reason to execute code (or any other executable attachments) from within your browser depends on your environment.
I don't see this, I really don't. Why should users need to execute emailed files? Self-extracting archives? Bad idea. I can agree with you here about the web browser, but not email. I can even agree about home usage, but we're talking about a corporate environment here.
But the nixes don't have the ease of use and UI
Agreed, I'm anything but a unix bigot here. But this thread started with a typical "blame the (L)user" attitude for an error that I strongly feel should be placed on the mail admin and on the software. The employee got an unsolicited resume, reading it should not be a harmful act.
And that's what really annoyed me about it, I hate this attitude. It's like forcing people to change passwords every 2 weeks "to enhance security", and then complaining because the "stupid users" are writing their passwords down on post-its. Well, of course they are. Who can remember 26 different passwords a year?
Here I admit I'm a bit confused. I can think of several ways that I can examine a program to see what it is without running it, but not a single way for an average user to do it.
They should be able to just click on it. If the mailer doesn't show it then it was harmful and should be deleted. And if you (not *you*, but the administrator) haven't configured your mail clients so that users can safely read their e-mail, (and there's lots of view-only software out there for Word processing files) then don't go complaining about stupid (L)users when something goes wrong.
And even if they could,"ILOVEYOU" has certainly shown us that they'll run it anyway, "Just to see what it does".
Oh, don't get me started on MS Word, I've fought with MS over that for almost a decade now. It would have been so incredibly simple to make Word safe in the corporate environment, and they simply refused to do it. Check out this page [dfoster.com] for a fun story of dealing with MS.
Re:hrm (Score:2)
"...and you ran it as root, you'd delete pretty much everything on your system."
Why would I do a stupid thing like that? Give me *some* credit, will you?
I just thought there was something special about IRC clients, like maybe letting many people on IRC know my IP address when I run as root or something.
Re: VBA "virus builder's assistant" (Score:2)
People keep accusing Microsoft of making low quality products, but VBA was a major improvement from NuKe's Virus Creation Labs.
Re:Virus to set security settings to paranoid? (Score:2)
If someone does make one, I vote for the name "IHATEYOU". Just remove "Windows scripting host" and assocaite the
But then again, you are still accessing someone computer and chaning someone else data without their premission. Which even if you heart is in the right place, still might get you in trouble with someone.
Plus what would happen if you script had a bug in it? Also should companies be allowed to "worm hole" hot-fixes into your computer without your premission? When the new service pack 6 screwed up some Lotus mail program, do you think IT managers would be happy that Microsoft automatically "fixed them" without premission?
Re:More interesting... (Score:2)
Re:Good viruses? (Score:3)
MS ignored it of course, and even released a new version of Word about a year later that opened the hole even further. Melissa, et. al. followed long after that.
Re:Is this really a worm? (Score:2)
As to the second question, it creates shared files with names like PamelaAndersonMovie.mov, collegesex.zip, MetallicaMP3crack.zip, etc. In other words it gives them attractive sounding names in the hopes that someone will see them and come download them.
Re:Name a file "Metallica" (Score:2)
Re:clearing things up (Score:2)
I know this, that is why I said for the runtime interputer, ok so it is spelled wrong, but you should still be able get the point of the post with a couple characters misplaced.
Re:The User was RIGHT (Score:2)
That makes perfect sense. However, Gnutella is not an Email program, and nothing is being executed without being asked to. Nor is anything being executed without being asked to in the case of ILOVEYOU and MS Outlook, which is what I assume you are talking about.
I receive unsolicited e-mail all the time, and I feel free to open it in mutt, because I know that embedded executables are not going to be run.
That's great too, but the problem isn't with just recienving email. And in the case of ILOVEYOU (if that's what we're talking about) embedded executables weren't being automatically run. I could just as easily send you a program as an attachment in Mutt, and if you ran it and it formatted your drives, it would be no different.
The user in this situation is absolutely correct. They're running under the assumption *snip*
Assumptions are exactly the problem. They're assuming that the attachment in the message they recieve (or the file that they downlod in THIS case.) is not harmful, and happily clicking away on it. As far as Tech Support goes, do you think that they should just disallow access to run any programs on a computer at all? That way nothing bad can happen, eh?
-Tommy
Re:clearing things up (Score:2)
What does the "tella" stand for anyways?
Nutella is a chocolate spread that comes in a jar, akin to peanut butter. Its quite rich chocolate, very sweet.
GNU + Nutella = GNUtella
-- iCEBaLM
Not a worm! (Score:5)
Second, be very grateful the author was nice enough to make this a benign bug.. it could have had CIH as its payload.
-pedantic (Score:2)
Some details about the worm. (Score:2)
--
Re:This is proof that Linux is not immune (Score:2)
Re:Not a worm! (Score:2)
Re:And if they run it, then what? (Score:3)
I am not turning this into a whole OS security model vs stupid user war.
If my grandparents get infected with a virus, worm or buggy program, guess who gets to clean up the mess? Me. I am trying to put some basic sense in their heads so I don't have to go over there and restore it.
If they where running Unix or anything else I would say "Hey when someone says try `rm -rf
I don't know or really care if it is the fault of the user or the security model of the OS, the only thing I know is that I don't like restoring a computer from OS up when it could be prevented with a few precautions (in this case information the user)
Me sending them that program is my way to "test" them, you know those fire drills you had in school? that is what I am trying to do, it is intresting to see users reactions, but that isn't the point.
The point is, when they have a fire in there house they will make it out alive, err I mean when there is a virus in there house they, the point was, as I stating is so that they know how to use fire to kill any virii that may be infecting there house due to biological warfare started by malcious computer users...
As with any system (strong securtiy policy or not), you have to inform the users for the strengths and weaknesses of the system. Even if you have a extremely secure system, if you post the username and password to anyone, it becomes as secure as a overweight high school girl going to a dance...
I am trying to stay away from the "stupid user vs insecure OS" war going on, but I think both sides agree that the user needs to be informed of basic security measures. A Unix system can be secure tell Bob posts the root password on irc...
To test this theorgy someone please post there root password and ip on slashdot.
(techinally if it was behind a firewall and had tcpwrappers installed and telnet/ftp/etc disable it still could be consider secure)
...but remember, Gnutella isn't actually weak... (Score:5)
"Some reports have been circulating in some of the online press about a 'Gnutella Worm'. This 'worm' does not exploit any weaknesses in gnutella itself, but rather weaknesses in the Windows operating system and more importantly, the user. This 'worm' will not affect anyone who doesn't manually download it, and subsequently manually run it. Gnutella does not execute any files it downloads. Be smart, don't run anything from an untrusted source without checking it first. This is an exploit of human gullibility and a weak operating system, nothing more."
Gnutella powerful, humans weak. Grunt, grunt.
John S. Rhodes
WebWord.com [webword.com] (Usability Vortal)
How to look like a fool! (Score:2)
"Give the anarchist a cigarette"
Re:Self defeating policy (Score:2)
That's why you should use the "GLOBAL, utterly anonymous peer to peer file sharing network" to do what it was supposed to do (pirate music, video, etc)... not pick up
-rt-
Re:Anyone that downloads a vbs file on gnutella... (Score:2)
Name a file "Metallica" (Score:2)
Re: (Score:2)
Really Clever (Score:3)
I think this low signal/noise ration is what is going to hurt Gnutella. Napster avoids this problem by only allowing MP3 files. If it is a worthless file, it will only open in an MP3 player and be found to be an invalid file. On Gnutella, the user could execute a file in the appropriate program--making novices all the more vulnerable to viruses and advertising.
clearing things up (Score:2)
Re:Is this really a worm? (Score:2)
Re:asm (Score:2)
Kill the VBS.. (Score:2)
But all you hear is "nasty virus writers" from the mass-media, when it's stupid, stupid users to blame.. Reminds me of a lawsuit that started in a local BBS message board back in '87. Someone posted, in jest, that format c: would fix a particular problem. Two lusers tried it, formatted their drives, and promptly retained lawyers because they thought they could sue someone else for their own stupidity. Judge tossed it out, thank God.
Re:hrm (Score:2)
No offense meant or taken.
VB != VBS (Score:2)
Re:Remember At Ease? (Score:2)
rexplorer.exe
instead of rsh
hrm (Score:2)
When I first was learning Linux, I got flamed a couple times because I was IRC-ing as root. Most IRC rooms ban people running as root, because it is well REALLY stupid to do. But what always made me mad, is sure they ban me for being stupid and running root, but they don't ban any Windows95/98 users. What is up with that?
I don't run any user programs as root, only su into it when it is needed for system admin tasks, but I now know why it is stupid. Really stupid.
Worm? Doesn't sound like it. (Score:2)
Maybe I just read it wrong, but this is really kind of silly. You download something, then execute it. If it's malicious then you get screwed. Aren't there numerous FTP clients that allow you to execute what you've downloaded from within the client? What about IE 5.0? It allows you to execute the file you've downloaded from within the browser.
This is just another VBS trojan like all the rest. It's not Gnutella's fault. Or do I misunderstand?
numb
my favorite is the html generating scripts (Score:2)
It's just ironic when you're searching for something like Zappa and you end up a a britney spears porn site.
Perfect metaphor for today's music industry. Last night during every commercial break Fox was touting britney as "The Voice of a Generation."
heh. heheheheheh. hehehehehahahahahahahBAHAHAHAHAHAAAAAAA
Re:malicious no, a moron,.. (Score:2)
I was going to be a pedant and say that water didn't explode, but sense got the better of me and I found a definition of explode saying 'to burst forth with sudden violence or noise from internal energy.
Blueberry pie recipes? (Score:2)
I thought the majority of file transfers on Gnutella were blueberry pie recipes...
Re:Gnutella is closed source, hence not secure (Score:5)
Oh, yeah. Kudos to the author. Novel delivery mechanism! Better than ILUVYOU and it's attempt to spread via IRC!
Re:Conspiracy? (Score:3)
Just stay online for a few more minutes and I'll have the answer for you. Also, pay no attention to the new icon in your system tray...
For you conspiracy nuts... (Score:2)
Yeah, that's the ticket.
Reminds me of this UNIX "virus" I recieved once... (Score:4)
This is a UNIX email virus. It works on the honor system:
If you're running a variant of unix , please forward this message to
everyone you know and delete a bunch of your files at random.
Thank you for your cooperation.
< snip >
The only thing this Gnutella trojan can prey upon is an idiot user and there really isn't much one can do to protect against that.
micro$oft strikes again w00t (Score:2)
But to be fair, it's basically the same old story from the old days when trojans, virii, and worms were distributed in .COM and .EXE files (for those of us who used DOS =) hell, there were even a couple .BAT trojans (not very effective but still)... you could download all you wanted and not a thing would happen until you ran them. Then again, that's what scan was for... =)
You could have the same story with *nix though. What's to stop someone from writing a program that wipes out a user's directory? Or a sneaky bit of code in a program claiming to need access to root? I suppose the reason it doesn't happen as much in *nix land is because the users are generally more competent than people accustomed to simple point and click on M$ stuff; and incompetent people generally don't get root. =)
I guess the point is, all it takes is someone dumb enough to run a script or program etc without checking it out. If you're not practicing safe computing, you'll get an STD (Stupidly Transmitted Disease).
Re:Gnutella is closed source, hence not secure (Score:2)
I see GNUtella as being 'open' by having the open protocol.
And by the way it's a damn easy protocol. Seems like being designed for hobby programmers, and I don't think that's bad.
The easier it is, the more likely it will get widely accepted.
Check the GNUtella protocol out for yourself [wego.com]
Join the grassroots movement..... (Score:5)
carlos
Re:Gnutella is closed source, hence not secure (Score:3)
Conscience is the inner voice which warns us that someone may be looking.
Re: (Score:2)
The _Real_ Reason these worms keep going (Score:2)
(L)user: I just received an email titled: RESUME. Should I open it?
Support: Did you ask for this resume to be sent to you?
(L)user: No
Support: Do you know the person who sent it to you?
(L)user: No
Support: Do you get resumes as part of your job function?
(L)user: No
Support: Then please delete the email without opening it.
(L)user: Are you sure? I don't want to lose anything important?
Actually, I considered it a not so small victory for training that the user called, but it shows the point. The biggest security hole in any operating system will always be the carbon interface banging on the keys. Once these users get loose on an any system, security becomes much, much more difficult.
The thought of possibly corrupting everyones email must be weighed against the possiblility of missing a funny chain letter... Anyone's guess who wins that one.
(And yes, I freely acknowledge that MS makes exploiting these poor creatures incredibly easy, but its only a matter of time before they move on to linux and other OS's)
More interesting... (Score:4)
There was something more interesting, though, that I discovered. Somewhere, someone figure out a way to take the search words that get sent out, and automatically create an HTML file from it. If you download it (as I have, a couple of times), thinking maybe it's an HTML file linking to some place that may have what you want, you'll find it's something else totally unrelated - somewhat akin to getting the xxx sites when searching for completely innocuous topics because they manipulated the search engines. Nonetheless, an unscrupulous (relatively speaking, given the nature of Gnutella, and because after all, who would complain?) could link to a site full of banner advertising or some such to get hits.
I got a benign variant of this... (Score:2)
Here's how to disinfect yourself [your.host].
When will this run on linux (Score:2)
Re:Conspiracy? (Score:2)
Is it just me, or are there more & more viruses/trojans crawling out of the woodwork of late?
Is it an underground effort by the Linux zealots to undermine Windows? Is it a cunning ploy by Micro$lop to get people to buy W2K?
Or is it the anti-virus vendors drumming up sales?
Or am I just paranoid, and it's all coincidence?
It's the flavor of the month combined with typical sensationalist "journalism." Combine big, largely made up numbers ("ILOVEYOU virus causes $5 billion in damage to U.S. corporations!") with the current headline addicted nature of news in the United States and you've got the press hyping up every new bug as a potential digital Chernobyl. With the Elian story winding down and no recent spectacular celebrity deaths, the press will continue jumping on every virus as a potential huge ratings/eyeballs grabbing headline for the time being.
Re:GNUtella only runs on *BSD, not Linux (Score:2)
Re:Is this really a worm? (Score:2)
asm (Score:5)
Back in my day we didn't have any scripting launage to code virii/worms in, we had to do it in hard code ASM, by hand, without an assembler, in the middle of winter, without power in middle of a frozen lake. Back then, there wasn't "documenations", we had to reverse engineer the processer to get the correct op codes, then write are own assmebler.
Then when we wanted to run the file, we had to transfer it via 340K 5 1/4 floppy disk, we didn't have networks, the Internet or fancy hard drives.
Then once the floppy was in the users machine, we had to call up and have the user run 4 differant executables, this took a lot of social engineering.
Seriously though, who says Microsoft isn't invonative? If you want to write a virii/worm for DOS you needed with ASM or C/C++, which is differant for the typically script kiddie to understand. Hand someone Visual Basic for dummies book and with a week have a worm that can prograte around the Internet within the matter of days. Thank you Microsoft for your weak securtiy premissions and easy to use high power octane scripting launage.
Seriously though, if Microsoft wanted to make it more security, give it user premissions like Unix, but if they want to keep it easy to use, have a popup box when something (program/script/command) wanted to access/write/read another users file and say "This program needs to run at a differant user level: level foo, are you sure you want to run this?" and when they click "ok" it gives them a popup box to enter username/password for level foo and if they are entered correctly it runs the program with higher premissions. Easy to use and somewhat secure. Just have Unix or Unix like premissions, with the easy of use of Microsofts pop up and dialog boxes, the user won't even have to touch the command line (btw command.com sucks compared to bash, and edit is pathetic compared to vi, I won't wish Microsoft command line interface to my worst enemy)
Not a gnutella weakness, but rather a user weaknes (Score:2)
a) Manually select the file for download, with its VBS extension glaring in their face
b) Manually go into the Gnutella download directory and execute it.
In other words, if you get "infected" by this thing, it's your own damned fault.
A point (Score:4)
I don't believe you'll find a less security-aware company on the face of the planet. If they did port Office to Linux I have no doubt in my mind that it'll need root privs, and include all the happy horseshit that's been getting Windows users infected for years.
You can keep MS and the virusses that come with them.
Network Associates Worm Tech Info... (Score:2)
Re:Is this really a worm? (Score:2)
Re:Conspiracy? No, just easier (Score:2)
Think back to Robert Morris. Now that was a hack, and took signficant skill. Nowadays, every two-bit script kiddie can tear mail servers up after half a day of perusing a book on VBS.
Propagation is simple these days because everybody's got e-mail and the apps and OS they're using are tremendously easy to infect.
Yeah, that one trashed my drive pretty badly... (Score:2)
Nasty.
Re:malicious no, a moron,.. (Score:5)
I just tested this, I emailed my grandparents and told them to NEVER execute an attachment. I told them it was probably a worm or virus, when into the whole anti-virus/windows progranda and told them not to even click one executables for people they know and exchange email with regular and even trust. They understood it pretty well.
I wrote a quick, "Hello World" command line program in C, emailed it to them, and guess what, they ran it. I just told them 5 minutes ago that it would probably be a virus, did they question it? No, they ran it blindly.
It just printed the string "some one just told you not to double click on executables, if I virus or worm, you would have to restore from backup, do you even have a backup. Glad I like your mug"
They emailed me back saying "opps". I think they better understand now, the real test is when I email them here in a couple weeks and see if they remember then.
They aren't computer savy, they chat with old army buddies via email and view cooking guides on the web, they are "normal users" and don't really have a concept of virii or malice users, even when it is clearly explained to them. Sure they understand it, but do they practice it?
I am going to wait a couple weeks then email the same program from an unknown (atleast to them) hotmail or yahoo email account and see if it "stuck" with them
Sounds like a good idea (Score:2)
MJP