Maker of Kournikova Gets Wrist Slapped Too 167
shelflife writes: "This story
says 'It is the first time in history that the maker of a computer virus has been tried in the Netherlands -- indeed one of the few times it has been done in the world. Hypponen knows only of one conviction. A man was sentenced to 18 months in jail in the U.K. in the early 1990s. The man served 11 months, said Hypponen.' but that can't be true. What about Robert Morris? Anyway, the requested sentence is amazingly light -- 240 hours of civil service." The really interesting part is that this kid wasn't even a programmer. He just downloaded a kit. Shows how far this Virus Craze has gone in the last few years.
May be he is guilty for spreading it? (Score:1)
How do you determine the cost? Makes sense ... (Score:1)
That is exactly right. No one stepped up to claim damages.
In light of that the defense attorney attacked the prosecution.
In terms of right or wrong it is obvious that the right thing wasn't done. In terms of judicial process and law, it was a success.
Maybe there needs to a better way to determine losses during a virus/worm incident. Are there any standard formulas not based on Anti Virus company PR?
The only thing I could find was this:
http://www.vibert.ca/prevbus.htm
It breaks time down on support efforts and totals it.
script kiddies (Score:1)
a kit! (Score:1)
Interesting that he turned himself in. (Score:2, Interesting)
It's about time (Score:1)
I'm certainly against penalizing the authors of the kits, if they don't release viruses. We shouldn't do anything to people who alert us to security vulnerabilities, even to the extent of releasing an exploit, since this is often the only way to get companies to make a patch. But for those people who decide to use this information to steal the time and money of others to gratify their egos, the law is the proper recourse.
If you don't agree, that's fine. See how you feel after having to spend a weekend of your own time wiping and reinstalling the OS and applications on a machine or machines that have been hacked. Then, testing them and having to deploy new security procedures so that you can be live on Monday. It's not fun.
Re:To put this in simple terms (Score:1)
The change that you can get a virus is almost zero.
The funny part about this is, that all those viri (or scripts) don't work with Outlook express for Macintosh.
No automatic execution of scripts and/or programs like with Outlook and Outlook express for Windows.
That's one advantage of the MacOS platform.
I'm using Eudora Pro and never had one virus.
And I avoid using any M$ product at all.
That's the only way to make sure that the change that I will get a macro virus is almost zero.
The problem with M$ software that it is very simple to make a macro- or script viri or worm.
Not using this software is the best way of preventing spreading of worms and viri.
And of course, you should always use anti-virus software with windows.
And update it at least once a week.
Re:To put this in simple terms (Score:1)
Anyway, it's smartasses like you that make me want to whip together a Mac-based worm and call it anna.jpg. Enough dumbfucks would open it up to shut you up.
Well, contrary to your remark reality already proves that you are wrong.
There are about 56 viri for the Mac.
Almost all of them don't work anymore due to the fact that they aren't written correct and use obsolete API calls which aren't available anymore since MacOS 7.0.
Compare that with the almost +/- 60000 viri for windows pc's....
Second, most viri for the Mac are just stupid programmerglitches.
Like for instance the hypercardvirus.
None of the Outlook virues on Windows work for Outlook Express either. Anytime Outlook has auto-executed anything it's been considered a bug, and that is not how the Anna virus spread
Nope, it isn't a virus.
It is just a stupid script which is executed by Outlook when you double-click on it.
And that is just one of the biggest problems with Outleak.
I'm a sysadmin at a small company.
The only way to prevent that we receive any script- and/or
So, in front of the exchangeserver there is a mailserver with sendmail and some filtering software and anti-spam software (with a large database).
This seems to be the only way to secure an exchangeserver.
And it works all the time.
Since the "i love you" script we haven't had one virus.
Good.. (Score:2, Insightful)
---
evelakamatt
Re:Good.. (Score:2, Interesting)
Finally someone in a computer-related trial gets a semi-fair sentencing. I'm suprised he didn't get $4,000,000,000 worth of jail time for all the "damages" he caused.
Contrary to the US it is not common that people are compensated above Fl 50.000 (that's around $ 22.000) in the Netherlands.
If a waitress spill some coffee on in a restaurant the normal compensation is that the restaurant pays the bill of the dry cleaner.
Contrary to the US we at least have some common sense and it isn't done to sue somebody for a mistake (and it is almost impossible).
You will find that this is the case in most parts of Europe.
How to calculate the damage? (Score:1)
I hope the court took into consideration:
- cumulative time (at sysadmin rates) spent cleaning off the virus
- long-distance and other comms. telling infectees, infected systems' admins that their systems are infected
- lost time due to disk-full errors etc.
What else?
The real loss / damage is that people are pissed off at each other for passing on a virus which someone else specifically designed for them to be able to pass on unknowingly.
Like switching the brake and clutch in city buses. Ha ha, what a riot. OK, so no one got killed, but Ha ha! Look at me! How'd you like the hospital treating your loved ones to be putting their resources toward cleaning off this scum rather than toward keeping records straight, making sure your parent / sibling / spouse / child doesn't get a medicine they're allergic to, etc?
timothy
Re:How to calculate the damage? (Score:2, Offtopic)
As an Arab living in the United States, I too have been affected by the tragedy inflicted on your country by these terrorists. I had several friends in the WTC at the time of the attacks, and I feel that the USia needs to extract vengance upon those who committed these acts. However, you must understand that the men who perpetrated this violence represent a distinct minority among Arabs.
Your suggestion that all arabs have their arms amputated strikes me as offensive and highly insensitive. Racially motivated violence will not bring the dead back to life.
Now is the time for level-headedness and tolerance, not ignorance and persecution.
Re: How to calculate the damage? (Score:1)
Sure he didn't mean weapons?
just by the way ... (Score:1)
http://tuxedo.org/~esr/fortunes/rkba.html
timothy
Re:just by the way ... (Score:1)
So I didn't run into the sig limit, really
Tim
Re:just by the way ... (Score:1)
timothy
Re:How to calculate the damage? (Score:2, Informative)
"Arms" [dictionary.com] as defined by dictionary.com [dictionary.com].
~LoudMusic
Re:Shit Happens (Score:1)
Get a name, log in, be somebody for a change.
~LoudMusic
Couldn't do it alone... (Score:3, Troll)
Re:Couldn't do it alone... (Score:2, Insightful)
Yes, Outlook is prone to leaving gaping holes to run these things through, but let's not blame the responsibility.
Someone, an IT Manager, a Network Administrator, a tech, has made the decision that their company, group or department will use Outlook. That is where the blame rests.
No one puts a gun to their head and forces them to use Outlook. No one. Someone makes the final decision.
In that decision there may be mitigating factors such as software investments, training costs, etc. so if they find themselves in a situation where they feel Outlook is their best decision they then need to protect themselves.
After the first Outlook specific virus everyone should have realized this simple fact: anit-virus products exist for a reason.
A good anti-virus product will override your email and not allow it to happen. Automated updates to DAT files can be handled locally or over the internet.
There is no use in blaming Microsoft. You blame the people who handle IT for the organization.
Re:Couldn't do it alone... (Score:2)
Re:Couldn't do it alone... (Score:2, Insightful)
Another factor contributing to the confusion between files and executables is the 'user-friendly' hiding of extensions, as used by Loveletter (loveletter.TXT.vbs, or something like that). And of course there is no excuse for basic errors like buffer overruns - a few such bugs are forgivable in ordinary applications, but an Internet mail client really needs more care in design.
Finally, these weaknesses have often been pointed out and exploited for several years now. Yet Micrsoft never seems to do anything about them (apart from some kludge to drop all
Re:Couldn't do it alone... (Score:1)
Actually, with the buffer overflow in Outlook's Date: field a while back, it ceased to be true. Virii could execute and proliferate the moment it hit your inbox wether you read the message or not, let alone execute an attachment.
Re:Couldn't do it alone... (Score:1)
Re:Couldn't do it alone... (Score:1)
And moreover, I'm tired of seeing those posts everywhere, where they are Not needed. If you really feel so hard about this crusade, why don't you tell the people that are Unaware of such?
Ah yes. Scoring cheap points by cheering for the home team...
Want me to tell you what the Real culprit is? All those management morons sending small little "funny" or "cute" AVIs or flash games... those are the ones that will dbl-click on Any attachement, and those are the ones likely to send an attachement that you should dbl-click. (Mail-rule: email from X with attachement goes straight to trash).
Re:Couldn't do it alone... (Score:1)
Execute code with your account before you even see the message isn't what I'd call 'behaving'
Re:Couldn't do it alone... (Score:2)
What if IT says "hell no" but management forces the Microsoft solution on them. Do you still blame IT?
What about schools and ISP's where clients just start using the bundled Outlook Express because it came with the computer, forcing the overworked sysadmins to divert time and money to installing centralized anti-virus software on the mail hosts, because there's no way in hell that anti-virus software is going to be installed properly configured on all the client machines?
I say boycott Microsoft until they fix the negligent product design that brought us the anti-virus market.
Outlook Express "security" (Score:1)
Google lists a few [google.com]. Looks pretty insecure to me.
Not convinced? How about doing a search for Outlook Express at Security Focus [securityfocus.com]?
Or browse a few Crypto-Gram by Bruce Schneier [counterpane.com]. Good reading, IMHO.
Re:When CHOOSE an insecure OS. (Score:1)
It's a balance. No one should be surprised at this point that running Windows and Office is riskier.
Re:Couldn't do it alone... (Score:2)
Yes, but only if we also take God to court, for making people so stupid.
Re:Couldn't do it alone... (Score:1)
Microsoft didn't force the person to use it. You informed the person of the ramifications of using it and he decided to.
People make decisions that seem stupid, perilous and ill informed everyday.
That does not mean the tools they use as a result of those decisions should be held responsible.
I mean if someone uses gasoline to clean their water heater and then relights the pilot light should the gasoline company be held accountable?
Announcement (Score:1, Funny)
Reasoning... (Score:3, Insightful)
and
The defendant, Jan de Wit, turned himself in to the police in his hometown Sneek, Netherlands, on Feb. 14.
I would venture a guess to say that those are the reasons why he was given such a light sentance, and the fact that he was 20 years old. A little remorse goes a long way in the courts, and turning yourself in too usually helps to give a lighter sentance.
Re:Reasoning... (Score:2)
GOOD! (Score:1)
Anyone who makes a "virus kit" or anything similar should also be imprisoned and fined. Figuring out how to breach security in software and letting the authors know so they can fix it is one thing, and its a good thing to do. But actually writing a program to exploit shortcomings in programs has nothing other than malice written all over it.
On the other hand... one could also make a case that people should be allowed to sue software manufacturers for costs incurred dealing with virii, etc. if the software company was indeed informed about the problem but took no corrective action to fix it. Of course, if they released a patch and you didn't bother to install it, or you didn't bother to install/set up the software correctly, that is and still should be your own fault.
Re:GOOD! (Score:1)
Some authors will refuse to patch the software until something is actually exploiting it vulnerablities. *cough*Microsoft*cough* See also this comment [slashdot.org].
Re:GOOD! (Score:1)
This is not the same as punishing someone who sells you a gun because you use it to protect yourself. These kinds of malicious programs serve no legitimate, useful purpose of any kind. While I don't think coding should be a crime, the programs DO cause real damage which costs real money to fix. Something needs to be done about it.
One example, not too long ago, someone posted instructions which would allow Hotmail users to read emails belonging to other Hotmail users. What purpose was served by posting this stuff in a public forum? We had already known hotmail security was breached. Did the poster think that someone might just use it to illegally break into another person's hotmail account?
Re:GOOD! (Score:2)
Re:GOOD! (Score:2)
The purpose was to force Hotmail to fix the vulnerablity. It worked. The reason it worked was because the Joe Blow User found out about the vulnerablity due to the coverage, and took appropriate action. Different people take different actions, but the end result gave Hotmail a clear message: fix it, or you won't have enough business to sustain your operation. Often these security holes are considered too obscure and therefore not a threat. All you have to do it get the message out to a couple blackhats and average users, and walla, it becomes a serious threat even to those who would rather not deal with it.
We had already known hotmail security was breached. Did the poster think that someone might just use it to illegally break into another person's hotmail account?
Yes, the poster knew all too well that the blackhats would find and exploit the vulnerablity if it were made public, and they would run amuck if it were not fixed, as such he/she made it so public that Hotmail is left with no choice but to fix it. The same principle is the reason we invest in the stock market: We give up a little bit of something now, to get more back later. That something is money or security depending on your favorite paradigm.
I remember when... (Score:1)
Right decision (Score:2)
Re:Right decision (Score:2)
And that's a lot more lacsidasical than we are talking here- it's closer to a manufacturing a car that's easy to hotwire.
In my view you're an ass. There are very real costs with setting a system up right. How long does it take you to reinstall your operating system? My personal system takes a couple of evenings for the basics and won't be right for weeks.
>If companies really are losing much as they claim, why don't they just hire someone to install
>security patches when they become available, it's not exactly rocket science.
They do. These networks can be vast though, and getting to all of the machines in time can be difficult. Also, many patches or fixes involve switching off services or features. Companies cannot blindly install patches, they need to test them first. It ain't easy.
Re:Right decision (Score:1)
Re:Right decision (Score:2)
>of the world for them since other people do most of the clearing up.
Oh right, so the architects of the WTC were to blaim for the building falling down? [In that case I think they should be admired that the building stood for an hour after such a brutal attack; and the failure mode was the best you could really have- almost straight down.]
Some or even many attacks cannot be realistically avoided; but can only be dealt as best anyone can when they occur. We don't know the holes until somebody finds them, and the bad guys sometimes find them first.
>They have an incentive take less than the optimum level of fire
>precautions and to make sure arsonists get all the blame for fires.
Not so much; if they are being significantly reckless they will carry some small part of the blame in all likelyhood, same as if you leave the door open; and that can be career affecting. But still, 90+% of the blame rests on the attacker.
In the company I work for Red Code attacked a handful of servers out of hundreds or even thousands- the rest had been patched; in that case perhaps there was some recklessness involved, they should have patched them. But 95% of the blaim lies at the doors of the authors.
Re:Right decision (Score:1)
No. Noone in their right mind would have expected those attacks. However, when you connect a machine to the internet, you can be almost certain it will be port scanned for weaknesses.
In the company I work for Red Code attacked a handful of servers out of hundreds or even thousands- the rest had been patched
Security can never be 100%. I'm suggesting that if reasonable precautions haven't been taken, then blame should be shared.
Re:Right decision (Score:2)
>then blame should be shared.
How many hours of community service should the system admins have been given then? Get a clue dude, you've lost it.
Re:Right decision (Score:1)
LOL.. Off the top of my head.. 24 hours per month.
(If you read carefully, I said if people aren't taking precautions, they shouldn't get damages - not that they should do community service.)
Re:Right decision (Score:2, Insightful)
Two words dude: Norton Ghost
Besides which as most any computer oriented person will tell you, backing everything up is most important.
Re:Right decision (Score:2)
Yeah, if you have the hardware to do that; and even then only if your data is necessary.
People that go around trashing, writing worms, trojans or viruses, or cracking are dirt. It's like stealing peoples lives- often hundreds of dollars worth of time per system. Even with backups.
Re:Right decision (Score:2)
Re:Right decision (Score:2)
IANAL; sounds like you would need one...
D'oh (Score:4, Offtopic)
That seems like a reasonable sentence (Score:3, Insightful)
The reason lame modern viruses get written is that it's really easy; you put in very little time, and then get to hear reports about how it spreads: very little effort, a little entertainment. If he'd known that it would take 250 hours of work, he probably wouldn't have bothered.
The same goes for hacking websites: people do it because it doesn't take any real effort. If it took 250 hours of boring work that you can't automate, people wouldn't bother.
crime and punishment (Score:1)
; on the other hand, a criminal act that costs countless money and time. I hope this kid has to do sysadmin work, install patches, and fight off other viruses as part of his community service.
Why did they to that... (Score:2)
Kevin Mitnick (Score:2, Interesting)
"A man was sentenced to 18 months in jail in the U.K. in the early 1990s. The man served 11 months, said Hypponen.' but that can't be true. What about Robert Morris?"
Not to take away from RTM, but what about Kevin Mitnick [kevinmitnick.org]?
Re: Kevin Mitnick (Score:2, Informative)
Re: Kevin Mitnick (Score:1)
Wrist slapped? (Score:2, Insightful)
Say you work a 40-hour week (days)...that pretty much only gives you weekends to devote to service. If you work 8 hours on saturday, it will take 30 weeks to complete the sentence.
Anybody want to give up 30 saturdays? I didn't think so.
The punishment is certainly less than what one might have expected, but I think this is a good trend, not a bad one. I'd much rather see these marginally troublesome white-collar criminals get easier sentences than ANY drunk driver or other violent criminal acts. So the virus is bad. Sure. Was there any loss of life? Was anyone maimed or psychologically traumatized (heh) over the incident? Hell - he didn't even try to steal information or money.
Punishments should fit the crime. What he did was not excusable, but a little perspective check is in order - especially after tuesday's events.
sedawkgrep
Re:Wrist slapped? (Score:1)
Say you work a 40-hour week (days)...that pretty much only gives you weekends to devote to service. If you work 8 hours on saturday, it will take 30 weeks to complete the sentence.
Anybody want to give up 30 saturdays? I didn't think so
Why should the criminal get to determine the conditions under which his sentence will be imposed? He should have to run the risk of losing his job to complete his sentence. Had the law not been broken, he would not be in such trouble.
Re:Wrist slapped? (Score:1)
He should have to run the risk of losing his job to complete his sentence
There you go, trying to call down hellfire and brimstone. One of the intents of a sentence is rehabilitation - the convict should be more capable of normal functioning at the end of this, not less. What do you think will happen if he loses his job?
Re:Wrist slapped? (Score:1)
Say you work a 40-hour week and at 4:45 pm on a Friday a new virus gets emailed to someone in your company and starts renaming random files on your file server? That pretty much only gives you the weekend to devote to restoring from backup, instituting new procedures, etc.
So the virus is bad. Sure. Was there any loss of life? Was anyone maimed or psychologically traumatized (heh) over the incident?
There was no loss of life, but a system administrator had to spend the next day and a half, while his wife and 2 year old kid were at home, restoring from backup, updating virus definitions, and cleaning infected machines. If he gets paid hourly, the company lost money. If he's salary, he lost money -- and a weekend day, maybe the entire weekend, with his wife and kid at Disney World. I think 240 hours is more than fair.
Re:Wrist slapped? (Score:1)
Sorry, but that was the admins responsibility is the first place: a good admin will prevent virus infections at all cost. Hey, I'm just admin of our family network and I update virus definitions each month twice.... In a company he should even filter out all executables at mailserver level. Sorry, I don't condone writing viruses but companies should be protecting themselves.
Normal people, I mean, granny using her computer, are of course not protected that way....Companies and admins administering the networks have no excuse. They are in fault when a virus gets through.
Re:Wrist slapped? (Score:2, Funny)
Only if you're a famous soccer player or opera singer
Virus Kits aren't that new (Score:1)
Re:Virus Kits aren't that new (Score:2)
Besides, I never heard of any kits that helped you to write boot sector viruses, which were the only ones that ever seemed to spread anywhere, at least before Word Macro viruses and Outlook worms came along.
Re:Virus Kits aren't that new (Score:1)
The Death Sentence (Score:2)
We should send a message to all clueless amateurs out there that go around "clicking" in virus making kits and creating Outlook viruses that force law abiding companies to close down their e-mail systems and loose thousands of dolars in revenues (imagine all those suffering employees that cannot send the latest joke to all their collegues).
If we don't act swiftly and decisively now, we risk having these "amateurs" playing around with Code Red Creation Kits.
I say hang the guy in Dam square in Amsterdam - that will show them!!!
Wow. A Virus SDK. (Score:1)
Bang (Score:1)
The really interesting part is that he did not make the gun, just pointed it and pulled the trigger.
The 1990s UK Case - not about viruses (Score:1)
The conviction in 1990 wasn't for creating a virus. I know, because I was network manager at one of the sites involved and was responsible for logging network activity which formed part of the evidence. In that case, the individual had found a vulnerability in the ICL 3980 mainframe series - in essence, root password changes were logged to a journal which was publicly readable. He had already taken over several machines in the UK before we were alerted, but as it happened he hadn't managed to root us because we were "slack" in our password changing and the root password hadn't actually been changed for many months. Other more diligant sites who changed the password weekly or monthly weren't so fortunate.
For a couple of weeks I created logs of his connections to our machine; they were traced back to a dial-up connection at one of the colleges in London. Once the evidence was in place, the authorities gave him (I quote the detective who interviewed me) "the wobbly door treatment" one evening, much to the amazement of his mother who was cooking dinner while her son was "playing" with his computer in his bedroom
At the time, the Computer Misuse Act was only just going through parliament and therefore he had to be charged under existing laws. The prosecution case was that modifying the magnetic fields on hard drives amounted to criminal damage, and it was for this that he was tried and convicted. He was sentenced to 12 months, with a further 6 months suspended. He came out after 11 months to an operator job with a company using ICL mainframes.
Re:The 1990s UK Case - not about viruses (Score:2)
Uh, actually, no, it was for creating a virus, and had nothing to do with mainframes as you suggest.
I had corresponded with the author (he was part of the SAM Coupé programming community). I know who he is. I have tons of his source code. And he was convicted for (on the surface of it) creating the first assembly-language polymorphic virus, and putting it into a virus kit.
The virus was called Smeg.
Here's a link that you might find informative:
News story [niu.edu]
Simon
I stand corrected (Score:1)
Looks like the link you provided is indeed the case referred to in the article. The case I was involved in happened five years earlier in 1990 and I as far as I know, then and now, was the first time there was a conviction in court for a "computer misdemeanour". Just a coincidence that both perps ended up doing 11 months, I guess.
Visual Virus 1.0 (Score:1)
What's the matter with people? (Score:1)
What the hell is the matter with people who think they're entitled to take away people's freedom for causing a little economic damage? People are more important than money!
A lot of these hackers might learn their lesson through public humiliation and education. Jail does nothing to fix people, so why the hell resort to it except in hopeless cases?
my mistake (Score:1)
I think they should return the kid his computer. They should delete the viruses and let him keep his computer and data. Just because he released a virus shouln't be reason to seize his entire digital "assets".
Robert Morris (Score:1)
Virus kits... (Score:2)
...c'mon, where's the craftsmanship? Where's the pride in your work? When I wrote viruses, it was all about doing it yourself, accomplishing something. Now you don't even have to be a programmer, you just have to know how to point-and-click. I tell ya, when pride in craftsmanship goes down the toilet, there's nothing left.
CmdrTaco's Weird Idea of Sentences (Score:2)
This is pretty dumb. Jail is boring, obnoxious, demeaning and occasionally dangerous, particularly for these type of people. A sentence of several months is not a slap on the wrist. Community service sounds about right.
Time to think (Score:1)
If you look at most "new" viruses that are added to the databases of Antivirus products, you can see that they aren't actually new. Most of them are modified versions of some existing virus. So, if we get another case where someone modifies an existing virus to avoid detection by AV products, is he the creator of it? I say that he is the creator just as much as Jan de Wit is the creator of this worm.
I hope that he this guy gets a penalty. I hope that this will prevent some other people from creating viruses. Something else that is good about this case is that the creator of the kit, [K]alamar, stopped creating more kits (his name was in on Argentinan TV and this scared him).
Viruses are bad. Even though they fund an entire industri, I think everyone would be happier without them, even people in the industri. Bringing people that create or spread them to justice is a good start in the path toward a virusfree world.
Justice? I don't think so! (Score:1)
For writing software that MIGHT be used to violate copyright law and therefore violates the DMCA, Dimitry Sklyarov gets the book thrown at him. Where the hell is the justice in that? Nothing that Mr. Sklyarov did was malicious, and yet his "crime" is treated far worse than those whose actions were deliberately intended to do damage. There is something seriously wrong with this picture.
Re:Justice? I don't think so! (Score:1)
the UK man that was jailed (Score:1)
he is the black baron, or chris pyle. responsible for SMEG.
Reality check on sentencing (Score:1)
How often people say that a sentence is "amazingly light". I think that should be a crime punishable by whatever sentence the speaker/writer says is "amazingly light".
Just to remind people: at the trial, no evidence that this guy's activity had harmed anyone in any way was presented. Yes, viruses are bad; yes, he should be punished; but for a first offence, wouldn't probation and a fine be more appropriate? If he doesn't learn his lesson and offends again, OK, then throw the book at him.
Re:You aren't the real Allah troll! (Score:1)