Storm and the Future of Social Engineering 77
Albert writes "Storm shows several key characteristics, some new and advanced. It uses cunning social engineering techniques — such as tying spam campaigns to a current event or site of interest — as well as a blend of email and the Web to spread. It is highly coordinated, yet decentralized — and with Storm using the latest generation of P2P technology, it cannot be disabled by simply 'cutting off its head.' In addition, Storm is self-propagating — once infected, computers send out massive amounts of Storm spam to keep recruiting new nodes."
How is this news? (Score:5, Informative)
Re: (Score:1)
Re:How is this news? (Score:5, Insightful)
Re: (Score:2)
Re:How is this news? (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Insightful)
First it says: "IronPort Systems estimates that, at its most destructive point in July 2007..."; I'd argue that it was at its most destructive during the September DDoS against multiple sites.
Re: (Score:2, Insightful)
Re:How is this news? (Score:4, Insightful)
Re: (Score:3, Insightful)
That's not true if, instead, they have a healthy neurosis about running network clients that automatically download and execute foreign code.
It blows my mind that anyone still continued to run MSIE after 1995.
Re: (Score:2)
Which, of course, would be crazy talk. Right?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
aim lower, for the honour of the old school (Score:1, Funny)
This is simply an advertisment (Score:5, Informative)
Re: (Score:1)
Re: (Score:2)
To me it seems that the primary thing we need to do is figure out how to patch all those vulnerable Windows machines that facilitate this kind of crap.
dave
Re: (Score:1)
Self created problem? (Score:5, Interesting)
Hi Eric
Please forward us the username and password that your using so we can login and test this problem
Cheers,
Bruce Renner
Betta Computer Services Pty Ltd
Unit 2 / 55 Tradelink Rd, Hillcrest, 4118
Ph: 3809 2999
Fx: 3809 3999
http://www.bettacomputers.com.au
Note: This message may contain privileged and confidential information that is the property of the intended recipient. The information herein is intended only for use of the addressee. If you are not the intended recipient, then you are requested to return e-mail to Betta Computer Services Pty Ltd and destroy any copies made. Copying or disseminating any of this message is prohibited. Any views expressed in this message are those of the individual sender and may not necessarily reflect the views of Betta Computer Services Pty Ltd.
Re: (Score:2)
Re: (Score:3, Funny)
Re: (Score:3, Funny)
Re: (Score:1)
Re: (Score:2)
I'm sure your clients won't mind and it looks like Bruce is fairly lax about credentials... surely he will just send me your contact info and let me switch out the email address of record
Yes, most social engineering exploits ARE self created problems
Never give out your password... (Score:3, Funny)
Re: (Score:2, Funny)
Re: (Score:3, Interesting)
Then it turns out the guy did want my CC number. When I pointed out that I have no way of knowing that this is really TW or a scammer, so
Re: (Score:3, Interesting)
Tell me about it.
Some background to the particular bee in my bonnet: OS X is designed with a certain folder structure repeated in various different places:
However, the GUI installation tool only allows for installatio
Re:Self created problem? (Score:5, Informative)
I think there are a whole lot of things that Apple does wrong, but in this case, if you're trying to use the installer for something that doesn't need to write system-wide stuff, you're the one doing it wrong. The vast majority of applications don't use installers. You drag the thing to the applications folder, which doesn't ask you for your password (and the 'application' that "looks" like a single file is actually comprised of all the libraries it needs to run). Upon running the application, the application will then write stuff to your ~/Library folder.
Now, my beef with Apple's installer is that there's no easy way to uninstall anything that was installed with an installer. With the other stuff, I can just drag the application from the Applications folder into the trash, but if it requires an installer, you're essentially left to track down all the files and deleting them manually.
Re: (Score:3, Insightful)
I also prefer apps that are installed by dragging them into the applications folder, but if they create things in ~/Library, you're left with exactly the same uninstallation problem as you bemoan in Apple's installer. Unless that's just ~/Library/Preferences/com.domainname.AppName, I'd prefer a paper trail, i.e., an installer receipt.
Anyway, you or I may not create application installers, but as long as some people do, Apple is culpable in training users to type their password freely.
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:1)
Re: (Score:1)
Sounds like Prey (Score:4, Funny)
http://en.wikipedia.org/wiki/Prey_(novel) [wikipedia.org]
ZOMG BOTZ (Score:3, Insightful)
the blurb doesn't even SAY anything beyond that, and the 'article' is a skinny summary that has a cute lil stupid graph in the middle... and a solid bracing of two columns of ads on either side.
Does any article with the word "storm" in it get published...?
Re:ZOMG BOTZ (Score:5, Interesting)
Re: (Score:2, Insightful)
as a guy named Storm (Score:2)
Of course newspapers leave headlines that leave me as a mass murder like --Storm kills 300 in the Philippines -- --Storm leaves orphans homeless-- --Storm invades your privacy-- --Storm discontinued by geo-- --Storm discontinued by Coca Cola--
Storm
Re: (Score:1)
Lets get the ISPs involved! (Score:5, Funny)
Since the article mentions "and with Storm using the latest generation of P2P technology"
I think the only reasonable solution to this is to for all of us to call our ISPs and demand that this "P2P" thing be either throttled back or somehow forced to stop, perhaps by sending out fake RST packets whenever the ISP sees "P2P traffic. Yeah, let's all do that so we can nip this Storm bot in the bud.
Re: (Score:2)
A Little Education can bring calm after the storm (Score:5, Insightful)
Re:A Little Education can bring calm after the sto (Score:5, Insightful)
If you're car display lights up and flashes, people take notice but still I've seen people ignore the warning lights and just drive (sorry, but women are actually the worst culprits).
A computer is a black box to people and a few flashing lights/slowness mean nothing to them. It could be that their P2P app has just kicked in or their printer is printing or a million other things... people can't diagnose it, therefore they don't care about it.
You will *not* educate the masses, no matter what damage you do to their computers - these people are buying new computers every year because "the old one got slow", where in reality it was running at the same speed but just bogged down with viruses.
The way to do it is not to trust them to be able to spot it, or need to. That is, make a computer that takes care of such things. This is what privilege seperation do when they are implemented properly, but even on the strictest controlled networks, you'll find something users can do that wasn't designed for or intended. However, the fix is in the design and execution, not the dumb idiot who just wants to send an email to his family.
Re:A Little Education can bring calm after the sto (Score:4, Insightful)
Re:A Little Education can bring calm after the sto (Score:3, Interesting)
Re:A Little Education can bring calm after the sto (Score:4, Informative)
Little bleach in the gene pool would go a long way (Score:1)
Opinions: (Score:5, Interesting)
Took it's time.
Why isn't every virus doing this?
Seriously, this has always been possible, always been a threat. It's not surprising. It's "different" but you can't even call some parts of that "new"... other people thought of these things years ago.
I wouldn't be surprised if the next step is an "evolution"... instead of a simple worm, we get a virus that changes itself programmatically to avoid detection, uses information from previous successful hacks to propogate itself (e.g. "People click on me if I claim to be from this website... I'll send out some more of me claiming to be from that and similar websites"), or authors piggy-back increasingly more complex viruses on the back of Storm, so that eventually there is just a "swarm", instead of a "Storm".
And then the "virus swarm" will be seen as a single entity and you'll be defending your computers against it and reading adverts for "Anti-SWARM" software, etc.
Re:Opinions (Score:1)
.. I wouldn't be surprised if the next step is an "evolution"... instead of a simple worm, we get a virus that changes itself programmatically to avoid detection ..
Sorry friend - we've had those kind of viruses for a long time now - http://en.wikipedia.org/wiki/Polymorphic_code [wikipedia.org] http://en.wikipedia.org/wiki/Metamorphic_code [wikipedia.org]
Pleonasm (Score:2)
In addition, Storm is self-propagating -- once infected, computers send out massive amounts of Storm spam to keep recruiting new nodes
No way ! It can do this ? That's unbelievable
:
For those who need a little reminder about what is a worm (such as the guy who wrote the article), here is the definition of a worm by Wikipedia
A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention.
Why. . ? (Score:5, Interesting)
I know that this is what anti-virus companies do, but the way people talk about Storm and similar bot nets, makes it sound as though there is some elusive quality which allows it to do all these unexpected things. What gives? It's just a program. What's the big deal? Or IS there a big deal? I've never been infected.
-FL
Re: (Score:1, Funny)
Re: (Score:2)
No, I believe you're thinking of the phrase, "It's all so much simpler now. After you get the procedure you'll understand as well."
-FL
Re:Why. . ? (Score:4, Insightful)
Wikipedia (http://en.wikipedia.org/wiki/Storm_botnet) has a nice write-up on Storm, the "Methodology" Section is especially informative:
Yes, it's not hard to defend against getting infected, but every year there are a bazillion new computer users who want to "punch the clown to win a free i-pod", or whatever, and they get infected by the dumbest stuff. Then their computer can be used to attack others.
Anyway, most any
Re:Why. . ? (Score:4, Informative)
Ultimately, the only way to shortcut the race is to keep the code from being executed, on the assumption that people aren't going to want to have the bot on their computers. Unfortunately, this is going to require heavy retooling of security systems (to lower the chance that bugs can be exploitable, and to let users know exactly what the program they're trying to execute/install wants to do).
To get back from that digression, the big deal is that it uses peer-to-peer and that so many people have fallen for it. AV companies (and other reverse engineers) do look at the code, but they can only react, hence the arms race.
Re: (Score:2)
The other problem from my limited understanding is that it is incredibly resistant to doing just that - "look at the code."
The executable is encrypted, making disassembly difficult. People have purposefully infected isolated sandbox machines to try to attach a debugger to the decrypted, running process - and the bot kills the debugger. Researchers have found their machines (and the entire network they're connected to!) DDoS'd and effectively shut down as Storm found out and got angry.
Avoiding infectio
simple fix (Score:1, Insightful)
Re: (Score:3, Insightful)
Re: (Score:1)
cannot be stopped, eh? (Score:4, Insightful)
I suspect a few public decapitations of the people running Storm would put a pretty quick stop to it. Just gotta pick the right targets, see.
Enlist the RIAA! (Score:2)
According to this article [freedom-to-tinker.com] it is possible to "frame" IP addresses using the bittorrent protocol, and convince the RIAA that a non-infringing IP address (for example, a networked printer) is hosting their precious music.
If worm-compromised hosts can be automatically identified (say, the originator of every piece of spam that I get), why not frame them, and then RIAA will send take-down notices to their ISPs? Either this forces the RIAA to work a little harder before harrassing people, or a bunch of worm