When Malware Authors Combine Efforts 306
An anonymous reader writes "Spammers, Hackers and virus writers are all teaming up according to some russian security researchers. This means that they reckon that weaknesses will be exploited in a matter of hours of being announced, rather thant the weeks and months that we're seeing now.
Scary stuff."
And just yesterday (Score:5, Interesting)
Re:And just yesterday (Score:2, Funny)
Re:And just yesterday (Score:3, Interesting)
There will be a few groups who work in strategic alliances. The very scary part about this will be the "power" behind some of the malware campaigns. I think CoreWars, running on every windowz box that isn't hardened really is going to happen.
This should prove to be interesting, especially when governments step in with the non-judiciary non-legislative branches because a real security leak is caused by one of these programs. Think a pissed off NSA (not a politicking one) of th
Why is parent modded "troll"? (Score:2)
Re:China: Spammers, Virus Writers, & Hackers (Score:3, Interesting)
Close. Actually, the two things you should do are:
1) Download and install Firefox.
2) Delete Internet Explorer (if you can).
On my computer, Internet Explorer is slightly faster for casual browsing than FireFox because Explorer is more tightly integrated into the operating system.
On my computer, I'm running Linux. IE is NOT integrated into the operating system. You can't see it, but I'm doing the Superior Dance.
If IE is integrated into your OS, there is a third thing you should do.
3) Upgrade to
Is this truly more scary than ... (Score:2)
Further, if I'm wrong, doesn't this announcement generate (or risk generating) more momentum in the "malware conglomerate" that's being reported?
Public disclosure... (Score:5, Interesting)
Re:Public disclosure... (Score:5, Insightful)
This is the greatest argument for open source software I have ever seen. A proprietary model of development is going to get creamed as people take advantage of their limited resources and exploit the woo wang out of their apps. FOSS apps, on the other hand, potentially have hundreds of thousands of people ready to go worldwide at any given moment to correct problems as they happen.
M
Re:Public disclosure... (Score:2, Interesting)
Well, maybe if they tested the software better and built it more secure from the start they wouldn't need a 24x7 staff of patchers.
Haha. But that would imply the product is being driven by developers and engineers, not marketting people.
Re:Public disclosure... (Score:2)
Re:Public disclosure... (Score:4, Insightful)
Closed-source software has the ability to write the patch before disclosing the vulnerability.
I believe in open source 100%, I just think that this argument falls against, not for OSS.
Re:Public disclosure... (Score:3, Insightful)
Re:Public disclosure... (Score:2)
The one problem with this idea is that the incentive for the company to patch the vulnerability has to come from within. Market forces are only beginning to force Microsoft into a position where they MUST fix the gaping holes in their products. I don't know if a smaller company (let's use Real Media for the sake of argument) would have a similar imperative.
I trust public disclosure for exactly that
RE: argument against open source? (Score:3, Insightful)
By the same token, Linux and BSD have been chosen as the platform many commercial firewall/router products are
Re:Public disclosure... (Score:3, Interesting)
Does Microsoft spend weeks doing regression and unit testing? I do not know, however making the assumption that a pa
Re:Public disclosure... (Score:2)
Also - it's better to know there is a chance you could hit with an exploit, and take steps such as a backup, or closing down a firewall port, etc., then to be caught by an exploit with your pants down. If there's a possibility my machine could get 0wned, I want to know about immediately so I can keep an eye out for it if nothing else.
Re:Public disclosure... (Score:4, Insightful)
How does this change anything? This situation already exists and has existed for years. There has always been an element of pay-to-attack behavior as well as gathering resources via mass shotgunned attacks. And, in fact, spammers have been taping in to this environment for a while.
Re:Public disclosure... (Score:2)
I think you're right in that this isn't really a qualitatively new thing, but the quantity of pay-to-attack may in
Re:Public disclosure... (Score:3, Interesting)
http://www.wiretrip.net/rfp/policy.html [wiretrip.net]
-Paul
Re:Public disclosure... (Score:3, Insightful)
Re:Public disclosure... (Score:2, Interesting)
By definition, the "bad guys" don't typically believe in disclosure as it takes away another one of their 0day toys.
By disclosing weaknesses immediately you allow information owners to take precautions to protect their infrastructure, even if that means making the resource unavailable until a patch is provided by the vendor.
It is naive to believe that only "good guys" find probl
Re:Public disclosure... (Score:3, Insightful)
IMHO, this makes little or no difference. How many of the viruses and trojans in recent years have been created before a patch was available? Not Blaster or Sasser. I'm sure there are some in this category, but I can't think of any.
Once a patch is released, most businesses will do their own
Re:Public disclosure... (Score:3, Insightful)
"This is why vulnerabilities are so important," said Kaspersky. "We are against anyone who publishes vulnerabilities because it gives hackers a tool."
Wouldn't it be more important to be against anyone who creates vulnerabilities rather than those who inform us about them so we can patch or even shut off services if necessary?
Re: (Score:2)
How many times do I have to tell you? (Score:5, Funny)
Re:How many times do I have to tell you? (Score:5, Funny)
Re:How many times do I have to tell you? (Score:2, Insightful)
True, but having the additional steps is what makes it a +5 funny post. "Unplug your ethernet cable" would probably be modded troll.
Re:How many times do I have to tell you? (Score:2)
Re:How many times do I have to tell you? (Score:2)
Re:How many times do I have to tell you? (Score:2)
Wow, talk about an obscure Clerks reference. That episode never even aired did it?
Re:How many times do I have to tell you? (Score:2)
Re:How many times do I have to tell you? (Score:2)
Uhm.. You know those russian security experts (Score:5, Insightful)
-Phixxr
Re:Uhm.. You know those russian security experts (Score:3, Informative)
They also predicted [mosnews.com] "Internet Terrorist Attack" in August.
Re:Uhm.. You know those russian security experts (Score:3, Funny)
I mean, in Soviet Russia efforts combine malware authors, for chrissake!
Re:Uhm.. You know those russian security experts (Score:2)
Re:Uhm.. You know those russian security experts (Score:2)
After decades of communist rule, I think every Russian is a security expert.
That said, I really am disgusted by the number of unnamed sources in the press overall. Think of the last time you heard a US "government official" actually named. They claim it's "under condition of anonymity". Why does informing the public have to be done UCoA? There's no accountability...
All the more reason.. (Score:2, Informative)
Many shallow eyes... (Score:3, Interesting)
...make deep bugs deeper. FOSS philosophy applied to viruses. Yikes.
Re:Many shallow eyes... (Score:4, Funny)
No big deal (Score:4, Funny)
Re:No big deal (Score:5, Funny)
Groups of Attackers (Score:3, Informative)
Also, what "new" cooperation tools are malware writers using to communicate with each other? I'm fairly sure that IRC, Instant Messaging, VoIP, Bulletin Boards, and e-mail have all been standard communcation tools for these people. Maybe the groups now have more members.
Re:Groups of Attackers (Score:3, Insightful)
If there's a movement towards greater code reuse, sharing of ideas, and debugging help among the people creating these exploits, we won't just see a speed difference -- we'll see a quality difference. We've been relying on s
Organized Crime? (Score:5, Interesting)
I'll from the head! (Score:5, Funny)
Scammer: I'll form the heart!
Pornographer: I'll form the right hand!
Spammer: I'll form the crotch!
All: Together, we are - ASSHOLETRON!
(catchy theme music here)
Re:I'll from the head! (Score:5, Funny)
"Captain Spam-it, he's our hero. Gonna make your compuer divide by zero!"
Re:I'll from the head! (Score:2)
Talk about your surprise endings!
Re:I'll from the head! (Score:2)
That sucked.
No surprise- (Score:5, Interesting)
But now, man some of the things I've seen are really nasty!
You wipe 'em out, they come back, they hide from searches, morph into other programs, I've even seen one (I shit you not, I've been in IT for 10+ years, never seen anything like this one!) that was active even when the infected drive was placed as a slave on another machine, it started right up and infected the new PC.
This goes way beyond simple syware, these people are teaming up and it's just the beginning.
Re:No surprise- (Score:2)
It's no real surprise, then, that large corporations and their ad dollars are behind a lot of this.
Re:No surprise- (Score:4, Funny)
Dude, don't click on them *again*...
Re:No surprise- (Score:2)
Re:No surprise- (Score:2)
Re:No surprise- (Score:2)
Only if they intercept BIOS calls and somehow survive the transition into protected mode, and if the protected mode hardware drivers actually use the BIOS rather than go directly to the hardware. Which I think is very unlikely.
So no, I don't think this is possible *easily*. The best you could do would be to try and interfere with NTLDR and load a fake device driver than handles the re-infect, but that's a substa
Absolutely No Surprise (Score:2)
Probably not [theregister.co.uk] all [theregister.co.uk] that [theregister.co.uk] different [theregister.co.uk], really. And there's also the possibility he may have been doing IT in the porn industry for much of it.
serve yourself and save (Score:3, Interesting)
erhmm....
ianase (i am not a security expert) but wouldn't that statement apply to, hmmmm....., oh i don't know.....THE INTERNET?? seriously, a broad, vague, statement like that suggests to me that this is mostly overreaction on the part of a group who could experience significant gains IF their statements were true.
fud? imho, yes.
Security Through Obscurity (Score:3, Interesting)
Kinda makes you think twice about publicly announcing vulnerabilities in your software before you have time to fix them, does it not?
Re:Security Through Obscurity (Score:2, Insightful)
Re:Security Through Obscurity (Score:2, Informative)
This war can't be won ... (Score:3, Insightful)
Once done, they have a certain population size (vulnerable hosts) that can be almost instantly assaulted.
On the white-hat side, once the malware is noticed, it may take months to patch the initial security hole and even longer to patch the entire population of vulnerable hosts.
This is why vulnerability announcements are so important, the software that survives in the future will be the one with the shortest vulnerability to patch cycle. The others will die off ... only the strong survive!
Re:This war can't be won ... (Score:2)
I think that to defeat these groups the easiest way is to use the least vulnerable software, which for an x86 platform right now seems to be OpenSource software.
Didn't apache have a bug that was fixed in less than 30 minutes after the flaw was discovered?
How many corporations c
Re:This war can't be won ... (Score:2)
This is the Windows way. Linux security fixes usually take a few hours up to a few days for services (ssh, apache, Bind, ntp). Also, if you use nonstandard ports for anything else and install active intrusion detection software then hackers won't get past the initial port scan.
Oh, and web browsers are inherently complex. I put a proxy in front of mine with ClamAV to innoculate any pages sent to the browser, just in case there is an exploit.
I will be v
Re:This war can't be won ... (Score:3, Insightful)
That's great for simple products like Firefox, but what about when the product that has the security hole needs a fundamental change in its behavior? And if that product is used by every Fortune 500 company now you'll need to do compatibility testing to make sure that the product fix doesn't b0rk the dozens of other interoperable software which has been built on top of it.
Securit
focus change (Score:4, Insightful)
However, this article is pleading that we should *not* be publishing vulnerabilities, "because it gives hackers a tool", and I disagree with this. Publishing vulnerabilities is a way to alert the public of exploits that are present. What we need to do is make the publishing of vulnerabilities more popular than it is so that the general public is aware of problems and alerted on how to fix them.
Re:focus change (Score:3, Interesting)
Of course, by the same token, if businesses start issuing more warnings (cough*MICROSOFT*cough*) then maybe more people will realize that their software of choice is a piece
Another group... (Score:2)
Another group of people is obviously conspiring to take over. I wonder if this is all related to the "Vast Right-Wing Conspiracy"? Or was that the "Conspiracy of the Liberal Elite"?
Microsoft should.... (Score:4, Funny)
I can see it now: Active Virus (TM)
1. Make OS.
2. Build-in holes.
3. Release patches.
4. Create virus.
5. Still profit!
Re:Microsoft should.... (Score:3, Insightful)
6. People get sick of it and whine
7. People move to Linux
8. Profit for someone else!
Et tu, Slashdot? (Score:5, Insightful)
Been there, done that.... (Score:2)
Re:Et tu, Slashdot? (Score:2, Funny)
w00t, we have wannabes?!
I feel cool now!
Semantics (Score:2)
Cracker is a more accurate definition, and certainly this otherwise paints a bad name for hackers. But realistically, given the use of hackers to describe such users perhaps a better name for white-hat hackers would be appropriate...
Re:Et tu, Slashdot? (Score:3, Insightful)
I know this won't be very popular, but maybe it's time the "hacker" community accepted that like many other english words, it can mean multiple things. Geeze, already it can refer to someone who is bad at golf, or someone who enjoys chopping at wood, why not someone who "hacks" into computers?
Maybe i'm silly but I'd rather trust the Oxford English Dictionary on something
Move along, nothing to see here (Score:3, Informative)
http://it.slashdot.org/article.pl?sid=04/08/25/
Latest Kapersky news (Score:3, Insightful)
How can you trust such a non-trustable source anywany?
Re:Latest Kapersky news (Score:2)
As soon as you figure that out, give me a call. If I could understand why so many people continue placing their trust in individuals or institutions that seem to exist only to abuse that trust, I'd finally be able to understand why the political system in my country works as well as it does.
!News (Score:2)
Damn it
News
- Information about recent events or happenings, especially as reported by newspapers, periodicals, radio, or television.
- A presentation of such information, as in a newspaper or on a newscast.
- New information of any kind: The requirement was news to him.
This is not news! It's simply common sense that certain classes of people are going to conspire and associate with each other to some degree
Do we care? (Score:2)
It's win-win for us. Lose-lose for the newbies.
Call Gregory (Score:2)
P-1 CUR ALLOC=8,058,044,651 CALL GREGORY
open a can of whoop-ass (Score:3, Interesting)
It also opens the participants to criminal conspiracy charges. Can you say RICO, motherf***er?
Very dangerous meme... (Score:3, Insightful)
This pushes security discussion underground, but doesn't stop the bad guys, just leaves the administrators vulnerable and unaware. Very easy to spread this sort of propaganda however... hopefully it doesn't lead to laws being passed.
Now they'll find their own vulnerabilities (Score:2)
Jabberwocky! (Score:5, Insightful)
By the time someone with enough motivation (read funding) to write an article on a vulnerability does so, the bad guys have already written exploits. Why? For the same reason...they get paid!
The published articles allow the moderately tech savvy user to protect themself. Additionally, it forces the software makers' hand to close the vulnerability faster than if they had no pressure at all. Ultimately, this is our only way of shaming large companies into creating proper software and delaying the releases until they've created a more hardened product.
Yes, hanging out the dirty laundry of vulnerabilities makes it easy for the junior hackers to create something out of nothing, but I'd rather we all know about the problems at the same time than a few sophisticated spam hackers knowing about the problems for an indefinite amount of time.
Uniting could make them weaker (Score:2)
Kapersky's scare tactics (Score:2)
Wasn't it just 6 months ago or so that they were warning of a big attack day from the script kiddies out there (Was a... Friday, or a Saturday it was supposed to happen - Can't recall which off-hand). It never happened, but you wouldn't have believed that from their press release.
Don't get me wrong... Kapersky's not the only one who feels that there's greater cooperation between the various vir
Mostly a windows problem (Score:2)
Toda
Teams == easier to infiltrate (Score:2)
Mr, Kaspersky, F** you (Score:2)
That's right keep them secret, keep them safe. So only the crackers and the uber-geeky know. And the little hairy foot developer can carry the exploit to mount doom before the evil minions of 50R0|\|666 get their hands on it.
How will we know what ports to block, what mutex to push via GPO, and what tools to use to prevent these attacks if we don't know abo
pattern, anyone? (Score:2, Interesting)
1) spread fear, its good for business.
2) create some fucked up 'axis of evil' shit to help further #1. ("Virus writers are combining their efforts with hackers and spammers to launch Swiss Army knife-like malware attacks on users")
3) throw in some fuzzy math for effect. ("The company said that it was seeing 200 new viruses a day.")
4) take a random stab at preven
Protocols will have to get more resilient (Score:3, Informative)
In these days of 0-day exploits, I just can't take the chance that someone will find a hole in ssh and create a Warhol-worm before I can install a patch. I sleep better now...
A simpler method (Score:2)
Re:Uhh, ok. (Score:2)
Re:Anonymity is part of the problem (Score:5, Funny)
...And this was posted by an Anonymous Coward. Am I the only person to see the irony here?
Re:Anonymity is part of the problem (Score:2)
I guess I should have looked up, then I would have seen the point. I guess that means it's now time for my mid-afternoon coffee break.
Re:Spammers, Hackers and virus writers... (Score:2)
Re:China: Spammers, Viruses, and Hackers (Score:2, Insightful)
Re:Oh and let's not forget... (Score:3, Funny)
Re:Indeed. I used Netscape 4.08 on WfW 3.11 to d/l (Score:2)
Moll.
Re:Indeed. I used Netscape 4.08 on WfW 3.11 to d/l (Score:3, Insightful)
Trupmet winsock or similar to bind to the 0x60 DOS socket.
$20 router connected to your DSL to do the PPPoE login, as well as a bit of firewalling to any computers internally.
I would never suggest using a PPPoE utility on the computer when routers are so cheap and useful. Most DSL modems even have the router logic built-in nowadays.