
Four Kids Confess to Goner Worm 539
imrdkl writes: "4 kids in Israel have confessed to writing and distributing the Goner worm, according to Fox."
Yet another annoying worm comes and goes, wasting countless IT hours, to say nothing of bandwidth. The kids face up to five years -- of course since they aren't in the U.S., they might actually be punished.
5 years? (Score:2, Interesting)
Re:5 years? (Score:2)
"...server that barfed its guts on the floor because of this..."
Well blahs all around (Score:4, Insightful)
If our users had listened to the rules, this wouldn't have been a problem. But within 30 seconds of the attachment entering our network, over 50 users had run it. Why can't someone hold the irresponsible user at fault? The instructions are easy - don't run attachments you weren't expecting. Instead of blaming some kids for playing around with code, why can't we find fault in the people that don't follow their instructions?
Yeah, I'm ranting, but to make something constructive out of my waste of bandwidth, how can we get the users to listen? Anyone have effective tools? Yeah, I'm all for firing the ones that can't observe policy, but that would mean firing my boss too. And she's actually pretty decent, as far as managers go.
Re:Well blahs all around (Score:2, Troll)
Thank you for saying this. It's not the virus makers that bring down networks, it's the people who fall for the same social engineering over and over again and click on the attachment.
I am scaring myself now because I am agreeing with the NRA - I've brought the 'guns don't kill people, people kill people' debate into this as an analogy. I apologise in advance for starting a flame war.
Re:Well blahs all around (Score:2, Interesting)
At any case, I do believe that virus writers should be held responsible, but I don't think the solution is the so called "cyber crime" laws or anything that focuses on the means rather than the cause.
Re:Well blahs all around (Score:5, Insightful)
with an attached note saying "pull this pin,"
and that person then proceeding to pull it,
even though they have been told OVER AND OVER
that if they pull the pin on a hand grenade,
it will hurt them.
The virus is dormant, completely harmless
UNTIL SOMEONE RUNS IT.
The fact that someone wrote and engineered it
to spread in this way, and convince people to run
it, they (the writers) should be held accountable.
But just because they are responsible doesn't
mean every other person down the line
isn't responsible as well.
Makes me think of an episode of Space Ghost Coast To Coast (Snatch, I think..)
which goes something like this:
"The rays... Its... Its feeding on the rays!"
"Then don't shoot it!"
"But.. The rays... It's feeding on them! Ohh."
Re:Well blahs all around (Score:2)
Re:Well blahs all around (Score:3, Interesting)
In fact, if users did turn smart, both you and me might find it a lot harder to get jobs.
You see, computer geeks get jobs because we're supposed to be the ones who think about things like this. Hell, we're perverted enough to *enjoy* doing this nitty-gritty computer stuff. Joe Q. User just wants things to work. The user doesn't want to have to deal with anything. After all, the computer isn't their job, the computer is a tool to help them with their job.
So yes, I agree that in an ideal world people wouldn't be stupid and would know not to open unexpected attachments (and always scan everything anyway, and all that stuff). But the reality of it is that will never happened, and it just takes one person screwing up to let the worm wreak some degree of havoc.
Re:Well blahs all around (Score:3, Insightful)
Here's what happened: they were hit at 17:50 local time, at about 18:00, the first of four Outlook
lusers clicked on the attachment, which made the few admins who were still at work aware of the
problem. As they immediately went into action, they were able to get the mail servers under control pretty quickly (relatively speaking, that is). Next day, however, a scan of the network
revealed that about 50 additional PCs had to be cleaned up. These belonged to people who still use Netscape to read their mail and had also activated the worm. It didn't spread from there, but it did disable the virusscanners, so...
Next thing, that admin that I'm refering to claims: "Fortunately, we have Outlook installed on a few PCs already, because that is how we found out just before leaving for home. If everybody still used Netscape, a lot more PCs would have been infected during the evening, night, and morning before the helpdesk would have noticed the problem."
Sadly, this really is a true story...
Re:Well blahs all around (Score:2)
Since we run antivirus at our mail gateways, we catch most of what comes through and users get a scrubbed attachment of 0 bytes with an addendum to their subject line of "Scanmail has detected a virus!" so we are not usually at major risk. But we have had people (in IT even) launch iloveyou.vbs and cause headaches.
Although I do not expect users to know which file extensions denote which type of files are attached, I do expect them to call IT before opening suspect attachments. This, of course, assumes IT has enough people to be responsive to such requests in an organization. When that is not the case, anarchy may reign...
Expect all you want.... (Score:2)
This after all the usual emails after a virus and instructions on updating DAT files (click here, click there, if it says to reboot, do so, and that was it).
As much as we'd all like it to happen, non-IT people will not turn on their brains and apply logic & critical thinking to computer situations.
Re:Well blahs all around (Score:2)
That's not good enough. After the first one, the rest of the unexpected attachments would be coming from people INSIDE the company.
Re:Well blahs all around (Score:2, Interesting)
Public humiliation always worked well for me!
e.g. "Can you believe that old pervert in sales really believed that the chick in client servce sent only him an 'I Love You' message?"
Fixing the staff problem (Score:5, Interesting)
I don't agree entirely with what you write, since I assign the blame for things like this almost entirely to those who write the stuff in the first place. I'm sure you'll get plenty of other replies saying the same.
OTOH, you make a fair point about employee training. The small company where I work, a software development house, has had a few e-mail viruses mailed to it over the past year or two. It's interesting to note that these often get forwarded around the office, but invariably by non-technical staff. The developers and tech support guys and gals generally have the sense not to run blind attachments; the admin and management guys and gals are more trusting, and bite the bullet.
Our IT support guys have long had a record kept of exactly when everyone runs the anti-virus update they mail round every month. Recently, they've instituted a "leader board", which is mailed to everyone, showing who ran it fastest. It's an amusing little game for those of us who are sitting in front of our PCs anyway, but the really telling thing is the people who don't appear on the list at all (which is typically mailed around the afternoon after the update), i.e., those people who still haven't updated their systems several hours later. Guess who they are...
So, we have established that certain types of users are more vulnerable to this than others, and we know who they are. The next question, of course, is what to do about it. You can come up with any number of penalties, but how are you going to turn around and slap them on, say, the MD of your company (a repeated offender in our case)?
Personally, I always liked the "drill" approach. The IT guys occasionally create a Hotmail account or some such, and mail something cool-looking to a few random accounts at the company. If you run the attachment, it pops up a simple message on your screen informing you that if this had been real, you'd just have cost everyone in the company a day's work/sent abusive mail to your most profitable client/whatever. This isn't publicly embarassing, and it makes the point. It's certainly proven very successful in a couple of cases I know of.
You could complement that with a "three strikes" sort of rule. Anyone who falls for it gets a couple more spams shortly thereafter. Anyone who falls for it repeatedly has maximum security settings imposed on their machine thereafter. It will cause them hassle if, for example, they have to send or receive a genuine executable attachment, but such is the price you pay for keeping your systems secure from your own users as well as people outside. Better that than watching offensive mail go to those top five clients...
Re:Fixing the staff problem (Score:4, Redundant)
At least in my company, the first person to send this out (company name to remain anonymous.) was the CTO
This is not a lie or an exaggeration. Our companies CTO was the first damn fool to send it.
I'll now read the rest of this thread to see other replies.
Re:Fixing the staff problem (Score:2)
Re:Fixing the staff problem (Score:2)
We use outlook - but mine was patched and I used the web client via mozilla to avoid the vbscript, IIS disabled and using something else for a local JSP/HTTP server. I thought I was being carefull, and I still got nailed by nimda anyhow...
Your drill only works for the first case. From there on out, it sends it to every one in the address book. I get a message from the CTO, rather than 1337hxrs@hotmail.com, that is a known source for me. Your lucky most email virus subjects lines are stupid too - unless the damn preview nails you anyhow. Ah, hell... even when I was practicing safe hex, the only thing left standing was my sunblade.
BTW, the preview problem can be fixed for those of us forced to use outlook... Check out nohtml. http://ntbugtraq.ntadvice.com/default.asp?sid=1&p
Re:Well blahs all around (Score:2)
It's the answer no one wants to hear or do, but one way to get them to listen, would be to hold them responsible for their actions. You sent a dozen copies of virus? You get punished. It doesn't matter if you wrote it or not; you did it.
Abuse Secured Computer Information Interchange (Score:2)
Now that web browsers can handle FTP sites, it's easy to show most people how to upload/download content and it's also easy to set up a low level of security (blind directories etc.) that is comparable to sending stuff over email (if it's confidential, it shouldn't be going out over email anyway).
Xix.
Burger Flipper (Score:2)
- About a third are irrelevant to work
- About a third could have been done as text
- About a third already exist on fileservers
Then think about the amount of effort in building an insanely large Exchange server to host all this junk and, and compare it to the *very* modest box we used to use for mail. I used to accumilate maybe 20 Mb of mail a *year*, now I accumilate much more than that per month. On average, each of our users have about 200 Mb of "vital" correspondence in PST files clagging their homes (and the PST files starts to spontaneously combust when they top 70Mb or so). After all this, I think we have gone backwards in terms of investment/utility. We are paying a lot of money so people can use Word as their email editor and ignore good file management practises.
Yes, I'd agree that convincing PHBs they don't want floral pattern wallpaper on their email is a lost struggle, but the 1% of attachments people actually need would be far more effectively sent through other means and our mail infrastructure would be a tenth its current size.
Attachments are a PITA.
Xix.
Re:Well blahs all around (Score:2)
Re:Well blahs all around (Score:2)
Because it's not a
dave
Re:Well blahs all around (Score:2)
Re:Well blahs all around (Score:2)
Re:Well blahs all around (Score:2)
Honestly, slashdot posters are some of the dumbest fartknockers around.
Oh yeah, definately. Sure Mr. Anonymous Coward. Do you have a valid suggestion? I can't think of anything that comes in *.scr that is of any benefit.
Re:Well blahs all around (Score:2, Insightful)
Re:Well blahs all around (Score:2)
Re:Well blahs all around (Score:2)
Same old argument, right? It's the user's fault.
I really don't like this conclusion. Truth be told, this is a major security flaw in Outlook (and derivatives). The bottom line is if Microsoft is going to market to the technically ignorant, they need to protect these users from themselves for the sake of the businesses these employees work for. This is only good software engineering! Design the software for the target audience - everyone.
Now I know MS probably doesn't think it owes the businesses that buy its software anything - "you get what you pay for". But this flaw - allowing e-mails to execute scripts - is absolutely unnecessary and costly to ANY business connected to the Internet. No amount of policy can protect businesses from this flaw. There will always been a few ignorant weak-link-in-the-chain employees that don't know any better.
So say what you want about the virus writers, they are putting MS under a very important spotlight. How many virii have to exploit various Outlook holes before businesses demand something better, if only to save money in IT costs? It makes you wonder where the breaking point is
Re:Well blahs all around (Score:2)
Also, blocking most attachments, if not all, at the mail server would've stopped the problem complem.
Re:Well blahs all around (Score:3, Insightful)
Honestly, I don't think the fault rests on these kids at all.
A quick article reference:
Once inside a user's system, it [Goner] deletes anti-virus and firewall programs, then installs scripts to allow hackers to access the computer and use it as a platform for denial-of-service attacks.
This was not a blameless accident. It wasn't a mistake, that wasn't meant to be released. It was a specially written virus designed to build a 5cr1p7 k1d33 DDOS network.
I don't think they planned to sit around with thier massive DDOS network, not doing anything. Furthermore, they certainly knew what trouble the worm could cause - there is ample precedent for this.
We won't deter future virus writers with a slap on the wrist. They need to be given a sentance that others will look at and say 'I wouldn't want that to happen to me'.
They shouldn't be given a 5-year sentancem granted. I would think that a $5,000 fine and confiscation of thier computer equiptment would to fine. But we can't say 'Blame the users; they aren't following procedure', because if it weren't for script kiddie virus writers, there would be no need for virus-stopping procedures at all.
That's my opinion, anyway.
Michael
Re:Not to state the obvious (Score:2)
At first sight, that sounds like a great solution. In fact, MS themselves tried it (blocking just about anything that might be executable, without any chance to circumvent the block) in the notorious Office security patch a few months ago. Unfortunately, that immediately caused chaos in offices across the globe, as people suddenly discovered that they couldn't send or receive attachments they actually needed to any more, either.
Re:Well blahs all around (Score:2)
Comment removed (Score:5, Interesting)
Re:at least IT is paid by the hour. (Score:2, Insightful)
For what it's worth, Microsoft is the biggest fish out there. In a large business with many users that aren't technically proficient, learning to use another program is difficult. So, Outlook is what they use and Outlook is what you'll find.
Blaming the users will not solve anything. It's nice to turn up your nose at their technical inferiority, but I fail to the how that helps anyone.
What's the point? (Score:2, Insightful)
Same old... (Score:4, Interesting)
script kiddie/cracker/whatever create worm
worm gets out, spreading by point and click method
IT goes on about how bad this one is
Eventually worm dies and kids are caught
Big deal made over last worm causes more copycat type worms
Cycle restarts
Ok I mean thats pretty general, but goddamn if I'm not sick of all this. How about instead of going after the worm writers (they are not innocent but hear me out), why don't we try to at least educate the public into not opening things they don't know about. I mean what good does blackice and zonealarm do if someone opens a file and turns them off? The technology isn't the problem (except with IIS but thats whole different beast), its the people. Maybe someone (I know I'll be flamed as a bastard for this) should create a worm that actually fucks over the people that open it. Instead of making it so they download some roll-back registry fix, how about you just wipe out the registry? Why not make it so IE and Outlook have popup-adds with every page and email they view. What if the worm steals their emails and sends them to spammers list automatically? I mean obviously people aren't learning, or this crap wouldn't be happening over and over again. Yeah the people are victims blah blah blah... cry me a river. I've never had a worm, and never will. I'm not claming i'm smart or anything, but its common sense that an emailing "I'm asking for your advice" with a document that ends in scr or vbs is something that joe45@aol.com probably didn't mean to send me.
Re:Same old... (Score:4, Insightful)
Ah yes. It's the user's fault. Damn them for actually using the features in their frigging e-mail clients. How dare they not go through arcane menu commands and figure out how to deactivate features. Let's shoot the slobs now, and totally ignore the fact that lazy-ass developers created all of these problems for the users to begin with.
Oh yeah. very common sense. Unless, perhaps you know joe45@aol.com. Which is the case in most of these "scan the user's address book and send a copy" schemes. That's why it's so successful... e-mails go to people who know, and perhaps trust, the person who launched the virus. Hell, a lot of the viruses are in the form of Word documents, which, believe it or not, are actually passed around via e-mail. See, e-mail is all about communication. People send people things. People open them up. 99.99% of the time, nothing bad happens. That's what e-mail is for. That's why we have attachments. If people aren't supposed to open them, what's the point of having that capability in e-mail clients?
Do you actually expect people to know what the hell a .scr file is? Maybe you've got all of Window's file extensions memorized. Most people I know have more important things to think about.
No, if you want to code up a virus to "fix" this problem, code up one that goes out and downloads and installs an e-mail client that was written by someone with a clue about security. Perhaps install an operating system where something run in userland can't fuck with system files. Hell, write a virus with some AI that can seek out and destroy the source code to lousy e-mail clients, scripting systems that have no concept of security, and operating systems that have no security model to speak of.
In the mean time, screeching at people that doing things that the e-mail clients were designed to do in the first place is grounds for a cyber-anal-raping is about as productive as screeching that they're a witch if they float in water. It may seem obvious to you, but you're not speaking their language.
Re:Same old... (Score:2)
Re:Same old... (Score:2)
Re:Same old... (Score:2, Troll)
punishment for virus writers? (Score:2)
Re:punishment for virus writers? (Score:2, Insightful)
You just made your own point. The internet is now commonplace, and it costs large corporations lots of money in lost productivity when one of these get sent out (if only in our IT department alone, laughing at the stupidity of the users falling for the stupid tricks the virus writers use to get them to open the email). There are a hell of a lot more people to care now.
Re:punishment for virus writers? (Score:2, Insightful)
We all pine for the 'old days.' But really ... today all they have to do is relate it to 'terrorism' somehow and then the person goes to jail. And then all virus makers are terrorists. And because the terms are generalised, anyone who is a 'hacker' is a terrorist. But wait, there are many linux hackers who don't go around compromising networks. But they are hackers. Sooner or later a linux hacker or two get identified with working on PGP, but strong encryption, according to the US, is a munition - WE HAVE HACKERS MAKING MUNITIONS HERE!! TERRORISTS !!! Arrest them ALL!!! They're helping Osama Bin Laden! And it could all be falling into a cascading cycle of ignroance.
And this is what THEY want because people with outside-the-box knowledge about computer security can always do things with networks that can't be controlled or monitored by the powers that be.
Ah yes, I pine for the good old days. (Btw, if it means anything, I'm younger than you.)
Re:punishment for virus writers? (Score:2)
Re:punishment for virus writers? (Score:2)
That's because in those days, viruses did relatively little damage to only a few people. There weren't as many around, and it was much harder to spread them.
Nowadays, a s'kiddie with a problem can do millions of dollars' worth of damage because he's in a bad mood, and he can do it in a matter of minutes. No matter how good your security and recovery procedures are, a virus can always hit at the wrong time and do serious damage. Remember, a single day of downtime or an afternoon of lost data across a whole company can be the difference between making a profit or going bust in this business.
So yes, I think you have to punish those who do this, and with something serious enough to act as a genuine deterrent. Slapping them on the wrist and saying "Naughty" just isn't sending the right message.
Re:punishment for virus writers? (Score:2)
Look at it from a warfare angle: Goner is a half-assed stunt by some *Israeli* kids. You can rest assured that if Al Qaeda could find two brain cells to rub together that they would've done something similar, and unlike the kiddies they would've wiped BIOSes and NIC MAC addresses, wiped filesystem metadata and boot sectors, programmed video cards to extremely high refresh rates (destroying old monitors and maybe making them catch on fire), and so forth.
Yes! AND Punishment for CIOs/CTOs (Score:3, Insightful)
The question that never gets asked is why all these companies were vulnerable to these attacks. I've worked for several Fortune 500 companies and I've yet to see one with good security. You'd think they'd be going out and hiring a bunch of security professionals after Sept 11 but I'm not seeing a whole lot for infosec or security on the job boards.
Until some CIOs and CTOs start losing their jobs over this crap, the cycle will persist.
They've already suffered enough (Score:3, Troll)
After all, judging by the virus code, it is almost certain that they had to use Microsoft software to create it.
5 years for kids??? (Score:3, Flamebait)
In the US, these same kids can just as easily steal a car, get drunk, and run you over while running a red light. Guess what? With a good plea-bargain, they'll get off in 5 years too.
What's more important, 5 years in the slammer for stupidity or 5 years in the slammer for killing someone? Get your priorities straight people...
Don't worry too much. (Score:5, Insightful)
Re:Don't worry too much. (Score:4, Troll)
No, no, no! They are T E R R O R I S T S! Come on people, if you let terrorists like these kids off the hook, it's only a matter of time before they start bombing things and mailing anthrax, right? Gotta be tough.
Re: (Score:3, Insightful)
Re:5 years for kids??? (Score:2, Interesting)
We should harness the talents of 5cRi7K1DDI35 (Score:3, Insightful)
These kids are to young to go to gaol and the outcome of confining the kids to a cell for up to five years will only make them criminals.
I just think the punishment should fit the crime and actually make a difference to the outcome of such young and talented delinquents lives
Re:We should harness the talents of 5cRi7K1DDI35 (Score:2)
I mean, damn...
Sigh... (Score:3)
BTW, I've read that in Israel white-collar crimes are punished more harshly than normal crimes. For example, if you commit copyright infringment you stand to spend more time in jail than a rapist. Can somebody confirm/deny this? (But then again, it looks like this is the way things are going in the US too with "hackers" being declared terrorists and all...).
Re:Sigh... (Score:2, Interesting)
No, no, no. After living in Israel for about a year, I can tell you that copyright infringement (especially cable/sattelite/software piracy) run rampant. I'd say around 80% of all software was pirated, and most people I knew stole either sattelite or cable television. In a country that's at war, piracy isn't the current priority on the ethics hierarchy.
I can't belive people are still falling for this! (Score:3, Funny)
*Woman peeks her head into IT Manager's office*
"Oh, and Bob, I opened that e-mail virus -- just like you told me not to!"
Attachment blocking at the server (Score:5, Informative)
I use a virus scanner on the Exchange server capable of blocking attachments based on extension (Scanmail by TrendMicro works nicely for me). I always block:
ade,adp,asx,bas,bat,chm,cmd,com,cpl,crt,exe,hlp
Bingo - no e-mail virus problems
I figure if my users really need them and the person sending the message is smart enough (and meant to send it) then they can zip it. If the sender wasn't smart enough to zip it, then I can always pull it out of the quarantine folder.
This Is Bullshit (Score:4, Insightful)
Computer crimes are MORE than sufficiently punished in the US, thank you very much. I don't know where you get off implying that the US goes easy on computer "crime". I had a little incident during my freshman year of college. The FBI was very determined to get me jail time for a ridiculously minor offense. It was only through sheer wit and creativity of my laywers that we got the offense down to a misdemeanor and a lousy 600$US fine. That was the most hellish time of my entire life and could have ruined my career forever. All over a tiny little deal (no damage was done).
Imagine what these kids would get in the US for writing such a worm. It'd be a helluva lot worse than 5 years in prison. So put your pro-punishment attitudes away and get real. Remember what our government does to computer criminals [freekevin.com].
Re:This Is Bullshit (Score:2, Funny)
'p'unishment = locking a person in a room for a while.
'P'unishment = beating the poor sod with bamboo canes or cutting off his hand or something.
Re:This Is Bullshit (Score:2)
Re:This Is Bullshit (Score:3, Insightful)
The FBI should be actually doing their jobs and hunting down murderers, rapists and people who actually hurt other people instead of hunting down people who write programs to piss people off.
Put shit into comparison for a second.
These kids are terrorists! (Score:2)
We all know what happens to terrorists, check out bin laden hiding in the cave!
Make an example (Score:2)
outlook address book (Score:2, Informative)
Why does outlook allow a script/program to access the address book without the user's permission? I think we've seen how costly this bug/feature is, why isn't there more pressure on M$ to fix this problem, or provide the option to turn it off?
These kids are essentially going to go to juvi/jail for swimming in a pool, when the sign clearly says, "no swimming."
No fault to the pool owner for not putting a fence around his pool, right? Ah, justice.
Re:outlook address book (Score:2)
Re:outlook address book (Score:2)
What is the problem with a script accessing the address book?
Before flaming me, think about what you're asking.. The address book for Eudora (for example) is a text file! I can write an applescript that accesses the information in the test file without ever talking to Eudora. What will disabling address book support do besides removing a feature that might be very useful (for example, a script that filters your incoming mail according to your address book)..
Re:outlook address book (Score:2)
and there is nothing wrong with a script accessing the address book as long as the script has permission to access it which is all this patch does, ask you if its ok.
A Suggestion For Corporations and IT Professionals (Score:2, Interesting)
You set up a simple script that by default, turns off accepting email with attachments on it. When a person in the company NEEDS to view an attachment, the script allows one email with an attachment through to his computer after he fills out a form and submits it to the script (the form is never actually read, but hmph).
This way, anyone who needs to see an attachment does and must know about it before hand. At the same time, it blocks attachment-outlook-stupidity viruses by disallowing them to shoot through the system on a normal basis.
Furthermore, any person IN THE COMPANY who sends an attachment to another person in the company that's rejected by the mail server because the recipient hadn't filled in the form has his or her email account locked for 24 hours to stop the virus from spreading.
Done. Finished. My thoughts.
Re:A Suggestion For Corporations and IT Profession (Score:3, Interesting)
Well, I know that if I told Stan from accounting I was going to send him a file, and in his normal scatterbrain manner, completely forgot about it, and subsequently had the attachment bounced and my account locked, Stan from accounting would lose his legs. But otherwise, this plan is good, if a little draconian. Maybe just filters against certain executable file types would be a better idea.
Here's the other side of this coin. (Score:2, Redundant)
Here's a little bit of the flipside:
Our Exchange server weathered it just fine. Why? Because it's running Trend Micro's scanner, and it punts everything but TXT and ZIP files.
The last three virii that ran through the net DIDN'T affect us. We've got 1200 workstations, 60 odd servers, and _6_ admins. (and a 6 member Help Desk)
A Microsoft shop CAN be protected, it CAN avoid this crap, and you CAN run an enterprise on these products with a small staff.
CRIPES!
Further, the poor little kid is just playing around. Bullshit. There are a bunch of businesses having a hard enough time STAYING IN BUSINESS. They SHOULDN'T HAVE to deal with the financial burden of bouncing and disinfecting their infrastructure.
Re: (Score:3, Interesting)
That's right, punish KIDS... (Score:3, Insightful)
Part of the process of being a kid is learning... While I do not approve destruction or paralizing IT infrastructures, this seriously bugs me depending on the seriousness of the punishment.
Meanwhile, LOADS of spammers are still clugging my Hotmail inbox at a rate of at least 20 spam a day, my ISP email account receives at *LEAST* 5 spams a day, multiply that by X amount of users, THERE'S a big bandwidth waste. These people are still running free and going stronger than ever!
Those lame virus lasts for about a week. If after that, anyone else gets caught, they need to *LEARN* the HARD WAY like "doing backup is a good idea because you never know when your system might fail", well the same should go with "Update that antivirus file, because you never know what might hit you". Heck, the antivirus programs offers to do it automatically, there's no excuses.
Re: (Score:3, Insightful)
hate crimes (Score:3, Funny)
I believe these kids are guilty of hate crimes [satirewire.com] against stupid people.
Canada does it best (Score:3, Insightful)
That is enough punishment for a silly prank.
And I can't simpathize with the people who blame the users for openning the attachments. Teaching users not to open emails that have "Hi" as the subject line is only a short term solution. Trying to get users to remember which types of files are executable is not an option either. (Until a year ago, I assumed that
A better solution is to not allow executable attachments which end in
An even better solution is for Microsoft to fix their programs or for people to not use Microsoft products.
procmail filter (Score:4, Interesting)
The extra level of 'abstraction' (the user having to rename the file to run it) has saved us from every major email born virus in the past two years while still allowing people to get there precious attachments if they are expecting them.
For the children! (Score:2, Insightful)
What kind of stupid statement is that??? The U.S. shares the honor of being a country which will execute people for crimes committed in childhood with only one other country in the world -- Libya. Great company there.
Your statement implies that our government is soft on the law-breaking young -- HARDLY! Rather, it's attitude towards (non-white, anyway) children is nothing short of bloodthirst.
Justice (Score:2, Interesting)
Ok, I know I'll probably get marked as troll, but oh well.
The way I see, is these kids are kinda like Big Tobacco. They make something that's harmful, and the people that use it do so of their own free will, despite the countless warnings given out that they should not. It seems funny to me that the same people who think Big Tobacco shouldn't be punished, also think that any mischeivous kids should be severely punished. Well, that is unless it's their own kid.
Defense against information warfare (Score:5, Interesting)
These virus writers are doing a public service. Serious problems with our communications infrastructure might not be fixed if it weren't for them.
Imagine what could happen if the first exploits of these security flaws came, not piecemeal from a scattering of amateurs, but rather from some adversary who could call on the services of numbers of technically proficient individuals. A hostile government say, or a terrorist movement that drew in disaffected persons in many countries. What if the vast majority of business users had no idea of how vulnerable they were until the system suffered a massive failure?
There is an enormous learning process going. People are finding out the hard way, what they would never otherwise have the time to focus on: computers can fail, for very subtle reasons, and we are more dependent on them every day.
Not in the US? (Score:2)
of course since they aren't in the U.S., they might actually be punished.
The US has the toughest Anti-hacking laws of almost anywhere, other then china of course, where you can be exicuted for it (actualy, that's pretty much the way things are with any crimes these days, the US punishes harder then any country other then china). And, our laws have only been made tougher by the new anti-terrorism bills. In fact, had these kids been in the US they could have been tried as terrorists. (and I mean they must be terrorists, they're from the middle east!)
Why let it go so far? (Score:3, Informative)
I really have little sympathy for IT admins who get killed by this stuff, there are a million tools out there to stop this stuff from doing damage way before idiot humans get their hands on it.
I personally would like to see more ISPs use this stuff, after all they're not obliged to carry any traffic they deem high risk to their users. They already block dodgy ports so windows shares aren't wide open, why not a complimentary virus scan on mail?
We must now bomb Irael (Score:4, Funny)
Re:US Not Punishment Friendly? (Score:2, Insightful)
I think taco's making a specific allusion to MafiaBoy, who got off with probation for his DDOS attack last year.
Re:US Not Punishment Friendly? (Score:2)
Re:What drives a script kiddie? (Score:3, Insightful)
I believe that every programmer, at some point, goes through a phase when they want to try everything under the sun just to say that they can/could/did do it. I never actually wrote a virus myself, but I definitely remember wanting to just for the sake of getting into the guts of a computer and seeing what makes it tick.
Most programmers have also been/are sysadmins. I believe this along with growth/maturity eventually lead to the desire to produce something useful, not destructive, for the rest of the world.
Unfortunately, some never get past it, and some just use pre-fab virus creators. These people for whatever reason didn't move on to the next stage of evolution and probably never will, but at the same time, they keep sysadmins in business and antivirus writers employed.
Re:What drives a script kiddie? (Score:3, Insightful)
Hmmm, maybe if there are more crackdowns on script kiddies and more slander against that kind of life these kids won't think it's 'cool' anymore. Just a thought
Same here... but I don't think crackdowns will help. I mean, they probably get enjoyment out of their creation growing (until they fully realized what they did). A better idea than crackdowns might be a controlled environment for kids to screw around in...
Of course, one result would be giving crackes experience / promoting it. But giving out free condoms could be viewed as promoting sex...
whatever. I can't see any especially good solution.
Re:What drives a script kiddie? (Score:2, Insightful)
Just my 2 cents.
-OctaneZ
Crackdowns cant even stop crime! (Score:2)
WE have kids in the USA who think its cool to be a gangster, who think being an outlaw is cool, and become criminals.
When you tell someon they CANT do something, it makes it COOL for them to do it.
Think about it.
Re:Crackdowns cant even stop crime! (Score:3, Funny)
That should make it uncool enough.
Re:What drives a script kiddie? (Score:2, Funny)
Maybe middle school/high school health classes will start having anti-lameness speeches. I can imagine it now: "Don't do worms..........mkay?" or "Don't give into the peer pressure to code worms... they might make you feel good temporarily but they're bad in the long run" or even "Just because one of your friends tells you that writing worms is cool don't listen". Lets not forget "Friends don't let friends write worms".
Re:What drives a script kiddie? (Score:2, Insightful)
Then again, this is from the same school board that says kids can't use the comps for playing games that involve the keyboards, because they wear out quickly that way. They're only allowed to play "mouse games".
Technology has passed these people by. Actually, I don't think we'd ever see something like this because most people I talk to think worms are caused by the Internet or something and act completely stupified when I tell them it's actual people who write them.
Re:they didn't do anything wrong. (Score:3, Insightful)
Re:they didn't do anything wrong. (Score:2)
Actually the towers were designed to be able to withstand a collision with a 747 (witch is bigger then the a 767 or 757).
So they shouldn't have fallen, what happened was totally within their design specifications. (looks like the engineers didn't count on all the burning jet fuel)
Re:they didn't do anything wrong. (Score:4, Insightful)
That's a bad analogy. It's more like four kids pressed a button on the outside of the WTC at street level, causing the towers to explode due to an engineering flaw. In other words, there is no way for a mail message to directly cause harm to your computer. It must be interpreted by a program which you trust (a traitor, in other words) which is willing to harm your computer at the command of an outside party.
I absolutely can and do hold them responsible. Their decision to facilitate running programs that arrive in the mail without any kind of sandbox or access restrictions was an obviously dangerous one whose implications were immediately visible to people who understand computers. Microsoft spins their product as the omniscient gatekeeper to the internet and handholder to the clueless. They encourage the computer-illiterate to put their trust in Microsoft rather than learning how computers actually work. They created both the software and the culture that propogate malicious code. All of which means that they are greatly to blame for deliberately bringing into existence email viruses.
Re:they didn't do anything wrong. (Score:3, Informative)
That's a bad analogy. It's more like four kids pressed a button on the outside of the WTC at street level, causing the towers to explode due to an engineering flaw. In other words, there is no way for a mail message to directly cause harm to your computer. It must be interpreted by a program which you trust (a traitor, in other words) which is willing to harm your computer at the command of an outside party.
Agreed, there should be absolutely NO REASON why a block of text and/or data sent to your machine should do anything you don't want it to. Since it does, and since these viruses get written over and over again, with no end in sight, the blame is with the software writers.
Now I'm not saying these kids should be let off the hook. They did something that was wrong and costly. But if we don't want to have this happen again, punishing the kids accomplishes nothing. Actually it makes the future virus writers want to learn how to be more stealthy.
The solution is sandboxes or code-checking with proofs. Or better yet, just displaying email messages as TEXT-ONLY, like they're supposed to be.
Re:Punish the kids? (Score:2)
Re:Here's a bomb, enjoy!! (Score:2)
"An e-mail virus is like a bomb. Well, not really a bomb, but a bomb that's like an e-mail virus."
Re:What Language? (Score:3, Informative)