Top Viruses, Worms and Malware in 2006 74
An anonymous reader writes "HNS is running an article with a list of those malicious codes which, although they may not have caused serious epidemics, stood out in one way or another. Some of the categories are: the biggest snooper, the most moralistic, the worst job applicant and the most tenacious. From the article: 'The most competitive. Once the Popuper spyware has installed itself on a computer, it runs a pirate version of a well-known antivirus application. Far from trying to do the user a favour, it is actually trying to eliminate any possible rival from the computer. It seems that the fight for supremacy has also reached the world of Internet threats.'"
Re:A bit of bias from the press? (Score:4, Insightful)
The three S's (Score:4, Insightful)
The few viruses (they were actually non self-replicating trojans -- most were modified versions of Opener) that affected people on rumour forums required people to give the trojan/script admin (sudo) privileges. I'm sorry, but no matter what OS you're on, giving a virus sudo means game over.
Re: (Score:2)
SELinux.
where are the reports .. (Score:4, Informative)
Where are the reports of thousands of OS X desktops being compromised and bank accounts being emptied.
http://www.macobserver.com/editorial/2003/08/29.1
was Re:A bit of bias from the press?
Text of Linked Mac Virus Article (Score:2)
by Charles Gaba, 11:00 AM EDT, August 29th, 2003
So, another week, another Windows virus. Ho-hum.
Computer viruses--Windows-based computer viruses, for the most part--have been around for a long time now, but it's really only since the explosion of the Internet (the modern, commercialized Internet, that is) that they've caught the public eye, and it's only within the past 2-3 years (since the first "rock star" viruses, Melissa, A
Re: (Score:3, Funny)
That's all I got so far.
The worst worm and job applicant - Todd Shriber? (Score:1, Funny)
Top Viruses of 2006... (Score:1, Insightful)
Re: (Score:2, Informative)
-The most promiscuous. This title goes without doubt to Gatt.A. This malicious code can infect any platform that it is run on: Windows, Linux, etc.
Re:Top Viruses of 2006... (Score:5, Informative)
Re:Top Viruses of 2006... (Score:5, Insightful)
And well, saying that WIndows is bad because almost all viruses are designed for them is like saying that houses are bad, because thieves might try to break in...
Re: (Score:1)
Re: (Score:2)
(And for the slashdot lamo-slow-the-cowboy-down routine I TYPE SLOWLY YOU INSENSITIVE CLOD!)
Re:Top Viruses of 2006... (Score:5, Insightful)
Re: (Score:1)
Re: (Score:3, Insightful)
No, Windows is a target because it is widely used and vulnerable.
Windows is bad because there are so many obscure ways to hide malware and restart it on subsequent boots.
Re: (Score:3, Insightful)
My stone house, on the other hand, is not very susceptible to fire. That means it's better.
*Notice that I'm convienently ignoring how difficult it is to run anything through the walls, compared to that wooden house, in addition to how cold the stones get during the winter (and the subsequent lack of insulation), etc.*
Re:Top Viruses of 2006... (Score:5, Insightful)
[0] http://www.google.com/search?hl=en&q=vista+virus [google.com]
[1] http://www.google.com/search?hl=en&lr=&q=vista+se
[2] http://it.slashdot.org/article.pl?sid=06/11/16/01
Re: (Score:2)
However, they don't spread a lot (because if someone uses linux, he has enough knowledge not to open an attachment/install an unknown file.)
Well, one *hopes* they have that! That practice has been a mainstay since the first viruses cropped up. However, believing that you're safe because you're running Linux, without following good practices is pretty dumb too. The first time someone's running as root and downloads an untrustworthy file...
Yes, it's harder to get viruses in Linux, and the ones that a
Re:Top Viruses of 2006... (Score:5, Insightful)
But that's not really an issue is it? What Linux distribution has the default user as Root these days? In fact, it's more difficult to run as root in some distributions instead of as a normal user, in that the "root account" is never enabled. Attempt to login to (X,K,Ed)Ubuntu as root at the login screen and it won't work.
How to get a Windows computer infected:
Connect to the 'net without a firewall or run IE and visit a bad page. Or, run OE (interesting that Outlook Express has the same initials as "Operator Error") for your mail. Or run p2p software and download a "song" that doesn't play (but is instead an executable file). In fact, I've got a friend whose daughter did exactly the latter, and I'm going to fix it after the weekend. I beginning to think that these days, that's the most common vector of infection, as I see it time and time again.
Windows gives execute permission based on the file name extension. For this utterly stupid idea held over from the frickin' CP/M days, users are being hosed left, right, up, and down. This bogosity should have died with Windows 3.1 or at least after Bill Gates discovered the 'net and put out Win98. However, the concept is still with us in Vista, so techs everwhere are going to be guaranteed a paycheck for at least the next 5 years.
How to infect a Unix or Linux machine:
Automatically through mail? Impossible to do without user interaction, since everything that comes down the pipe doesn't have the execute bits turned on. Anyone who writes an MUA that does that autmatically will be taken out back and hit with the clue bat.
Visit a web page? There's no such thing as a drive-by install. The user has to download the file and manually set the execute bits high again, through chmod or by right-clicking on the file.
Use p2p? Everything downloaded has no execute bit. What data file _ever_ deserves an execute bit? Indeed, I have yet to ever receive a file from the wire that has execute bits turned on except when they're contained within an installation package, and for that to work, I need to pause and use root permission if it's an install for the whole machine and I still have to unpack it even if it's going in my home directory.
In fact, the simple act of user interaction, even if it's the typing of the current user's password (OS/X) prevents a whole lot of evil. It's that short pause that gives the user the chance to _think_, if even for half a second, and say _no_ to random malware. If you're a malware writer and you give your victims the chance to think, your bit of evil goes nowhere. There are only so many times that people are going to install a fucking purple gorilla.
This ignores the population that will run silly "cupholder" executables and trojan filled "free screensavers," at every opportunity whether in Linux, Unix, or Windows, but then real stupidity trumps artificial intelligence every time. You can only do so much if a user is determined to blow each toe off his foot with a
If this means that Unix and Linux are more difficult, (as if typing the current user's password is complex) so bloody what? It's damn inconvenient when a computer gets infected, isn't it?
--
BMO
Re: (Score:3, Interesting)
Automatically through mail? Impossible to do without user interaction, since everything that comes down the pipe doesn't have the execute bits turned on. Anyone who writes an MUA that does that autmatically will be taken out back and hit with the clue bat.
Unless there's a bug in your libpng implementation, and your MUA automatically displays images.
Re: (Score:2)
Apples. Oranges.
The former is a design decision - to consciously give execute permission to email content. The latter is a bug. Please learn the difference between the two.
Bad troll. No cookie.
--
BMO
Re: (Score:2)
I know the difference between the two. You said, however:
How to infect a Unix or Linux machine:
Automatically through mail? Impossible to do without user interaction, since everything that comes down the pipe doesn't have the execute bits turned on.
Which is patently false.
Re: (Score:2)
This ignores the population that will run silly "cupholder" executables and trojan filled "free screensavers," at every opportunity whether in Linux, Unix, or Windows, but then real stupidity trumps artificial intelligence every time.
Which was my point. I cringe every time that someone says "I can't get a virus because I'm running Linux!" Linux makes it more difficult than Windows by several orders of magnitude, but it doesn't mean that it's impossible. In case you're wondering, I have seen people wh
Re: (Score:2)
You and I are on the same side. Heh.
When, at first, I couldn't use the root account in Ubuntu, I enabled it using sudo passwd. But upon reflection, after thinking that not having an active root account was a bit of bogosity (I'm a big boy, I know what I'm doing), I have changed my mind and agreed with the Ubuntu and OS/X method of using sudo for everything. It keeps one from playing "admin" for too l
Re: (Score:2)
You cant simply download a cool screensaver and double click it like in windows.
Re: (Score:1)
But that's not really an issue is it? What Linux distribution has the default user as Root these days? In fact, it's more difficult to run as root in some distributions instead of as a normal user, in that the "root account" is never enabled. Attempt to login to (X,K,Ed)Ubuntu as root at the login screen and it won't work.
-------------
While that may be true, you want to know how much effort its required to enable that? not much
Re: (Score:2)
I know exactly how much effort. I actually mentioned a way to do it up there, in case you hadn't read. However, the newbie is not TOLD to do it, and so by default, only when the newbie _learns_ what to do, the newbie can enable it or not.
But by then, the newbie has probably operated under sudo long enough that it's second nature and probably has picked up the clue that it's more secure that way anyway.
The fact remains,
Re: (Score:1)
Re: (Score:1)
Re: (Score:3, Insightful)
Because if a spambot is running as an ordinary user, it's ridiculously easy to kill and remove. A userland spambot is next to useless, because it will have a very short life. Where does it get launched? In
Re: (Score:1)
Linspire
Re: (Score:2)
Yeah, sure, millions of them.
I read this lie for many years and never seen any true virus for Linux, only "examples which don't work".
Re: (Score:3)
I read this lie for many years and never seen any true virus for Linux"
Hear hear!
I have to expound on this a little.
One of the reasons that the Windows apologists say that Linux has poor virus propagation is because of the geek ratio, and that Linux geeks "know what they're doing."
Well, let's take a look at OS/X. OS/X has a higher population of non-geeks that just want to get things done. Indeed, it's got the highest ratio of fashion conscious and arty-types of any user popula
Re: (Score:3, Insightful)
Great year for malware... (Score:5, Funny)
Direct Revenue hiding its core
one lone
launching executables from Group Policy subkeys;
populating subkeys of Winolgon\Notify with self-renaming
Hiding malware so it launches before Explorer (and even before the antivirus app) is sneaky, underhanded, and ensures a steady stream of income so I don't need to get an actual job. Editing the Registry hives from WinPE is the only cost-effective way to remove many of these things, and Suzy Homeuser wull never be ready for that.
So here's to you, scumbag malware writers... and here's to Microsoft for leaving soooo many ways to launch your malware: Thanks for paying my mortgage. Without security holes, and the slimeballs who exploit them, I'd be back selling auto parts.
Re:Great year for malware... (Score:5, Informative)
That one that warns of "your pc is infected with malware" from system tray, known some places as smitfraud others as VX2, now uses several hundred reinfection methods, from infected active script desktop images, to the old favourite, making itself the default program to open files of type
In fact, all those tricks you list are used by one version or the other (or if you are unlucky and get the latest updated version, all of them).
Faster now just to backup data, format and re-install than try and debug each and every method used by the particular version you have, I have tried auto remove tools, all of them end up out of date less than 24hrs after launch (someone is making enough from this thing that paying lots of money to a few programmers is not a problem).
The pay-off is of course when the user clicks that task bar balloon and it installs the "protection racket" software of choice onto your PC, which says it found 4366724 virus' and spyware, and to please pay them for a full licence to remove them. Of course if you pay them, it does NOT remove even its own malware, at least yesteryears organised crime DIDN'T break stuff if you paid.
The real kicker is, the 3-4 times I have seen it infect a pc (had user, on a fresh pc, do what they did when it first happened) it was through an IE "unpatched code execution" bug of the week.
When I tell people to use firefox, and then pre-install it on their new PC/repair, do they think it is a joke?
Re: (Score:1)
O
Re: (Score:1)
Something like 99.9% of people just want a 'internet' thingy, they don't care about having a computer or security or whatever, and if the blue e was the internet before, then it is probably still the internet now, and they don't care about the fire in your pants or whatever the hell you were rambling about when they were paying your bill.
Seriously, the only reason most people know they're running Windows is because it says so when they turn on the pc. There's the monitor, there's the "CPU," the mouse,
Classic Help Desk story... (Score:2, Funny)
When I was the alpha geek on a four-geek Help Desk, we had to ask each caller for the computer name (we later used bginfo for that). We would ring a bell every time we got the answer "Dell," then patiently explain that the computer is a Dell, but the computer has a name on the network, and we need to figure out what that is...
one woman interrupted me: "Trinitron?"
I slapped the mute switch just in time, and ROTFLMAO.
One repair strategy (Score:4, Informative)
My usual algorighm:
Start up in Safe Mode
Use AutoRuns.exe to identify most of the offenders; delete those that don't self-reinstall
Open IE and then System Information; look at Loaded Modules to find the vx2
Boot to Windows PE; back up and load the Software and System hives & clean them up; do the same with the user hive(s)
Boot into Windows and check for stragglers.
Lots of fun, especially for $1.25/minute.
Archaic! (Score:2, Funny)
Oh, well, I think they underestimate just how stupid some people are. I wonder who the unlucky person was who first nabbed that one. Just goes to show, the internet is the "wild frontier" and that probably won't ever change.
Re: (Score:2, Funny)
I worked at a chain of auto parts stores, with only five Windows machines. The marketing guy was constantly catching the Zombie virus from his drawer full of floppies.
After about the 5th or 6th time, I took all the floppy disks out of his desk and smashed them with a ballpeen hammer.
Re: (Score:2, Funny)
Re: (Score:1)
Idiots, this makes the problem only worse! (Score:1, Interesting)
Definitions (Score:4, Informative)
Well, the GP said the spyware "monitors whether users access certain web pages with pornographic content". Sexual matters being involved, the expression "voyeuristic tendencies" is appropriate. If I want to know what kind of motor my neighbor has in her car, I'm being "curious", if I want to know what kind of panties she's wearing, then I'm a "voyeur".
What the world needs (Score:5, Funny)
Re: (Score:1)
Malware's ever expanding talents (Score:1, Insightful)
Re: (Score:1)
The other user who, I've noticed, rapidly messes up a computer even with the above 4 things installed is "average teen with half a clue" who is somewhat aware they should not install bad things, but assumes that if it is something that all their friends install, or something they feel they just gotta install, then it can't hurt them.
What about the most effective? (Score:1)
WGA (Score:4, Interesting)
That bit of malware is installed on users machines without their knowledge of what it really means.
It may monitor what you are up to, We don't really know yet.
It may pop a message onto your computer suggesting that you go to a certain website and pay money to some questionable organisation.
A new version is reputed to disable your computer if you do not submit to its blackmail...
Re: (Score:1, Funny)
The article is wrong and attemts sensationalism (Score:2, Interesting)
I don't know about everyone else, but this damages the credibility of the article for me.
How about linking the original article? (Score:2, Informative)
Panda Software Virus Yearbook 2006 [pandasoftware.com]
One Glaring Omission (Score:1)