Schneier on Attack Trends: More Complex Worms 189
Gary W. Longsine writes "Bruce Schneier has posted an interesting entry on
expected attack trends to his blog. Of particular interest is the increasing sophistication of automated worm-based attacks. He cites the developing
W32.spybot.KEG
worm -- once inside a network it scans for several vulnerabilities and reports its findings via IRC.
Trend Micro also has information on a scanning-capable version of this worm, which they call: WORM_SPYBOT.ID"
work work work... (Score:5, Insightful)
This mixed with irc connectiviy, LAN port scanning, update downloads...
Sounds like a full time job to create one. What are these people gaining anyway?
Re:work work work... (Score:5, Insightful)
Re:work work work... (Score:2)
Re:work work work... (Score:2, Interesting)
The only way to ensure that a PC never propogates anything is to never turn the damn thing on.
CJC
Didn't Joshua/WOPR* say that? (Score:3, Insightful)
*WOPR (War Operation Planned Response) computer system A.K.A Joshua
Re: (Score:3, Funny)
Re:work work work... (Score:2)
A little googling turns this [intrinsicsecurity.com] amongst others.
So yes there are products out there to prevent this kind of thing.
Re:work work work... (Score:3, Informative)
Is this the New Economics, the lost dream of IT visioneers?
BTW this Monday my company network was badly infected with yet unknown worm. It created about 15 registry values named 'Microsoft System Backup' to make itself start at lot of occasions. Still can't find anything about it on the internet.
Despite our admins, I've installed personal firewall...
Re:work work work... (Score:4, Funny)
-Ben
Re:work work work... Anti-malware tips.... (Score:2, Informative)
But first they have to infect it.
The easy way to avoid a zombied computer:
Pretty much use any OS other than one made by Microsoft. Since the market share for a non-Microsoft OS is so small, it isn't worth the malware author's time to attack them. A successful attack (if possible) would yeild little or no damage in a collective sense.
On a Microsoft OS? More work is involved in order to stay malware free.
Go into IE and turn off ActiveX
Re:work work work... Anti-malware tips.... (Score:4, Insightful)
Go into IE and turn off ActiveX, and scripting or (religiously) use the Off By One browser or Lynx which both doesn't understand ActiveX and scripting.
Treat your email and email attachments like 'text files' like I do. I only use Outlook to send email--not receive it.
Use a software firewall and antivirus. I use Agnitum's Outpost and Grisoft's AVG. I also recommended Trend Micro's Sysclean.
A great help would be to surf the internet from behind a hardware router that drops ALL incoming unsolicited connections.
Do you see how cumbersome is to keep the Windows machine free of *ware and viruseseses?
Why bother doing all that when you could just spend 40 minutes installing one of the already user friendly enough Linux distros on the market (Linspire, Xandros, Mandrake, Suse...)???
Niche products don't help (was: Anti-malware tips) (Score:2, Insightful)
You could also use a non-Microsoft, niche product like the ISS personal firewall to help protect yourself if you must use Windows.
And then you can get nailed with something like Witty [caida.org].
There were only about 12,000 Black Ice systems out there. There are over 10 million OS X systems deployed in the
Re:work work work... (Score:5, Insightful)
Automated access to large numbers of systems inside big corporations and government, where they collect passwords, account names, scan for vulnerabilities and gather information from PC disk drives for evaluation and sale (corporate espionage). Use of thousands of home systems for spambots and DDoS attack fleets. It's all about organized crime and money to be made these days.
No, it ain't just kiddies seeing who they can 0wn anymore. They are playing for keeps now.
Re:work work work... (Score:5, Interesting)
Wouldn't this be a successful argument for platform diversity? They have the motivation to write complex malware, but do they have the motivation to write complex and cross-platform malware?
Can one then conclude that because the common wisdom seems to favor a uniform system, this is those people's just deserts?
Re:work work work... (Score:5, Interesting)
Excellent point. However, in practice it can be a tricky balance. For example, a company that runs AIX on the Power architecture is less likely to be vulnerable to the buffer overflow exploit of the week than say Linux on Intel.
The trade off becomes "patch early, and patch often" versus "maintain an expensive development/build environment for a relatively obscure platform that sucks to build software on." As a person who has witnessed this phenomenon first hand and has felt the full pain of building all the standard OSS on AIX, I can tell you that Linux/Intel starts looking pretty good at times.
As always, it's never black and white. Platform diversity == good. Too much platform diversity == major pain in the ass.
-Peter
Re:work work work... (Score:3, Interesting)
Everyone makes the "Oh, but if enough of us switch, then they'll start attacking [name of OS] too!" and commercial developers don't want to write cross-platform because it's not profitable.
I propose that this offloads much of the cost onto the user setups, who pay in lost productivity, lost or stolen data, and sometimes directly financially, because they represent a large target. I ar
a successful argument for platform diversity? (Score:4, Insightful)
Say what you want about Microsoft, and while much of it's true, the users are to a degree at fault as well. If I leave my keys in my car and the doors unlocked, I can't very well blame the manufacturer for it being stolen.
Re:a successful argument for platform diversity? (Score:2, Insightful)
The problem with this analogy is that you are implying that Microsoft actually provides the door locks which the users are neglecting to use. While things have gotten better with respect to default services and firewalling, it is still de riguer to add on third-party software to any Mic
Re:a successful argument for platform diversity? (Score:2)
'Beauty is in the eye of the beer holder.' -unknown.
Re:a successful argument for platform diversity? (Score:2)
What's wrong with virii? - Did you not know what he meant? This is English, not French. We have a right to bastardize our language any d--n way we want!
NOT an argument for platform diversity (Score:3, Interesting)
The argument goes. In nature, species survival depends on diversity to maintain some portion of the population who can survive the onslought of some new contagion. SO in computers we should mimic nature and have a heterogeneous mix of software so our computer networks can survive worm/virus contagion.
BZZZT!
Networks and corps are different to species. Computers don't multiply and diversify as a natur
Re:NOT an argument for platform diversity - My 2c (Score:2)
For the Apollo 13 astronauts, ground control computer failure of any sort (including system compromise by hostile users) would have been all but a guaranteed death sentence for the 3 men aboard the cri
Re:NOT an argument for platform diversity - My 2c (Score:3, Funny)
The failure option will be available in the next release as a standard feature.
Re:NOT an argument for platform diversity (Score:2)
I'd also like to point out that even corporations don't have perfectly homogenous environments. Servers, desktops, workstations for various tasks such as artists, marketers, developers, etc., all have different needs and usually have different OS and application configurations.
However, you're right in that commonality in
Re:work work work... (Score:2)
The simple answer is "Yes, if needs be".
Do you really think that in the event that heterogenous environments become commonplace, they'll all just say "oh well, it's too hard now, better forget the years of practice and honing my skills and do something else instead"?
It'll slow them down, sure, and it'll likely defeat the lessor malcontents, but there will always be people willin
Re:work work work... (Score:2)
Re:work work work... (Score:3, Interesting)
Re:work work work... (Score:2)
Re:work work work... (Score:2)
ROLFLMAO. Thanks for the humor dude. I haven't laughed that hard in days. That's hilarious!
But hey, while I got you let me ask you a question. All those hackers, spammers, people who control zombies, etc are they doing it for profit or fun?
Re:work work work... (Score:2)
Re:work work work... (Score:2)
Re:work work work... (Score:2, Funny)
Re:work work work... (Score:2)
Re:work work work... (Score:2)
http://www.personneltoday.com/Articles/2005/06/07
Re:work work work... (Score:2)
http://81.144.183.106/Articles/2005/06/07/210245/
Re:work work work... (Score:2)
1. Create a botnet
2. ???
3. PROFIT !!!
Re:work work work... (Score:3, Interesting)
Depends on who "these people" are.
Anti viral company: Creating a greater need for their product.
Support desk: More support calls to them.
Someone with a grudge against a particular o.s: They can say that their o.s isn't as vunerable.
Script kiddie: They do it for their ego after watching hackers and getting all hot and sweaty by the site of the davinci code
Admin: Do it to get the Product Manager to allow upgrades on their networks and more staff and $$$
Re:work work work... (Score:5, Informative)
Welchia [symantec.com] attempted to patch the DCOM RPC vulnerability that Blaster feed on and remove Blaster if present. It was called the "good samaritan worm". The problem was, as the AC pointed out, the network traffic Welchia generated DoSed any network that it "aided". Other "helpful" viruses have existed, but usually had the same unfriendly welcome for the same reason.
Re:work work work... (Score:3, Funny)
Chicks.
Re:work work work... (Score:2, Funny)
actually, yes. Chicks. (Score:2)
It was a network intrusion like these worms create that resulted in Paris Hilton's private Sidekick data to be comprimised. That's how the net got a hold of her private nude photos.
Re:work work work... (Score:3, Funny)
About 9 pounds a week, on their staple diet of cheetos and Moutain Dew?
Dopey coder (Score:2)
"trustno1"
My idiot former roommate was a paranoid wannabe computer geek and he cherished his "cool password that I would never get because it uses numbers too".
Dolt.
Hmm, Note to self (Score:2, Funny)
Modern viruses attack from 2 directions (Score:5, Insightful)
We had a guy who was constantly downloading and running every attachment he ever received. We finally set him up with an ePod terminal and some crayons and haven't had a significant virus problem since. As a bonus, we get some interesting artwork to hang in the lobby.
This goes to show the benefits of Open Source software. Being able to see the code gives attackers a practically clear window into the guts of any network relying on that software. More eyes means more vulnerabilities found, so the network is actually safer because all these holes are known, if not by the security companies themselves, by the attackers who attempt to exploit the bugs.
We can't take the drastic step of eliminating Windows on our networks because it is so entrenched, but the slow migration away from it one desktop at a time is giving us a whole new outlook on viruses.
Re:Modern viruses attack from 2 directions (Score:5, Funny)
Sorry BOFH wannabe, they're not stupid users, they're just users.
If they aren't doing what you would like, you obviously have a training deficiency which might be your fault, not theirs.
How can you possibly secure a network against attacks if your users are constantly undermining your lockdown efforts?
By undermining their efforts. And if they try to undermine your undermining of their undermining, simply undermine their undermining of your undermining of their undermining. It's really quite simple.
Re:Modern viruses attack from 2 directions (Score:5, Funny)
I don't know where I heard this but...
"You can never make anything idiot proof because idiots are so damned ingenious"
Re:Modern viruses attack from 2 directions (Score:2)
Re:Modern viruses attack from 2 directions (Score:2)
Sorry, wannabe nice guy, but the #1 sign of stupidity is that stupid people never know that they are stupid.
If you are not stupid, but just unknowing about something, you know that listening to people who know about it is a smart idea. So you'll listen to what the admin or IT dude has to say and follow it.
If you're stupid, you think you aren't, and you disregard it all. So you turn off the firewall, forget about that antivirus thingy and cho
Re:Modern viruses attack from 2 directions (Score:5, Insightful)
Human stupidity is greatly amplified by weak architectures. If one lucky user gets a malicious email and executes the attachment (after unlocking the password protected zip and clicking on "Natalie_Portman_Naked.zip") that's bad enough. But cleaning up dozens or hundreds of PC systems clobbered by the resulting worm infestation is catastrophic. The industry is only starting to realize that we need better tools to fix stupid.
-Peter
Re:Modern viruses attack from 2 directions (Score:2)
Re:Modern viruses attack from 2 directions (Score:2, Informative)
While I agree that open source is good stuff, your logic is retarded. You basically state that if the vulnerability is known by the attacker and not security companies that ther
Re:Modern viruses attack from 2 directions (Score:2)
Re:Modern viruses attack from 2 directions (Score:2)
Re:Modern viruses attack from 2 directions (Score:2)
Re:Modern viruses attack from 2 directions (Score:3, Insightful)
This really isn't that hard. I run 8 university computer labs, and in the last 2 years I have had 1 machine get infected. That machine was in a faculty member's office, and he had formatted it and reinstalled windows in order to undo my lockdown.
Between good imaging tools (ghost, etc.), setting policies, using industry lock down tools (deep freeze, driveshield, etc.), and creative u
IIS == Thumper (Score:5, Funny)
Hedley
TFA in a nutshell (Score:2, Funny)
I found this essay most unimpressive.
Lures and jigs (Score:4, Funny)
"...we've got a KEG... of worms... and phytoplankton"
Schneier (Score:5, Informative)
Schneier and the SF Public Library (Score:5, Interesting)
Some comments: I haven't read Beyond Fear yet, but I have read Applied Cryptography. The San Francisco Public Library kept it in a back room and asked me to surrender my ID to look at it. I have no idea why. Maybe it's a terrorism manual.
Re:Schneier and the SF Public Library (Score:2)
Now if we could only... (Score:5, Funny)
Anatomy of the Web Application Worm (Score:5, Informative)
http://www.cgisecurity.com/articles/worms.shtml [cgisecurity.com]
that would be illegal in New South Wales Australia (Score:2, Informative)
Re:that would be illegal in New South Wales Austra (Score:2)
What about my situation? I mean, my boss is pretty big, but I don't know if he has any attachments...
Re:that would be illegal in New South Wales Austra (Score:2)
Are We Glad.... (Score:3, Insightful)
What happened to fixing the OS, so an AV isn't needed?
Why do I even bother?
One day there'll be a worm so complex (Score:5, Funny)
Crime that targets the shady (Score:5, Funny)
While mainstream web services are cringing in anticipation of becoming targets, it is quit amusing to watch what seems to be one kind of filth devouring another.
Re:Crime that targets the shady (Score:2)
Summary (Score:2)
Hopefully, that'll save time before you go RTFA...
German Dresden spam (Score:2)
Oh yeah, and that worm icon - come on, timothy, it's a caterpillar, surely.
Have to agree, as a virus/worm removal writer (Score:5, Interesting)
Now these things screw with the shell setting for Windows, add themselves to the win.ini and system.ini registry entries and run themselves as services, drivers, etc. Even more annoying, they're copying the names of real windows files now, but dropping into different directories - like find.exe but in the Windows directory instead of System32. They create multiple copies of executables that run from every autorun entry they can find, and recreate each other. They communicate with IRC, they steal passwords and usernames to AIM accounts, and in at least a few cases I've found WinPCap and other sniffing or trojan tools installed as well.
For many months, updating the AIM virus removal tool I maintain was a matter of a few seconds of updates. Then one weekend it turned into several hours of creating new functions and sections of code to handle all these new variants.
The best I can figure, it's script kiddies or zombie botnet operators just running canned and packaged code, because after the first variant appears, a hundred more follow within a few weeks, using the same techniques or filenames. Generally, the purpose of these worms tends to be to download and install spyware - bringing in income through referral programs - and then leave the system open as part of a botnet.
Lately, these techniques are being combined with common exploits on vulnerable websites, especially ones with some of the recent PHP vulnerabilities. Again, it's like botnet-in-a-can, grab some scripts and some code, change a few filenames or urls, and let 'er rip. It's certainly not getting any easier to put in the time to update the removal tool, that's for sure.
-Jay
http://jayloden.com/aimfix.htm [jayloden.com]
Why don't computer viruses evolve? (Score:2)
And a follow-up question is if not now, then will viruses evolve in the future when they get more complex?
These papers are the closest thing to an answer I've found but still not conclusive to me:
http://www.pcvirus.org/links [pcvirus.org]
Hogwash. (Score:2)
Re:Dumb sysadmins (Score:3, Insightful)
-Peter
Re:Dumb sysadmins (Score:2)
Egress filtering is evil. The first thing I do upon encountering it is erect a tunnel.
Re:Dumb sysadmins (Score:2, Interesting)
Re:Dumb sysadmins (Score:2)
Nope, never been fired over it yet. In smaller places, I end being de-facto in charge of security even though I'm mostly a developer. And I would generally not work in a place where the sysadmin was so incompetent that they felt the need to egress filter anyway.
Re:Dumb sysadmins (Score:2)
Yeah, like you'll even notice. DNS tunneling, HTTP tunneling, SMTP tunneling, the choices are manifold. And you can even use all of them at once. Once you cover one loophole, another will be thought of. I wrote my own piece of tunneling software in a matter of a few hours once. Not one of you obnoxious control freaks is going to prevent me from ssh'ing home.
Egress filtering is evil and pointlessly stupid. Any sysadmin who engages in it is covering their own incompetence.
Blocking "non-standard" ports (Score:2)
Re:Blocking "non-standard" ports (Score:2, Interesting)
There are many good tools which can do "deep inspection" and take action.
Hell, you could do it with Snort if you wanted to invest the time.
Re:Dumb sysadmins (Score:3, Informative)
Re:Dumb sysadmins (Score:3, Informative)
Re:Dumb sysadmins (Score:2)
but folks should start considering, "block all outbound ports except port 80"
Right, and what will happen with people running services that are blocked? That's right, they'll just start using the "magical" port 80 that lets people connect to it.
I think some port blocking makes sense. It certainly makes sense for large, tightly controlled organizations to block port 25. No one but legit mail servers should be trying to connect to port 25. That would at least protect against spreading viruses and spam
Re:Dumb sysadmins (Score:2, Informative)
This actually makes it easier to detect the "rogue apps" trying to exit the corporate network. If everyone tries to use port 80, then I have to redirect only port 80 with WCCP. I run the port 80 traffic through various Layer 7 scrubbing appliances to pick off the stuff that we don't want to leave our network.
It's like shooting fish in
Re:Dumb sysadmins (Score:3, Informative)
The only outside access is via a web proxy.
But unless you have a very restrictive 'deny,allow' rule set (which we don't, because it simply wouldn't fly here), a worm can simply look up your proxy settings and use the web proxy instead. Or it can use port 443, and use HTTP CONNECT with the proxy to a remote system listening on port 443, then encrypt t
Re:Dumb sysadmins (Score:2, Informative)
You mentioned worms that encrypt their traffic. This traffic would be difficult to detect and block using Layer 7-aware appliances.
There is a similar trick to your SSH-workaround to get the Citrix client to work over port 80. Part of Citrix (nfuse?) can use port 80 and the traffic *looks* like HTTP. But it's really not HTTP and a proxy can break the Citrix connection. The solution is to
Re:Dumb sysadmins (Score:2)
You are insane. Why not just completely disconnect from the Internet? That's what you'll have to do eventually as the war between your insane egress filtering and the virus writers escalates.
Re:Dumb sysadmins (Score:2)
Re:Dumb sysadmins (Score:3, Informative)
Without going into a long explanation, destination ports for outgoing connection attempts, such as port 6667, can be blocked from leaving the originating network. Even this method can be fine-tuned as to protocol/s, and so forth.
The worm probably use a random outgoing port to connect to the IRC server, so I don't see how this would work without blocking other valid services.
That random port is the
Re:Dumb sysadmins (Score:2)
There are ways, and more ways, and more ways around each and every roadblock you describe. Data can be encrypted, Base64 encoded and marked JPG or GIF. It can use full HTTP as its transport protocol, or possibly even HTTPS. It can be masked in dozens of ways.
What you've done is raised the bar "high enough" so that a "typical worm" doesn't have the s
Re:Hopefully... (Score:2)
Re:Why can't companies guard against this crap? (Score:2)
W32.Spybot.KEG is a worm that has distributed denial of service and back door capabilities. The worm spreads to network shares protected by weak passwords and by exploiting vulnerabilities.
technical details
When W32.Spybot.KEG is executed, it performs the following actions:
1. Creates the following copy of itself:
%System%\p6.exe
Sounds pretty sophisticated if you read all the details. Notice the line about how when it "is executed." Maybe we need to figure out how we can give everyone virus
Re:Why can't companies guard against this crap? (Score:4, Insightful)
But small businesses are the fastest growing section of the economy, and the only way they can remain productive and competitive is to leverage cheap IT. Translate that to: not paying consultants. That means that the person who is supposed to be worrying about what the small company actually produces is instead worrying about being a home-grown IT person. I can't tell you the number of small businesses I've seen in this mode, and the lack of just-add-water total security systems leaves them pretty vulnerable. But even if there were such magic bullet products out there, any small network open enough to be actually useful to a small business is going to be vulnerable to attacks that have been crafted by a large team of highly skilled, motivated Russian techno-mobsters. That's a tough enemy to fight when you're just, say, a 5-man gardenening retailer, or a mom and pop sign making company.
I think the real solution is thin clients and hosted apps. That way the ASP can use some economy of scale to deal with the threats. I know, thin clients don't work for everyone, but even if you use a fat machine as a thin client, at least your core business apps and data would be safe at Acme Hosting, and the worst thing you'd have to do is burn down your local network and start over.
BTW:
And to the FBI agent who may come across this message: Go find some real criminals. The last I heard, there are still plenty of real crimes still being committed on a daily basis. Murder, rape, child exploitation, etc. Why not devote some time on the big stuff?
Come on, don't fall for the "we can't do two things at once" concept. That's BS. I would imagine that a small company being extorted by Russian DDoS attackers would be "big stuff" to everyone who depends on that small business for their families' income. Dealing with that stuff, and dealing with murderers and rapists (usually local law enforcement, anyway) aren't mutually exclusive. I think what you're really lobbying for is a larger budget for the FBI so that they can deal with sophisticated info-criminals and deal with the more traditional crimes in a large and growing population. Stealing a company's trade secrets, or knocking their business offline, or running off with banking info and using it - the guys who do that for a living sure as hell are "real criminals." Just because they happen to be geeks doesn't make them any less criminal. Don't give them any sympathy just because they have an interest in code or know what NAT stands for.
Re:Spybot (Score:5, Funny)
What do they care about infringing on a trademark?!
Z3r0C001: Hey what do you think about the name "I Be Malicious" for the name of our new virus?
|<rash0v3rr|d3: Hmm, the initials of that spell I.B.M., we could be in for a lengthy legal battle.
Z3r0C001: You're right, legalities aside, it would at least be unethical to use a name that shortens to another companies name, especially seeing as both of our products are in the computing realm.
|<rash0v3rr|d3: Indeed, lets forget the virus and forget our troubles with a big bowl of strawberry icecream.
Z3r0C001: w00t
Re:Worm? (Score:3, Insightful)
Re:Worm? (Score:2)
Thanks! I'll be here all night.
Try the veal.
Re: (Score:2)