Kraken Infiltration Revives "Friendly Worm" Debate 240
Anonymous Stallion writes "Two security researchers from TippingPoint (sponsor of the recent CanSecWest hacking contest) were able to infiltrate the Kraken botnet, which surpasses its predecessors in size. The researchers have published a pair of blog entries: Owning Kraken Zombies and Kraken Botnet Infiltration. They dissect the botnet and go so far as to suggest that they could cleanse it by sending an update to infected hosts. However, they stopped short of doing so. This raises the old moral dilemma about a hypothetical 'friendly worm' that issues software fixes (except that the researchers' vector is a server that can be turned off, not an autonomous worm that can't be recalled once released). What do you think — is it better to allow the botnet to continue unabated, or perhaps to risk crashing a computer controlling a heart monitor somewhere?"
Had me up until the sensationalism (Score:5, Insightful)
I challenge the submitter to find one instance where a computer controlling a heart monitor has a worm infection. They are not even networked and they do not run Windows.
Re:Had me up until the sensationalism (Score:5, Funny)
Oh wait, wrong movie
Re:Had me up until the sensationalism (Score:4, Funny)
Re: (Score:3, Insightful)
Well, maybe not the primary machine, that may be true, but there are monitor "stations" on the patient floor at the nurses desk area that run networked windows using monitor applications to display heart data.
Re: (Score:2)
Re: (Score:2)
Just because there are backup plans do not mean that you can wipe out the normal mechanism for nurses to monitor patients. I would suggest to you that the spam you get is a small inconvenience compared to the ehtica
Re: (Score:2)
I agree, critical operations should be run by a qualified surgical team.
Seriously worms bringing down heart monitors? - I agree with the OP, the hyperbole detracts from an otherwise reasonably interesting question. (To which my answer is: There is no such thing as a good worm)
Sure anything is possible and accidents do happen but AFAIK the worst incident involving computers in medicine was this famous e [vt.edu]
Re: (Score:2, Interesting)
Re: (Score:2)
Think of it this way a company probably could save a lot of money if they could run a heart monitor through a generic machine rather than a dedicated machine. Also a program running on a more generic machine setup may also be able to collect other information and send it over the net to say, a doctor's pager automatically. So there are good reasons as to why a generic machine which might be infect-able would be used.
This is not to mention the other similarly critical uses a
Vulnerable Monitoring Systems (Score:2, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Seriously have you been sleeping? There have been numerous cases of ancient computers
Re: (Score:2)
They are not even networked and they do not run Windows.
Um....yes they are and yes they do. Here you go. [windowsfordevices.com] Also, here [networkworld.com] and here to a lesser degree. [microsoft.com]
Re: (Score:2)
Re: (Score:2)
http://www.pcworld.com/article/id,143496-pg,1/article.html [pcworld.com]
http://www.programurl.com/software/heart-monitor.htm [programurl.com]
It doesn't necessarily matter that the heart monitor doesn't run windows, although there's nothing stopping someone from trying that, if a machine with that problem is in the loop. It's especially problematic if the devices themselves are at risk of hacking. Wi
Re: (Score:2)
Wow. Wrong [livedata.com] and wrong [medicompinc.com].
Re:Had me up until the sensationalism (Score:4, Insightful)
And what happens to the patient if one of these goes down because of a virus?
Nothing. Absolutely nothing.
Re: (Score:2)
And what happens to the patient if one of these goes down because of a virus?
Nothing. Absolutely nothing.
Nothing. Absolutely nothing.
(What should have happened is that a nurse somewhere would be made immediately aware of the problem, and would be able to call a doctor and a crash cart...)
Your turn.
Re: (Score:2)
What kind of idiot... (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
Brave soul.
heart.exe application error
the instruction at 0x6a9210e5 referenced memory
at 0x6a9210e5 the required data was not placed
into memory because of an I/O error status of
0xc0000185.
To continue, type an administrator password, and then click OK.
These kinds... (Score:2)
Feel free to ask them. From my experience they build their ECG's on Windows.
Re: (Score:2)
Re: (Score:3, Interesting)
Hence if there is a software failure that results in a death the full liability falls back on the hospital and the staff responsible for that software purchase and their criminally negligent willingness to use software the is clearly unfit for the purpose based upon the warranty/EULA supplied with the software.
It
Well, if you ARE going to do something like that. (Score:4, Insightful)
Don't tell anyone!!!
All the lawyers in the world will converge on you if you do.
Re:Well, if you ARE going to do something like tha (Score:2)
Re:Well, if you ARE going to do something like tha (Score:2)
Which is precisely what they did. Hmmmmmmm...where's my tinfoil hat?
Yes, they should do it. (Score:2)
Re: (Score:2)
Re: (Score:2, Funny)
Re: (Score:2)
Friendly botnets would be sued. (Score:2)
The people deploying "evil" botnets do so for profit. And they earn enough to cover the risks.
In short, we're not going to see many friendly botnets.
Re: (Score:2)
Find some script kiddie, and pay him huge sums of cash to spread it for you. Works for the evil botnets
Kraken infiltration (Score:2)
Re: (Score:2)
Re: (Score:2)
That is all.
risk crashing a computer (Score:2)
For FSM's sake, who thinks that heart monitors are both networked to the outside world and running Windows XP? Any manufacturer that did so would be open to all sorts of legal trouble, assuming they could get any hospital to risk using such a thing.
Re: (Score:2)
Windows hasn't been suitable for much of anything since about 1997. Does that keep people from not only using it, but paying good money to finance their descent into hell? Of course not.
Have you ever tried to explain to a dentist how to move a newly popped-up window off from on top of the window he is actually interested in while your mouth is anesthesized a
This Kraken 'bot (Score:2)
Oh, fear it not
The zombie slave
Needs just
Burma Shave
Re: (Score:2)
Re: (Score:2)
Probably the best one I have yet to see.
DUH! (Score:3, Insightful)
Am I the only one that thinks this is too simple to be questioned? Friendly.... it's a word that suggests something that does no harm. If the software can't figure out if there is no risk, then it should take no action other than reporting.
Safety, it's a big issue. VW will not be sending their high tech stuff to the states next year because of litigation concerns. They are right to do so, if there is no method to ensure your product does no harm, do not deploy it. period. unless you would like to spend time in court.
There have been dozens of anti-theft systems that would turn a car off after it's been stolen but due to concerns that it might do so while the car was traveling at speed on the highways, such products were never deployed.
Safety first. kill bad bots second. Sort of what the US police forces are supposed to do. Well, until someone gave them a taser gun. Now, shoot first is the rule because they won't get sued, and don't have to worry about it.
If you're going to write anti-worm software, safety is a major concern if you are acting without the owner/user's permission. There is NO way around that without incurring litigation risk.
Re: (Score:2)
Having the horse drop dead after its out of the barn may be nice for recovering the body, so to speak, but systems that prevent drive-away theft in the first place make much more sense, along with tracking systems to facilitate recovery.
As a mechanic, I see car after car burdened with fe
Re: (Score:2)
IMO the large number of recalls reflects the excessive complexity of modern vehicles. I wouldn't want remote disable on any of my vehicles.
Actually, paging networks are perfectly positioned (as are satellite networks) to send a signal to a device in your car that tells it to never start again once it is turned off. When you report your car stolen, activate that signal and it will remain (short of towing) where it is until the police find it.
The safety issues scare insurance companies and without their blessing the systems could not make anyone money. Tracking systems are good to a point, but you're right. The best is to prevent drive-away in
Re: (Score:2)
Not true. Here in Chicago, the police get sued all the time - almost daily. Multi-million dollar judgements are commonplace, and the cops in question are invariably sacked (and sometimes financially ruined).
Here are some examples [chicagotribune.com].
Re: (Score:2)
are you going to look to see if the pop up is telling the truth, or assume it's a virus itself and squash it? Be honest now.
It'd certainly tell me that the computer is doing something that I didn't ask it to, which implies that something isn't right.
Even if it wasn't a popup. Ferinstance, what would you do if you discovered that your desktop wallpaper had been changed to red text on a black background saying "This computer is infected with one or more virusses. Disconnect it from the internet and seek professional help"
Or if your screen saver became scrolling text of the same message.
If I saw those messages, I certainly w
Re: (Score:2)
important difference (Score:5, Insightful)
There is still the "messing with other people's computer" issue, of course.
Re: (Score:3, Insightful)
There is no way I would think it was legit.
Re: (Score:2)
Re: (Score:2)
There was an anti-exploit for one of the early windos worms, I forgot which one. My website was running it for several years. Essentially, it was a perl script that hid behind the well-known URL that the exploit was targetting, hit the machine back with said exploit (after all, it had already proven to be not only vulnerable, but actually infected) and shut it down with a log message that should tell the sysadmin after reboot that his machine is infected.
Worked fairly well. Few hosts t
No dilemma (Score:2)
This raises the old moral dilemma about a hypothetical 'friendly worm'
No, it doesn't.
It raises the old moral dilemma about messing with other people's computers, for a good purpose.
But the "friendly worm" issue is a different one. The main problem is control. I've done the math and published a paper on this. You do not want to be the author of an out-of-control autonomous, self-replicating entity, no matter what it does.
So, like a dog, can you guarantee that it will listen to you, instantly, in all situations especially unfamiliar ones?
Re: (Score:2)
Re: (Score:2)
Ways of Terminating botnets. (Score:2)
Re: (Score:2)
Re: (Score:2)
The law needs to catch up (Score:4, Insightful)
Botnets also span more than one country so maybe this needs to be international law.
Re: (Score:2)
Actually, "the law" doesn't "need" anything. Laws don't need; they just are. They are often written by clueless legislative assistants. And they very often outlive their original intended function.
Here in the US, we still have laws on the books from a century ago that impose speed limits of 5 or 10 mph for motor vehicles, and supposedly one state still has a law on the books requiring that a
I've said it before: (Score:2)
"Your version of Microsoft XP has expired. Please buy a version of Microsoft Vista at your nearest authorized Microsoft dealer. If your computer does not support Vista you will be required to upgrade your computer.
Thank you for supporting Microsoft and not Linux or Apple. We appreciate your business.".
Sure it's not nice, but if it gets people to actually take action then I'm all for it. There will always be more companies trying to profit, new botnets, etc, but if you can actually stop the bot
Re: (Score:2)
Barn door closed, horse left six months ago (Score:4, Insightful)
Re: (Score:2)
is it better to allow the botnet to continue unabated, or perhaps to risk crashing a computer controlling a heart monitor somewhere?"
I would suggest that if a mission-critical system like that is already infected with a bot, the damage is done -- might as well attempt to clean it at that point.
The botnet itself is not harmless, and could just as easily overload or crash the computers in a hospital or powerplant. In other words, doing nothing could potentially be far more harmful than trying to wipe out the botnet.
In light of this, and the tremendous resources being wasted by these botnets, I am strongly in favor of eliminating them entirely.
I wouldn't boast about it on slashdot (or anywhere else) though...
Re: (Score:2)
Someone trying to distribute code to clean the infected computer has much less of an impetus to avoid utterly destroying the system. Sure, they don't want to, but there's no direct hardship if they do. Might they be a little less careful? Maybe.
Worse, a botnet aut
Re: (Score:2)
While I don't think this merits harsh punishments, the *possibility* of having to reinstall his system is a fair trade off against the *certainty* of the botnet being used to cause harm to others.
Re: (Score:2)
is it better to allow the botnet to continue unabated, or perhaps to risk crashing a computer controlling a heart monitor somewhere?"
I would suggest that if a mission-critical system like that is already infected with a bot, the damage is done -- might as well attempt to clean it at that point.
While you're at it, you might as well modify the system in other ways that will be useful, such as changing the user's default keyboard layout to the more efficient Dvorak, and making the system internationally accessible by setting the default language localization to Esperanto and SI metric units. Also, I humbly suggest replacing the bug-laden, security hole riddled Windows OS with a nice Linux distro. Whoever the user is, they'll appreciate these improvements once they get used to the changes and see
Re: (Score:2)
The other questions are tougher (Score:2)
It's a lead-pipe cinch that law enforcement people will and can do nothing to disable the network, and it-- like others-- represents a huge security hole and a big problem in terms of potential misuses of the existing botnet.
The 'authority' to even legally disable botnets is onerous. What's a botnet-
Which surpasses its predecessors in size (Score:2)
Non Assistance to person in danger should apply (Score:2, Insightful)
I am pretty sure that a good lawyer could twist it enough to sue those researcher because they DID not kill the botnet while they could. Instead they published a report explaining to the botnet creator how to plug the hole. Next time they should just ask for a subversion comiter account a fix it themselves.
I can almost see how the patriot act could apply here. I thin
Cleansing a Botnet is Murder. (Score:2, Funny)
Goodness Gracious Me (Score:2)
No Moral crisis here. (Score:4, Insightful)
Imagine a similar situation among humans. A Virus breaks out which ravages whole populations. You find a cure which can be distributed by spiking the watter supply or by pumping it into the air.
I can tell you, the CDC (No. Not the "Cult of the Dead Cow". The other CDC) would only hesitate long enough to verify the safety of the cure before dispatching it.
Or lets come to a more reasonable and commonplace situation. A man infected with Rabies is not allowed to chose weather he will be treated. His infection impairs his judgment and makes him a danger to other people, therefore he is a hazard to be cured against his will.
Doesn't the same apply to a botnet member oblivious to it's own condition spewing it's infection, Spam and lord knows what else onto other computers?
Kevin.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
What is the initial virus didn't kill anyone or make them sick, but the cure did?? What if it only gave them the shits. Should it really get released??
Re: (Score:2)
Re: (Score:2)
One year when I returned from summer vacation to my college campus, internet connectivity was very spotty. It got worse as more people came back, and we eventually learned it was entirely due to virus traffic. Anyone who plugged in a computer to the network found that it would get infected and spontaneously reboot in a fe
Sabotage the botnet (Score:5, Insightful)
I say vigilante action is okay, to protect ourselves (the people in the know adminning the networks and computers being attacked).
Re: (Score:2)
I said the same thing to the cops as I was vburning down the house of some local drug dealers. Oddly, they didn't buy it, either.
Re: (Score:2)
I'm not sure that releasing friendly counter-worms is the best solution, though.
with great power comes great responsibility (Score:2)
They can update the infected computer with a program that causes an annoying popup to occur until the machine is sanitized by the owner. Then update the machine's firewall (if it has one) to block the controlling UDP port.
That solution should be fairly low risk.
I get so much spam of late, that I have no problem if they deliberately break the entire IP stack on the infected computers. Serves the owners right.
I did this back in the code red worm days. (Score:2)
Buddies of mine were a bit less nice. They put the machines into spontaneous 3 minute reboot cycles. They figured that would get the users to get a clue and fix it. I though that was a bad idea.
What if the FBI is watching? (Score:2)
I did this once... (Score:3, Interesting)
We were on the verge of fall break, and someone on campus had found out a 'catch-all' email address which was aliased to _all_ the university email addresses. So some dickwad started sending a weird email saying something like "Hey joe, where are you?", which everyone got, and everyone replied "Hey, I'm not joe -- who are you?" Which was then sent to everyone else.
The thing basically kept feeding back to itself and was threatening to get out of hand. Literally hundreds of emails started popping up. Of course, this was waaay back then, before the days of spam, so it was 'abnormal', 'weird' and annoying all at once. Since it was a friday evening, and knowing that at the rate it was going everyone's inbox would be flooded when they returned from the week-long holidays, I -- perhaps naively -- thought I'd put a stop to it.
I attached a large binary file to an email and sent it to that catch-all address, hoping that it would jam up the works enough that the network admins would notice.
Notice they did, and eventually I got called up to see the ombudsman -- who promptly said he was considering kicking me out of campus.
So yeah, one can have good intentions -- like what I did -- but the means to achieve that end may not be acceptable to everyone, even though it did get the job done.
My 2 cents anyway.
By analogy, it should be done (Score:2, Insightful)
Consider this example: You find that someone robbed your neighbor's apartment (who is on vacation), and left the door opened and broken. Should you fix the neighbor's door, or leave them open for anyone to enter?
The correct answer is: You should fix the door, but with the permission of the police. Therefore, I think, the computers should be patched, but with the approval of legal enforcement (if i
There's a Difference... (Score:2)
There is a big difference, I think, between releasing something like a worm to patch un-patched boxes -- i.e., computers that haven't been "broken" yet, but potentially could be, and hijacking an EXISTING botnet to inject a "self destruct" update into it. I have some problems with doinking with other people's computers if they aren't infected yet (there are a lot of critical things that you could break, and there may be other reasons why they haven't updated some particular part of the OS which you don't
Self-defence? (Score:2)
If you see someone breaking into a store... (Score:2)
Really, if they have a way to safely remove the infection, they should go right ahead. Preventing harm from someone without risking any other harm should not require informed consent.
If their cure involves a potential risk to the infected computer, then it's more questionable. But allowing the bot to continue to thrive is to convenience an irresponsible user whose computer got compromised at the cost of a responsible user whose secure computer is still vulnerable to DoS atta
Should we? (Score:2)
Absolutely. Quickly before the worm itself crashes the machine.
Plausible deniability? (Score:3, Interesting)
For those who are advocating that an anti-bot be released (or whatever you want to call it) so as to disable this pest, I have a question for you: how is someone going to be able to tell the difference between these:
1.) A user who creates and releases an anti-bot, but through an error (design, programming, whatever) inadvertently causes "harm" to the system.
2.) A user who creates and releases an anti-bot that appears to try to block the worm, but is in fact designed to cause "harm" to the system.
Recall that the Morris worm [wikipedia.org] was not intended to bring down the internet:
ANDSee also A Tour of the Worm [std.com] for a more detailed account of how it unfolded.
The intention may have been good, but the implementation had an unintended consequence that led to a major disruption of the internet. I remember full well the confusion at the time as the details unfolded. I was working at a major computer manufacturer that dropped its connection to the net to protect itself. Ultimately, none of our systems were hit (wrong OS), but the sheer volume of packets on the net led, effectively, to a DDOS'ing of the uninfected systems, too.
So, in a nutshell, how can one objectively tell the difference between an attempt to kill the worm that causes problems, and an attempt to cause problems that looks like it is trying to kill the worm? In a non-static environment. With our limited ability to write bullet-proof, error-free code. Besides, someone else could capture and re-purpose the good code to cause more problems.
KILL THEM ALL (Score:4, Funny)
Infestation Notification (Score:2)
Yes, it is justifiable in this case (Score:3, Insightful)
Why?
Because there is no law enforcement for these matters on the net today. Sometimes, in frontier situations, a form of mob or vigilante type justice becomes necessary. In this case, it would be an expression of popular democracy when a group in a frontier setting decides that sometime of order enforcement is necessary in order for society to function. These spam bots qualify as a level of threat that would justify a defense of this kind because, in our current environment, these bots can't be stopped by other means.
There is also a discernible right to self-defense. Here is my analogy. If an ignorant neighbor has permitted some nut to put a machine gun on his front lawn that periodically shoots bullets at my front door, then taking action to disable that machine gun is a justifiable form of self-defense even though the form of the self-defensive act is an offensive act against the machine gun. Any collateral damage from the self-defensive act doesn't necessarily invalidate taking the action.
That means if the incredibly rare case that isn't going to happen of the disabling of a heart monitor does occur, the self defensive act is still justified.
Now, spam is not an imminent danger in the way bullets are, but they are a danger. For example, I do not want my 11 year old exposed to hard core porn often promoted in much of this spam. If there is no effective law enforcement, then self-defense and perhaps a group sanctioned vigilante enforcement, even if the means are offensive in some sense, is justifiable. Note, it is not justifiable if law enforcement is available to deal with the problems, but in this case no such remedies are available.
Now -- is it legal? IANAL, so I don't know, but I think a legal defense is possible -- and -- how many juries actually go after these guys anyway?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Same thing applies here, would you want some random software program infesting your PC regardless of what it actually does?
Re: (Score:2)