Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Virus Trackers Find Malware With Google 113

Casper the Angry Ghost writes "Malware hunters have figured out a way to use the freely available Google SOAP Search API, as well as WDSL, to find dangerous .exe files sitting on thousands of Web servers around the world. Queries can be written to examine the internals of web-accessible binaries, thus allowing the hunters to identify malicious code from across the internet." From the article: "We're finding literally thousands of sites with malicious code executables. From hacker forums, newsgroups to mailing list archives, they're all full of executables that Google is indexing. About 15 percent of the results came back from legitimate Web sites hijacked by malicious hackers and seeded with executables."
This discussion has been archived. No new comments can be posted.

Virus Trackers Find Malware With Google

Comments Filter:
  • by yagu ( 721525 ) * <{yayagu} {at} {gmail.com}> on Tuesday July 11, 2006 @11:29AM (#15698349) Journal

    This raises Google's "no evil" equity significantly. Any mechanism to sniff out, identify, and hopefully proactively take measure to protect against the evil that is the web and its sinister demographic is a good thing.

    So, Google takes the "do no evil" a step further and calls evil out.

    There is a quote from the article I don't quite understand,

    "While we do not believe that the fact that Google is indexing binary file contents is a large threat, this is further evidence of a rise in Web sites being used as an method of storing and distributing malicious code," Websense said in a research note announcing the experiment.

    Is there some potential badness that Google is indexing binary file content? What might that be?

  • by mrxak ( 727974 ) on Tuesday July 11, 2006 @11:37AM (#15698430)
    It's not really Google that's doing it, it's Websense using a Google tool.

    In any case, the only thing I can figure about the quote is that Google indexing these sites helps to spread the malware around. Somebody could type in "l337 hax0rs hax" and end up at a malware site.
  • Web Site Contact (Score:3, Interesting)

    by RetroGeek ( 206522 ) on Tuesday July 11, 2006 @11:41AM (#15698471) Homepage
    I hope the authors are planning to contact the affected site owners. The article did not mention this.

    They could also build a list of these sites to periodically check them to make sure the malware files have been removed.

    And it would be nice if they allowed a search facility so some FireFox/SeaMonkey plugin could check to see if that site you are going to has malware installed.
  • by Alamoth ( 927972 ) on Tuesday July 11, 2006 @11:41AM (#15698479)
    It seems to me that the possibilities for uses of this application of SOAP would be highly beneficial. My initial thought would be the ability to filter your Google searches so that websites that are potentially carrying MalWare are either flagged or not shown at all.

    The 15% of sites that are reputable sites being attacked are the biggest threat. These are probably websites people visit often, and people should be warned. Perhaps even web browsers such as firefox and i.e. could incorporate the API into a toolbar and warn users before a dangerous site loads.

    My only question is how long does it take for the API to verify the potential threat of a webserver? Is it fast enough for these applications to be feasible? No one wants to wait for their websites to load.
  • How to (Score:5, Interesting)

    by mailspam ( 988188 ) on Tuesday July 11, 2006 @11:46AM (#15698525)
    Search on google for something like signature:00004550 inurl:exe
    Then, click View HTML
  • by iamacat ( 583406 ) on Tuesday July 11, 2006 @11:50AM (#15698567)
    Sniff everyone's servers for vulnerable binaries and do targeted attacks instead of random IP scans.
  • The idea is to code the exploit in such a way that Google extracts the exploit itself as the content description in the index. This probably gives 200 bytes or so for the entire exploit (maybe more, I don't have time to try this stunt right now).

    The idea is to put up useful content into the web site, along with the exploit. Google will index, and when the target searches google, the code will be injected into the search results.

    Of course, this needs hacking; both trying to figure out what google will allow in the content section, and to find a browser exploit that can be exploited.

    Just sayin...

    Your point of trust (as the target) is your browser. Which means ONLY open source browsers should be used. Those, at least, are controllable as to the exposure and behaviour when being delivered content.

    Ratboy
  • Re:Web Site Contact (Score:4, Interesting)

    by jafiwam ( 310805 ) on Tuesday July 11, 2006 @12:53PM (#15699058) Homepage Journal
    Actually, what would be cool is a plugin that can do searches in the background (maybe based on urls linked in a page being currently viewed) and put up an automatic block or popup for the user to know that the link has malware.

    Or maybe a system to allow automatic DNS cache injection (on my own DNS client) to prevent lookups going to the correct (infected) site.

    Once sites realize that big parts of user base is cutting them off premptively, they'll take notice and get rid of the crap so they can get users back.
  • Re:Web Site Contact (Score:2, Interesting)

    by Web Goddess ( 133348 ) on Tuesday July 11, 2006 @01:10PM (#15699206)
    Exactly! I was wondering how to use this tool to scan my own website for bad critters.
  • Re:Web Site Contact (Score:3, Interesting)

    by Billosaur ( 927319 ) * <<wgrother> <at> <optonline.net>> on Tuesday July 11, 2006 @01:21PM (#15699284) Journal
    Given the current state of the law, it is really dangerous to contact a site owner and tell him that his site is insecure. It is quite likely that you will be prosecuted for "unauthorised access" to the site. Much better to just add the site to your personal list of things to avoid, and then forget about it.

    Which doesn't help the rest of us. And why should a site owner get all bent out of shape if you tell them something they didn't happen to know? They must not be in direct control of the site or are pretty lazy if they are allowing this malware to pile up. And they won't be popular for very long if people catch on that the site is infecting them.

The rule on staying alive as a program manager is to give 'em a number or give 'em a date, but never give 'em both at once.

Working...