Online Videos May Conduct Viruses 195
Technical Writing Geek writes "A report on threats via the Internet released by a Georgia Tech research center indicates online video may be a new avenue of attack. As the popularity of flash media continues to explode, hackers may be targeting embedded video players and more traditional video downloads with worms and virii. 'One worm discovered in November 2006 launches a corrupt Web site without prompting after a user opens a media file in a player. Another program silently installs spyware when a video file is opened. Attackers have also tried to spread fake video links via postings on YouTube ... Another soft spot involves social networking sites, blogs and wikis. These community-focused sites, which are driving the next generation of Web applications, are also becoming one of the juiciest targets for malicious hackers.'"
Erm (Score:2)
Re:Erm (Score:4, Funny)
I guess the researchers at Georgia Tech were 11 and younger when this was done before.
Re: (Score:3, Interesting)
And yet it's so damn sad to see that in 10 years the industry has still not learned to do things right.
Good security starts from the design phase. If it was not meant to be hacked it should not be hacked. Security holes are mainly the fault and the responsability of the people who designed those buggy pieces of software.
And yet we see the media always blaming "hackers". Sure, they're assholes who try to break and enter. But it's like a bank leaving
Correction : WMV conducts viruses (Score:2, Insightful)
Let's leave the MS-apologist spin out of the summary. Video has nothing to do with it:
It's the WMV format [eweek.com] that conducts the viruses.
Correction : Everything conducts Viruses (Score:4, Informative)
So, list of places windows users will probably pick up nastyware now includes... actually, anybody know of something that *won't* lead to malware with windows?
Re: (Score:2)
Linux?
Dammit! (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
It's Indevitable. (Score:5, Insightful)
Media apps are big, hairy and process gobbets of data straight from the attacker's server. What did people expect?
They don't have to be (Score:5, Insightful)
What's wrong with posting MPG files for people to download? Every site these days is Flash video, or insists and assumes you're running a Web browser, wrapping their video file in Flash controls and burying the actual URL to the actual file people want to see under a dozen redirects.
All I want is the URL so I can play it with mplayer. I have no intention of putting Flash on my machine. Is that so danged difficult??
Re:They don't have to be (Score:4, Insightful)
Re: (Score:3, Insightful)
Well, make that three: control.
Re:They don't have to be (Score:4, Funny)
Re: (Score:2)
Re: (Score:2)
Also, having done some work on this kind of thing, you get your videos working on the most computers without having to make users do anything if you use flash. You might not like it, but it gets higher coverage than something like an mpeg.
Re: (Score:2)
You're certainly right about ads.
But won't most browsers talk to the default media player and play an MPG in the browser window when you click on it?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
b) Flash allows you to do things that even AJAX won't let you do. It is beneficial to the web. You know what games most people play? That's right, web based games, things like on popcap games and such. Just because you don't like it doesn't mean that it's not something that most people don't like. Face it, you're a curmudgeon, flash most definitely has it's place (but not as a replacement for an informational website... flash is for content asides and
Re:They don't have to be (Score:5, Insightful)
But, of course, the real reason for using Flash-based players is that it acts as a weak form of DRM. The intention is to force the user to watch the video only at the site (with ads, etc.), and to not allow the user to take the video, transfer it elsewhere (e.g. iPod), edit out commercials, redistribute it, etc.
Of course, we all know that it is possible to write a script that extracts the video... but it becomes a tiresome arms race. This is just another example of the fundamental tradeoff between the notion of "convenience" (for the user) and "control" (for the distributor). The user wants freedom. The distributor wants DRM.
Re: (Score:2)
Re: (Score:2)
Standard video files used to work quite well before those flash player appeared.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
That creates a new one, however: what video plugin do you use? And wh
minor correction (Score:2)
That should have been:
Re: (Score:2, Informative)
I would like to add my opinion this time. Some time ago I started a new idea: building *multimedia* learning content. Sounds easy enough, only that I had some more goals. Among them was to build a community-based platform - as in "OWNED by the community", not a "web 2.0" startup.
By the way, the current state is at http://letexa.com/ [letexa.com] - I'm giving the URL because you can see what I'm going to talk about next in real-life examples.
So, I tried with HTML/Javascript. I always knew I had to use Flash vor the Vi
Re: (Score:2)
Re: (Score:1)
If I wanted to produce one big (learning) video that would not matter, right, but even there I have an argument to keep the various content pieces separat
Re: (Score:2)
No, it's actually trivially easy to have both a flash player and a simple download link. They
Control, Data mining, Money (Score:2)
a)Most users don't realize it is easy to copy the flash movies from your
b)Flash stores data on the client computer ( a bit like cookies ) which is used to snoo... errr... automatically obtain customer feedback.
c)Flash lets you have all kinds of annoying banners, clickable monkeys, advert overlays, etc
So i
Re: (Score:2)
Only if the site is using progressive download for video. If they have a true streaming backend (eg, Flash Media Server) then there is no useful temp file to snarf.
Re: (Score:2)
Do you promise to view all the ads on the site and to not direct link the MPG on your blog without crediting the source?
But seriously, the one nice thing about Youtube is that it gives me the ability upload video to a 3rd party site and not have some leecher hose my web server. Sure flash is crappy, but I think in the end... Most people with web servers were tried of people j
Re: (Score:2)
Re: (Score:2)
- Flash has better penetration than native MPEG players and native embedded players.
- Gives a more consistent user experience regardless of OS/browser
- It is guaranteed that most users will be able to work out how to play the video, even if they don't understand downloading or what an mpg is.
- Guarantees that that the user can stay on the site and easily navigate elsewhere.
- Gives less annoy
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Does it work for this one [mlb.com]? If so it may be worth buying a Mac. :-)
Seriously, please let me know... Baseball is one of the worst offenders on this. Even their subscription audio streams require Flash!!
Re: (Score:2)
Indevitable? (Score:3, Funny)
Re: (Score:2)
I seem to recall nefarious crackers using the myspace embedded video feature to serve up Windows Media files that took advantage of code execution in the Windows Media Player.
Or is this just new an interesting because it's flash, instead of WMV?
Re: (Score:2)
Anyone seen any code? (Score:5, Insightful)
So, are they just guessing FLV may sometime become a virus vector? Has someone done a proof of concept?
TFA makes it sound like the Georgia Tech Information Security Center is making it up as they go along.
Re: (Score:3, Insightful)
TFA makes it sound like the Georgia Tech Information Security Center is making it up as they go along.
The FA was short on details, but from what I've seen in online video, there are 2 probable ways this is done. Most flash video sites require scripting to be on.. Duh there is a vector right there. Other sites insist you download their viewer (Untrusted software anyone?). With an untrusted viewer and scr
Re: (Score:2)
I don't think anyone has seen a YouTube.com hosted Flash video to be virus infected??
The article makes it sound more like that they're talking about people using popular online videos / video sites to spread viruses, not the streaming video file itself. As in YouTube comments, e-mails with links to supposedly "cool" online videos, etc. And then this comes off as nothing new at all.
Re: (Score:3, Informative)
Re: (Score:1)
The word (Score:5, Informative)
Re: (Score:1, Insightful)
Re: (Score:3, Funny)
Unless you find them on your boxen.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
The word "virii" implies the singular is "virius" and is only used by clueless people who are dazzled by the double i's. If you are going extrapolate grammar and spelling constructs based on other languages, which is a time-honored hacker tradition [catb.org], then at least be consistent about it.
Given that, by extrapolation from the word "radius", it then makes sense to talk about two Toyota "Prii", but two "viri", with one 'i' at t
Re: (Score:2)
From the venerable Jargon File:
Plural of virus (Score:4, Informative)
I think that should clear it up.
Re: (Score:2)
"What sholde a man in thyse dayes now write, egges or eyren? Certaynly it is harde to playse everyman by cause of dyversite and chaunge of langage."
I think most of us can understand whats being written in the quotes above egges and eyren mean the same thing eggs.
English as you can see has changed some wh
Re: (Score:3, Funny)
P.S. The g is silent, as is the first k and the last !
Re: (Score:2)
Of course.... (Score:4, Funny)
the plural of virus is viruses (Score:4, Informative)
note: there is no Latin plural for the word
virus (means slime, basically). the expected
plural, viri, is the plural of vir (man). the
plural of virus is viruses.
Re: (Score:2)
Re: (Score:2)
That looks like one of the best self-contradicting sentences I've never seen.
Sad that this is still "Informative" (Score:2)
On the other hand, I've gotta jet. I think a hacker just hijacked a few of my boxen.
There's a lot of conjecture here. (Score:3, Funny)
Would the esteemed learning establishment care to debate if we will be living on the moon, wearing shiny suits, eating meal pills, flying around with our prsonal jet-packs? I for one want to know
Hmmmm.
Why should Flash have any kind of write access??? (Score:5, Insightful)
This just confirms my opinion that Flash is an evil cancer on the web designed to move control of the web experience from the person browsing to the Flash author (who maybe a botnet builder).
Re:Why should Flash have any kind of write access? (Score:2)
Re:Why should Flash have any kind of write access? (Score:2)
The issue of executable or scriptable content in media files is something different. As other people pointed out, WMVs can have scrip
Re:Why should Flash have any kind of write access? (Score:2)
Re:Why should Flash have any kind of write access? (Score:5, Informative)
This is just FUD - but obviously this is Slashdot so who cares about facts anyway?
The truth is that the Flash player has actually a pretty draconian sandbox:
1. A flash movie can not write to disk or execute any command. Period. It only has a "cookie" mechanism to store info on user's computer but the user can allow/deny the action and allocate a quota for that info. The cookie is saved in the user's Documents and Settings folder (and the Mac/Linux equivalent), e.g. "C:\Documents and Settings\user\Application Data\Macromedia\Flash Player\#SharedObjects\LQ93AHGQ\www.youtube.com" The flash app cannot control the location or the file name.
2. A flash movie can't simultaneously have read access from the local file system and the Internet. What I mean is - either a flash movie loads a local file (text, xml, jpg, flv, etc) or it can communicate with a site (load URL, send variables with GET/POST, invoke a WS, etc) - but it cannot do both of them. A user has to go to Adobe website and specifically trust an application in order for that app to have more access.
3. Flash movies can't read the clipboard.
4. Access to microphone/webcam is disabled by default and must be enabled on a per-URL basis.
Anyone who RTFA knows that it's not about exploits inside the video stream, it's about fake links.
Now, I'm pretty sure I just wasted 10 minutes of my time trying to dispel some myths, because the average Slashdot user is too busy hating Flash and worshiping Steve Jobs. Mod me down, or better yet, just ignore this post and keep on living inside your bubble.
Thanx for the Informative explanation (Score:2)
What Flash can do (Score:2)
Scary web threats (HTML version) [72.14.253.104]
Scary web threats (Powerpoint) [doxpara.com]
How confident can we be that there are no more remote command execution vulnerabilities in the Flash player [frsirt.com]?
The designed security measures are only part of the puzzle when something is in the field.
Re: Online Video May Conduct Viruses (Score:4, Funny)
Re: (Score:2)
Do you mean the ones where you can get free adult content or the ones that only provide 3 lines of semi-interesting information and split it over 12 pages with so many ads that each page needs 2 min to load on my 10Mb/s connexion (and did I mentioneed that some of these ads usually overlap the content for which I came in in the first place). Yes, the latter kind should be banned.
Not new (Score:5, Informative)
Yahoo's Right Media had Trojans in banner ads
Posted by Elinor Mills
For several weeks starting in early August, visitors to MySpace, Photobucket, Bebo and other high-traffic Web sites were exposed to banner ads that contained Trojan horse software that could wreak havoc on a computer.
Web security company ScanSafe tracked the malicious ads back to Yahoo's Right Media network and estimates that they ran several million times, according to The Washington Post's Security Fix news site. (source [news.com]
Online video may conduct Virusses ? Old news ! (Score:2, Informative)
A previous post allready mentioned WMV format has an on-purpose function build-in that lets it "phone home" (and retrieve whatever code it likes) without as much as a peep to the user.
The real issue here is not that some kind of "information" (movies, PDF's, etc) could harbour methods to retrieve (or even contain) the actual malicious code, but how the creators of those methods think that its a good idea to let their displaying-software "phone home" 1) whe
The solution.... (Score:1, Flamebait)
Example of fake video (Score:2, Funny)
Irony (Score:2)
Is there a tool to remove wrappers? (Score:2, Interesting)
$ cat wrapped.wmv | grep -v "http://spawnsomecrap.com/crap.html" > clean.mpeg
Re: (Score:2)
Re: (Score:2)
The Link appears as something like URL:http://annoyingsite.com in unicode within the WMV. You can process the file and change the "url" to (for example) "urx" and windows doesn't know what to do with it so ignores it.
I've run across some files where the URLs are not openly visible like that but they were in the minority (May be more prevalent now).
I had a program that did it. Here is what I searched for:
char lstr[]={0x55,0x00,0x52,0x00,0x4c,0x00,0x00,0x00};
And here is what killed the redirect:
How does this work?? (Score:2)
I just don't get it. I'd love an explanation. Maybe it's like a website that takes user input and runs it as server side code.
Re: (Score:2, Insightful)
Re: (Score:2)
Re: (Score:2)
The JPEG handler is not "supposed" to run code; but, absolutely any program that receives data, processes it, and is expected to come to some kind of outcome with it can potentially be exploited if the programmers didn't have the foresight to check for buffer overruns and other exploitable conditions.
The best way to handle these is to sandbox applications--that is, limiting what they can do on the system. You can go really extreme and abs
Rick Rolled (Score:2)
this is hardly news (Score:2)
A Fire Upon the Deep (Score:2)
As received by: Transceiver Relay03 at Relay
Language path: Cloudmark -> Twiskweline, SjK units
[Cloudmark is a High Beyond trade language. Despite colloquial rendering, only core meaning is guaranteed.]
From: Transcendent Bafflements Trading Union at Cloud Center
Subject: Matter of life and death
Summary: Arbitration Arts has fallen to Straumli Perversion via a Net attack. Use Middle Beyond relays till emergency passes!
Key phrases: Net attack, scale interstellar warfare, Straumli Perversion
Distrib
That is an EXCELLENT book.... but this is offtopic (Score:2)
Re:That is an EXCELLENT book.... but this is offto (Score:2)
Oops... satire! (Score:2)
Flash Video sucks anyway! (Score:2)
Re: (Score:2)
Third person singular pronouns do not use apostrophes for their possessive forms. e.g. his, hers, its
it's = it is