Massive Spam Shot of "Storm Trojan" 260
jcatcw writes "Postini has already counted nearly 5 million copies of the spam in the last 24 hours, and calculated that the run currently accounts for 87% of all malware being spread through email. 'Expect this to grow much larger,' a Postini spokesman said; 'It should top out at 60 million messages within the next 24 hours.' It's the largest attack in the last 12 months, and more than three times the volume of the two biggest in recent memory: a pair of blasts in December and January. The spam carries a ZIP file attachment posing as a patch with subjects such as Worm Alert!, Worm Detected, Spyware Detected!, or Virus Activity Detected."
yep... (Score:2)
Nope (Score:3, Informative)
I have seen a couple of copies of the spam itself, but nothing major.
Re: (Score:3, Interesting)
I hope you are right, because I have had an epiphany and am now one of those who decry the "clueless users/lusers" responsible for letting their machines become infected and recruited into botnets.
I used to have sympathy for them, but as botnets proliferate and my mail servers get pounded even
Re: (Score:3, Insightful)
Re:Nope (Score:5, Interesting)
I have checked the senderbase.org entry and it says like 3500% volume increase over 1 day from that IP!
Still, as old timer I feel uncomfortable posting the IP on web whether it is spammer/worm infected or not. I mean that worm really took off, perhaps the owner of botnet finally accepted the price offered by mob,mafia whatever using it. Yet again, no worries, Clam detects even without opening that password protected zipped junk.
Comment removed (Score:5, Interesting)
Re:Another day in the world of near-monoculture. (Score:5, Funny)
Microsoft is to computers what Philip Morris is to lungs.
Woo, a new quote!
Re: (Score:3, Funny)
Re: (Score:2, Insightful)
Re: (Score:2)
And yes, Linux has been known to cause anxiety and tremors in people at times. =D
Re: (Score:3, Funny)
Re:Another day in the world of near-monoculture. (Score:5, Funny)
Who said it's Windows malware?
(yeah, OK, I was trying to be funny...)
Re: (Score:3)
If I weren't so tired atm I'd have something deep and witty to say about that, but all I can do is shake my head.
Re:Another day in the world of near-monoculture. (Score:5, Funny)
Re: (Score:2)
(posted from Linux, by way of a tunneled session from OSX)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Interesting)
Um, the payload is a .exe file. [symantec.com]
I thought I'd be a smart-ass and show you that it didn't run on Linux. But, damn! I have Wine installed.
Re:Another day in the world of near-monoculture. (Score:5, Insightful)
If anyone should be sued, it should be the ISPs who allow zombies to sit there on their network. I don't like lawsuits, and would prefer to see some government incentive used to compel ISPs to remove the zombies.
Re: (Score:3, Funny)
The biggest security risk is shared by all operating systems and hardware setups because it's not part of the computer.
It's the lump of carbon, water, and other trace elements/compounds between the keyboard and the chair.
Re: (Score:2)
The poor schmucks with an email who receive the spam are the ones who get it, as well as the poor schmucks who administer an e-mail system that now has to contend with the extra load.
Re: (Score:2, Offtopic)
Re: (Score:2)
Too much privilege! (Score:4, Insightful)
Actually, there is a technical flaw, not just a human engineering one. The system allows users to install software, with global system implications, with no confirmation. My Mac confirms such things with me, and seems to get it right. My Linux box won't let me touch the global system configuration at all unless I su to root.
This has always been the problem. I recognize that there is incompetent Windows software out there that won't run without Administrator privileges, but that's another issue. If you really need privilege to do something (like change your password), others systems have ways of temporarily elevating privilege. Like suid on Unix.
...laura
Re: (Score:2)
But I don't think that there is anything about making a spam-zombie that couldn't be done as a normal user. I think that this trojan would still work if applied to Mac or Linux users of the same cluelessness level (though that might be harder to find). Further, in most Mac installations, and many Linux installations, the main user of the system is aware of the root password and will happily plug it in when prompted. On the Mac this happens almost every time you
Re: (Score:3)
That's great, so when you're doing something that you feel really needs to be done, such as protecting your computer from the nasty botnet it is reportedly a part of, or your email will be cut off, you'll click through those prompts to get that patch in. Well maybe not you personally, but you and I are not the common masses.
Vista has the "Cancel or Allow" thingy going now. Do they need to extend it, would that really help?
"Hmm I need to run this patch like the email says,
computer IQ test? (Score:5, Funny)
Are you sure you want to do this?
"YES"
OK what is the end result of this computation 15 XOR 24 ?
" UM 17?"
No, please call your son to ask permission to perform this operation.
Re: (Score:3, Insightful)
Why the fuck do people keep bashing the UAC? What the fuck is wrong with finally having a real "sudo" in windows? Instead of having to run as administrator all the time, you can now escalate when you want to. Microsoft finally adds better security, and all the whiners come out of the woodwork.
This sort of shit reminds me of my uncle, who thinks he's a computer person:
"I really miss windows 98. It was a simple, no-frills operating system."
"It didn'
Re: (Score:3, Insightful)
One of the problems I had with early revisions of UAC (I haven't had the pleasure of trying out Vista's final version much) is that it couldn't figure out what the user was trying to do and anticipate it. When creating a new file, I first was asked if I was sure I wanted to create it, then I was asked if I was sure that I wanted to rename it. Hey Vista! It's a NEW FILE! I probably
Re: (Score:2)
You mean like right-cliking a program and selecting "Run As" in XP, executing the program with different permissions? Yeah, I sure wish that already existing feature existed too...
Re: (Score:2)
(Yes I know this is Slashdot and that I'm living in my own little fantasy land with this analogy)
Re: (Score:3, Interesting)
Lets say there was no laws governing seat belts. And theoretically after seat belts where already in wide use among the new.. flying cars that a few people drove. Fly Systems finally invents the flying cars for the average Joe. It really takes off and now almost everyone has a Fly System car, but Fly Systems REFUSES to sell cars with seat belts, despite a market demand. Sure you can
Escusing Bad Engineering (Score:2)
The thing is Microsoft shouldn't make Windows do these destructive things so readily in the first place. This comes about by bad engineering and worse its passed off as "bad users".
Eve
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I am sick and tired of paying for my cable modem and router to recieve crap packets, and making my router discard them. It's like junkmail on a HUGE scale. (except that the bits are tiny....)
Seriously though, I have a few clients who REFUSE to get a router / firewall. They insist that since it (the internet)works, they don't need it. Even after telling them that benefits for them (and me), even w/ charging them $0.00 to install the damned thing. People have wierd mentalities sometimes.
I gener
Re: (Score:2)
but this trojan is not really something that they can (or should) prevent! This worm is not exploiting any flaw in MS's programs that I am aware of, it is simply social engineering.
The flaw in Windows is that it does not provide for an open signing framework that warns users when running unsigned, uncertified code. Further, the flaw in Windows is that it does not restrict such code to a sandbox by default and it does not inform the user of what the software is doing when run. Double clicking software should not be a black box where that implies the software has privileges to do anything it wants.
Unless you make Windows prevent a user from running arbitrary code, I don't know how you'd fix this.
You apply ACLs to all software, with more restrictive ACLs for software that is uncer
Re: (Score:2)
No, not on Slashdot! The horror! And this whole time I though Slashdot was the pillar of unbiased, informed opinions based purely on fact!
Oh yeah, and something about being new here...
But you have to ask yourself... (Score:2)
Re: (Score:3, Informative)
Besides, Outlook DOES warn you when you try to launch an executable! I just tried to launch VNC, and it says, "WARNING! This file may contain a virus that can be harmful to your computer. You must save this file to disk before it can be opened. It is important to be VERY certain that this
Re: (Score:3, Insightful)
Re: (Score:2)
Email from this kind of attack is generated ei
Re: (Score:2)
I do agree with you that MS should be held responsible for remote exploits and buffer overflows, where the user does nothing and still gets infected. That's a flaw of the system. This (and about 99% of current malware) user user stupidity to infect a system.
Personally, I'd hold a user of a system responsible for what he does with it. If you are stupid enough to click on ever
Re: (Score:2)
People aren't allowed to own howitzers either even though many of us could be trusted to only fire them at government approved proving grounds.
Re: (Score:2)
The solution is responsibility. Take cars. If people would use cars the way the use computers, a mass accident with hundreds of people killed wouldn't be worth a story. It would be everyday life.
If you could not kill people but only do "material" damage, I'd hand you that howitzer. Why not? But you are responsible for it if you fire it within city limits and ca
Re: (Score:2)
I find your acceptance of material damage odd. You'd have to proble
Re: (Score:2)
Yes, that can cost a ton. But I'm pretty sure some insurance companies would jump onto that quickly, maybe with a similar bonus system they use here for cars (if you go without an accident for years, you pay a whole lot less than people who have one every other week).
But personally, I'd already be happy with the responsibility clause. Yes, inspections would be nice (and would certainly be loved by the local dealers who could definitly need the additional inco
Re: (Score:2)
What we're talking here is a guy coming up to you, telling you your car is unsafe and that he needs the car keys to drive it around the block to check if it is in danger and to fix it in his garage. Who should be responsible for that, GM or the cluebrick that hands over his keys?
Re: (Score:2)
(with apologies to Homer Simpson, and beer)
Re: (Score:2)
It's not in MSs liability when someone is executing code. Should MS keep you from executing what you see fit?
Personally, I prefer "free" systems (not as in beer, as in F/OSS) that allow me to run the software I deem "right" for my system. It's not for the system maker to dictate what I may run and what I may not run. This in turn means, though, that I have to take responsibility for my actions. I have to make sure that the prog
Re: (Score:2)
The rice guy knew Spider Man(tm)? Cool!
Re: (Score:2)
But sure. Think about it and it makes sense. Since the rice doesn't stick together, where do you think Spidey got the stuff needed to stick to the houses, hmm?
One mystery solved. If I could just find out now where all the caffeine in decaf goes, I'd be
Re: (Score:2)
Laughed my ass off after reading that one! WTF, MS?
Re: (Score:2)
Re: (Score:2)
Funn
Re: (Score:2)
Re: (Score:2)
Microsoft would say it was the responability of the administrators of the systems that are DOS'ing you and they are right.
No car company in the world has been able to sell a car that prevents me from driving like an idiot and killing people even though it's obvious that this is a hazard.
Re: (Score:2)
I am interested in buying your product. However, I can't talk to you because we've never been in communication before and you have no idea who I am. I guess I'm going to have to go buy your competitor's product because I can actually communicate with them without having to jump through a bunch of hoops first.
Wow, good thing (Score:5, Funny)
Inoculation (Score:2, Interesting)
A good campaign of email virus inoculation should do the trick. Start a series of spam which looks exactly like a virus, but just puts up a "If this were a virus, you'd have just infected yourself!" message, thus training users to just don't open it!
Possibly add a link or button (perhaps labeled "Click Me!") which puts up a follow-up message for the especially thick user: "For heaven's sake, you're just making it worse. Quit clicking these things!"
I've Gotten It Several Times... (Score:2)
My officemate got it as the Britney / Paris porn thing twice this week. But she wasn't interested. I got it once. I wasn't interested. I've gotten the "Spyware detected!" with the zip file attached three times: twice at work, and once on my Yahoo! account.
I work at Department of Agriculture, so I'm surprised they didn't install themselves ;-)
Re: (Score:2)
I got one, I got one!!! (Score:5, Informative)
Re: (Score:3, Funny)
'Aye, you do indeed,' said Gimli, looking them up and down over the top of his cup. 'Why, your hair is twice as thick and curly as when we parted; and I would swear that you have both grown somewhat, if that is possible for hobbits of your age. This Treebeard at any rate has not starved you.'
I saw one of these yesterday (Score:4, Informative)
We all had a chuckle at how stupid someone would be to actually do that - then we realized grandma probably would, not knowning any better. All the more reason to get grandma off windows and onto at least a Mac, if not Linux.
waaaait just one second... (Score:4, Insightful)
Out of curiosity... since this is a completely social hack, and is just a means to trick somebody into opening up a compressed file and running the included executable... why would a Mac or Linux user be immune? Cannot Mac and Linux users also run executable programs from their desktops? You're confusing the ability to run a program of your choice with the means by which someone is fooling you into thinking you should choose to run it, right?
Re: (Score:2, Insightful)
Sure, you could write a trojan targeted toward those OSs. And y
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
It's also the thing that malware writers care the least about. They tend to be more interested in creating botnets or routing spam than deleting grandma's photos. Windows is a much better target for these aims.
Re: (Score:2)
Re:waaaait just one second... (Score:5, Insightful)
But it doesn't matter.
The trojan/worm need not be an administrator to trash a user's computer, even with Linux. Let's use Ubuntu as an example. It can still send mail and propagate just fine as a regular user. It can also trash that user's documents and files (which are likely to be the only important data on the machine). It can use a crontab entry to start a daemon on a high-numbered port, which will run without user interaction, or without them even being logged in. That daemon won't be root, but it will still be capable of being a very proficient zombie.
After that, for good measure, it can just run gksudo and simply ask the user for root permission. Ubuntu users are absolutely content to enter their own password into gksudo whenever prompted, especially when performing updates and patches (as this claims to be). So, the trojan will readily then gain root and be free to run completely amock. Trashing or rooting the OS is the obvious next step, but it's probably not even needed after all of the damage and infiltration already accomplished as a regular user.
Seriously - just because it's not Windows does not mean that it's secure. As long as people are able to run arbitrary programs on their own computers, these types of things will continue to be a problem...no matter what kind of computer it is, and no matter if it has root/administrator priveledges or not.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
Executables are frequently distributed inside compressed archives (eg, ZIP files) in order to prevent email filters from automatically removing them as "dangerous file types." There are ZIP extensions and TAR natively includes UNIX privileges, so there'd be no need to chmod +x malware, as the decompression utility would do it automatically.
To the best of my knowledge, none of these formats will set the setuid bit, though, so from there you'd either need to get the user to run it as root (sudo malware) or,
Re:I saw one of these yesterday (Score:5, Insightful)
Don't think that would happen? You must be dealing with a better class of users than exist in the wild. Of course it would happen, and happen at such a frequency that it would be just another massive exploit.
Windows is targeted because of market penetration. Why bother with less than 5% when you can get 95% in a single effort?
Re: (Score:2, Funny)
Just another... (Score:2)
...trap for the unsophisticated Web user. I mean, if you get an email from someone you don't know telling you to update your anti-virus, wouldn't you think that's a little suspicious?
I don't get much spam, because I really don't let my email address float out in the wild, so this kind of thing never bother me. But it just makes me wonder when someone is going to take some initiative and try to build a better system, to minimize the human element as much as possible.
New "Sledgehammer" virus (Score:2)
Please forward this email to everybody you know, then smash your computer with a sledgehammer. NOTE: you must forward the email BEFORE smashing the computer, not after.
###
I swear to God I think people would actually do that. What the hell can the operating system do if people are willing to save a zip file, type in the password, and then run the contents?
Maybe Microsoft should refuse
Re: (Score:2, Insightful)
Re: (Score:2)
Imagine the promise that this tool is gonna remove all WGA troubles for now and ever. Think people would refuse to burn it to CD, log in as admin, give it all rights and permissions, reboot 10 times and hand over every kind of password they have, including those for EBay, Amazon and their bank account?
Re: (Score:2)
http://www.cyberflu.com/ [cyberflu.com]
From the site:
Re: (Score:2)
Hmmm.... (Score:2)
I swear to God I think people would actually do that.
Then it would seem spreading such a virus hoax might help this sort of problem. Users stupid enough to fall for it would immediately lose their internet access.
Re: (Score:2)
"Please forward this email to everybody you know, then duct tape a plastic bag over your head. Make sure the seal around your neck is air tight. NOTE: you must forward the email BEFORE putting on the bag, not after."
Simple problem (Score:3, Informative)
One sort of computer doesn't need to be administered any more than your toaster or TV needs to be administered. If the programming cannot be changed by the user in any way and all it does is read email and browse the web. Period. Maybe play some music sometimes. Ideally, such a device has its programming in ROM (not flash) and cannot be changed in any way. No instructions are ever put on R/W memory, ever. Completely and utterly secure the way your toaster is. How many people have found exploits for a toaster?
Windows is perfectly secure when it is properly set up and administered. The problem is that you can't install software on such a computer and you can run all sorts of fun applications. Gee, isn't that too bad. One solution is to require every user to either (a) switch to a appliance that cannot be compromised, (b) pay the ISP to administer their computer or (c) pass a test to be qualified to have a general-purpose computer connected to the Internet. And yes, the test should be similar to the FCC license for HAM radio: long, incredibly detailed and most people can't pass it without lots of work.
The operating system cannot be made secure from users adding software if they are supposed to add software. But users aren't qualified to add software to their computers and if they are allowed to do so, they will add things that will eventually destroy the ability to use the Internet.
exam (Score:2)
unless you know something about electronics/radio
le customers (Score:2)
"This is the same as the last 'patch' email I told you we never send, delete it"
maybe the problem... (Score:2, Interesting)
...is that malware has better installation instructions than any of our other software. When people see documentation, it's like a dream come true!
Ah... disillusionment. :-)
Mail server filters (Score:3, Interesting)
A day in the life of a spam filter (Score:3, Interesting)
Trojan is so US centric (Score:5, Funny)
Re: (Score:2)
If it's important to you, I'll check on Monday.
Re: (Score:2)
There is no chance of this not succeeding with people that have no business being responsible for administering a computer.
Re: (Score:2)
I use mimedefang, which filters
Re: (Score:2)
(It seems to me that it would be worth the trouble for a virus scanner to try every word in the file as a password, and then scan the results.)
High risk file types (Score:2, Insightful)
Source: http://support.microsoft.com/kb/925330/en-us [microsoft.com]
Re:It scares me to death! (Score:4, Funny)
Sure there is [wikipedia.org]