Contents in This Issue
Total Page:16
File Type:pdf, Size:1020Kb
FEBRUARY 2006 The International Publication on Computer Virus Prevention, Recognition and Removal CONTENTS IN THIS ISSUE 2 COMMENT WMF IN THE SPOTLIGHT What threats may come The Windows Meta File (WMF) format has received a lot of attention over recent weeks. Peter 3 NEWS Ferrie finds out a bit more about it, and then Neighbourhood Watch to fight ‘badware’ explains why it has been in the spotlight. VB2006 call for papers page 5 Addendum: The false positive disaster AV UNDER THE MICROSCOPE 3 VIRUS PREVALENCE TABLE Dan Kaminsky takes a long, hard look at the reaction of the AV industry (or lack thereof) to the Sony rootkit incident and assesses the 4 VIRUS ANALYSIS consequences. Not worthy page 8 5 TECHNICAL FEATURE WINDOWS NT ON TEST Inside the Windows Meta File format Matt Ham fully expected a bumper harvest of VB 100% awards this 8 OPINION month, simply due to the familiarity Learning from Sony: an external perspective of the Windows NT platform to developers. Find out whether his 11 FEATURE expectations were met in his NT comparative review. page 12 Signature updates vs BCP 12 COMPARATIVE REVIEW Windows NT 4 Workstation 20 END NOTES & NEWS This month: anti-spam news & events; John Graham-Cumming investigates whether Bayesian poisoning really exists. ISSN 1749-7027 COMMENT ‘A serious threat in in the US. A Trojan operator needs access to a compromised system for just hours or even minutes to 2006 will be steal vital information. Since most attacks are unique, it multi-stage, is rare to see more than a handful of copies of each individual Trojan and traditional signature-based targeted phishing solutions are usually unable to block these threats. We attacks.’ are likely to witness more incidents of this nature in 2006. Or rather, we’ll be lucky if we can spot them before they get to us, carry out their payload and disappear. Tomer Honen A serious threat in 2006 will be multi-stage, targeted Aladdin Knowledge Systems phishing attacks. According to the Anti-Phishing Working Group (http://antiphishing.org/), thousands of WHAT THREATS MAY COME phishing attacks are reported every month, but the attack It is said that money makes the world go round – well it methods are changing. Instead of luring victims to certainly drives the malware community. Over the last spoofed websites where they are fooled into entering year, we’ve seen a sharp increase in the number of confidential information such as their passwords, backdoor attacks employed by various in-the-wild financial details etc., the latest trend is to use threats. Taking over computers is apparently quite a password-stealing malicious code in the phishing profitable endeavour, and there are many buyers for the websites themselves. Even if the user does not enter the scores of backdoor-infected PCs out there. It is safe to confidential information, they may be infected by say that 2006 will be just as malware-filled as 2005 was, malicious code that will extract it forcefully. and probably even worse. The number of malicious code phishing sites more than Mobile phone threats will make a few headlines this year quadrupled in 2005, to over 1,000 reported sites. as the number of smartphone users grows. We are likely Money-driven attackers will exploit this obvious Achilles’ to see new mobile phone threats, which may be able to heel by employing multi-stage targeted phishing attacks: spread to other platforms and infect them. Since the • Certain users will receive an email intended communication channels employed by mobile phones specifically for them. This will display content that are often insecure, it will be easy to use these devices to is of interest to the recipient, trying to get them to implant remotely controlled Trojans in a corporate click on a link to a site. environment. In this way, hackers won’t even need to • The website will contain malicious code that drops make the initial contact with the infected PC; all they and executes a backdoor Trojan on the victim’s need to do is infect a mobile device and let the PCs come system with little or no user interaction. And voilà! to them. Somewhere in the world a hacker obtains a new More disturbing than common spyware or worms are remote controlled system. This turns phishing invisible targeted spyware and Trojans. Last year we attacks into a serious corporate threat. witnessed several Trojan-related incidents that made Many content security solutions scan malicious content headlines around the world – from corporate attacks in received by mail but neglect to analyse content Israel and the UK, to major credit card information theft downloaded from the web. By neglecting to inspect web traffic, users become exposed. Also, many users do not realize that email messages can execute content downloaded from the web as the message is viewed. Editor: Helen Martin According to Gartner, ‘Through 2010, each new Technical Consultant: Matt Ham technology transition point will result in 30 per cent Technical Editor: Morton Swimmer more newly opened attack paths than old paths that are Consulting Editors: closed.’ In layman’s terms this means that the more Nick FitzGerald, Independent consultant, NZ advanced we become, the bigger the threat. It is a grim Ian Whalley, IBM Research, USA prediction, and there’s little that can be done to make the Richard Ford, Florida Institute of Technology, USA Edward Wilding, Data Genetics, UK world behind our firewall, anti-virus, anti-spyware and anti-spam products more hospitable. However, with the right protection, some of us should hopefully have a relatively quiet year. 2 FEBRUARY 2006 VIRUS BULLETIN www.virusbtn.com NEWS NEIGHBOURHOOD WATCH TO FIGHT ‘BADWARE’ Prevalence Table – December 2005 Google, Lenovo and Sun Microsystems have pledged their support for a new initiative aimed at fighting spyware, Virus Type Incidents Reports malware and deceptive adware. The Neighbourhood Watch-style campaign Stopbadware.org is being led by Win32/Sober File 11,597,547 98.16% Harvard Law School’s Berkman Center for Internet & Win32/Mytob File 96,390 0.82% Society in the US, and Oxford University’s Oxford Internet Win32/Netsky File 84,022 0.71% Institute in the UK. Win32/Mydoom File 11,540 0.10% The effort aims to provide clear and objective information Win32/Bagle File 7,854 0.07% about downloadable applications so that consumers can Win32/Sdbot File 4,889 0.04% make informed choices about what they download onto their systems. Stopbadware.org will gather stories and data Win32/Lovgate File 3,648 0.03% from users, and use that data to inform its research efforts. Win32/Zafi File 2,426 0.02% The Stopbadware.org website invites less technical users to Win32/Funlove File 1,993 0.02% submit stories about their experiences with ‘badware’, as Win95/Spaces File 1,166 0.01% well as appealing to those who are more technically-aware to submit technical data reports. Those behind the campaign Win32/Bagz File 358 0.00% also plan to write standards and testing procedures to define Win32/Mimail File 333 0.00% ‘badware’, and spotlight the worst offenders with the help Win32/Bugbear File 311 0.00% of the anti-malware community. Full details of the project Win32/Pate File 270 0.00% can be found at http://www.stopbadware.org/. Win32/Klez File 222 0.00% Win32/Mabutu File 207 0.00% VB2006 CALL FOR PAPERS Win32/Gibe File 183 0.00% The deadline for submitting paper proposals for VB2006 is Win32/Dumaru File 181 0.00% fast approaching. Abstracts of approximately 200 words must be sent as plain text files to [email protected], to Win32/Valla File 163 0.00% arrive no later than Thursday 9 March 2006. Win32/Maslan File 152 0.00% Submissions are invited on all subjects relevant to Win32/Reatle File 120 0.00% anti-malware and anti-spam. A list of topics suggested by Win95/Tenrobot File 100 0.00% the attendees of VB2005 can be found (along with further Win32/Elkern File 79 0.00% details of the paper submission and selection process) at http://www.virusbtn.com/conference/vb2006/2006call.xml. Win32/Kriz File 76 0.00% VB2006, the Sixteenth Virus Bulletin International Win32/Brepibot File 72 0.00% Conference, will take place 11–13 October 2006 at the Win32/MyWife File 72 0.00% Fairmont The Queen Elizabeth, Montréal, Canada. Win32/Bobax File 55 0.00% Win32/Mota File 55 0.00% ADDENDUM: THE FALSE POSITIVE Redlof Script 52 0.00% DISASTER Win32/Swen File 51 0.00% Some concerns have arisen over the version of ClamAV Win32/Fizzer File 42 0.00% tested for the article ‘The false positive disaster’, published Win32/Chir File 38 0.00% Virus Bulletin VB in in November 2005 (see , November Others[1] 406 0.00% 2005, p.11). Rather than the product being compiled on the test machine directly from the source code, as is the Total 11,815,073 100% developers’ recommendation, a precompiled developer version of the product was downloaded from a third party’s [1]The Prevalence Table includes a total of 406 reports across website (in good faith, since a link was provided on the 65 further viruses. Readers are reminded that a complete listing is posted at http://www.virusbtn.com/Prevalence/. ClamAV website). Therefore, the results obtained cannot be assumed to apply to the ‘official’ version of the product. FEBRUARY 2006 3 VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS NOT WORTHY If the registry value ‘Idoneus’ exists, the virus reads it and deletes the file to which the registry value points, then copies Peter Ferrie itself to another randomly chosen directory, and rewrites the Symantec Security Response, USA registry value with the newly chosen directory name.