The Origin Of Sobig (And Its Next Phase) 500
MrZeebo writes "According to this story at Canada.com, the FBI, along with other authorities, have traced the origin of the Sobig worm. The quick timeline: Apparently, an earlier version of the worm installed a backdoor on a home computer in British Columbia. The creator of the worm used this compromised computer to create a Usenet account with Easynews.com in Phoenix, using a stolen credit card. The worm spread from Usenet, and contained the IP addresses of 20 computers to contact on Friday, and to download an unknown program from those computers. Officials were able to take 19 of these computers offline before the mass-download. However, the 20th computer stayed online, and many copies of the worm were able to get the rogue program. Those that did were merely redirected to a porn site, no damage done. However, now infected computers will continue to try and connect to the other 19 every Friday and Sunday until the worm expires on Sept. 10th." Reader muldoonaz points out this brief Reuters story about the investigation, too.
Re: Wicked screensaver (Score:4, Funny)
Re: Wicked screensaver (Score:5, Funny)
Re:Warning: your computer has a virus (Score:3, Insightful)
Re: Wicked screensaver (Score:5, Funny)
Re: Wicked screensaver (Score:3, Funny)
What a nice guy though (Score:4, Insightful)
Re:What a nice guy though (Score:5, Funny)
We only have 48 hours to shut down 20 randomn computers or the internet is brought to it's knees.
Re:What a nice guy though (Score:2, Funny)
Re:What a nice guy though (Score:5, Interesting)
Which means G, the one with the yet more freakin' evil payload, is probably set to go live... ooh, sometime around the 11th... uh-oh.
Expiring the worm is deliberate, so that different versions of the worm don't interfere with each other much.
We got lucky, or maybe not: the author realised what was happening, reads the right lists (or spies on them, heh), and decided that he'd rather leave it to the backup payload - the update url was simply a random porn site, one of the decoys, rather than a compromised webpage containing the latest version of his second-stage rootkit/trojan/proxy, Lala.
So we don't know what his latest surprise would have been. There's been too much attention - he's not going to spring it. He - let's be honest here, they - want a low-profile proxy network, quietly removing the worm after deployment, to anonymise his compromises, do some identity theft, mail some spam (they're EVIL, remember).
Now, this stolen credit card was almost certainly stolen with the keylogger in the previous trojan cascade of Sobig.E, so... well, that pretty much fucks things up as far as traceability goes, same for the proxy servers that the authors will have been using to cover their tracks.
Disclaimer: I don't *know* this, but based on what disassembly I've done, what I've read, and previous versions, it seems very, very likely. He might have been planning something else, but I suspect all this publicity derailed his plans for quiet world domination.
Re:What a nice guy though (Score:4, Informative)
SoBig.A [symantec.com]
- Copies itself over network shares to shared start up folders on other computers.
- Sends a message to an address on pagers.icq.com.
- Uses a separate thread to download contents from a specific web site to %windir%\dwn.dat, and later executing it. (later reported to be "Backdoor.Lala")
- Looks for e-mail addresses to send mails to in the files with these extensions txt, eml, html, htm, dbx, wab.
- Stores sent messages in the file %Windir%\Sntmls.dat.
- Uses 4 random subject lines.
- Uses 4 random attachemenet names.
- Always uses big@boss.com in the "From" field in the mails sent.
- Size: 65,536 bytes
SoBig.B [symantec.com]
Changes from SoBig.A:
- Always uses support@microsoft.com in the "From" field in the mails sent.
- Uses 9 random subject lines.
- Uses 9 random attachemenet names.
- Uses a deactivation date.
- Attempts to download data from four different GeoCities Web pages. The addresses of these Web pages are stored in various
- Size: 52,898 bytes
SoBig.C [symantec.com]
Changes from SoBig.B:
- Always uses bill@microsoft.com in the "From" field in the mails sent.
- Uses 7 random subject lines.
- Uses 8 random attachemenet names.
- Size: ~ 59 KB
SoBig.D [symantec.com]
Changes from SoBig.C:
- Very few infections noticed (0-49 listed at Symantec). Changes unknown due to low infection rate.
SoBig.E [symantec.com]
Changes from SoBig.D:
- Always uses support@yahoo.com in the "From" field in the mails sent.
- Uses 18 random subject lines.
- Uses 5 random attachemenet names.
- Size: 82,195 bytes (zip file), 86,528 bytes (executable)
- Sobig.E can download arbitrary files to infected computers and execute them. The author of the worm has used this functionality to steal confidential system information and to set up spam relay servers on infected computers. This functionality may also be used as a worm self-update feature. Under the correct conditions, Sobig.E attempts to contact one of the list of master servers, which the author of the worm controls. Then, the worm retrieves a URL that it uses to determine where to get the Trojan file, downloads the Trojan file to the local computer, and then executes it. The day of the week must be Monday or Friday. The time of the day must be between 19:00:00 UTC and 23:59:59 UTC. Sobig.E obtains the UTC time through the NTP protocol, by contacting one of several possible servers on port 123/udp (the NTP port). The worm starts the download attempt by sending a probe to port 8998/udp of the master server. Then, the server replies with a URL, where the worm can download the file to execute.
- Sobig.E opens the following ports: 995/udp, 996/udp, 997/udp, 998/udp, 999/udp, and it listens for any incoming UDP datagrams on these ports. Incoming datagrams are parsed, and upon receiving a datagram with the proper signature, the master server list of the worm may be updated.
SoBig.F [symantec.com]
Changes from SoBig.E:
- Size: about 72,000 bytes
- Spoofed address (which means that the sender in the "From" field is most likely not the real sender). The worm may also use the address admin@internet.com as the sender.
- The spoofed addresses and the Send To addresses are both taken from the files found on the computer. Also, the worm may use the settings of the infected computer's settings to check for an SMTP server
Re:What a nice guy though (Score:3, Insightful)
Uh, no.
The expiration date is there because if you're an evil software writer you don't want people running last month's version of your evil software and competing with the All New and Improved version.
Just basic economics, really.
Ewen
Methods used to obfuscate worm code (Score:5, Interesting)
this is why (Score:5, Funny)
Re:this is why (Score:4, Informative)
Re:Methods used to obfuscate worm code (Score:4, Insightful)
So figuring out what the virus that spread initially did was easy. The only way to figure out what it was going to do next ahead of time was to gain access to one of those 20 computers, and there wasn't a lot of time for that. By blocking 19 of the 20 at their ISPs, at least the next phase was mostly stopped, and turned out to be harmless. But whoever wrote this virus will no doubt learn from this, which was likely the whole point of the exercise, and do something even sneakier, or just bigger (more than 20 hosts), next time. Then eventually when they're confident they can successfully launch an attack of this sort without being blocked, they will launch the REAL attack they've got planned, whatever that is.
Re:Methods used to obfuscate worm code (Score:4, Interesting)
I work for an antivirus vendor, and it took me a total of almost 5 hours to decrypt the IP addresses. Once I figured out what the worm needed to decrypt the IP addresses, I ran it in a debugger and changed the registers at the right locations. Then I just ran the worm and got the IP addresses from a network sniffer (if the first IP doesn't respond in X many seconds, the worm tries the next one and so on).
Sorry for posting anon, but I felt it was better for this post.
Another day, another worm (Score:5, Interesting)
They worry me because of the fact they do all the above. These things are just a little power trip for all concerned. Microsoft's latest idea of forcing Windows Update could stop this - but only with the new versions of windows. We're going to have older versions kicking around for years to come.
Ultimately, could Microsoft be blamed for these viruses? After all, if they didn't miss these bugs, the viruses wouldn't have a mechanism to run on. But should we blame the guys producing Apache when a flaw is found in that? Personally, I think its unfair to blame MS for all of this.
Re:Another day, another worm (Score:2, Insightful)
Re:Another day, another worm (Score:2)
Re:Another day, another worm (Score:3, Interesting)
I agree with you that SoBig isn't a security hole in MS's code, but I like the "Open from here" features. You said that you should have to save to disk, mark executable, then run it. Guess what, if that's how it was then people would do that and still get the worm/virus. For some reason, end-users have to look at everything that comes through their inbox. How many people do you know that run linux as root because it's easier, and even though they know they shouldn't. Seriously, I know some very smart pe
Forced Grid Computing? (Score:3, Interesting)
How long until we see more organized worms that communicate with each other to achieve a goal (such as cracking an RSA key)? It seems that stealthy worms could already be out there, slowly infultrating and lodging themselves into message handlers or whatnot...
BTW: Yes, I do think we can blame MS... Their
Re:Another day, another worm (Score:5, Insightful)
But if you're interested in how to have this kind of thing NOT HAPPEN, which I think is the more important issue for us in the IT field, then the blame falls squarely on microsoft's shoulders.
Sure, all software has bugs. But Microsoft's software is a little different. It's in 95%+ of the world's computers. They know this, that's their business. Governments use it. Nuclear plants use it. The electric company uses it. Your personal information is stored in it. Your medical history is stored in it. Microsoft has their fingers so deep into businesses around the world.
Yet they don't do anything particularly special to prevent these worms. They put in the same (or less) effort that the open source folks to find bugs. They sit idly buy when they could easily afford *thousands* of independent code audits. They leave ports open when they could easily ship them closed. They ship a mail client that runs foreign executables. Not off completely, or in a sandbox, or whatever. It is inexcusable that attachments can run as code. This is a bug in the design of the operating system (ANY operating system).
Microsoft needs to get their head out of the bank vault for about two seconds and realize this is something they *must* do, even if it doesn't mean any new revenue. They have a responsibility to every business out there. Even if you are a FreeBSD + Mac shop you are effected by this.
It's downright embarassing that a simple bit of code like these worms/viruses can even get out the ethernet port.
Microsoft, how about innovating a real *solution* to this that *isn't* Palladium? I know it's possible. Have you ever seen qmail or other programs by DJB? Everything is partitioned with simple interfaces between code modules, even if there are bugs, they are ineffective. Do the same in Windows. People will put up with the extra effort eventually, because they are SICK of this shit.
What really amazes me, is how many people seem to think Microsoft is "doing everything they can". They can do more, a lot more, and they must!
I don't get it (Score:4, Insightful)
Re:I don't get it (Score:5, Insightful)
Your ISP is likely not even running windows or uses a seperate "box" which filters the mail. Alot of people running windows sit behind a linksys router with a built in firewall and laugh about these vulnerabilities. They don't realize they are sitting behind a layer of the simpliest and weakest form a linux security living in that router.
Outlook won't run executables unless you tell it to... yeah we already had worms that executed automatically in outlook. But wait that fixed that hole.. you sure there aren't any others? All you have to do is click the attachment and that is "telling it to". Me on the other hand, I have to save the file and then change the filesystem permission on the file to executable and THEN and only then AFTER I have explicitly gone out of my way to make the system recognize the file as being executable may I execute the file. Sure I can set my mask so that EVERY file has execute permission by default but why would I? Or I could do it another way, make up a system where I put 3 letter codes at the end of files and the ones with the rights codes are executable... but hey, couldn't anyone name the file that way? oops.
This boils down to a fundemental flaw in the way the system was designed back in the DOS days. Any change would completely annihilate the existing windows structure and all the code surrounding it. Course they could have... I dunno. Designed the system using ANY of the concepts implemented in ANY OTHER operating system in existance and we wouldn't see this kind of thing today.
If a user is too stupid to right click on the file and check the box by the execute permission. He's too stupid to be trusted to execute files.
Re:I don't get it (Score:5, Insightful)
Why do windows techies insist on packaging things as executables?
For example, I downloaded an addon track for a Windows racing game I like. It's a single
Not only that, but they add another layer of bs to the mix by putting the
Of course users click anything that says OK. That's what you do with windows. Click, click, crash, reboot, click, click, reinstall. It's just the way windows is done, sucky.
Re:Another day, another worm (Score:5, Insightful)
The number minor and serious holes in microsoft software which are actively exploited makes it pretty clear. Microsoft basically seems to release software first, and then look for security holes second. Apparently what they are looking for in beta testing is usability bugs that would prevent them from releasing. They are in a hurry to get software to market and leave the looking for holes part for later.
Apache and other open source software on the other hand tends to run the other way (although anybody can make a project and develop however they please). Look for bugs that cause security problems and system instability first... minor graphic update glitches and such come second.
In a perfect world both would be ironed out before ever being seen by the public... in the real world I think it's obvious that the open source way is better.
Re:Another day, another worm (Score:3, Insightful)
What surprises me is that these worms or viruses are not more than nuisances. It would be so easy for the authors to add a lil' code to "format c:" after propagating itself. That would do more damage and cover its tracks.
"format c:" is not the most damaging thing (Score:5, Insightful)
Also, for a lot of users, it's more damaging to leak information than to destroy the computer. Think of all the bank, credit card, and brokerage passwords that are available by logging the keystream. And, more relevantly, it's far more profitable to the virus writer to receive leaked information than to know that someone's drive was formatted.
Re:Another day, another worm (Score:2)
Read the MS EULA. Microsoft may be indemnifying people against possible IP problems (for hidden software). On the other hand, damned if they're going to indemnify their users against real problems.
Re:Another day, another worm (Score:5, Insightful)
I just love this type of explanation of why MS is at absolutely ZERO fault for it's security problems. Compare the number of Apache worms/viruses with the number found in IIS. Why are there more in a single year for IIS than for Apache over several years? Why haven't appache worms/viruses brought the Internet to a crawl and hit the newspaper headlines big time?
Oh yeah.. because MS has such a huge market share making more targets. BZZZ.. Apache holds almost 2 times the market share for active web servers! Could it be that MS's IIS isn't as secure? No.. noo... it's because of hackers. It's all their fault.. Poor MS!
If you are going to use an analogy, try making it fit the facts:
Builder A builds a LOT of houses. To cut costs and because they truley believe they know best... they use locks from RustyLocks.com. They also use an alarm system from AlarmsAreUs.com. The lock experts and alarm system experts say, "Hey, don't use those.. they have a high risk of being compromised!"
Builder A argues that they haven't been compromised yet and that they are good enough for the home-buying public. They continue building tons of houses with these parts in place. They sell the homes with a HUGE profit margin and bill them as secure, safe and full of extras your family will love.
Builder B lets the lock experts design a good lock they think is hard to break. They let the alarm system experts design a good alarm which is hard to bypass. They use these in their houses and find that they don't actually run up costs, but instead lower them. They also put the design of the systems up for public review in case they missed something themselves. They sell the homes for a reasonable price and offer the blueprints and all other design materials to the public in case someone wants to build their own.
Soon building A's homes start getting broken into. They find a fix for the lock's current problem and offer it for free.. they even offer to install the fix. What they don't do is replace the locks with a better designed one because it's too expensive to. Of course this doesn't fix the security system problems or other problems with the locks. In the mean time they blame the crooks and also everyone who is broken into for not fixing their locks.
Because the lock and alarm system guidlines from Builder B are availble to any lock or alarm system expert, they are repeatedly reviewed by those who want. There are enough people willing to review because they live in these homes and want to be safe. Maybe they find problems with the locks, maybe they don't. But if they do, the locks are improved and everyone is told.
Eventually a few of builder B's locks get picked. The lock experts start tearing apart the locks and figure out if fixing them is good enough or if a whole new lock is warranted. Regardless of the answer, they make the new locks available for free with simple instructions on how to replace them.
In the mean time several more break-ins occur in builder A homes.
Builder A's reactive actions result in repeated security incidents. The Builder B community team's proactive actions result in occasional but rare security incidents.
Blame the crooks! Sure, they hold some of the blame, but both builders KNEW the crooks were out there. They both knew the crooks wanted into the houses to get the goodies inside. So, does builder A share any responsibliity? Hmmm... According to your post.. NO.
Re:Another day, another worm (Score:4, Insightful)
As for all those buffer overflow exploits, most are the result of a conscious decision to use fixed, unchecked buffers in order to save work. You usually see the glaring potential for exploit as you write it but decide not to worry.
It's understandable that in many projects, it's worth it to allow such vulnerabilities to exist to reduce development time and project complexity, but Microsoft software runs on something like 95% of the desktops in the world, and they repeatedly enable rarely used internet accessible services by default in every version of Windows and generally ignore good safety practices.
On the bright side, they added stack buffer overflow protection to Visual C++ 7.0, so it's just a matter of them getting most of their code to compile under it, and remembering to enable that feature.
Security is not as impossible as Microsoft claims. They just never designed their software with it in mind, and occasionally it comes back and hits them in the face. Windows is like a one room house with 16 back doors and only the front door has a lock. If you look at say, OpenBSD, which is completely free and developed on a shoestring budget, it has an almost perfect security record.
Re:Another day, another worm (Score:3, Funny)
(Go ahead and make fun of the following thought process...)
---Gunsmiths make Guns = MS makes OS
---Bulletsmiths make Bullets = Virus writers make viruses
---Dumb people look at the bullet through the barrel and pull the trigger = Dumb people click on *.pif, *.scr
Re:Another day, another worm (Score:4, Insightful)
I do hold Microsoft accountable because they tout their own products for being so "user-friendly" while they add no security into the products...if you're going to design an application that a child could use, for God's sakes, don't stop half-way, make sure the user is safe from the very ignorance your product feeds.
To use the car analogy again, its as if Microsoft has built super-easy to drive cars for all of our parents, grandparents, and kids, but the car explodes upon even the slightest collision.
Seriously, how can you not blame Microsoft? The "vulnerability" isnt in the code, its in the coders.
J
Re:Another day, another worm (Score:3, Informative)
Damn... (Score:5, Flamebait)
It is pure, gleeful schadenfeude for me to think of all the hapless PHBs and MSCSE CIOs who are finally being given a little hint as to just how vulnerable they've left their companies. In the short term yes, many people will be inconvenienced and possibly some critical systems knocked out. But these hapless companies and also the public sector will eventually be forced to learn, and that's ultimately a good thing for all of us.
Re: Damn... (Score:4, Interesting)
> But these hapless companies and also the public sector will eventually be forced to learn, and that's ultimately a good thing for all of us.
Essentially these have been serving as vaccinations rather than infections, because they're provoking an antibody response that will (should) reduce the impact of a genuinely hostile worm when it finally comes out.
The vaccination isn't completely effective, since so many people obviously aren't hardening their systems, but some are, and the experts are getting a lot of practice at trapping, analyzing, and defusing the worms on a tight schedule. If this had come out a couple of years ago the response might not have been quick enough to shut the 19 sites down.
Still waitin' for the big one, though.
Nobody seems to care. (Score:2)
Antiviral software is virtually a must to avoid the myriad of malware that circulates the WWW. People
Re:Nobody seems to care. (Score:3, Funny)
You just like saying schadenfeude (Score:3, Funny)
Re:Damn... (Score:3, Informative)
Correction (Score:5, Interesting)
Re:Correction (Score:2)
Re:Correction (Score:4, Funny)
Newsman: Next up on our program--when l33t sp33k meets Engrish [engrish.com]
Example [engrish.com]: !4ANG3R! A d@n93r0u5 +0y. +h15 +0y 15 b31n9 m@d3 4 +h3 x+r3m3 pr10r1+y +h3 900d luk5. The l1++l3 p@rt wh1ch 5uph0c@+35 when the sharp p@r+ which 93+5 hurt 15 5w@ll0w3d is c0n+@1n3d 93n3r0u5ly. 0n1y the p3r50n wh0 c@n +@k3 r35p0n51b1l1+y by 1+53lph 15 +0 p1@y.
You may now gibber.
The porn site moneymaking scheme? (Score:5, Interesting)
Furthermore, what is the address of this porn site? I think we net admins have a valid right to "research" this threat using the company broadband!
Re:The porn site moneymaking scheme? (Score:2)
The reasons for him linking to it could range from a random site to a paid job, but I doubt the latter. Everyone with half a brain know what they have to face if they get caught and the efforts that have gone into find people in earlier cases. But then again, there are stupid people out there.
Porn webmasters are always ahead of the curve (Score:5, Insightful)
Already exists (Score:4, Funny)
the perfect solution was missed. not too late! (Score:5, Interesting)
IN fact why not have the virus download a patch that installs a daemon that periodically installs all MS patches. anyone who is too dumb to deactivate it needs to have it installed. its a self -selecting fix
Re:the perfect solution was missed. not too late! (Score:5, Interesting)
I think that the worst case situation would be that a security engineer finds a flaw and uses an exploit of that flaw to patch all systems against the flaw, then announces to Microsoft that the flaw existed, here is the exploit, here is the fix, and oh, by the way, the fix has been applied to nearly every Windows SV on the Net, as well as a few others. The problem then is that Microsoft would have the problem of deciding whether they should sue the security engineer or applaud him.
I think the concern of Microsoft would be whether the fix is worse than the flaw. Since they did not provide it, their own licences do not apply to the patch, which means that nearly every computer with the code installed would effectively be running unlicenced code which Microsoft might find themselves liable for. Especially if there is a flaw in it.
-Rusty
It's NOT too late. (Score:5, Interesting)
If nothing else, put together a script that will log the IPs of machines that connect for further instructions and send a message to their responsible ISP asking them to have the users clean up their system.
I"ve already got a prototype set of scripts if anybody's intersted.
Re:It's NOT too late. (Score:3, Insightful)
Stupid, Offtopic, Newbie, Question (Score:4, Interesting)
What's the difference between a worm and a virus?
Re:Stupid, Offtopic, Newbie, Question (Score:2)
Re:Stupid, Offtopic, Newbie, Question (Score:2, Informative)
No, if the thing attaches to legitimate Word documents and executables and whatever, it is a virus. If it is a standalone program, it is a worm. See here. [wikipedia.org].
Re:Stupid, Offtopic, Newbie, Question (Score:4, Funny)
You see, a virus is what we doctors call
very very small. So small it could not possibly have made off with a
whole leg.
Worm vs. Virus (Score:5, Informative)
There's a good answer on Broadband Report Forum [dslreports.com], or you could try Google [google.com].
CNET Mistake (Score:2, Informative)
To Clarify... (Score:5, Informative)
SoBig.F - A virus. Exploits no vulnerability in the OS. It only executes when a user runs the attachment. It sends out emails to everyone in your address book and makes the source another address from your book. It runs its own mail server, so filter port 25 outbound.
Blaster - A worm. This exploits the Windows RPC bug and self propogates to any unpatched system.
Welchia/Nachi - A worm. Also exploits the Windows RPC bug and attempts to clean machines infected by Blaster. Unfortunately, it tries to find other systems by doing random pings which can saturate a network.
Idiots. (Score:5, Insightful)
Don't use 20 predetermined machines from which to fetch updates; generate an unstructured network while you're spreading (remember who infected you, and trade connections randomly).
Don't fetch and install any updates provided to you; use RSA signatures to verify that they are legitimate.
Don't use canned, easy to filter, subject lines in your email messages; borrow subject lines from your host's mail spool (optionally, do so with only a small probability -- let evolution determine which subject lines are the most effective).
In short: If you're going to release some software which you want to see on millions of machines around the world, try not to embarrass yourself.
Re:Idiots. (Score:4, Funny)
-----
Come on, if you're going to write an OS, do it right.
Don't use 20 predetermined machines from which to fetch updates; generate an unstructured network while you're spreading (remember who sued you, and trade alliances randomly).
Don't fetch and install any updates provided to you; use RSA signatures to verify that they are legitimate.
Don't use canned, easy to filter, subject lines in your email messages; borrow subject lines from your host's mail spool (optionally, do so with only a small probability -- let evolution determine which subject lines are the most effective).
In short: If you're going to release some software which you want to see on millions of machines around the world, try not to embarrass yourself.
Re:Idiots. (Score:3, Insightful)
If anyone is smart enough to write a good virus, chances are they are also smart enough NOT to use it at all and instead prove their worth by doing useful stuff.
Re:Idiots. (Score:4, Interesting)
I think it's pretty obvious that this was a test of a few things:
So next time (and the speculation seems to be next time will be the day after SoBig.F expires on 10 September) will presumably have learnt from the results of these tests.
Oh, and it wouldn't surprise me if next time is a Warhol Worm [berkeley.edu]. I'm guessing they've collected up millions of zombies this time around.
So, yes, this time around it's easy to filter, and it's really only the useless virus notification and other bounce backs which are annoying.
Please do not send virus notifications for any worm or virus which is known to forge email addresses.
But don't expect it to be so easy next time.
Ewen
Re:Idiots. (Score:3, Informative)
Re:Idiots. (Score:5, Interesting)
Consider a mailing worm which has a 99% chance of re-using its "parent's" subject line, and a 1% chance of using a new subject line, randomly chosen from the host's mail spool. The "bad" subject lines will rapidly die out, since nobody will be fooled by them, while the "good" subject lines will spread (at 99% of the normal rate). Survival of the fittest, applied to subject lines of email worms.
Even better, when the virus "mutates" (the 1% chance of picking a new subject line), it will pick a new subject line which is appropriate to the culture in which it finds itself.
Re:Idiots. (Score:3, Insightful)
That's not necessary. Have an unstructured network, capable of broadcasts, build itself and wait (while still exchanging connections, of course). Listen. If the worm becomes widespread, you'll be able to hear it. Now, when you want to do something, contact one of the nodes which tried to infect you.
This way, you not only don't need those 20 fixed machines, but you don't need to have
Re:Idiots. (Score:3, Insightful)
You don't know one thing. The great majority of crimes are never solved. How many burglaries/car thefts/pickpocketings/muggings etc that you or your friends and family reported ever results in a conviction?
That's why increasing jail sentences has almost no impact on crime rates -- they only affect a criminal's behaviour if he thinks he's going to get caught. (Plus in my view it's subject to the law of diminishing returns. If someone's ready to risk 15 years in jail for a crime, are they really going to thi
No Problems Here (Score:4, Funny)
Sobig was created to defeat Bayesian Filters. (Score:5, Interesting)
As i understand it, SoBig was written by some spammers (this according to something I read a few days ago). If this is true, it only reinforces my belief that the Sobig worm was written for the purpose of weakening Bayesian filtering schemes for spam email, thus making it easier for spammers to send spam mail in the future.
How?
Simple. you are getting sobig emails apparently (but probably not really) from people who you may ordinaly receive ham from. If you (as many of you will) flag the SoBig messages as spam, your bayesian filter will remember that spam comes from trustedfriend@ham.com and lo and behond false positives increase.
Think this is ridiculous? I began out of habit flagging my sobig emails as spam before it dawned on my what i was doing. Yes, my filtes caught the sobig, but i did some tests soon to find exactly the behaviour that i described.
This further underscores the FACT that spam is a SOCIAL, not a technological problem. No bullshit, just good legislation.
I am a small businessperson with a legitimate web based business on the web now for 8 years. Three acounts now receive 4500 spam per day, or roughly the equivalent of one 56k modem whose full time job is to receive spam. While we have followed best practices with email addresses, over 8 years and thouands of customers, these things get around.
Re:Sobig was created to defeat Bayesian Filters. (Score:3, Insightful)
If a spammer was going to use a virus like this to do spammy things that would benefit him, I think he would use it to turn Joe User's computer into an open relay that would get a
Re:Sobig was created to defeat Bayesian Filters. (Score:4, Informative)
Secondly, because SOBIG includes its own SMTP server the header information in each of the mails will not be the same as the genuine header information from your regular correspondents. So POPFile (and other filters) would still see them as different.
John.
My anti-virus kicks in before SpamAssassin. (Score:3, Interesting)
Anyone who bothers to send a virus through a spam filter deserves whatever he gets.
Re:Sobig was created to defeat Bayesian Filters. (Score:3, Funny)
I received an email a few days ago from someone who says that they can help you with this problem...
Re:Sobig was created to defeat Bayesian Filters. (Score:4, Informative)
Re:Sobig was created to defeat Bayesian Filters. (Score:3, Interesting)
I figure some time around 2014 the authorities will identify this connection.
effective virus (Score:5, Interesting)
But one of the lessons to be learned by people with all colours of hats from the sobig.* family is that the interface design of the virus is very effective.
It is subtle, in that the subject lines of the emails are rather muted. It has no other message than to tell people that the info is in the file, and it may appear to come from someone you know (and might trust). In short, it isn't very 'spam-like'. and of course it has a very effective mail engine.
I work in a university setting, and I can tell you that having a PHd will not save you from accidentally opening this virus. Email programs should make it _hard_ to open any file that is executable. How many times does it have to be said? Thanks to the internet gods that my users are on linux, and that the secretariat is staffed by savy people.
I watched this puppy rise from category 'low' to 'high' in a space of 6 hours on nai.com on tuesday. I am more than a bit surprised that it
started at level 'low'; anybody else remember the eariler incarnation when the email appeared to come from 'support@microsoft.com'?
Re:effective virus (Score:3, Interesting)
I just did that in fact. I sent an email that contained only attachments, no text. I have one of those camera phones, and I took an interesting picture that I sent to some people I know who would be interested. Since writing text is hard on a cell phone I put in a subject that didn't say much, with some attachments. I'm hoping that it is enough for those who care to open the attachments. Since they are .jpg pictures that shouldn't be a problem to view them, and because they are from me, they might b
Who cares about the virus.... (Score:3, Funny)
Which porn site was affected? I need to find out for er... damage control, yeah!
Question (Score:5, Insightful)
OK, I have a quick question. These worms and virii are hitting a ton of Microsoft vulnerabilities, and that's why they *exist*, but to me it seems like they only succeed because office workers, mom (my mom's comp was hit by Blaster), guy down the street, etc. *don't harden their computers*, or because they can't seem to stop clicking on attachments.
So if this gets worse and worse, and hypothetically more people start running linux or mac or whatever as their desktop OS (which I think could happen in dribs and drabs now -- a shitload of folks I know HATE microsoft right now), what's to stop them from ignoring system security all over again? You have the whole Lindows run-as-root thing still, for example. I know there aren't nearly as many worms and shit written to exploit non-MS OS's, but that doesn't mean folks won't start, and I'd just like to know what would/could happen, and what exploits would then be available, if they do.
I'm tired, and cranky, and I love Linux. But I just don't know if I'd trust my mom to run a secure Mandrake box if she can't even do Windows fucking Update.
Re:Question (Score:4, Funny)
Re:Question (Score:3, Insightful)
The difference is (in most cases) that she doesn't HAVE to learn how to secure it. Linux distributions come with almost everything disabled, including the MTA and other unnecessary daemons. You have to explicitly turn them on, or enable their insecure modes to open your system to attack from outside parties.
How long has Microsoft had the Messenger service enabled by default? What about t
Re:Question (Score:3, Insightful)
That's the problem at hand. In order for a computer system to be easy enough for the general populous to use, you HAVE to be able to double-click an attachment to figure out what it is and use it.
If you think it's hard for your Mom to run windows update, wait until she has to: ./afunscreensaver.pif
$: chmod 755 ~/downloads/afunscreensaver.pif
cd downloads
$:
in order to see what the hell an a
War always does the economy good (Score:3, Insightful)
We'll never know what the hackers true intent was, however. It's suspicious that blaster and the sobig virus were thrown out almost one right after the other. It all may be a distraction. For all we know there could be another virus lurking around infecting machines slowly, 1 by 1 until a doomsday date at which they deliver their payload.
Quit using C/C++, lose the buffer overflows (Score:4, Interesting)
Programming in C/C++ is directly equivalent to having to get out of your car to check the lugnuts at every red light. I mean - buffer overflows? Segfaults? Library conflicts? This is the stuff of the Dark Ages!! (with the possible exception of the libraries...) If Microsoft (along with everyone else) worked in an actually productive environment, these types of errors would be impossible in nearly all cases. (Of course, I'm not saying bugs in general would be impossible...)
I was fortunately able to work entirely without C for the last 10 years or so, and managed to go the entire time without a segfault, and was easily 10 times as productive as I ever have been in C. (Using myself as an example removes any programmer skill issue - one can presume same level, both cases.) This included some large projects, including a complete web-enabled GIS system with live maps and integration with corporate inventory & personnel databases.
Recently I had to return to the C++ environment, and was astonished at how painful, and inefficient the process is. And, of course, code written for one linux platform had to be modified for another, and then again for Solaris. In a simple 300 line program there is no common version that works on all three platforms, even though all used GCC. So I'm now faced with the prospect of building and testing three versions simultaneously or going through the meta-agony of setting up an autoconf build (tho I admire autoconf greatly - autoconf is arguably a key factor in the success of open source.)
And the various IDEs (for pretty much any language) are just glorified outliners, not engineering tools and certainly not CAD in any useful sense of the word. It is time for software to become engineering. Imagine designing a nuclear plant entirely using text - no drawings, no CAD, no piping analysis, no dynamic stress analysis. A large programming project has a similar complexity, yet we are still stuck writing prose - this is software literature, not software engineering! CAD has transformed every engineering discipline except one. Why do we insist on remaining stuck in the Dark Ages?
Re:Quit using C/C++, lose the buffer overflows (Score:3, Insightful)
Please note that some of us do not consider getting your VCR to reliably capture every episode of Star Trek to be "programming."
Yes, let's program in a higher level language so we can inherent all the crappy code libraries of the OS. Let's spend half our lives doing tech support for erroneous systems that we're dependent upon.
C/C++ can be more portable than any other language. If you're having trouble making it portable, don'
Re:Quit using C/C++, lose the buffer overflows (Score:4, Interesting)
My point exactly - All those 'crappy code libraries' are written in C, which means (effectively) that every other language has to support the C libraries - all 4,321 versions. And, surprise!! - we're spending half our lives doing tech support for systems whose errors are Largely due to the problems of C!
C/C++ can be more portable than any other language. If you're having trouble making it portable, don't blame the language.
Compiler portability via bootstrapping was, in 1972, C's really big new innovation. Other languages were more portable than C once the compiler was ported, but they were generally not good languages for building compilers (LISP, APL, ALGOL, maybe even FORTRAN come to mind.) That was then, this is now. IIRC it was Dennis Ritchie who described C as a "structure PDP-11 Macro Assembler". Some argue that C's major advantage is its stupidity - almost all the functionality is in the libraries.
If you haven't had a need to use C before, that's good for you. You're probably not developing applications that need this low level language so don't compare apples to oranges and go back to diddling your non-normalized corporate database.
(Ad hominem attacks are boring.) As I pointed out, C may have a purpose writing device drivers, although even that is arguable - Burroughs was writing hardware descriptions in (IIRC) Pascal as far back as 1980, and you'll note that Intel doesn't use C to describe the Pentium logic - arguably low level programming. And again, you make my point. Anything higher level than device drivers (kernels? maybe, maybe not) is out of C's problem domain.
At present the typical labor cost to build and maintain nearly any system is two orders of magnitude larger than the cost of the hardware it runs on. If the loaded cost of a programmer is $100/hour then a program that takes one day to write is more expensive than the processor it will run on, and every minute chasing down a fencepost error costs $1.67 (Pascal and Algol for just two examples, prevented fenceposts as early as 1968. Spending an hour trying to decipher stupid compiler-library mismatches borders on unethical abuse of resources.
The real question is, why do we still think of programming in terms of language? This shows a presupposition that literature is programming. It may be, but it's certainly not engineering. As long as we're writing prose, we're not doing engineering.
It is fairly obvious to me that the entire worldview of the software community is presently broken. Grace Hopper et al developed COBOL to allow 'nonprogrammers' to write programs. That was in the late 1950's. What progress has occurred since then? Why aren't we drawing our programs? Why don't we run the graphic model through a dynamic dataflow, bandwidth and timing analysis? Why is it up to us to manually tune the literature to support multiple processors?
The plain fact is that I've watched the nonprogress of software over the last 20+ years, and it's nearly all a rehash of old stuff. The latest, greatest software engineering discipline as taught at the local university is unchanged from the method I used in 1978. We're designing jets for Boeing, using the software equivalent of a Model T.
Re:Quit using C/C++, lose the buffer overflows (Score:3, Informative)
You can write crappy programs in any language, and there are crappy libraries in every OS. At least with C if you want to re-invent the wheel you're doing in on a level that affords you the minimal performance and flexibility penalty.
Re:Quit using C/C++, lose the buffer overflows (Score:3, Funny)
Whoah ! Where people able to understand what you told them ? Like, " 'mon ! hek that web page and ut n' paste the ommon errors !" But that's nothing ! I gave up with all vowels ! (ppl tnd t thnk spk lk n nsct, thgh).
Saw the b'stard launched (Score:5, Informative)
Unfortunately I've since deleted it (It's an offence to knowingly possess viruses in the UK)
The message reference that it was in is [MPG.19ab40b72e8ed720989682@news.easynews.com] but google doesn't archive those groups.
Perhaps that was it???
Virus author's other post (Score:5, Informative)
(You can compare to the message included here [easynews.com] from easynews)
Re:Virus author's other post (Score:3, Informative)
I actually posted a warning reply to the original post but was obviously too late.
he was relying on people browsing usenet binaries with insecure newsclients... looks like fer
Redirect to a porn site? Yeah, right. (Score:5, Interesting)
With a lot of luck, maybe forensics on the first few machines taken offline will yield the real download address, and we can see what that clown was really up to.
This is what the writer should have done. (Score:4, Funny)
No damage (Score:5, Funny)
No damage done! My dear poor mother got redirected to goatse.cx! The psychiatry bills alone will cost a quarter of a million dollars.
Easynews privacy policy... (Score:5, Interesting)
We do not keep HTTP access logs
We do not keep NNTP access logs
We do not use IP addresses to link to personally identifiable information. IP addresses are used for administrative purposes only to ensure the Web site is running smoothly.
Here's a link to the complete policy: Privacy Policy [easynews.com]
Control of servers... (Score:3, Insightful)
Re:Instructions to cure worm. (Score:5, Informative)
Hence this doesn't work. I thought this was a nice touch on the part of the worm author. As well as including NTP, they author had their own SMTP server for sending the messages and used a regular expression engine to search for email addresses on the machine.
This was not written by a script kiddie.
John.
Re:Instructions to cure worm. (Score:3, Interesting)
Re:Instructions to cure worm. (Score:3, Insightful)
This was not written by a script kiddie.
I'm inclined to agree. It seems like a lot of effort to go to, including the use of a stolen credit card. However, why simply download a pron-link in the second stage, and not something more harmful? Why only 20 computers, and not 1000? This seems more like a proof-of-concept--I think SoBig.G is going to be that much worse. Maybe it'll be released the day after this one expires--9/11.
Re: y'know what I'm wondering... (Score:3, Funny)
> Is why any virus writers ever get caught. [...] they simply have to go down to their local library and/or cyber cafe wearing a wig and makeup, stick the floppy in, click, then leave, what's the problem?
I used to do that, but I got tired of having all the geeks try to pick me up while I was there.
I Love You runs on RH 7.3/KDE (Score:5, Interesting)
Now if the computers hadn't been running windows and they would have crashed anyway and wouldnt have been able to execute it. Oh wait they were running windows. I guess windows(and any crashable OS) only crashes during important data writing.
Linux X applications by and large aren't as stable as Windows shareware (ie. KMail silently dies when the disk is full, etc.). The Linux kernel *is* crashable - try hot-swapping an ISA card in an old clunker. [grin]
As for worms, well, once on my KDE box, I clicked on a virus while I was showing off Linux to a friend. "Look at how immune I am to e-mail virii... [click-click]... Oh shit... Look at how well Windows applications are supported!"
Red Hat 7.3, shipping with Windows binaries associated to Wine. Yup, I got my Linux box infected with a Windows e-mail virus. Dangerous default file associations are not a problem exclusive to Windows, and it's only a matter of popularity before e-mail virii are being written to exploit bugs in Linux apps.