Anti-worm?
2003-08-18 02:02 pmThe appearance today of an anti-worm that propagates using the same mechanism as the widely-reported Blaster worm (and which both removes Blaster, if present, and installs Microsoft's patches to prevent reinfection) raises some interesting questions:
- Should the anti-worm be considered 'malware', like all other worms, or should it be considered simply as an interesting method of patch distribution?
- Should the anti-worm's developer be hailed as a hero or reviled as yet another wild-eyed cracker?
- Is it legal? Should it be?
- Will this lead to copycat worm/anti-worm pairs whereby an enterprising individual or company launches (anonymously, of course) an innocuous but fast-spreading worm, followed a few days later by a widely-publicized antidote? Has this already happened?
- Will a series of helpful anti-worms lead in turn to the obvious deception in which the purported anti-worm installs yet another and more insidious payload, which users fail to check for because they assume that the anti-worm is benign, like all the others?
no subject
Date: 2003-08-18 03:04 pm (UTC)Ah, but...
Date: 2003-08-18 03:41 pm (UTC)Do people not recognize that these malworms cost REAL MONEY -- money for bandwidth, money for systems administrators, and money for cleanup? Why should I have to spend my money to put up with an attack?
So, yes -- vigilante system administration. Personally, I think that Windows (and various other OS's) have the capability of producing self-healing executables... and I believe that Microsoft needs to be held accountable for every dime that their products have cause to be misspent. They're interested in patching holes... well, why not make the underlying operating system less like a sponge in any case?
Re: Ah, but...
Date: 2003-08-18 07:45 pm (UTC)The problem is not one that could be solved by "self-healing executables". Perhaps you're referring to buffer overflow attacks; these are prevented by using subroutine libraries and programming languages that don't allow buffers to overflow.
One major problem with Microsoft, though, is that Windows is designed to make it easy for third parties to install software on your computer. Any system that automatically installs patches, for example, can probably be subverted to install malware instead (not to mention the fact that Microsoft's "patches" are very large-grained and often contain as many new bugs as they fix -- that's why people are reluctant to install them in the first place).
Self-healing executables...
Date: 2003-08-19 08:41 am (UTC)But what -I- want to know... why can't the RPC services just be -stopped-?