Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:can someone please explain (Score 3, Insightful) 229

If I remember correctly, Stuxnet targeted Windows machines in the first step too. There it infected developer tools and the damage-causing payload did get compiled into programs for those SCADA systems of certain importance. So Windows systems might not have any obvious importance at all, but they play a role of the weakest link surprisingly well.

Comment Re:Another aspect of this mystery (Score 2) 229

As an evil virus author, I would add another twist: make the plain-text part of the virus install the font (we know it does so). Few moments later, from within the encrypted code, uninstall the font (we have no clues what that code actually does).

Unsuspecting folks would devise infection detectors, which will give nice "false negatives".

Comment Re:Another aspect of this mystery (Score 2) 229

Pity. I was hoping that this would be a clever part of systemic offensive. Like forcing laser printer to release deadly toner fumes by downloading evil curves of this font. Or making its kerning so bad that the users would collapse with severe headaches.

Judging from the infection vector (i.e. USB sticks), I suspect that the targets are off-line, or at least heavily firewalled. Mind you, the target is most probably some military facility, likely in Iran. I don't think navigating to a non-white-listed web page wouldn't raise alarm, from the virus author's point of view an unnecessary complication.

Comment Another aspect of this mystery (Score 2) 229

By the way, TFA says that the virus even installs some font. This unusual step confuses me quite a lot. Is it for some kind of "exposed but not obvious" document watermarking. Or is it preparation for some future infection vector? Questions :-(

Does somebody know whether there is that font ("Palida Narrow") available?

Comment Re:can someone please explain (Score 5, Interesting) 229

One of my guesses is that both the PATH element and the Program Files item are linked to a single application. That way, as long as the application is installed, the payload would be decryptable. The name check suggests that the application is some in-house project, probably not publicly released.

But maybe the "trigger" is an application in certain environment. Then the Program File would determine application presence. Then the expected item of PATH could refer to some network share, mapped disk, e.g. T:\Repository\bin. Such combination would be pretty unique and therefore an ideal "trigger", IMHO.

Comment Re:can someone please explain (Score 5, Informative) 229

The trick in this case is that the key is already available at the targeted machine - the virus tries to combine various pairs of %PATH% paths and names from %PROGRAMFILES% and if some combination has an expected checksum, that's the key. To make cryptanalysis a bit more difficult, it seems that the second part of the key is not in plain ASCII. Therefore the "key distribution problem" is nicely solved - if the code runs on targeted system, the key will be easily generated. On any other machine you won't obtain any information about the key.
User Journal

Journal Journal: Thermophobia 6

Global climate change -- it doesn't bother me. What does bother me, being a "Global Warming denier," is the sudden MADNESS that has stricken deeply into the nation and the world over the last few months. I am truly amazed by the phenomenon. Amazed that the mainstream has become mesmerized by it, entangled in the unscientific propaganda. And amazed at the speed at which it has spread.

Mozilla

Submission + - Open Source Race Car

zerk writes: The folks at Spread Firefox are talking about their next marketing campaign. One of the more interesting ideas is a Firefox sponsored car in the Indianapolis 500. It's worth taking a look just to see the gorgeous 3d rendering!
Quickies

Submission + - Scientists Study Sacred Sounds at Churches

Ant writes: "This Wired News story says researchers here are investigating the subjective acoustic qualities of church architecture in one of the most extensive scientific inquiries yet. By studying the best-sounding spaces (and the worst), the researchers hope to assemble practical design criteria for new churches. The data can also provide the clergy with some considerations on what music works best in existing places of worship. Since 2000, the team has visited 40 churches from Gothic to contemporary in style. They picked nine of the buildings for a five-song test of their acoustics. Seen on Shacknews."
Media

Submission + - Peer-to-peer poisoners: A tour of MediaDefender

wwmedia writes: "When your company poisons peer-to-peer networks for a living, public relations usually takes a back seat to discretion; quiet is the rule in the P2P content-protection industry. That's why Jonathan Lee, the company's VP of business development, isn't worried that the corporate web site is down when I reach him in his Santa Monica office. "It's kind of ugly anyway," he says. For a company like MediaDefender, the largest such firm in existence, privacy comes naturally, but a 2005 acquisition by ARTISTDirect has encouraged the firm to take its services public as it starts to look beyond its original client base — music labels and movie studios — and dives headfirst into the brave new world of providing legitimate P2P content for advertisers. http://arstechnica.com/articles/culture/mediadefen der.ars"

Slashdot Top Deals

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...