Virus People should be fed to wild weasels

carnival pigs? Would they wear little hats?

I don't mind viruses as you don't get them if you're MR. CAREFUL. Once upon a time though I went on a site and it opened dos and added loads of links to my favourites and changed my home-page. So I turned into the Incredible Hulk and yanked the plug out at the back.
 
Sasser Worm Suspect Confesses to German Police

38 minutes ago Add Technology - Reuters to My Yahoo!


By James Mackenzie

HANOVER, Germany (Reuters) - German police have arrested an 18-year-old man who confessed to creating the "Sasser" computer worm, believed to be one of the costliest Internet attacks.


Reuters Photo



In what police called the largest case of its kind, the computer science student was arrested on Friday after software giant Microsoft gave German authorities a tip-off, police said.


"We are absolutely certain that this really is the creator of the Internet worm because Microsoft experts were involved in the inquiry and confirmed our suspicions and because the suspect admitted to it," said Frank Federau from Lower Saxony police.


Microsoft, the U.S. Federal Bureau of Investigation (FBI (news - web sites)) and German police had worked together to find the suspect.


Police described the suspect as a highly intelligent "computer freak" living with his parents.


They said the man, who they declined to name, studied computer science at a vocational school and he got his "passion for programing" from his family's computer services business.


It was the lure of cash that proved the man's undoing. A group of individuals from his home state of Lower Saxony approached Microsoft on Wednesday inquiring about reward money should they turn in the man, Microsoft said.


The firm has put bounties of up to $250,000 on the heads of other notorious virus writers. Microsoft general counsel Brad Smith told reporters the company agreed to pay the informants if there is a conviction.


Ruediger Butte, head of the State Crime Office in Lower Saxony, said Microsoft contacted German police on Friday. Police arrested the man the same day near the central German town of Rotenburg and he confessed during the afternoon.


He was later set free because there was no evidence to suggest he was a repeat offender, police said.


Police believed he created all variants of the Sasser worm, a destructive program that has claimed big scalps, such as Germany's Deutsche Post and Britain's coastguard stations.


Heiner Wilhelm from Lower Saxony police said the suspect was not aware of the extent of the damage he had caused. "He had become worried about the impact but he hadn't reckoned on our turning up," he told a news conference in Hanover.


When police went to the man's house they found a home-built computer which contained the source code used to run Sasser.


State prosecutors said the man could be tried in a youth court because he turned 18 only on April 29 and was possibly a minor when he committed the crime of "computer sabotage."


The crime carries a maximum sentence of five years' imprisonment if tried in adult court, but state prosecutor Helmut Trentmann said he could not specify the maximum penalty the suspect could get. Police said it appeared the man acted alone but communicated with other programers. He told officers he wanted to create an anti-virus to other viruses like Mydoom and Bagle.


The man said he created the worm Netsky to fight the viruses but encouraged by all his friends he developed it further and Sasser was created as a modification of Netsky, police said.


Since appearing a week ago, Sasser has wreaked havoc on personal computers running on the ubiquitous Microsoft Windows 2000 (news - web sites), NT and XP operating systems, but is expected to slow down as computer users download anti-virus patches.





From the outset, Sasser baffled security experts. Unlike the most recent digital outbreaks, Sasser was programed simply to spread and knock out computer networks, not take over machines and possibly steal information stored on them.

Home users, corporations, and government agencies throughout Europe, North America and Asia have been hit. Once infected, the vulnerable PC reboots without warning as the compact program hunts for more machines to infiltrate. (Additional reporting by Bernhard Warner in London)

http://story.news.yahoo.com/news?tmpl=story&cid=569&e=11&u=/nm/tech_internet_worm_arrest_dc
 
Meh. You just have to type "shutdown /a" in the run box when the countdown starts, and download the microsoft update to fix it...
 
Wooz69 said:
A strange version of it screwed my comp up, I'm still trying to find ways to remove it. In a while I'll run my PC on DOS and try to remove it.

I found out that typing "shutdown /a" on the "run" box stops the MS BLAST-like reboot while the countdown starts. Saved me a lot of trouble.

The whole situation had one a good impact on me, however. I managed to get a grip of some basic commands and WinXP processes knowledge, since I spent the last 3 days tinkering with it.


yeah, easy.
 
Thanks for the news, eom. It's amazing how fast they tagged this guy. The lure of the reward was his undoing. 5 years of prison and they let him go because he's not a repeat offender- would you run for it?

If the story is true, if he was trying to make an anti-virus and created a worm instead, it's a warning how easily something malignant can spread on the net.
 
Canada appeared to have remained unaffected.


It's the Canadians, I knew it!
I am on the front lines, being so close to Canada, armed with only an airsoft gun I shall storm them in a preemtive strike and take as many down as I can.

*an hour passes*

... they took my airsoft gun and told me to go home at the border, then they laughed at me :(
 
Those virus making bastards should be flogged in public square witha Cat-O-Nine tail whip, then subjected to sodomy by rabid goats... Then through them in a pit of hungry weasels/dogs/pigs or gators... (Which ever you prefere.)
 
On a similar story- SPyware-

I hate these bastards.

Spyware

A hidden menace

Economist-
As spam is to e-mail, spyware is to the web. Can it be stopped?

Get article background

VIRUSES and spam get all the attention, but there is another, less visible, threat to internet users that may already be lurking on your computer without your knowledge. “Spyware”, as it is known, is software that sneaks on to your PC, tracks your online activities, and occasionally splashes pop-up advertisements across the screen. It is more than a nuisance: such software is, in effect, hijacking your PC, monitoring your internet use and unilaterally opening browser windows. Some spyware also harvests personal information, such as your e-mail address and location—or even your credit-card details.

The rapid growth of spyware over the past year, and the legal ambiguity surrounding it, has brought it to the attention of regulators and lawyers in America and Europe. This month, a court in Utah will hear a case challenging the first state law that would ban it. Unless the software is stamped out, it could do to the web what spam has done to e-mail: create an annoyance of such magnitude that the internet may become less useful.

The practice is widespread. Spyware that monitors a user's online activities and triggers advertisements in response is present on over 4% of computers, according to one study. The top three spyware firms claim their software is installed on around 100m PCs. Yet most users are unaware it is there. That is because the software is usually installed in a “bundle” with other programs, such as the peer-to-peer file-trading software with which many internet users swap music. Another kind of spyware automatically installs itself when a user merely visits a particular site, a trick known as “drive-by downloading”. Having sneaked on to a PC, spyware applications can severely degrade its performance. Mostly, it is very difficult to remove; some programs are even designed to make removal as hard as possible.

The most nefarious forms of spyware steal information such as credit-card numbers or passwords by monitoring every keystroke a user types. This kind of software is already illegal, and is relatively rare. Much more common, however, is advert-triggering software, produced and distributed by software companies operating in a legal grey area, who prefer to call their products “adware”. There is real money to be made in hijacking screen real-estate and selling it to advertisers: the largest adware firm, Claria, had revenues of $90.5m in 2003 and recently announced plans for an initial public offering.

Though less devious than outright surveillance, this form of spyware can nevertheless harm consumers and online businesses, by diverting users away from the sites they have chosen to visit and by displaying a competitor's site or advertisement instead. Until recently, for example, German internet users visiting the national site for Hertz, a car-rental firm, were, if Claria software was installed, shown advertisements for rival car-rental firms instead. Hertz sued, and in March a German court ordered Claria to stop the practice.

In America, several firms have sued competitors and spyware firms over trademark and copyright infringement, as well as unfair competition. Many of these cases have been settled out of court, which lowers costs and speedily resolves the matter. But this means that no legal precedent is established. Where courts have ruled, their decisions have been inconsistent: hence the growing interest from policymakers in drawing up legislation.

Earlier this year the state of Utah passed a law banning spyware unless it tells users that it is being installed, asks for their consent, and can be removed. Context-triggered pop-up advertisements were made illegal without the permission of the targeted website. One spyware firm, WhenU, immediately sued to block the law, partly on the grounds that it violated free speech; this will be the subject of a hearing next week. Other states that are considering legislation, including California, New York, Iowa and Virginia, are watching closely. So are federal lawmakers: Congress has drafted two bills restricting spyware and the Senate is debating a third.

These bills are similar in calling for notice, consent and ease of removal. (A European Commission privacy directive in 2002 takes a similar line.) Yet they differ in strength, depending on whose interests they aim to uphold. States such as Utah lean towards consumers, and take a stringent position on what is permissible. The legislation proposed by federal policymakers and by California, by contrast, favours the technology industry with a softer stance. The industry, for its part, is divided. E-commerce sites, which are often the victims of spyware, typically call for new laws, while technology firms fear that legislation could outlaw some of their existing practices. For example, Google's search toolbar has a feature that can collect data if users allow it.

Moreover, some companies that oppose spyware also happen to profit from it. For example, Dell, a computer-maker, has complained that spyware is the main reason for customer calls to its technical support lines. This hurts its brand. In Britain, however, the company has become a customer of Claria, and its ads pop up when users visit the websites of rival firms such as IBM. And in May, Yahoo!, a web portal, released a browser add-on that can block pop-up ads, even though Overture, its ad-placement unit, is responsible for 31% of Claria's revenue.

The analogy with spam is informative. If legislators had acted sooner, it might have been possible to prevent spam from spiralling out of control. Does that suggest that legislation against spyware will also prove ineffective? Not necessarily, because the people behind spyware are a centralised and traceable group of companies, unlike spammers. Lawmakers have an opportunity to nip spyware in the bud, and help to ensure the integrity of the internet. They should take it.

CWB049.gif
[/img]
 
Computer Viruses

People who make Computer Viruses should be fed to wild weasels.

I suspect that this is mostly just a racquet for the anti-virus folks to have a life.

Computer viruses

Fighting fire with fire

Dec 8th 2005
From The Economist print edition
A new idea for immunising computers against viruses

COMPUTER viruses, the self-replicating programs that infect workstations and cripple networks, are a hazard to business. The “I love you” worm, which wreaked havoc on May 4th 2000, spread by sending a copy of itself in an e-mail to everyone in every address book it encountered. It took just a few mugs in each company to open the attached “love letter” to generate thousands upon thousands of messages that overwhelmed systems round the world. The cost to business was estimated to be $10 billion.

How long should the person who created this spend in prison.
(and why isn't feeding him to the wild weasels a better solution?)

The “I love you” worm was exceptional, but run-of-the-mill viruses are a constant nuisance. However, a paper published in this month's Nature Physics, by Eran Shir of Tel-Aviv University in Israel and his colleagues, has suggested a new way of dealing with them.

A virus spreads by infecting its host, reproducing itself and moving on. Firewalls and other sorts of anti-virus software—computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious bits of code such as spyware—are one line of defence. These programs search files for known viruses and monitor what is running for suspicious behaviour. If a known virus is encountered, it can be stopped.

Yet such programs are inherently always one step behind the makers of viruses.

But new viruses are continually being created. As soon as a new virus is detected, a second line of defence would be to pass information about it between computers quickly, before they become infected. And that is what Mr Shir is proposing. Moreover, the researchers believe it takes a virus to stop a virus. They would like to propagate the vaccine as an epidemic.

As in the biological world, a big problem with vaccines is that they cannot be created until the virus they seek to stop spreading has emerged. Vaccines are thus always one step behind. What Mr Shir and his colleagues outline is a plan to accelerate the spread of a vaccine in a way that allows it to overtake the virus.

But current defenses are little better.

Their strategy uses a series of “honey pots”. These pieces of software attract viruses and are employed by anti-virus firms to pick new threats up quickly. The researchers' idea is to embed these honey pots within a network so that any virus spreading through the network would be likely to reach them promptly. The honey pots would then be linked to each other in a separate, overlying network that allowed only vaccines to pass across it.

This separate network would act as a by-pass, enabling the vaccine to overtake the virus and reach uninfected computers first. A honey pot would automatically identify a new virus, extract its signature and pass this information—the vaccine—to other honey pots using the overlying network. The honey pots would share this information with other computers on the network. All uninfected computers would then be able to recognise the new virus as dangerous, and refuse it entry.

The strategy would become more effective as the size of the network grew. For example, for a network of 50,000 computers, if 0.4% of them were honey pots, some 5% of computers would become infected by a virus before they were immunised. If there were 200,000 computers, the infection rate would fall to about 1%. For 200m computers (about the number now in America), less than a thousandth of a per cent would be infected. The savings to business could be great indeed.

But would this work?

Your thoughts?
 
The possibility of abuse of this system is at least as dangerous as are the viruses themselves, all it takes is a work around and this system could become only a method for disseminating viruses even faster...

Also, I don't want any software on my computer other than the one I installed personally, even if it's anti viral software...
 
What are 200 meters (m) of computers?

Or do they mean million (M)?

... ignorant dumbfucks.


Anyway. There are two ways to catch a virus:

1. Run an insecure software, e.g.: Windows

2. Put a dumb user in charge of the computer

Companies should penalize employees who fail to follow common safety measures.

And companies should let their sys admins to decide what software gets installed rather than some marketing shitheads -- provided they were smart enough to choose their sys admins by competence, not MS conformance.

Virusses exploit the weakest link, and for most systems the weakest link is the user.
 
Good fucking grief...more computers to compensate for stupid people? I, too, can see how this can be wildly abused, especially if the "honey pot" is compromised in some way. The "on-site antivirus" this article mentions is neat, with the cute little vaccination and other convoluted garbage, until you get to the point where a POP or SMTP server can just as easily look for executable attachments that are not whitelisted and simply drop them.

The other simple way to avoid virii on your system is to make it secure so that a casual worm can't get into it, as well as train people on how to use their own dumb terminals - which employees of lesser interligence should be working on anyways, if only Microsoft actually supported a secure OS or server system. Again, a thank you to Microsoft for fucking up the industry by allowing any idiot to further hose other Windows machines.
 
I'm gravedigging this deliciously named thread in order to ask you guys for free run-time AV protection recommendations. I'm using Linux BitDefender for removal of the pests, but I'd like an effective online scanner, too.

I've been using Avast! up until now, but it seems to no longer be able to effectively protect me (I've been getting the same alerts over and over again for it not being able to remove the infection once and for all), and I need to set up basic protection for a few Windows machines of mine.

Also, potentially this belongs in GGH
 
Kharn said:
Ehehehe, virus trouble, welsh?

Really, it never bothered me, I have a pretty open computer, no firewall and shit and at times it's even kept running all through the night, online, while I'm asleep.

Meh, it's mah smarts, I am smarter den dem damn hakkurs.

try scanning you pc for key loggers and other spyware :P Bet you'll get a long list of them. I scanned mine and found +200 of those sneaky stuff
 
I have narrowed down my options for a free Antivirus tool to the German Avira and the Chech AVG. WHich one woudl you recommend? Needs to be secure and light on the system burden... (lol)

Or should I stick with Avast? Or any other recommendations?
 
Back
Top