Malware Distribution Through Physical Media a Growing Concern 141
twitter brings us a story about the increasing number of digital devices reaching consumers with malware already installed. In this case, digital photo frames from three different Sam's Club stores were found to contain the same type of malicious code. We discussed a similar problem with iPods a while back, as well as a more recent situation with Maxtor hard drives. Quoting the Register:
"While a compromise at the manufacturer is the most likely scenario, ISC's Sachs also pointed to retailers as a possible point of infection. Returned products, which could have been infected by the consumer, are frequently put back on the shelf, if they are in sale-able condition, and attackers could take advantage of a store's poor digital hygiene, he said. 'Trying to (infect a product) all the way back at the factory — getting it through all the checks and balances — would be pretty hard to do,' he said. 'But doing it at the store, where there might be loose return policies, and (where) they put it back on the shelf - you are not going to get a million infections, but you might get a person from an investment bank next door.'"
1990 called... (Score:3, Informative)
(yes I know this is a different story than back then, but it's the same headline)
Pretty bad when photo frames spread computer virus (Score:3, Insightful)
Re: (Score:2)
Re:Pretty bad when photo frames spread computer vi (Score:4, Informative)
Re:Pretty bad when photo frames spread computer vi (Score:1)
It's only a problem if you use Windows. (Score:5, Insightful)
Now, someday this may start to affect other, non-Windows operating systems. But in many ways I don't think it will be as much of an issue, because many of the alternative OSes have a far more sensible security model than that of Windows. So what easily causes problems with Windows has little to no effect on Solaris, Linux or OpenBSD.
Re: (Score:3, Funny)
Re: (Score:2, Informative)
"Its rare you hear of a Windows infection. Those Linux users need to get with the program if they ever want to gain the desktop." - by Anonymous Coward on Sunday January 13, @11:25AM (#22025570)
True, if they did this stuff, here:
:)
HOW TO SECURE Windows 2000/XP/Server 2003 & even VISTA + make it "fun" to do:
http://www.security-forums.com/viewtopic.php?t=50567&sid=c8b24a76a3974ec9bef2bed38c4b64d4 [security-forums.com]
* Windows CAN be secured very well, with a bit of effort, for years of security, even online, for years into the distance if you try what's in that URL above!
It works - & for a small investment of your time, only, & the work done by YOU, only!
(Simply by using the CIS Tool as your guide
Re: (Score:2, Informative)
WOW; 13 screens of registry hacks and other tweaks (Score:2)
> http://www.security-forums.com/viewtopic.php?t=50567&sid=c8b24a76a3974ec9bef2bed38c4b64d4 [security-forums.com] [security-forums.com]
> * Windows CAN be secured very well, with a bit of effort, for years of security, even online,
> for years into the distance if you try what's in that URL above!
There are linux distros with shorter install documentation than that. Wouldn't it be better to use an operating system that did *NOT*,
Re:It's only a problem if you use Windows. (Score:5, Interesting)
I'm not sure why you've been marked as a "troll", because what you said is completely accurate. Windows systems are more susceptible to malicious software. I'm not sure how that could be disputed. Now, things have gotten vastly better than they were when Windows 95, Windows 98 and Windows ME were developed. But even Windows XP has been widely affected by worms and malware, and Windows Vista is usually little better.
Although I'm an accountant by trade, I've worked at several companies with mixed Windows and UNIX networks. And at all of them we've had significant downtime due to Windows worms and viruses wreaking havoc on our internal networks. But I've never once, at any of those companies, heard of any downtime of the UNIX systems because of such a security threat.
Re: (Score:2)
"... numerous Windows-only worms". Yes and no. Most of them are trojans, hardly any of them are based on fully automated remote exploits.
Re:It's only a problem if you use Windows. (Score:4, Interesting)
Re: (Score:2)
Most people don't need powerful and flexible ACLs. They just need "Ordinary users can't modify this" and "This is not meant to be executable".
Re: (Score:2)
Re: (Score:3, Funny)
Re: (Score:1)
Re:It's only a problem if you use Windows. (Score:4, Funny)
I disagree ... (Score:5, Interesting)
Apparently this guy has never worked in a production firmware environment before: there are fewer checks and balances than you might think, especially because embedded-system guys generally don't have much awareness of Windows malware issues. Unfortunately, more and more embedded devices are being plugged into desktop machines, and with auto-run enabled
Re: (Score:2)
I plead guilty... sort of (Score:5, Insightful)
As a result of this, we started using virus scanners from three different manufacturers. As a software vendor, the risk of shipping a nasty virus to your best customers is very real, no matter how hard you try to prevent it.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
The wonder shouldn't be that it happens, but that it happens so *seldom* -- a testament to folks like yourself.
Re: (Score:3, Interesting)
There is a responsibility problem here. Do we blame the hardware manufacturers for producing faulty pro
Autorun is evil (Score:5, Insightful)
I almost got some malware from autorun off a thumb drive, fortunately the anti-virus recognized it and stopped it from running. When that happened, I looked for a surefire way to turn off autorun (and autoplay) but all I found was a bunch of registry edits that may or may not (according to different accounts) turn off autorun/autoplay. Why is there no global option in a Windows control panel for that?
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
It's not esoteric or obscure. If you have a program, for example wibbulator, you most often can expect its configuration to be stored in /etc/wibbulator -- which, depending on the sophistication involved, may be a simple file or a folder containing several files. What's more, if you want to turn off blah messages, the option is generally a line something like enableblahnotify 1 in the configuration file (or in
Re: (Score:1, Insightful)
Re:Autorun is evil (Score:4, Informative)
The closest thing I know of to an official way of disabling autorun is to install Microsoft's powertoy TweakUI [microsoft.com]. As you might guess from the name, it gives you a GUI to tweak various aspects of the Windows user interface, including letting you turn off autorun. I've never had a problem with it.
Re: (Score:1)
Re: (Score:2)
But you don't know how contract manufacturers work. Everyone farms out production to them.
The pace is extremely hectic - if you find a way to speed up testing per unit by 5 minutes, you can save a ton of money.
What happens at the contract manufacturer is a bunch of boards are made, then the "as
Stupid idea (Score:5, Interesting)
Re:Stupid idea (Score:5, Informative)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CDROM]
"AutoRun"=dword:0000000
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoDriveTypeAutoRun"=dword:000000FF
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoDriveTypeAutoRun"=dword:000000ff
Takes care of the autorun idiocy.
Re: (Score:2)
Re: (Score:2)
Registries and stupid ideas (Score:4, Interesting)
Erm - a single script file can easily update thousands of different configuration files on any platform. And for all the world-famous Windows user-friendlyness, I'll take editing some bizarre Linux scripts where key=value over trying to remember hexadecimal codes for Internet Explorer registry entries :-)
Lets not overlook the dangers of having a single, unrebuildable registry for all the system settings... What happens when it gets hosed? I seem to remember that Windows 95 used to keep two copies of the registry around and could rebuild it if you deleted it. Windows XP seems to have lost that ability - I have no idea if Vista has recovered it.
Cheers,
Toby Haynes
Re: (Score:2)
Re: (Score:3, Interesting)
Re:Stupid idea (Score:4, Insightful)
This is just what I've always been talking about with Windows. Why does it take this level of deep knowledge of the operating system to secure against the most idiotic of exploits? Ask an engineer of any other operating system about autorunning executable code from just any media that's inserted and they'll look at you like you've been taking crazy pills.
This is along the same lines as many other questions I have about Windows, like why can image files execute code? Why is it possible for ActiveX scripts to change system registry values and download software to your hard drive? Why is everything not named the same between versions? Why does everyone still use it?
Le sigh....
Re:Stupid idea (Score:4, Informative)
By the way, like so many other Windows features, this one was copied from Apple. HFS CDs could have some flags set designating them as autostart CDs and a named file would be run when they were inserted. This 'feature' was used to spread a few Mac viruses in the '90s and was never added to OS X.
Re: (Score:2)
There you have it.
Re:Stupid idea (Score:4, Insightful)
Re: (Score:2)
Re: (Score:1)
Of course, more and more of these devices [such as CD-R's per earlier slashdot story], Flash USB drives, etc. are coming with bits of software as a "value-add" thing...
Re: (Score:3, Funny)
grrrr...this one bit me at work again last week. I was in the middle of a big project and had probably half a dozen windows open. I cannot imagine why MS thought this was a good idea. Can I turn it off?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Yep. If you're using XP Professional, run the Group Policy Editor (gpedit.msc).
Once in, use the left-hand pane to navigate to Local Computer Policy -> Computer Configuration -> Administrative Templates -> Windows Components -> Windows Update.
Something hit me today whilst looking up things involving WiFi networking under Windows and learning that under Vista to disable automatic connection to AdHoc networks you have to open a command prompt and type;
I thought Linux was the OS that had complex commands and Windows was all GUI point and shoot style? So now under Windows XP to change basic, every day functionality you have to find and utilize some obscure policy editing applet? How doe
Malware Economics 101: It's a quantity game (Score:5, Insightful)
Rather, I suspect infection at or near the source -- slipping malware into the firmware or shipped software that goes with the device. At that point in the software delivery chain, a single act of infection can be distributed to tens or hundreds of thousands of machines. I could also imagine targeting highly promiscuous machines (e.g. WiFi routers) that have a high chance of being in contact with other promiscuous machines (i.e. other routers or laptops).
Although I'm sure some people get their grins by infecting one machine at time, the malware industry is more about collecting the largest quantity of machines at the lowest possible cost.
Re:Malware Economics 101: It's a quantity game (Score:5, Insightful)
If the world was asshole-free then people would never get their cars keyed, tires slashed or houses egged unprovoked.
Re: (Score:1)
No, we'd just go back to the Victorian times and define such crimes as not standing up when a lady enters a room as being an asshole.
Thank goodness for the freedoms of a permissive society! Now people really have to be vicious to deliver social harm to each other.
Returned media? (Score:1)
As usual, it's a matter of user education.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
What is missing from most flash based devices is what floppies had.. A write protect.
Re: (Score:2)
Re: (Score:1)
I'm pretty paranoid about viruses and malware, and I've never so much as had an infection until this drive. And my computer was moderately more secure than most-- it didn't run the autorun feature the instant I plugged it in. Unless you consider trying to convince all Windows users to modify their registry keys to disable autorun on a
Sony? Sears? (Score:5, Insightful)
Learned About this a Long Time Ago (Score:5, Interesting)
I downloaded a free copy of McAffee and it found the virus on my computer as well as every floppy that I had inserted since then that wasn't write protected. McAfee's software offered to clean it but all it did was wipe out the MBR making it where I had to reformat and reinstall everything.
I told a friend at school who had just bought a similar motherboard. He broke the seal on his driver disk, scanned it, and found the virus there too. It was coming from the factory infected.
That was a lesson I will never forget and it happened almost 20 years ago.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Boot sector viruses did not spread because people attempted to boot from floppies.
Boot sector viruses spread for a single reason: Computers by default tried to boot from the floppy first. People would leave floppies in the drive, and get infected.
Re: (Score:2)
However, a whole lot of people would reset their computers and forget there was a floppy in the drive. In the time it took them to realize what they had done, the boot sector virus would load and then infect the hard drive boot sector.
It was extremely common.
Re: (Score:1)
Re: (Score:3, Funny)
Re: (Score:2)
Symantec Corperate edition version 10.1 had a hole in it... that allowed a virus to spread, using SAV as it's vector
Called symantec, the fix: Update to 10.1.5, and scan. We took the switches down while we fixed it
Re: (Score:3, Interesting)
It's amazing what went out on floppies back then. Out of curiosity, I would scan through "free" sectors on floppies and often I would find internal documents, source code, QA results, unrelated software, etc.
That "idiot" in Bulgaria was probably no idiot... (Score:5, Informative)
Back in the, good ol' days... (Score:2)
Special software included. Yay. (Score:5, Insightful)
No, it isn't anymore. Somebody in marketing had the bright (read: revenue-producing) idea of loading up a new storage device (which should be blank, damnit) with a bunch of advertising crap. Combine this with Windows' oh-so-helpful autolaunch features. Frankly I'm surprised it took this long to become a problem.
I long for the days when you could buy an UNFORMATTED device. The OS would tell you it's unformatted, so you formatted it. Done.
Re: (Score:2)
the only SAFE way is to force the user to format the disk on the first use.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
the pervasiveness of malware contributes (Score:2, Insightful)
The pervasiveness of the malware problem contributes to this
Our shop had one shrink wrapped package that had malware included and when this was tracked down the vendor didn't know they had become infected and were distributing shrink-wrapped malware
this underscores the importance of putting a stop to malware
the fundamental error is at the concept level: it is wrong to think it is OK to run your programs on someone else' computer without their knowledge or permission
to invert this properly back to the
Re: (Score:2)
Remember that its their 'feature' which is causing this problem, not the user and the malware authors are only taking advantage of it.
Re: (Score:1)
thanks to services like
once the problem is in plain view corrective action will be forthcoming and I don't think it will take long at all
how about IBM provide us with a RACF version for the promiscuous Ms. Windows?
Re: (Score:2)
Do you want the job of authenticating and signing all "safe" apps? No? Well neither does anyone else. Look at what's happened with driver software for Windows. There's just too much of it for all of it to be approved by any central authority.
Re: (Score:2)
Driver software for Linux is approved by one central authority, and Linux actually supports more devices Out Of The Box than Windows. Reason being, there were many older devices for which new Windows drivers were never written; so they won't work with fully-patched-up Windows 2000, Windows XP or Vista.
AOL (Score:1)
I got one of these! (Score:5, Informative)
I told Microcenter about it and they were like "Huh." Didn't ask anything more, nor did they remove the frames or check them. I was somewhat pressed for time, so I didn't try going up the chain of management to get someone to acknowledge that there was a problem.
It's a good thing I found it though, since it was a gift for my technologicallly illiterate parents. I had taken it out of the package to load pictures up on it. If I had just given it to them directly, I'm not sure what would have happened. AVG caught it when it was plugged in via USB, so probably nothing drastic, except a phone call from my Dad asking me what the pop-up box meant.
Old news... (Score:3, Funny)
Computers have been shipping with Microsoft products preinstalled for some time, I believe.
Re: (Score:2, Funny)
Is windows a virus?
No, Windows is not a virus. Here's what viruses do:
* They replicate quickly - okay, Windows does that.
* Viruses use up valuable system resources, slowing down the system as they do so - okay, Windows does that.
* Viruses will, from time to time, trash your hard disk - okay, Windows does that too.
* Viruses are usually carried, unknown to the user, al
I, for one (Score:5, Interesting)
21st Century CyberColdWar, who supplies the MBs? (Score:1)
Motherboards are mostly made in various Asian countries now, aren't they? How paranoid is it to imagine the Chinese deciding to infect motherboards with spyware?
Lest you think I've got my tinfoil hat on, check out some thoughts of Ken Thompson (which I found in the discussion from the "Trojan Found In New HDs" link I provided, at least I think that's where I got it from.) http://cm.bell-labs.com/who/ken/trust.h [bell-labs.com]
Re: (Score:2)
I have one (Score:2)
It's branded as an eMotion device (model DF-EM7), but it looks identical to the ADS product.
My question - because here at /., I'm not all that relatively geeky - is how would this spread? It accepts photos direct from the computer via a USB 2.0 cable or via memory card. Assuming I'm not stupid enough to plug the thing directly into my computer, am I safe? Will the trojan infect the memory card for subsequent infection of my hard drive (of my Windows machines, not my Mac, right?)?
Also, is there a way f
Re: (Score:2)
Let's face it. The VAST majority of FOSS system have a lot of closed source firmware on them.
iPods? (Score:1)
2 solutions and a boot counter (Score:1)
This will offer some protection against factory sabatoge.
2) Any time a unit is returned it should be reset to factory condition.
This will take care of shoppers who buy, infect, and return merchandise.
The device should have a "firmware freshness" indicator that says this is the 1st, 2nd, or 3rd or more boot since a factory reset. When you buy the product it
Neither solution works. (Score:3, Informative)
This will offer some protection against factory sabatoge.
No it won't - if the "factory sabotage" consisted of (deliberately or accidentally) having malware as part of "what [the firmware] should be".
2) Any time a unit is returned it should be reset to factory condition.
This will take care of shoppers who buy, infect, and return merchandise.
And how is a reai
Re: (Score:1)
No it won't - if
I said it would offer some protection, not complete protection. This will close off some but not all opportunities for in-house sabotage.
And how is a reailer supposed to do this? Do you know of ANY product that comes with a (true) "reflash to factory status" utility that doesn't depend on what's in the device itself - let alone a cross-industry standard for this? (And you can't trust the media returned with the device, either. If it's writable it also needs "resetting" - and if it's read-only it needs replacing with a fresh copy.)
It may not exist but this is easy enough to implement in hardware:
Divide the boot sequence into 3 steps:
Step 1, from ROM: Check to see if reset pin is pressed.
Step 2a, if reset pin is pressed: Erase volatile firmware and copy contents of read-only firmware backup to run-time firmware. Blink status lights to indicate reset-in-progress/reset-complete/reset-failed codes
Windows ME (Score:2)
Feh (Score:2)
--
Linux on the desktop has been a reality for me since 1997
one of the big four did it to us... (Score:2)
We bought several hundred computers and provided the laptop image to the manufacturer after we'd installed our standard suite of applications. The major hardware manufacturer certified the build and started imaging machines - we had about a hundred of them in house before the first ones got stood up and tripped virus scanners as soon as they were powered up.
The image we sent the manufacturer was virus-free but
Re: (Score:2)
I haven't had that problem lately. I noticed that iTunes seems to try to install Quicktime, but since I've moved to Ubuntu, that problem has gone away. GTKPod
with the proper lib works wonders on an iPod in place of iTunes/Quicktime on Windows.