Back to Home Back to Home God Bless America
Coming Soon! Coming Soon! Coming Soon! Coming Soon! Coming Soon!


AntiVirus Links

Active Content | Buffer Overflow | Shell Script | Trojan Horse | Web Bug | AntiVirus Links

Virus Treat List, the list provides a synopsis of the latest virus-related threats discovered by Symantec™ Security Response, including information on: Category Rating (risk), Name of Threat (threat), the day on which the threat was identified (discovered), and the day on which a virus definition was added to protect against the threat (protection). Please click on the Virus Threat List for additional information or check out the Virus Calendar.

Removal Tools, viruses have become increasingly complex and virus infections involve more system elements than ever before. Symantec™ Security Response has developed tools to automatically conduct what would often amount to extensive and tedious manual removal tasks. If your system has become infected, the tools listed here should aid you in repairing the damage.

Hoax Page, Symantec™ Security Response uncovers hoaxes on a regular basis. These hoaxes usually arrive in the form of an email. Please disregard the hoax emails - they contain bogus warnings usually intent only on frightening or misleading users. The best course of action is to merely delete these hoax emails. Please refer to this page whenever you receive what appears to be a bogus message regarding a new virus, or promotion that sounds too good to be true.

Joke Page, the jokes listed here will not perform any malicious action on your computer. Each of them is a joke program. Joke programs are programs which attempt to display something humorous or only pretend to perform a malicious action. Though often annoying, these jokes are not dangerous.

Attacks to Your Computer System

Active Content | Buffer Overflow | Shell Script | Trojan Horse | Web Bug | AntiVirus Links

Active Content attacks, which take advantage of various active HTML and scripting features and bugs.

These types of attacks are aimed at people who use a web browser or HTML-enabled email client to read their email, which is a very large portion of the global community. Typically these attacks attempt to use the scripting features of HTML or of the email client (typically Javascript or VBScript) to retrieve private information from the victim's computer or to execute code on the victim's computer without the victim's consent (and possibly without the victim's knowledge). Less dangerous forms of these attacks can automatically cause the recipient's computer to display some content the attacker wishes, such as automatically opening an advertising or pornography web page when the message is opened, or perform a Denial-of-Service attack on the recipient's computer through code that freezes or crashes the browser or the entire computer.

Note: The simplest way to completely avoid such attacks is to not use a web browser or HTML-enabled email client to read your email.

But in the real world in which we live today, you would be hard pressed not to use a web browser or email. It may also be possible to configure your email client to turn off the interpretation of script code. See your program documentation for details. Turning off scripting in your email client is strongly recommended (there is no good reason to support scripting in email messages). An HTML-enabled email client on a Macintosh is just as vulnerable to active-HTML email attacks as an HTML-enabled email client on Windows or Unix. The vulnerabilty will vary from system to system based on the email client rather than the operating system.

Microsoft Outlook users should visit this page that describes tightening down Outlook's security settings.

Active Content | Buffer Overflow | Shell Script | Trojan Horse | Web Bug | AntiVirus Links

Buffer Overflow attacks, where the attacker sends something that is too large to fit into a fixed-size memory buffer in the email client, in the hopes that the part that doesn't fit will overwrite critical information rather than being safely discarded.

Definition: A buffer is a region of memory where a program temporarily stores data that it is processing. If this region is of a predefined, fixed size, and if the program does not take steps to ensure that data fits within that size, there's a bug: if more data is read than will fit within the buffer, the excess will still be written, but it will extend past the end of the buffer, probably replacing other data or program instructions.

A buffer overflow attack is an attempt to utilize this weakness by sending an unexpectedly long string of data for the program to process. These attacks can be used as Denial-of-Service attacks, because when a program's memory gets randomly overwritten the program will generally crash. However, by carefully crafting the exact contents of what overflows the buffer, it is in some cases possible to supply program instructions for the victim's computer to execute without the victim's consent. The attacker is mailing a program to the victim, and it will be run by the victim's computer without asking the victim's permission.

Note: That this is the result of a bug in the program under attack. A properly written email client will not allow random strangers to run programs on your computer without your consent. Programs subject to buffer overflows are incorrectly written and must be patched to permanently correct the problem.

Patches for Outlook are available via the Microsoft security site.

Active Content | Buffer Overflow | Shell Script | Trojan Horse | Web Bug | AntiVirus Links

Shell Script attacks, where a fragment of a Unix shell script is included in the message headers in the hopes that an improperly-configured Unix mail client will execute the commands.
Another attack on the user's privacy, but not on system security, is the use of so-called Web Bugs that can notify a tracking site when and where a given email message is read.

Note: Many programs running under Unix and similar operating systems support the ability to embed short shell scripts (sequences of commands similar to batch files under DOS) in their configuration files. This is a common way to allow the flexible extension of their capabilities.

Some mail-processing programs improperly extend this support for embedded shell commands to the messages they are processing. Generally this capability is included by mistake, by calling a shell script taken from the configuration file to process the text of some headers. If the header is specially-formatted and contains shell commands, it is possible that those shell commands will get executed as well.

Active Content | Buffer Overflow | Shell Script | Trojan Horse | Web Bug | AntiVirus Links

Trojan Horse attacks, where an executable program or macro-language script that grants access, causes damage, self-propagates or does other unwelcome things is mailed to the victim as a file attachment labeled as something innocuous, such as a greeting card or screen saver, or hidden in something the victim is expecting, such as a spreadsheet or document.

These attacks are usually used to breach security by getting a trusted user to run a program that grants access to an untrusted user (for example, by installing remote-access back door software), or to cause damage such as attempting to erase all of the files on the victim's hard disk. Trojan Horses can act to steal information or resources or implement a distributed attack, such as by distributing a program that attempts to steal passwords or other security information, or may be a "self-propagating" program that mails itself around (a "worm") and also mailbombs a target or deletes files (a "worm with an attitude").

Note: The "I Love You" worm is an excellent example of a Trojan Horse attack: a seemingly-innocuous love letter was actually a self-propagating program.

For this attack to succeed the victim must take action to run the program that they've received. The attacker can use various "social engineering" methods to convince the victim to run the program; for example, the program may be disguised as a love letter or joke list, with the filename specially constructed to take advantage of Windows' propensity for hiding important information from the user.

Most people know that the .txt extension is used to indicate that the file's contents are just plain text, as opposed to a program, but Windows' default configuration is to hide filename extensions from the user, so in a directory listing a file named textfile.txt will appear as just "textfile" (to avoid confusing the user?).

Note: An attacker can take advantage of this combination of things by sending an attachment named "attack.txt.exe" - Windows will helpfully hide the .exe extension, making the attachment appear to be a benign text file named "attack.txt" instead of a program. However, if the user forgets that Windows is hiding the actual filename extension and double-clicks on the attachment, Windows will use the full filename to decide what to do, and since .exe indicates an executable program, Windows runs the attachment. Blam! You're owned.

Typical combinations of apparently-benign and dangerously-executable extensions are:

xxx.TXT.VBS: an executable script (Visual Basic script) masquerading as a text file
xxx.JPG.SCR
: an executable program (screen saver) masquerading as an image file
xxx.MPG.DLL
: an executable program (dynamic link library) masquerading as a movie

Note: This attack can be avoided simply by not running programs that have been received in email until they have been checked over, even if the program seems to be harmless and especially if it comes from someone you don't know well and trust.

*** Double-clicking on email attachments is a dangerous habit. ***

Bugs in the email client or poor program design may allow the attack message to automatically execute the Trojan Horse attachment without any user intervention, through either the use of active HTML, scripting or buffer overflow exploits included in the same message as the Trojan Horse attachment or a combination of these. This is an extremely dangerous scenario and is currently "in the wild" as a self-propagating email worm that requires no user intervention for infection to occur. You can be sure that this won't be the only one.

Another channel for Trojan Horse attacks is via a data file for a program that provides a macro (programming) language, for example, modern high-powered word processors, spreadsheets, and user database tools.

If you cannot simply discard attachments that may put you at risk, it is recommended that you install anti-virus software (which detects and disables macro-language Trojan Horses) and that you always open data file attachments in the program's "do not automatically execute macros" mode (for example, by holding down the [SHIFT] key when double-clicking the attachment).

Note: If your system administrator (or someone claiming to be your system administrator) emails you a program and asks you to run it, immediately become very suspicious and verify the origin of the email by contacting your administrator directly by some means other than email. If you receive an attachment claiming to be an operating system update or antivirus tool, do not run it. Operating system vendors never deliver updates via email, and antivirus tools are readily available at the antivirus vendor websites.

Active Content | Buffer Overflow | Shell Script | Trojan Horse | Web Bug | AntiVirus Links

Web Bug privacy attacks, an HTML email message can refer to content that is not actually within the message, just as a web page can refer to content that is not actually at the website hosting the page.

This can commonly be seen in banner ads on a website at http://www.geocities.com/ for example that may include a banner ad that is retrieved from a server at http://ads.example.com/ when the page is rendered, the web browser automatically contacts the web server at http://ads.example.com/ and retrieves the banner ad image. This retrieval of a file is recorded in the server logs at http://ads.example.com/, giving the time it was retrieved and the network address of the computer retrieving the image.

Applying this to HTML email involves putting an image reference in the body of the email message. When the mail program retrieves the image file as part of displaying the mail message to the user, the web server logs the time and the network address of the request. If the image has a unique filename, it is possible to determine precisely which email message generated the request. Typically the image is something that won't be visible to the message recipient, for example an image that consists of only one transparent pixel, hence the term Web Bug it is, after all, intended to be "covert surveillance".

Note: It is also possible to use a background sound tag to achieve the same result.

 
   
  Copyright © 2002-2003 eLatta, LLC  All rights reserved.
Telephone: 203.439.4300