Worms, viruses, and trojan horses

3RD IN A SERIES OF 5

Are your computers at risk to worms, viruses, and trojans? According to Symantec, the FBI Computer Crime and Security Survey covering 1999 shows that 85% of nearly 600 large companies surveyed dealt with a virus attack during the year.

Several general types of viruses exist, and several transport systems. The terminology has become blurred over the years. Fighting rogue code is easier if we all speak the same language, so let's start by getting the terms straight.

Viruses

A virus infects applications or documents by inserting or attaching a copy of itself or by entirely rewriting files without the knowledge of the computer user. When the user opens an infected file, the virus code runs - often without the user being aware of it. The virus depends on users to spread because it has no mechanism by which it can move from one computer to another. The virus must be passed on to other users through infected e-mail attachments, programs on diskettes, or shared files.

A virus may allow the infected program to run normally, but many have a "payload" of some sort - acts that include displaying a message on the screen, damaging or deleting files, and formatting the user's hard drive. Another popular payload involves spawning network processes that in turn start other processes. As a result, the overburdened network fails.

Some viruses are easy to locate and eradicate because they make exact copies of themselves. An antivirus scanner can identify the program's signature and warn the user.

An encrypted virus makes things a bit more complex. By scrambling the signature, encryption makes it impossible for antivirus software to spot it. Instead, the scanner must look for a decryption routine that the virus uses. These viruses are fairly easy to detect.

Polymorphic viruses raise the bar again by encrypting both the virus and the decryption routine. Every infection looks a bit different from every other infection. Companies that write antivirus software use generic decryption routines to find polymorphic viruses.

Macro viruses have become increasingly popular because they're easy to create and, because programs such as Microsoft Word are in such widespread use, macro viruses spread quickly.

Macro viruses are usually written in Visual Basic for Applications (VBA) or VBScript. They generally infect documents and templates. Unlike other viruses, these are "platform independent", meaning they can move from PC to Mac.

Trojan horse programs

Security experts are most concerned about trojan horse programs. These are malicious programs that are disguised as something the user would want - a screen saver, game, and sometimes even a program that claims to fight viruses. Instead of doing what it claims it will do (or in addition to doing what it claims it will do) the program actually performs other tasks. One of the most popular "other tasks" is installation of a spy program that sends the user's data to another computer or installation of software that allows a remote user to control the victim's computer.

Worms

When you hear the term "worm", it refers to a program that propagates itself, usually over a network via e-mail. A worm is not a virus, but it could carry a virus. The I love you incident was a worm, not a virus - but it also had a trojan horse component that attempted to steal passwords. Worms are dangerous to networks because they replicate quickly and, in the process of spreading, can bring network traffic to a halt. The I love you worm's virus component destroyed certain files on the victims' computers.

Back Orifice, SubSeven, & Qaz

These applications are examples of trojan horses, each designed to steal information or computing resources from your system.

In October 2000, Microsoft announced that an unknown hacker successfully compromised their corporate network using a trojan horse called Qaz. Qaz (pronounced "cause") appears to have originated in China. Qaz has been reported to e-mail stolen passwords to Russia.

Microsoft says the security breach lasted for only a few days, but it might have been weeks. Microsoft says snoopers didn't gain access to any current applications, but reports say that Windows or Office software might have been compromised.

Why is this a problem for us?

The first response to a break-in a Microsoft might be "So what?" Allow me to suggest two reasons why you should care about this break-in.

First, if this can happen to Microsoft, it can happen to anyone. Second, whether the crackers gained access to shipping products or products under development, the crackers now have a better understanding of how Microsoft's security procedures work.

Despite Microsoft's robust security procedures, Qaz infected the corporate LAN and was undetected for an unknown period. For the Qaz infection to have started required a Microsoft employee (or family member) to open a file with an infected attachment. It might have been a family member of an employee because some Microsoft employees work at home or take work home. For this reason, employees' home computers effectively become part of the corporate LAN.

They wanted code, not products

Whoever broke in was interested in intelligence, not products that could be sold. In other words, it wasn't a pirate who wanted to make illicit copies of Office 2000. Pirates just buy one copy of the software and duplicate it.

The crackers were interested in seeing the source code for Microsoft products. They wanted to examine how the company's operating systems and applications deal with security issues.

Bottom line: This break-in could turn out to be a huge security threat for Microsoft product users worldwide.

Protection against trojans

Remote administration is nothing new. Microsoft's SMS, Symantec's pcAnywhere, and the AT&T's VNC all make remote administration possible. A system administrator can work on a computer without having to go to that computer.

The trojan variants, though, install themseleves without the user's knowledge and have larceny or destruction as their goal.

Although a trojan horse program will try to remain invisible, it will make its presence known in three ways:

1. The trojan program must provide some way for the cracker to contact it. In other words, it needs to act as a server and it must open a port for the cracker to use. This will make the program visible to a firewall program such as ZoneAlarm.

2. The trojan program must be able to restart whenever the user boots the computer or logs in. This means that there will be a new icon in the Start Menu's StartUp directory (rare) or in the Registry, config.sys, autoexec.bat, or win.ini (more common because it's less likely to be noticed). This is why you should examine your computer as it's booting. Learn how long it normally takes and, if it suddenly starts taking longer or you see messages that you've never seen before, check it out.

3. The trojan installation program must write some new (or at least modified) files to the victim's system. An antivirus program that monitors new and modified files will often reveal the trojan's presence. Make sure that your antivirus definition files are up to date!

Don't let a trojan move in

Prevention is always better than cure. A trojan makes its way onto the victim's system by one of several routes. The most common are an e-mail attachment, a floppy disk, a file download, or through a rogue Web site that runs an ActiveX downloader when you connect to the site.

If the security context set in Internet Explorer doesn't allow ActiveX downloads or the user's settings disallow adding values to the Registry, the trojan installation will fail.

Don't let it phone home

Should a trojan successfully install itself, you need to discover it, keep it from communicating with the outside world, and remove it. One of the more common traits of trojan horse applications is the attempt to tell the sender that it has been successfully installed on the victim's system.

To do this, the program must connect to the Internet. A software firewall program such as ZoneAlarm can act as a safety net in this situation.

Unlike hardware firewalls, ZoneAlarm watches both inbound and outbound traffic and it monitors traffic on a program-by-program basis. When you first use a new or updated program, ZoneAlarm will ask if you want to allow that program to gain access to the Internet and, if the program is trying to act as a server, whether you want to allow that.

After being installed, ZoneAlarm will ask about your Web browser and your e-mail program the first time you use them. In most cases, you'll tell ZoneAlarm to allow these programs to use the services of the Internet and, if you're on a LAN, the intranet. You'll tell ZoneAlarm to remember your decision so that you won't have to answer the same questions tomorrow.

When you update your e-mail program, ZoneAlarm will notice the change and - before it will allow the new file to gain access to the Internet - it will ask again for your permission. If you haven't knowingly updated a program that used to have unlimited access to the Internet, this would be a clear sign of a problem.

An even clearer sign occurs when Qaz or BackOrifice finds its way onto your system. Suddenly a new application will attempt to gain access to the Internet. If you don't recognize the program name, disallow all access!

ZoneAlarm is available (free for personal use, $20 per year for corporate use) from http://www.zonelabs.com/.

Evicting the trojan

MooSoft has the answer to trojan horses with its program called The Cleaner, which detects and removes more than 500 trojan horses and their variants. The program may be downloaded and used without charge for 30 days. Those who continue using it after the trial period are expected to pay a $30 registration fee.

For information on The Cleaner, see Moosoft's Web site at http://www.MooSoft.com/.

   
 
 

William Blinn Communications - All Rights Reserved
Subscribe to the Newsletter
179 Caren Avenue • Worthington, Ohio 43085
Phone: 614-785-9359
(Telemarketers please note: This number is listed on the national Do Not Call registry.)