When Malware Attacks Malware 135
PetManimal writes "Researchers say that the Storm Trojan/Peacomm worm has been tweaked to spread via IM programs and attack rival malware. Symantec sounded the alarm, and says that the exploit launches in AOL, Google Talk, and Yahoo Messenger windows that are already open, making it appear to be a legitimate message from a known user. The worm has modified the code from last year's Nuwar worm, and when activated, enables a DDoS attack against any site, including antispam services and servers supporting rival malware: 'Systems hijacked by Peacomm have also conducted DDoS attacks against at least five domains used by the creators of the noted Warezov (or Stration) worm. After a busy September and October, Warezov was credited by some analysts as the genesis of 2006's massive fourth-quarter spike in spam volume.'"
that's... (Score:3, Funny)
You get total protonic reversal.
Re: (Score:2)
Re: (Score:3, Funny)
Re: (Score:2)
If they'd just fix each other... (Score:5, Funny)
If your dog was running around the neighborhood barking at people and biting them, they'd make you do something about the dog. I don't see why your computer gets to the do the same thing on the internet with such impunity.
2 cents,
QueenB.
Re: (Score:2)
Most of these worms don't work on those old versions of Windows. It's the 2000 and XP machines that are vulnerable. Also, installing software requires that one download it first, and that's a cure that's worse than the disease (see Welchia).
I like the idea of turning on Windows Update, though.
Re: (Score:1)
Re:If they'd just fix each other... (Score:5, Informative)
I recently had to fix a machine that was declared 100% clean by Spybot, Hijackthis, Windows Defender, etc. - and still kept throwing up random porn popups*. Turns out it was a virtumundo variant... the checker (forget the name) recommended by the hijackthis people could see it, but wanted money to remove it - eventually found an app that does it by doing some clever stuff and forces a bluescreen to stop it reinstalling itself (which it does in realtime.. you *can't* delete it manually). That's now in my machine fixing arsenal for the next time I see it.
Makes me wonder how many of the bleats that 'my machine is clean therefore it must be blizzard being hacked' posts on the Wow forums have variants of similar crapware on there.. and they've fallen into the trap of believing the scanners despite the overwhelming evidence to the contrary.
* And that was a machine without IE on it and fully patched.. the thing apparently got on in a trojanned version of Acrobat Reader.
Re: (Score:3, Informative)
Spybot regularly updates both signatures and detection methods. No, it's not perfect, but I've yet to meet the perfect scanner. I find that a combined dose of Spybot, AdAware, and a good AV program does a very good job of keeping Windows systems clean.
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
You know there will always be at least one unpatched zero day flaw active at any time.
Re:If they'd just fix each other... (Score:5, Informative)
net stop wuauserv
Start -> Run -> gpedit.msc -> Local Computer Policy -> Computer Configuration -> Administrative Templates -> Windows Components -> Windows Update -> Re-prompt for restart with scheduled installations. They hid it well but it's there
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Wi ndows\WindowsUpdate\AU]
"RebootRelaunchTimeoutEnabled"=dword:00000000
"NoAutoRebootWithLoggedOnUsers"=dword:00000001
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\Policies\Explorer
NoDevMgrUpdate value to 0
HKEY_LOCAL_MACHINE \ SOFTWARE \ Policies \ Microsoft \ WindowsFirewall
Set these to "not configured"
* Windows Firewall: Protect all network connections
* Windows Firewall: Do not allow exceptions
* Windows Firewall: Define program exceptions
* Windows Firewall: Allow local program exceptions
* Windows Firewall: Allow remote administration exception
* Windows Firewall: Allow file and printer sharing exception
* Windows Firewall: Allow ICMP exceptions
* Windows Firewall: Allow Remote Desktop exception
* Windows Firewall: Allow UPnP framework exception
* Windows Firewall: Prohibit notifications
* Windows Firewall: Allow logging
* Windows Firewall: Prohibit unicast response to multicast or broadcast requests
* Windows Firewall: Define port exceptions
* Windows Firewall: Allow local port exceptions
http://sourceforge.net/docman/display_doc.php?doci d=28367&group_id=105508 [sourceforge.net]
Preparation
Start by installing the latest version of ClamWin, and download the latest virus definitions. See the ClamWin manual for full details on how to do this. Note that, if you are going to create a CD, you will not be able to update the virus definitions without creating a new CD, since a CD is read-only.
Copy Folders
Create a working folder in a convenient location to hold the files that are to be copied onto CD/USB, eg C:\ClamWin-CD.
In the working folder, create a folder named ClamWin.
Copy the contents of the ClamWin program folder into C:\ClamWin-CD\ClamWin. By default, the ClamWin program folder is installed to C:\Program Files\ClamWin
Create folders named log, db and quara
Re: (Score:3, Informative)
What, install by force a package without a realtime scanner 'cause the user can't be bothered, and then think they'll bother doing manual scans? Methinks you've suffered an oversight...
I've taken to suggesting AVG to all of my friends and family. Free, autoupdates, realtime scanner, scheduled daily full scan. Routinely outperforms both Norton and McAfee in lab catch tests. Otherwise, I'm all for your list.
Re: (Score:2)
2 cents,
QueenB.
Re: (Score:2)
AVG updates definitions almost daily. The scanning engine, maybe not as often as the paid product, but I'm alright with that. In fact, I more or less expect that - they are a business, after all. I find that the regularly updated free product works much, much better than the, say, 18-month out of date copy of Norton I found on my Mom's machine because, "it keeps wanting me to pay it, but I never use that program."
I've gotta visit more often.
At any rate, AVG isn't the only free-AV game in town. Avast!, Ant
Re: (Score:2, Interesting)
Now, I know that it disturbs people to talk like this, but the aforementioned 'dumb' Windows end user doesn't need more than a few ports open for connection to his/her machine.
So if draconian measures are being bandied about in this thread, maybe anything but Port 80 should be blocked at the ISP at 'the last mile' connection by default. Need anything more, 'by spe
When Malware Attacks Malware (Score:2)
Re: (Score:2)
This sounds like a really bad Fox special
Stronger malware (Score:5, Insightful)
Re: (Score:2, Informative)
Easy to kill (Score:2)
Just reboot.
Re:Easy to kill (Score:4, Insightful)
Re: (Score:2)
I think you could set a flash IDE drive to read only, and use it for your boot/OS. Sure it could trash your data, but at least the system is ok after the reboot. If not, I think there is a market for this.
Re: (Score:2)
Re: (Score:2)
Running from a CDROM boot is slow as mud..
Re:Stronger malware (Score:5, Funny)
Re: (Score:1, Offtopic)
Re: (Score:1, Insightful)
good point, even if it wasn't your intention.
Re: (Score:1)
A New Variation of Life... (Score:5, Funny)
Re: (Score:2)
Re:A New Variation of Life... (Score:4, Funny)
You were a math major, right?
Re: (Score:2)
So in this scenario Linux arrives late to the party then spends the next 50 years gloating about how they bailed everyone out?
Re: (Score:2)
Re: (Score:2)
Commodore 64. It has a small fanatical following, but in this modern world, is completely irrelevant.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Process accounting (Score:2)
Re: (Score:2)
Old News (Score:4, Funny)
this in not new (Score:1)
OS? (Score:1)
Re: (Score:2)
Any OS would is vunerable to an extent, since 90% of the problems are caused by the users allowing things to be installed. No OS can guard against that.
Re: (Score:2)
Any OS would is vunerable to an extent, since 90% of the problems are caused by the users allowing things to be installed. No OS can guard against that.
This is not true. Most problems are caused by people running software combined with the fallacious assumption by OS developers that software people run is trustworthy because the user is running it. An OS certainly can be created that accounts for running untrusted software and software with differing levels of trust and access. In fact, the bitfrost secu
Re: (Score:2)
That's wrong. The only problem is that an OS which doesn't allow you to install any software would probably a big failure
Re: (Score:2)
Re: (Score:3, Insightful)
The real problem is security models that assume very few levels of security. Either you install it and it can hose your machine and kill babies, or you don't run it and don't know if it was malware or not. That's just crazy. Back in the day MS Word used to pop up a dialogue box and say something along the lines of "this .doc file contains macros that may be viruses (ok)(cancel)." I knew a manger who offered $1000 to anyone who could add a button that said "open the file but don't let it infect my computer w
Reaction (Score:2)
Re: (Score:2)
... doing what? (Score:4, Funny)
Re: (Score:2)
And the Dept of Homeland security is doing what? exactly!
Probably re-imaging their insecure Windows boxes to try to clean up their own systems. How many directors of computer security have quit now after saying the job was impossible given the absurd Windows only architecture they implemented there?
It begins (Score:5, Interesting)
Thus begins the ecology of internet software. CPU cycles are simply too valuable (en masse) for one piece of malware to share with others.
Eventually, look for malware to get better and better and rooting out rival malware in order to take its place. As well, look for malware to be more cautious about consuming host resources, lest it get noticed by a user or antivirus package.
It's no different than Earthly biology. We think nothing of the colossal number of parasitic microorganisms currently hitching a ride on our metabolism. Some like E. coli are so useful that we even enthusiastically encourage (Yoplait anyone?). Symbiosis carries major advantages along the lines of "division of labor". How many years before real symbiosis is realized among internet-connected computers?
It would also evolve the antivirus landscape. The "OMG sterilize all machines!!!1!" mantra would change into a more relaxed problem: calculate the most efficient amount of CPU cycles to allocate among the competing tasks of:
That's how our bodies do it, anyway.
Re: (Score:2)
Re: (Score:2, Informative)
The stuff in yogurt is Lactobacillus acidophilus [wikipedia.org].
The stuff you DON'T want in your (upper) GI is Escherichia coli [wikipedia.org].
Re: (Score:1)
That's how our bodies do it, anyway.
Re: (Score:2)
Where do you buy yogurt, the public restroom???
Re: (Score:2)
Re:It begins (Score:4, Insightful)
However, there's a rather glaring flaw in the analogy, and it's this: in the biological world, the various bacteria that live in or on us do not have purpose. They are simply life forms, doing the things that life forms do (which is eat, shit, and make babies) in an environment that suits them. If they end up overrunning that environment and making us sick, it's not because they wanted to make us sick. If our bodies happen to be the perfect environment for them, and they happen to eat things in a way that is beneficial to us, it's not because they decided to help us out. They are just being bacteria. Symbiosis and infection are merely products of parallel evolution and happy coincidence.
In contrast, malware is written by people, and people do have motives for the things they do. Bacteria don't do this; they just do their thing with the eating and the shitting and the baby-making, and any macroscopic results are not due to the decisions of the bacteria.
Malware is written with purpose. That purpose could be to show the user ads, or participate in a botnet, or collect spammable email addresses, or whatever. But saying that anti-virus programs will ignore the "harmless" malware overlooks the fact that there is no harmless malware. There doesn't exist any malware that's going to go to the trouble of infecting your machine and propogating, and then not do anything. No one would program one. That means that all malware is either black hat (adware, botnet, spyware, etc.) or white hat (attacks other malware). Even if it's not using CPU resources, it is doing some other damage, such as annoying the user or enabling spam (in the case of black hat) or violating the freedom of a user to choose what software they have installed on their machine (in the case of white hat). Either way, all malware should be cleaned by anti-malware programs. In the world of software programmed by people, there's no such thing as harmless piggybacking.
****
Note: I am aware of the parallels of my argument with Intelligent Design. It was not my intent to start a flamewar.
Re: (Score:2)
Re: (Score:2)
Time Used by User isn't. Malware adds to this in in primarely three different ways, choked connections and laggy internet, direct intervention like pop-ups, and lastly, by bogging the machine down, either through hooking into places it shouldn't hook into, or through eating CPU-cycles.
In my experience atleast, the first two are way more prevailent than the latter.
Re: (Score:2)
In Soviet Russia (Score:2, Funny)
Ulimate Vulnerability! (Score:1)
Re: (Score:3, Insightful)
Regardless of the operating system or the applications which run upon it, the ultimate weakness at the end of the day lies upon the end user. You can only secure a system to a certain point until the user begins losing functionality, until the end user becomes more educated...well expect to see evolution in Malware.
Your comment is factually correct, but also very misleading. Users are the hardest element to harden in the chain of security, but right now they are by no means the weakest link. The OS devel
Re: (Score:2)
Re: (Score:2)
Gee, that sounds like every client-based firewall on the market (including XP's). The only wrinkle is the application signing, which is ALSO already being done but with a crappy UI as you mentioned.
In a way. A client based firewall is insufficient because it is too easy for something to escalate privileges and get around it. A MAC ACL is built into the core of the OS and deals not only with network access, but also access to hardware resources, system services, and files. With a client based firewall a w
Re: (Score:2)
Re: (Score:2)
The security of a system is the minimum of the machine's security and the user's ability.
I mostly agree, but it is a bit more complex than that. The machine's security includes its ability to inform the user and do what the user wants by making the right controls available to the user in a convenient way. Users are willing, for the most part, to spend a few hours learning the rules to safe computer use, provided they can still accomplish their normal tasks while following the rules. Right now they don't
Re: (Score:2)
You cannot "sandbox" an all purpose system to the point where the execution of a binary cannot cause harm to any part of it. At the very least, every file accessable with the account's privileges is in danger. Even if it's only
Re: (Score:2)
The ultimate first problem is that you SHOULD NOT run code from an unverified source. Period.
Tasks are not defined by what people should do in some mythical fairyland, but need to be based upon what people actually do. People want to run binaries they don't trust. Binaries are all trusted to differing degrees. I trust Photoshop because I have little choice. I need to use it. That does not mean Adobe should have the ability to do anything they want on my machine. I might want to run Halo, but I sure as he
Little known facts (Score:3, Funny)
What isn't generally reported is that Peacomm uses "Your momma's so fat" insults in the DDOS attacks. By far the most devasting and hilarious DDOS this year.
why can't the goverments of the world... (Score:2)
They could simply prosecute the companies that are advertising their products via spam, after all they must have either directly been the originators of the spam, or at least know who they are funding to do the dirty work.
The businesses that exist solely to send spam would dissapear overnight if their client base dissapeared.
I'm sure any government could easily be able to determine who is ultimately behind spam, simply by buying some advertised product then either tracking th
Re: (Score:1)
but somehow - i guess, murder is illegal in most of the countries of the world, but wait - somewhere somehow people still get murdered. hell, why?
lemme guess - some folks don't give a f* what's illegal? there HAS to be a reason.
Re: (Score:2)
Re: (Score:2)
They could simply prosecute the companies that are advertising their products via spam, after all they must have either directly been the originators of the spam, or at least know who they are funding to do the dirty work.
Great, then I can send spamvertisements for my competitor and they will be arrested. I can send spamvertisements for the company run by the jerk who is dating my ex-gf and he'll go to jail and she'll come to me for comfort. That's a great plan.
I'm sure any government could easily be a
Re: (Score:2)
Right, because drugs kill and everyone runs from those(ecstasy is a great example). Driving is one of the most dangerous things you can do...but you still drive everywhere. Being in the mob is dangerous, or a bookie, drug dealer, human trafficking, the list goes on. All an order of magnitude more dangerous than simple spamming...with a hell of a lot more 9mm shots to the head. All still wildly popula
It's more than that (Score:4, Interesting)
DDoS (Score:2)
Code wariors (Score:1)
Also, it might be neat pitting malware against each other in a Code War [wikipedia.org] type of visible environment.
This is old news, at least 2002 or earlier (Score:2)
Popular spinoff (Score:2, Funny)
I vote they make a spinoff of Robot Wars
I can see it now...
Malware wars... watch rival malware rip each other apart!
"Oh my god, Malwarior just executed an amazing kill maneuver!"
"it looks like Spymaster is only hanging on by a thread!
"Oh... and he's done for. Spymaster is terminated... add him to the hexdump!"
It Seems to me... (Score:1)
1. Don't allow your users to send port 25 traffic to any address but your own mail server.
2. Don't allow any one user to send massive quantities of email. Most user's won't need to send thousands of emails in a single day.
3. Use blackhole lists to prevent SPAM from networks that don't follow the abo
Re: (Score:1, Troll)
1. Don't allow your users to send port 25 traffic to any address but your own mail server.
Repeat after me... the internet is not the web, the internet is not the web. I'd kind of rather ISPs did not arbitrarily block ports because one OS is so unbelievably insecure that it does not even inform users before it starts spamming e-mail to the world, when that is a common occurrence on that platform.
Here's a counter-suggestion. How about if MS gets off their butts and makes their OS reasonably secure so that
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
If you want to make OS manufacturers liable, I want users liable for their sheer idiocy as well!
Re: (Score:2)
Re: (Score:2)
Good luck. You're the one suing, so the burden of proof is on you.
Re: (Score:2)
Re: (Score:2)
Yeah maybe i'd use my ISP's mailserver if they didnt tag all my mail, forward me shittonnes of spam and have a roundtrip time measured in hours.
Maybe I should pay $300 for a break pad change too eh? Instead of doing it myself properly. I obviously should leave it up to the 17 year old "professional" trainee down at speedy.
Re: (Score:2)
Re: (Score:2)
I don't know enough about SPF to know if it would work. Can spammer's somehow fake it?
Any workable solution that maintains our interent freedoms is better than locking the internet down of course.
hasn't... (Score:4, Funny)
Two wrongs make a right? / Swordfish (Score:3, Insightful)
But then again, perhaps 2 wrongs don't make a right...
CmdrTaco: help, being beat up by mod trolls .. (Score:2)
In this year 2007, why are we still talking about viruses, spam and malware. Why don't they make a desktop OS that don't get 'malware' merely by opening an email attachment or clicking on a web link.
IM programs and malware
http://slashdot.org/comments.pl?sid=222234&cid=18 0 01072 [slashdot.org]
Re: (Score:2)
What you said is the same as replying to an article about a homicide and saying "Well why don't we lock up all the murderers?"
Don't state the obvious in a discussion and expect not to be squelched.
Re: (Score:2)
That only happens if you're not running as root. On Windows, if you're not logged in as a member of the Administrators group, either you'll be prompted for some credentials (rare) or it'll fail with an error (much more common).
Don't blame MS because people run as admin; blame third party software developers for assuming people do, and for requiring admin access even when they don't ne