Viruses, Trojans And Worms -- Unplugged? 88
An Anonymous Coward writes: "This two-part article at Wireless NewsFactor examines the risks of malicious code on wireless platforms and what companies can do to combat potential threats. The gist of it is that wireless viruses/worms/trojans are unlikely to spread unchecked, and it digs pretty deep into why that is the case."
Re:How many times must you be told (Score:1)
Nice job anyway!!
Now anyone know any decent "free" anti virus software?
I had inoculateIt but they dont have the freebies anymore.
Ted
Not a virus programmer, but... (Score:1)
Re:Not a virus programmer, but... (Score:4, Interesting)
But, as you say, that requires an 'in.' The J2ME inherits it's security model from the desktop version, hence wireless apps are essentially running in a sandbox that prevent and prohibit certain types of behavior, almost as if there's an anti-virus tool installed on the device.
Re:Not a virus programmer, but... (Score:2)
Re:Not a virus programmer, but... (Score:1)
there have been holes found in JVMs for desktops, hence there are probably holes yet to be found in the K Virtual Machine. I know for one the most holes thus far have been found in the class loaders, yet required Java code very intricately written in order to be exploited.
deCSS virus (Score:4, Funny)
Re:deCSS virus (Score:1)
Re:deCSS virus (Score:1)
It might be packaged with a Microsoft support letter PDF file complete with the capability to print the Utah address on the envelope...
And don't forget to bundle a document editor, Media Player, MP3 encoder, web browser and mail reader, all coded in ASP.NET for maximum efficiency!
Micro$oft: Empowering the Email Virus Generations!
This reminds me (Score:5, Funny)
PDA's are even more vulnerable to attacks (Score:3, Troll)
Also, many portable devices aren't easily programmed, and some cannot be programmed without physically modifying the device. Sure you can download a dev kit for your PDA, but not that many people know how to code for them. Cell phones are even harder to write code for. That means bugfixes and patches are going to be slow or non-existant, leaving them even more vulnerable to security exploits.
Finally, the userbase of most cellular phones and PDA's aren't exactly the most technically saavy people out there. Most users of these devices are ignorant yuppies who could care less about security issues of the WAP protocol vs. Bluetooth. These people don't care/don't know better. All they want to do is talk to their girlfriends/write a grocery list while they're driving home in their BMW or SUV. Most, if not all cell phone users are simply too ignorant to care about security.
Re:Damn nice troll! (Score:1)
Re:PDA's are even more vulnerable to attacks (Score:2)
Re:PDA's are even more vulnerable to attacks (Score:2, Insightful)
The palm does present a fairly straightforward vulnerability to beamed viruses. Because you can beam applications as well as data, and the verification screen that the palm displays upon receipt of an item is generally just "okayed," there is a possibility for sending malicious apps.
I'm sure somebody could write an app or a hack that captured beam attempts and sent virus code instead of (or in addition to) the intended data. So, you try to beam a business card and a small application gets sent to the other person. The new application is named, lets say, "Preferences" or "Updater", the person runs it, and infects their own palm... etc. etc. (and imagine a trojan with a time delayed payload... a cool app with a feature set like vidigo [vindigo.com] could be all over the place before Bad Things happen...)
A lack of tech savvy users, coupled with frequent beaming is a potential danger. Not pretty...
Re:PDA's are even more vulnerable to attacks (Score:2)
A time delay trojan is something else entirely. It's just a net virus that affects the palm. You still have the above mentioned problems if the virus tries to propagate through the IR port.
One final note: the IR port is slow if your virus is bigger than a few k, the people are going to think something's wrong and pull their Palm's back to investigate (IE if that busniess card that takes half a second to transfer normally is taking 30 seconds, then they might think something is broken and trade traditional business cards.
All this strikes me as theoretically possible but somewhat infeasable in practice.
"Viruses, Trojans And Worms -- Unplugged?" (Score:2)
When writing a headline listing three items followed by an exclamation, the exclamation must always be "Oh, my". No exceptions.
Big issues... (Score:1)
But when my cell phone starts working randomly, Sprint and I are going to fight. =)
jrbd
Buzzwords, get them hot and fresh (Score:2, Funny)
"air-borne virus"
"pegasus" (flying trojan, oh never mind)
"Quetzalcoatl" (you can figure it out)
More prosaic:
"wireless worm"
"Code Infrared"
Re:Buzzwords, get them hot and fresh (Score:1)
Quetzalcoatl" (you can figure it out)
Isn't that the lightning Gaurdian Force in Final Fantasy 8? What's he got to do with it?
Trojan that kills Windows (Score:1)
Trojan horse goes on the offensive [cnet.com]
Well, now I know why I deactivated ActiveX on all Win-boxes I use, and never missed it, except when trying to use the Windows-Update-Function: to update you Win-box, you first need to make it insecure by enabling ActiveX...
ms
I think it was summed up.... (Score:3, Funny)
IMHO this article is really arrogant. It's still a well known fact that unplugging your computer is the only true security, connecting it via wireless is opening up the channel even wider.
Re:I think it was summed up.... (Score:1)
Re:I think it was summed up.... (Score:2)
But CE's vunerabilities weren't discussed (Score:1)
Virus/worm/trojan (Score:3, Funny)
Finally, they agree with me.
The main problem is ignorance (Score:1)
A few days ago when I was at my mother's work, she asked me how to deal with a copy of the Love Bug which for some reason arrived at her computer. Nothing special, right? Except for this: the mailer is Netscape, the OS is Solaris, the computer is Sun SPARC and my mother is a very experienced UNIX developer/maintenance programmer.
What's the moral of this story? Obviously, the particular problem in this case was the global hype surrounding the Love Bug and its consequences. This hype made my mother abandon the usual UNIX reflex (if it's Microsoft it has nothing to do with me), and treat this problem as real.
It seems to me that the global problem is ignorance. People do not know what viri are; they do not comprehend the concept of a remote exploit; many of us do not have a clear understanding of system security.
I think the proper solution would be to educate people through the mass-media (BTW, it's time for the TV networks to get someone who knows both what a worm is and how to pass on his knowledge to other people). Additionally, security training could be added to all those hi-tech management courses PHBs attend - maybe they'll absorb a few bits (or bytes).
Literacy in various subjects was the driving force of many important reforms and revolutions throughout the human history. It seems to me that some knowledge could improve immensly the computer security culture that we know today.
Re:The main problem is ignorance (Score:4, Interesting)
Re:The main problem is ignorance (Score:1)
Well, no, an experienced UNIX programmer should know how to use fork(), domain sockets, or the internals of SQL (her job is around a database), and she knows all of that perfectly.
The problem was not that she didn't know how to handle that, she did (it's not the first time she receives it), but rather that the hype was so big that it confused her.
Cell phones as trusted computing devices (Score:1)
These applications assume that cell phones are reliable devices, which keep secret data secret and operate without hickups until the battery runs out. So far, none of the initiatives has really gained momentum, but will people stop to reconsider what they are doing when cell phones become more and more similar to general-purpose computers, with fully-fleged browsers showing web content on tiny displays, possibly even including a EMCAscript interpreter?
I don't think so, and the results could be devastating.
Re:Cell phones as trusted computing devices (Score:1)
Most of the implementors are explicitly not making an assumption that the terminal is a trusted device, and are relying on the USIM to carry trusted information (such as identity information), and on encrypted network storage to carry certificates etc.
Location based services do not rely on GPS, and do not rely on trusting the phone - LBS is a network function.
Digitally signing will require an authenticating protocol (e.g. USIM->PIN) and this authenticator will unlock a cert held in a crypto vault.
Re:Cell phones as trusted computing devices (Score:1)
Of course, even today, people ignore such problems, add a tamper-proof device which stores the secret and performs the crypto operations, but continue to use the host computer to view the documents which are to be signed etc. Of course, this approach is not secure. A few German researches have recently broken such a system even though it had been certified to be "secure".
Notice the pro-Microsoft spin? (Score:2)
Malicious code can replicate more easily when more hosts are available, so virus creators tend to focus on widely used platforms. (That is why few viruses exist for wireless platforms right now -- and why more viruses plague Windows platforms than Mac or Linux platforms.)
Obviously Windows' market penetration is the ONLY reason Unix/Linux platforms have essentially no viruses while Windows has so many it's spawned an ENTIRE INDUSTRY of virus-protection software. The organization and quality of the software and the number of people looking for and fixing bugs have absolutely NOTHING to do with it.
So if a lot of people abandoned Windows for Unix, Linux, or OSX virus writers would write viruses for them. Since only popularity matters, they'd succeed as easily with those other operating systems and app suites as they do now with Windows. So viruses would be just as much of a problem as they are now. So don't bother to switch.
Subtle, isn't it?
Re:The sad thing is... (Score:2)
All related to computer 'experence' (Score:1)
Which means they are more likely to know something about security. Or that their sysadmin does, and a competent admin can /home/$USER but nothing else (software wise).
(a) protect the system. eg You could mess up
(b) Backup the system, incase $USER doesn't follow the rules.
(c) Pass on knowledge of what to do and what not to do. (Which sometimes is real pain in the butt, depending on the person!)
ANY sysadmin should do this, as should every user (at least b and c). In my experence, Windows Sysadmins are not as likely to do the above as Linux Sysadmins.
Popularity != Virus Written (Score:2)
Ahem.... WRONG!
Apache and Linux both have source available. Therefore, it should be MUCH easier to figure out how they work than IIS/Win2K. Apache/Linux is deployed across more web servers than IIS/Win2K. Therefore, more people should write viruses to the more popular program.
So then why is CodeRed (I,II,III,IV,etc.) for IIS/Win2k? Because IIS/Win2k is a funnier target. It's more fun to stick a thumb in Bill's eye than in Linus' eye.
Re:Popularity != Virus Written (Score:1)
If there is a buffer overflow in IIS (for which every binary is identical) running on NT (every install of which is v.similar) then it is easy to predict where the IP will end up, where system DLLs etc. are.
With open-source operating systems and application, there may be a significant number of installations that are different enough from the majority that it is either not worth writing a worm, or an in-the-wild worm won't spread easily because of scarcity of suitable hosts. Apache isn't rare, but it is probably less uniform than IIS.
Just my guess.
Get to it guys! (Score:1)
To explain what I mean, these wireless devices will have a common communications protocol, and possibly nothing or very much more in relation to the UI, presentation, you know user stuff. Say nothing of the actual, Um, activate LCD node 23h-87v, and check to see if this cell is paid for.
Any good anti-viral developer would realize that the best place to nip this sort of thing in the bud would be in a clean area. There's nothing to say that a worm that rot-13's your contact list or something of the like will actually be able to wipe your activation codes after sending them to heroin dealers in Detroit.
The easiest place for a virus to work and propagate is at a high level, such as outlook in the windows world, and this will probably be true in the wireless world.
There's nothing that says that Ericsson, Nokiea, Motorola, Sony, Tom, Dick, and Harry have to use the same underlying chipset to perform these tasks. I've never heard of a standard in all cell phones WAP chip!
If AV vendors concentrate on these particular chipsets, to say Norton NokieaAV for example, they will better be able to handle this threat. Only interface with the network like messaging would to receive updates.
That said, the less easy; more work, more hassle, more coding area of wireless virus writing, should concentrate on the underlying chipset to do the same job. What good is an AV product if it can't be updated, or worse yet can't be installed! I wouldn't be suppressed if the memory cores of these devices, being that they contain activation codes, are just as hard to re-program as DirecTV HuCards.
The place to get it done is at the chipset level, talking in native code, not protocol code. Find a back door before manufacturer-X finds it, and you're set.
Any AV vendor will also have to do a good job of preventing back doors in their code as well, so it's probably bound to be a large mess.
Re:Get to it guys! (Score:1)
Winxp (Score:1)
This will be bigger than the W2K bug
News for the masses? (Score:1)
Don't get me wrong... I realize that this is a very real issue. But assuming for a second that any software on a device that ever communicated with the outside world (via disk xchange, bbs, net, etc) is and likely always will be a possible victim to a virus/worm. With that in mind what is this article really saying? Its software and its online, of course its might be suspectable to a currently undiscovered exploit. I'm not saying it should be ignored... but is this news or just another media attempt to scare the public and/or rehash an old story?
It appears to me the only 'news' of the story is this preemptive strike, antivirus software. Now I have certainly never been the most paranoid geek in the world, but having antivirus software on a critical system seems to me more of a good step then a strike of any sort... it is not preemptive, it is delayed. I think a quote from the artical by Rob Rosenberg sums it up well... "The threat is quite simply that people won't use antivirus software on the devices, won't use security software, won't use proper passwords,"
Alas.. isn't that ALWAYS the problem? Again I ask.. is this really news?