Hackers Offer Subscription, Support for Malware 105
Stony Stevenson writes "Organised gangs are taking a page out of security vendors' books and setting up their own websites that offer support and subscriptions for malware and spyware. From the article: 'For subscriptions starting as low as $20 per month, enterprises can sell fully managed exploit engines that spyware distributors and spammers can use to infiltrate systems worldwide, said Gunter Ollmann, director of security strategies at IBM's ISS X-Force team. Many exploit providers simply wait for Microsoft's monthly patches, which they then reverse engineer to develop new exploit code against the disclosed vulnerabilities, Ollmann said. "Then all you've got to do is just subscribe to them on a monthly basis.'"
Re: (Score:1)
One small error... (Score:5, Funny)
ie isn't a virus development tool. It's just an installer.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re:OSS support (Score:4, Interesting)
Re: (Score:2)
Secondly, there are so many different versions, alternatives, and forks of open source software that it's harder to target a large audience. It's the monoculture that requires Microsoft to be more secure.
Re: (Score:2)
How many spreadsheets are in the basic Ubuntu repository? (not universe, non-free, multiverse, or whatever)
Ok, now how many are in the base repositories of the other major distros? I bet you'll find a few common faces...
And how many people use spreadsheets that aren't in the repositories?
What about compilers? What's that? not even intel's free compiler is in the repositories?
The repository system is like a two party political system: It enhances the front-runners and penalize
Title somewhat misleading (Score:5, Insightful)
Re:Title somewhat misleading (Score:4, Funny)
Re:Title somewhat misleading (Score:5, Funny)
Re:Title somewhat misleading (Score:4, Funny)
Re: (Score:1)
Re: (Score:2)
And I didn't have to slow down either.
|\/|y 133+ i5 +00 57r0|\|g...
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
No wonder people have problems getting along with, and understanding others -- they can't even tell the difference between "for" and "against"....
Sigh...
-l
Automatic updates (Score:5, Funny)
Re: (Score:3, Insightful)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Follow the money (Score:5, Funny)
Re:Follow the money (Score:4, Funny)
Re: (Score:1)
Nope, it's Marv. Stolen from Sin City.
Nephilium
Re: (Score:3, Interesting)
They've already legislated away some access to researching vulnerabilities with the DMCA.
Announcing security hole disclosure risks litigation in the U.S.
I'm most concerned about the American legislation that Microsoft will dream up to fight shops like this which will end up harming us all by limiting innovation.
Re: (Score:2)
Microsoft is probably too busy dreaming up Vista sales to be bothered with this issue.
Re: (Score:1)
Three guesses as to what single thing gives them that kind of power. It's not the money, though that is a "lubricant", so to speak.
why not (Score:2)
Sounds like a trap to me (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
I prefer cash and bearer bonds.
my merchandise is a little different though . . . YMMV but we've found that at times western union , while not reversible, is interceptable and/or traceable.
Re: (Score:2)
Re: (Score:2)
I suspect the service doesn't do much repeat billing...
Putting the "organized" in "organized crime" (Score:5, Insightful)
It actually fits a pattern we've seen with viruses, trojans, spyware, other malware, cracking, even spam. They've gone from small shops, often one programmer trying to make a name for himself, to full-on organized crime using businesslike structures and tactics.
Re:Putting the "organized" in "organized crime" (Score:4, Funny)
I want malware, and viruses for my OSX box. it just isn't fair that the viruses and malware only works on windows. I have animated cursors too. Heck right my ssh port is open go ahead and try to crack it.
Re: (Score:3, Funny)
Re: (Score:3, Funny)
Re: (Score:2)
Yeah? Which version of OpenSSH [cert.org]? Got the latest security patches from Apple? What's your IP address?
Oh, yeah, do you wanna buy some root exploits for your Mac?
Re: (Score:2, Flamebait)
First off, only the clued even know that ssh exists and how to turn it on. Joe and Josephine user don't know nor care what it is. It's not turned on by default. If one is offering SSH as a service, one should be clued into where to get updates, and recompiling one's own instead of waiting for Apple. Funny how Apple includes a full dev kit with OS/X and Microsoft doesn't for Windows. http://developer.appl [apple.com]
Re: (Score:1)
Yet they still won't provide support for *nix in any way shape or form. I want malware, and viruses for my OSX box. it just isn't fair that the viruses and malware only works on windows. I have animated cursors too. Heck right my ssh port is open go ahead and try to crack it.
This post is a virus that operates on the honor system. Please post your root password and credit card details as a response to this post, wipe your hard-drive, and then spam this message to everyone you know via e-mail and forum/bl
Re: (Score:2)
username luser
password luser
credit card 5555 0000 1111 2222
expired 03/07
and I just typed rm -rf ~ will that work?
This post is a virus that operates on the honor system. Please post your root password and credit card details as a response to this post, wipe your hard-drive, and then spam this message to everyone you know via e-mail and forum/blog postings. Thank you.
I couldn't help myself
Re: (Score:1)
Who didn't see this coming? (Score:5, Interesting)
Re: (Score:2)
What makes you think they don't have their own home grown hackers - like China [slashdot.org] for instance.
Re: (Score:2)
Re: (Score:2)
I dunno. Seems more likely that there'd be a scandal and we'd find out that AV vendors were sponsoring this type of activity. The worse the problem is, the more people will pay for protection, after all.
$20?!?! (Score:5, Funny)
Re: (Score:2)
Seriously, what does running as a restricted user do to prevent this? Restricted users can still install software anyplace they can write to.
Re: (Score:2)
Re: (Score:1, Flamebait)
Doesn't work (Score:2)
I am sure you mean removing execute permissions from the file itself. In that case, you would have to mount their entire home directory (has to be a home partition now) 'noexec', which would probably break some things, and still wouldn't work -- scripts do not need execute permissions, and they still have things like login
How long? (Score:1, Insightful)
Just my
Re: (Score:2)
Killing the messenger isn't going to change the fact that major software companies are still releasing software with basic security flaws in it. Somebody, somewhere is going to take advantage of that.
Re: (Score:2, Funny)
Yes, and we all know how organized, monolithic, and connected "the underground" is.
*rolls eyes*
Next Step (Score:5, Funny)
"a method of injecting code into a web-browser to steal credit card details.... on the internet"
"a method of using many remote controlled computer's, without the owners express consent* to send unwanted advertising material, to many, many people... on the internet"
After that expect to see Exploit Genuine Advantage programs to ensure that the stolen data you are using is from genuinely advantageous exploits, and not from some half baked knock off malware or virus, duplicated by a disreputable individual.
Obviously the last step will be the mergers, (after all the above should ensure a profitable market is created and grows). Symantec will merge with EvilCode PLC, to produce Evil-Symantec, McAfee will merge with McNasty, to produce McNastfee. These new entities will be able to leverage both the illegal exploit market and provide protection services simultaneously, probably all in one product... , Finally Microsoft will change its OS so that it no longer "works" with all these wondrous exploits and... hell will freeze over
Re:Next Step (Score:5, Funny)
You missed one... (Score:2)
Re: (Score:1)
Re: (Score:1)
Does it matter if your malware is genuine? Yes, if you want the confidence of knowing that your malware is legitimate and fully supported.
And only genuine exploit customers can receive product downloads, malware updates and special offers.
Benefits of Genuine Exploit:
Capabilities You Expect - Your system will deliver the features, options, and performance you need to maximize our productivity and enjoyment.
Confidence and Peace of Mind - Your malware is authentic, properl
I am shocked! Shocked I say! (Score:3, Insightful)
erm, ok, maybe not. Anybody whose job it is to track such things who thinks this is news, well, they're not doing their homework.
The exploit ecosystem has evolved an organism that appears to be self-aware.
If only there were an environment that was safe from such evil organisms, where they could not thrive...
Re: (Score:1)
Link to actual site, and better info (Score:5, Informative)
The site they're writing about [stat482.com], found by searching with Google for phrases in the article, isn't quite what the article says it is.
It's really yet another slimy "affiliate" program. "We give our code to your and you need to setup it to your websites. We pay for installs and for trusted webmasters for traffic if they want that." They're not selling malware with support. They're buying traffic to install their malware via drive-by installs. That's not exactly new. CometCursor, BonzaiBuddy, and Zango come to mind.
From the original article, someone else may be selling "fully managed exploit engines", but it's not these guys.
Re: (Score:3, Funny)
Nice to see the Zero Wing writers getting some new work.
Lynx (Score:1)
Yeesh.
Capatilism at it's finest (Score:1, Flamebait)
Re: (Score:1)
Good! No, as a countermeasure... (Score:2)
Re: (Score:1)
L0pht (Score:2)
WHAAAT??? (Score:1)
That's it for me. From now on I'm using only open-source malware.
This is outrageous! It's extortion, that's what it is! It's downright criminal... Oh!
Tin Foil Hat Alert (Score:1)
A new age (Score:1)
People just don't seem to get it (Score:3, Insightful)
No, it wouldn't It wouldn't sell, nobody would use it and it would be a complete flop.
Windows is designed to be usable by people without one little bit of computer knowledge. It therefore does things "for you" in the background that can be good and helpful. If they are subverted, they are bad and insecure. Take all of this away and leave just the command line and Windows would be much more secure, but it would be unusable by most people.
If it is programmable and the programming can be added to or modified in the field, it needs controls on who can modify that programming. If the inexperienced user can, it isn't secure. Period. When users run programs to install games they purchased they are using the same resources as when the click on an email attachment to install some bit of malware. They have no way of knowing the difference and it would seem no amount of education is going to fix that problem.
What most people need is a locked-down appliance that cannot be modified in the field without extraordinary effort. And certainly cannot be modified over the Internet. This could be user friendly and secure, but you wouldn't install software on it, ever.
Windows is trying to be user friendly and general-purpose. This has no choice but to fail to be very secure. The user cannot tell the difference between a program that is from Microsoft that is something they want and a program from microSoft that isn't something they want at all. Or from MircoSoft. Or really, anyone else at all. Sure, you can try to give them a chance to tell the difference - and Vista does try - but it isn't going to work. People gave up reading messages from computers and just click OK beginning in 1979 with CP/M and they aren't about to change now.
I contend that there is no material difference between the security present on a Macintosh or Linux and Windows in the hands of a user that doesn't understand how the system works. If they get an email that says to run some program, they are going to run it if they want what the email says they are going to get. If this requires using sudo to get root authority, they will do so if they have the ability to do it.
So how do you have security in that environment? You don't. You can't ever be secure against the naive user in charge of their own computer.
Sigh. People are scum. (Score:2)
Any y'all who were on Usenet back in the day know exactly what I mean.
20 DOLS !!! (Score:1)
I am sure phishers too (Score:2)