Anti-worm?

2003-08-18 02:02 pm
mdlbear: blue fractal bear with text "since 2002" (Default)
[personal profile] mdlbear
The appearance today of an anti-worm that propagates using the same mechanism as the widely-reported Blaster worm (and which both removes Blaster, if present, and installs Microsoft's patches to prevent reinfection) raises some interesting questions:
  • Should the anti-worm be considered 'malware', like all other worms, or should it be considered simply as an interesting method of patch distribution?
  • Should the anti-worm's developer be hailed as a hero or reviled as yet another wild-eyed cracker?
  • Is it legal? Should it be?
  • Will this lead to copycat worm/anti-worm pairs whereby an enterprising individual or company launches (anonymously, of course) an innocuous but fast-spreading worm, followed a few days later by a widely-publicized antidote? Has this already happened?
  • Will a series of helpful anti-worms lead in turn to the obvious deception in which the purported anti-worm installs yet another and more insidious payload, which users fail to check for because they assume that the anti-worm is benign, like all the others?

Date: 2003-08-18 03:04 pm (UTC)
mithriltabby: Serene silver tabby (Default)
From: [personal profile] mithriltabby
It’s vigilante system administration! I expect the body of law that should be consulted in this matter be the same one as provides for “citizen’s arrest”.

Ah, but...

Date: 2003-08-18 03:41 pm (UTC)
From: [identity profile] aerowolf.livejournal.com
The law needs to provide for legal means to punish and be compensated by people who put unwanted and undesired traffic onto my network, and -enforce- it. If the law doesn't enforce it (and believe me, it's REALLY difficult to get the FBI to take interest in your case unless you're a multi-billion-dollar company)... then I'm going to do whatever it takes to a) not remove access that I need to my own network, and b) remove the threat to my network.

Do people not recognize that these malworms cost REAL MONEY -- money for bandwidth, money for systems administrators, and money for cleanup? Why should I have to spend my money to put up with an attack?

So, yes -- vigilante system administration. Personally, I think that Windows (and various other OS's) have the capability of producing self-healing executables... and I believe that Microsoft needs to be held accountable for every dime that their products have cause to be misspent. They're interested in patching holes... well, why not make the underlying operating system less like a sponge in any case?

Self-healing executables...

Date: 2003-08-19 08:41 am (UTC)
From: [identity profile] aerowolf.livejournal.com
I agree, don't get me wrong -- but self-healing executables would get away from the ability (unless subverted) for a program to modify executable files on-disk, thus requiring a continual updating to the payload when the original process stopped.

But what -I- want to know... why can't the RPC services just be -stopped-?

Most Popular Tags

Style Credit

Page generated 2026-01-11 11:05 pm
Powered by Dreamwidth Studios