606 lines
34 KiB
Plaintext
606 lines
34 KiB
Plaintext
|
|
|
|
|
|
[Future Viruses and Operating System Development]
|
|
[Conceived and expressed by nucleii (c) 2001]
|
|
|
|
|
|
|
|
[Abstract]
|
|
|
|
"The best prophet of the future is the past."
|
|
|
|
--unknown
|
|
|
|
|
|
|
|
Since the beginning of documented times man has been trying to
|
|
simplify things. This process requires abstract thinking. Coming up with
|
|
new ideas outside of the norms.
|
|
|
|
Creativity.
|
|
|
|
This process has caused humanity to advance far beyond its roots of basic
|
|
needs and survival. Although living in a world based on technology, new
|
|
problems have arose. The rate seems faster than our ability to solve and
|
|
correct the obstacles. Has the modern society created a problem with no
|
|
solution? A world of striving towards perfecting a system that should
|
|
instead be torn down...
|
|
|
|
|
|
[Introduction]
|
|
|
|
|
|
The new millennium. 2001. Space odyssey my ass. None the less its
|
|
been an interesting year for the modern world...
|
|
|
|
Encryption, networking, theft, espionage, destruction, demonstration
|
|
protest. These are just a few of the topics i will explore here. I will
|
|
attempt to touch on what has been happening over the past few years, and
|
|
cover where i feel the trend will take us. The topics of the anti virus
|
|
industry and the consumer are covered. I have also included several of my
|
|
viral ideas which i will never actually get around to implementing. For
|
|
all you programmers out there, this is an open invitation to do so
|
|
yourself.
|
|
|
|
This paper is not meant to be viewed as a complete guide. Its just a
|
|
simple implementation of my personal ideas as theory. This should not be
|
|
taken as anything more or less.
|
|
|
|
|
|
[A Brief Past]
|
|
|
|
|
|
The 80's. The turning point for computing. This is the decade the
|
|
personal computers were creeping into the homes of america. The
|
|
commadore64, tandy machines with tandy dos, ibm with their pc-dos, apple
|
|
1 and 2 e's. The list goes on and on. In the early days of home computing
|
|
there was much more variety. Nothing had really dominated the market like
|
|
today.
|
|
|
|
This was also the decade the first computer viruses were found in
|
|
the wild. The technology was simple. Basic mbr/bs infection. With the
|
|
idea in the minds of computer users around the world, programmers became
|
|
interested. The advancement of the computer virus had grown from sector
|
|
infection to various file types and even directory infection. Different
|
|
schemes for spreading, stealth, encryption and other self modifying code
|
|
were implemented. The virus and anti virus community grew together. The
|
|
virus programmers were, and still are, always a step ahead.
|
|
|
|
Various dos distributions did what they thought was the right thing.
|
|
Ibm and msdos started including versions of their own anti virus
|
|
software. A good step, but in the wrong direction. A way to boost a new
|
|
industry? Whenever developers create software for an operating system, it
|
|
increases the user base. I really hope this didnt play as a factor... and
|
|
its far too late to ever know.
|
|
|
|
Why not start enforcing a set of rules on the dos os. It was obvious
|
|
that a read only attribute was not enough. The systems allowed any piece
|
|
of code to take complete control. Seems like it was doomed from the
|
|
start. Why continue development keeping the same base. It was totally
|
|
possible to change the kernel to restrict what goes on. They didnt have
|
|
to change the file format. They didnt have to change the interrupt
|
|
system. Only the way the kernel executed software. Why give complete
|
|
control to something that really doesnt need it. Even more interesting,
|
|
why not fix a problem that everyone knew would continue to affect the
|
|
future.
|
|
|
|
I could rant for 300 kb about the history of viruses... but i wont.
|
|
That would be way too much effort and a huge waste of time. If you want
|
|
your history, go get it. The information is freely available via the
|
|
internet. Read up. Be aware of where your coming from.
|
|
|
|
|
|
[The Present Virus Trend]
|
|
|
|
|
|
Times are strange. The microsoft os based virus writing movement is
|
|
in a major change for the first time since the start of the game. Over
|
|
the past five years we have seen a change in the trend of 16 bit and 32
|
|
bit virus production. People who are new to the scene are usually
|
|
releasing win32 pe infectors instead of dos com appenders as their first
|
|
virus. What was once saved as a "later learning" item has now become
|
|
standard in the field. Microsoft has been working dos out, and virus
|
|
writers have been working win32 in.
|
|
|
|
This 32 bit platform has opened up a whole new world of opportunity.
|
|
Not only did it increase the amount of executable formats one could
|
|
infect, it also released more power. Thirty two bit applications have
|
|
allowed more effective ways of encryption, trapping of other
|
|
applications, effective tcp/ip packet building, so on and so forth. The
|
|
os is much more robust. As an expected result, except by microsoft, the
|
|
virus technology is much more advanced.
|
|
|
|
Just look at a wildlist ( www.wildlist.org ) from february 1997 and
|
|
then take a glance at the august 2001 edition. The first thing you
|
|
should notice is the frequency of os specific code. In february 1997, two
|
|
years after the release of windows 95, about 95 percent of the viruses
|
|
"reported" to be in the wild are dos based viruses. Of the 239 viruses on
|
|
the list, 28 are microsoft office based, and a few others are win16 ne
|
|
infectors. Notice that Dir_II.A is still on this list. A virus that
|
|
cannot spread on machines running anything above msdos 4.*. Now go back
|
|
to august 2001. Of the 208 viruses "reported" to be in the wild, about 15
|
|
are dos based viruses. That is a drastic change in a matter of 5 years
|
|
when its compared to the change between 1995 and 1997. Not to mention the
|
|
sharp rise in the amount of viruses that are software dependent. As
|
|
stated before, the count jumps from 28 in the wild in 1997, to about 155
|
|
in 2001. So the technology has been around for a few years. It just takes
|
|
a little while for it to be widely implemented.
|
|
|
|
The present virus trend is really based around what other virus
|
|
writers are doing. Just like a bad fashion. A new idea is implemented.
|
|
If it gets enough attention, either by the media or other programmers, it
|
|
will be used again. This is not really a bad thing, but it does not give
|
|
rise to originality. The main problem with this in the virus world is
|
|
that most programmers dont write code that even puts a spin on the old
|
|
idea. Its just written in different style code and released again.
|
|
|
|
|
|
[The Present OS Trend]
|
|
|
|
|
|
Microsoft Windows based operating systems. When i say windows based
|
|
i mean everything from 95 to nt to win2k. Think generic for a while.
|
|
|
|
Enterprise computing is the strong point of the current market. This
|
|
has lead to need, of course, for enterprise software. The business world
|
|
has been backed by mainframe computing and different flavors of unix like
|
|
operating systems. The windows nt family has been pushing iis for a
|
|
while, but microsoft has always been lacking enterprise software. Over
|
|
the past few years there has been a strong development of other services
|
|
targeted to business, not desktop, computing on the windows platform. I
|
|
feel the future is bleak for variety in the business world. Windows has
|
|
had a stronghold on the desktop market for a while now. Trading in
|
|
stability and functionally for ease of use turned out to be a great
|
|
marketing scheme. I hope that windows doesnt take hold of the server
|
|
market as well. That is not the direction i want to go in with this paper
|
|
though so i just leave that topic alone.
|
|
|
|
Linux on the desktop has gained momentum. Every day we see some
|
|
useful advance. There is also finally major backers of linux. Look around
|
|
the subway flats in new york city. IBM has ads plastered everywhere of
|
|
their "peace, love, and linux" campaign. Not to mention its price. Big
|
|
business is starting to look at linux for a free solution for their once
|
|
expensive to replace servers. We are also seeing FreeBSD and other major
|
|
players in the unix and server os world to slowly become more geared for
|
|
desktop use. There have also been twists on that rule like macintosh
|
|
using a bsd like kernel as the base for their latest os release. I wish i
|
|
could say i knew where all this was headed for better or for worse. We
|
|
will have to wait and see what the next move is.
|
|
|
|
The buzz word has changed from "internet" to "multimedia" in the new
|
|
millennium. From web content, to video on demand, to old technologies
|
|
being widely implemented such as voice over ip. Eye and ear candy.
|
|
Everything is gui and everything makes a stupid bling noise when you
|
|
click on it. Mention "real time" and its all over. I think its a shame
|
|
that its so difficult to get people to develop for operating systems
|
|
other than windows. Think about what could have happened with BEos with a
|
|
better marketing campaign and contracted software development. Think
|
|
about what could happen if it was shipped with any major pc manufactures.
|
|
Everyone blames microsoft, including me, because its easy. Im not saying
|
|
they played well, or even fair, with others. I am saying its a world wide
|
|
problem. Its up to software developers. Its up to home and business
|
|
users. Its up to the people who are shipping their latest pc deal without
|
|
any option of os. Rome could only last for so long...
|
|
|
|
All in all, its a safe bet to say that windows will continue to be
|
|
the industry standard for desktop computing over the next several years.
|
|
The current change only seems to be what people are doing with their
|
|
"desktop" computers. With the availability of broad band growing, people
|
|
are using their home computers to offer network services to the internet.
|
|
Mainly in the form of web servers, but many home computers are also
|
|
offering things like smtp, nfs, and other hard disk and file sharing
|
|
services. This has changed the way the internet functions. It has changed
|
|
the way networking functions. It has changed the way viruses function.
|
|
|
|
|
|
[Current Virus Technology]
|
|
|
|
|
|
Now we have seen what has changed in the virus and operating system
|
|
world. We have also reviewed the software thats currently being ran on
|
|
these systems. Lets now look at the virus techniques that are currently
|
|
being implemented. I will try and keep this generic and not sway too much
|
|
into what technologies have been implemented in what file format or
|
|
software package. This will be brief and will only cover a few of the
|
|
basics.
|
|
|
|
Encryption and polymorphism. Household terms in the virus writing
|
|
world. No virus seems to be complete without. The MtE changed the way
|
|
anti virus software had to perform. From simple scan strings to the
|
|
world of heuristic and emulation. Protection from prying eyes. I feel
|
|
the use of strong cryptography is the future. People like spanska took a
|
|
step when IDEA was implemented in viral code. However, this has not
|
|
become standard practice. The only real problem is where to hide the
|
|
key. It doesnt matter if its RSA or an 8 bit xor loop. Both algorithms
|
|
have become equal when there is a pointer directly to the key. There are
|
|
several ways to obscure this, but all in all, its a trivial task to
|
|
decrypt viruses for that reason. This is why other self modifying code
|
|
techniques are so important.
|
|
|
|
Polymorphism is a perfect example. Lets say your engine writes a
|
|
different style and size decrypter for several different algorithms it
|
|
can choose from. Lets also say that it retrieves its keys from different
|
|
places on disk. That alone creates a whole new world of problems for
|
|
those that want to decrypt your code. Again, this will only delay someone
|
|
who understands anything about current microsoft based operating systems.
|
|
There is still nothing keeping someone from taking a snapshot of the
|
|
decrypted virus code from memory. Another massive weak point. Even
|
|
if the virus only decrypts instructions a step before they are executed,
|
|
they can still be copied. Not to say this isnt a good idea. Its been done
|
|
in the past and been proved very effective. A great way to make it
|
|
difficult to examine a program, even after its discovery.
|
|
|
|
Anti debugging, anti heuristics, anti emulation, fooling with the
|
|
stack, attacking common disassemblers, and other such protection
|
|
techniques will also only delay the process of effective detection. These
|
|
are all viable techniques, but dont seem to be implemented as much as
|
|
they should. Its basic protection. I feel that stability and effective
|
|
protection are the keys to a long life in the wild. Propagating is almost
|
|
a secondary issue.
|
|
|
|
I have failed to mention stealth methods for a good reason. Almost
|
|
all of the well know stealth technology was for the ms dos operating
|
|
system. These techniques no long work under windows. The new device
|
|
drivers and api system has taken priority away. Im not saying there are
|
|
not ways to stealth things under window anymore, just that its not
|
|
practical. Its the same as master boot record and boot sector infection.
|
|
The medium these viruses used to spread is no longer in widespread use.
|
|
Think when the last time you gave a file to someone via floppy disk. Even
|
|
better is to think about the last time you tried to boot off of a dos
|
|
based floppy, or left one in your machine. I feel that boot sector
|
|
infection has almost become another way of sustaining the existence of a
|
|
discovered infection.
|
|
|
|
Networking enabled viruses have become a standard issue item. What
|
|
once has been saved for strictly worm code has now been implemented as
|
|
a basic component in viruses. Im sure i speak for all of us when i say if
|
|
i see one more virus exploiting outlook in the media im going to vomit.
|
|
This is a logical step though. Nobody can deny that. The growth of home
|
|
networking proves the point. Long gone are the days when people needed
|
|
to pass files through physical means. Why wait when you dont have to. Why
|
|
send text through the post office. It takes weeks for a response. Sending
|
|
text and other forms of media via electronic methods can be done over
|
|
tcp/ip in a matter of seconds. Not to mention that its much more cost
|
|
efficient.
|
|
|
|
Back to the subject, its not just ms outlook thats being exploited.
|
|
IRC clients have also been popular to exploit. Mirc and pirch are the
|
|
main targets. There are many viruses that are aware of network drives and
|
|
other remote devices. Another common attack has been to infect web
|
|
content. Java class files, html, and other web elements have been
|
|
infected. The latest media blast was centered around the code red worm.
|
|
This piece of code used a buffer overflow in microsofts iis to infect
|
|
servers. The threat of network enabled viruses grows every year and is
|
|
only going to become a bigger problem. One of the more interesting things
|
|
ive seen happen is the advent of what has been dubbed "espionage enabled"
|
|
viruses. I first saw this from a macro virus from opic that stole secret
|
|
pgp keyrings and uploaded them to a web server. Similar practice has been
|
|
used to steal unix passwd files, windows pwl files, and other such wanted
|
|
material.
|
|
|
|
The current virus glut is compiled of hybrids of the past. Using old
|
|
techniques with cutting edge ideas. There are a handful of thinkers that
|
|
are on the forefront of the game. New infection routines bundled with new
|
|
ways of obscurity. However, most viruses are just recycled material from
|
|
years ago.
|
|
|
|
|
|
[The Future OS]
|
|
|
|
|
|
The future of operating systems has always been built around user
|
|
demands. Most commercial developers are not interested in the good of
|
|
mankind or computing. Programming is a paycheck. It does not really
|
|
matter how well the product is coded. Its just a matter of meeting user
|
|
needs. To sell. To keep the boss happy, the stocks high, and the
|
|
people buying. Once a user base is established the goals are limited. All
|
|
that is needed is to keep them interested in buying upgrades and
|
|
marketing to new users. Its a lot easier said than done, but that's all
|
|
that really matters. Getting new clients and keep the ones you already
|
|
have. It does not matter if you create a whole new set of problems when
|
|
consumers feel like they dont have another option. This is not only an
|
|
issue with operating systems, but the software that runs on them as well.
|
|
If the same commonly used multimedia, word processing, and database
|
|
systems were offered on non windows systems, things would change. I
|
|
dont think it would be an immediate change. Over time though, people
|
|
would understand that learning operating systems based on the linux
|
|
kernel is just as easy as learning to use windows based operating
|
|
systems. Its hard for people to let go of something they are comfortable
|
|
with to use a product they know little about and cannot get the
|
|
software packages they know.
|
|
|
|
I feel that most operating systems are going to lean closer to
|
|
integrating the common forms of digital media. This ranges from basic
|
|
audio and video, to things like voice recognition software. Windows has
|
|
been working on this for years. Apple has continued to use this as the
|
|
majority of their marketing scheme. The integration of various multimedia
|
|
packages in linux distributions plays huge factor. I feel that linux is
|
|
going to be a major player in the change of the market. As more
|
|
development is done to meet basic user needs, the draw to the operating
|
|
system will grow. Cost alone is enough to hold me as a believer. Success
|
|
will be determined by meeting the home users needs. As long as strong
|
|
kernel development is taking place, larger range of hardware support is
|
|
added, and developers continue to write applications for the platform,
|
|
things can only grow. Once there is a large enough base of free equals to
|
|
popular products, the market will open up. Nobody enjoys paying for
|
|
something they can have for free.
|
|
|
|
The open source movement will grow to become the largest resource
|
|
of software. There will always be people around who are interested in
|
|
programming for a hobby. Most of those people in the open source
|
|
community have no desire to make money off their work. Development can
|
|
happen at a much faster rate when the code is made public, and there are
|
|
thousands of people world wide looking at your problems. Others can pick
|
|
up on something you have overlooked. Its not even a matter of being
|
|
outsmarted. Its just the result of having a different perspective. Look
|
|
at all the hands that dig into the freebsd project. From my experience,
|
|
this is the most stable and best optimized kernel in the open source
|
|
software community. This feat was not achieved by holding tight to ones
|
|
ideas. If such effort went into software to run on these free platforms..
|
|
|
|
Windows must start over and change the way software is executed. Its
|
|
obvious that the file permissions are not working out. Microsoft felt
|
|
that viruses would not survive in the win32 environment. This is a
|
|
problem that is not going away by simple obscurities. It will take a
|
|
total rework of the system base to change anything. Even if this means
|
|
they have to release an operating system that is not backwards compatible
|
|
with their existing products. They do not seem to have a problem doing
|
|
this with software packages. The system could be released parallel to
|
|
whatever technology is currently on the market. Push it as "the future of
|
|
computing" or some other gravely bold statement. Give users the option.
|
|
People might not grab it at first. It will take years of software
|
|
development to really push the platform. Its not an impossible task. You
|
|
can move mountains.
|
|
|
|
Eventually there is going to be more effort in kernel protection.
|
|
The linux kernel patch from the openwall project is a perfect example.
|
|
This implements such features as a non executable user stack, and will
|
|
not allow shared memory segments that are not in use by a process. This
|
|
solves two major problems in the linux world. Both would require a total
|
|
reconstruction to implement on the windows platform. I think its sad that
|
|
microsoft left the brain of their os bare. There is no end to what you
|
|
can do to kernel32.dll after the system boots. Yet again, it would not
|
|
be such a large issue if the platform restricted what the software
|
|
running under it could do.
|
|
|
|
Local and network security will finally be looked on as a critical
|
|
function in a systems performance. This is a field that was hardly
|
|
touched by microsoft until the nt series was released. At least then
|
|
basic user rights could begin to be enforced. Something the mainframe and
|
|
unix systems have been doing for decades. People are now using computers
|
|
for one other major reason besides multimedia. Communication. In any
|
|
situation where people are connected, there are going to be problems. Be
|
|
it physical, or through distributed environments. Most major systems are
|
|
built to be connected to the internet. Everything can talk to everything.
|
|
I feel this is great, but without proper security, its just going to add
|
|
to the problem. Any system that is build with these two things in mind
|
|
will do well.
|
|
|
|
Processor architecture is soon to change. Once the ia64 chips are
|
|
really pushed, they will take over the home computing market. The 64 bit
|
|
memory addressing will open up new doors for speed and calculations per
|
|
clock cycle. The actual chip speed in megahertz will mean less than it
|
|
does now. This also gives major software developers a chance to start
|
|
over. New processor, new platform, and new software. Build again from the
|
|
ground up. What if man had continued on trying to perfect the horse drawn
|
|
buggy instead of working on developing the internal combustion engine. I
|
|
truly hope microsoft sees how important and how big of a chance this
|
|
really is. When your software powers 90 percent of the worlds computers,
|
|
its only ethical to start looking out for the best interest of the user.
|
|
Something that they have ignored for well over a decade.
|
|
|
|
|
|
[The Future Virus]
|
|
|
|
|
|
This is the real motivation for this paper. The part i find to be
|
|
most interesting. Using the base i have just set, i will go into detail
|
|
of where i feel things should go. Some of it can and will be implemented
|
|
in the not so far future. The rest we will just have to wait and see. All
|
|
in all, i have two main goals for this chapter. First, i hope to open up
|
|
writers to new programming techniques. Second, i hope to set in peoples
|
|
minds that this is a problem thats only going to get bigger. Until the
|
|
populace takes action and rights years worth of wrong, these problems are
|
|
not going away. To those who think they are in control, hold on. Its
|
|
going to be a wild ride.
|
|
|
|
Lets start with what is hot in the media right now. Viruses and
|
|
worms being used to exploit network services. This is a trend that i feel
|
|
will continue for years to come. Im actually surprised this has not
|
|
already been a wide spread practice. It just makes sense. Millions of
|
|
people connected together. Its too easy. The internet has given virus
|
|
writers one large petri dish. The internet has replaced physical media.
|
|
The original exchange that gave rise to widespread viral infection.
|
|
This comes back to darwin, evolution, and survival. Nature will find a
|
|
way. Its proved itself over and over, and now its going to flex in the
|
|
meta world. This can lead us down many different paths.
|
|
|
|
The world is run on information exchange. The biggest activity of
|
|
the united states secret service is intelligence gathering. Viruses
|
|
and worms that collect information. Why isnt (or is it?) this being used
|
|
by governments? Im sure getting a file into a remote computer is a
|
|
million times easier than recruiting a mole. Not to mention the safety
|
|
factor. It would keep an agent out of risk, and lets face it. Computer
|
|
crimes are hard to track. People make mistakes, people make computers,
|
|
computers make mistakes. Using various forms of disinformation, its
|
|
trivial to point the finger to someone else. One can easily create a
|
|
front and use it to exploit any given target. We all know the united
|
|
states government is pretty lax when it comes to network security. Most
|
|
other nations are equally as poor. Its only logical that this sort of
|
|
attack will take place. Welcome to the age of the digital spy.
|
|
|
|
The espionage enabled virus. Covert data theft. We now live in a
|
|
world where the computer virus can easily implement other functions. In
|
|
the past its been pretty bland. We have seen various forms of graphics
|
|
and sound, simple messages, and destructive activity as the norms of
|
|
virus payloads. I hope this is a trend of the past. Networking now opens
|
|
the door to so much more material. Viruses that target the credit card
|
|
databases of any given windows based online shopping package. All the
|
|
little dot coms being ran from home iis servers off cable modems are
|
|
perfect targets for such activity. Next you must consider all the other
|
|
software packages that can be exploited in such a fashion. Data of all
|
|
flavors can be harvested. Dont forget the other things many home users
|
|
have on their machines. I like the idea of viruses that steal dial up
|
|
access information. If you can get the login, password, and at least who
|
|
the provider is, your fine. Finding dns servers, phone numbers, and such
|
|
is usually public information. Alot of smaller dial up providers still
|
|
offer unix shells with the package which is an added bonus.
|
|
|
|
This practice isnt limited to public affairs. What about viral code
|
|
in the workplace? One can write code that will only infect machines on a
|
|
local network. This way you could perform tasks in a controlled
|
|
environment. Collect the wanted information and send it to a remote
|
|
source. One could avoid detection by such means as setting a date to scan
|
|
available drives and remove your viral code. This wont help much with the
|
|
backups, but most businesses back up once a week or so. A week is a very
|
|
large window to get what you need and clean up your tracks.
|
|
|
|
The foundation of civilization is communication. Our day to day life
|
|
can be throw upside down by even minor data flow disruptions. Think about
|
|
how much you are bothered when your cell phone drops a call or your isp
|
|
goes down for routine maintenance. These are not very critical examples
|
|
but they are situations most of us have encountered. Lets say you have a
|
|
wide spread virus. Most of the machines infected will be home users. Most
|
|
of those users access the internet. Most of those users will never have a
|
|
clue if their pc is attacking various networks via denial of service
|
|
attacks. This technique has been used in the past on targets ranging from
|
|
child pornography sites to the white house. Programmers can now use code
|
|
as a form of protest. Im sure that it will only get negative results like
|
|
more media hype for kiddies and crackers, and maybe jail time for the
|
|
programmer. We all have seen the harm done by webpage defacing for
|
|
"political" reasons. I can never see denial of service attacks resulting
|
|
in anything positive. I must say that this is a problem that will be
|
|
implemented more. There is no way around it. Im not so fond of this topic
|
|
so im going to say, nuff said.
|
|
|
|
I would like now to touch on the idea of plug-ins for viruses. We
|
|
can thank vecna for this (any many other) technique. Start with a simple
|
|
virus shell. Basic code for effective spreading, evasion, and networking.
|
|
No big deal. Implement module support. Now stop laughing and shaking your
|
|
head. Imagine how things would have been if CIH had some sort of module
|
|
support. The virus checking various servers for updates to perform all
|
|
sorts of tasks. Each client could not only receive updates for payloads,
|
|
but for performance, bug fixes, alternate contact information, and so on.
|
|
This would be very interesting if the project was open source and invited
|
|
others to write their own modules. Why not document what your engine can
|
|
do, and release simple examples to get programmers attention. Set a
|
|
standard protocol for virus modules. It could get quite messy.
|
|
|
|
Every year a programmer infects a file format that has been long
|
|
overlooked. Various microsoft office documents, data files, and other
|
|
such media is exploited. I cant help but wonder how far this can go. An
|
|
idea i have always wanted to implement is to infect several files with
|
|
different parts of a virus. Infect an executable file with just code to
|
|
copy the virus body from a different file to memory and execute it. Store
|
|
the virus body in a media file that is never scanned by default with most
|
|
anti virus products. The standard JPEG file format is usually overlooked
|
|
because its not an executable file. Its a perfect target to hold such
|
|
code. You can leave the JPEG header alone and tack megs worth of
|
|
information to the end. I have never seen this practice affect the way
|
|
any program views the picture. Its much easier to tweak PE files to scan
|
|
as clean when they do not contain actual viral code.
|
|
|
|
There has also been greater virus activity on various unix and free
|
|
"unix like" platforms. Much more on the latter. There have been several
|
|
papers published on infecting the elf format. Better documentation of the
|
|
linux interrupt system has also been made available. This i find very
|
|
interesting. Not just because its new, but because its taken this long
|
|
for people to catch on that linux is not perfect either. Although it can
|
|
still be exploited, the difference is the default environment does not
|
|
allow it. Simple things like limiting what an executable file can do, and
|
|
restricting what can take place in memory, have curbed this so it will
|
|
never become a major problem. It will most likely always continue to be
|
|
an issue, but i cannot see unix viruses propagating in the wild.
|
|
|
|
On another note, i see a problem with network enabled hardware. Its
|
|
bad enough that people leave devices like printers and routers with their
|
|
default settings or no password at all. This has not been a problem as
|
|
far as viruses go, but times are changing. Video game consoles are being
|
|
shipped with hard drives and pentium processors. With the advent of
|
|
networked games on these devices, its just a matter of time before its
|
|
exploited. The xbox is based on x86, has a hard disk, ram, and a built in
|
|
network support. After kritz being spread on a dreamcast cd, i cant help
|
|
but wonder when the console itself is going to be the host.
|
|
|
|
I think that the future virus will be molded around networks. Virus
|
|
code will use more of the resources that have been available for years.
|
|
Programmers will continue to exploit things that have been ignored. The
|
|
future virus will be shaped by user ignorance. It will take advantage of
|
|
a generation of point and clickers. Evolution. Growth. Survival.
|
|
|
|
|
|
[Conclusion]
|
|
|
|
|
|
A piece of art to show flaw. An exploit on the problems of its host.
|
|
The industry complains about viruses with the argument that "If kids
|
|
wouldn't code them, then it wouldn't be a problem". This is only half
|
|
true. The problem would still exist. Why? Because its interesting. There
|
|
will always be people who want to look into the matter, to figure out
|
|
just how it works, and to implement the idea themselves. Once such an
|
|
exploit is known, its not going away on it's own. When such problems are
|
|
found in the security industry, something is done about it. People don't
|
|
just say "hey, we found a root exploit in (fill-in-the-blank), but we
|
|
will just ignore it and hope nobody uses it. So why has microsoft and
|
|
other operating systems allowed such problems to continue?
|
|
|
|
I feel that virus programmers will always look for new problems to
|
|
exploit. New places to hide. New ways of giving operation systems that
|
|
have chosen to ignore security the finger. The technology that has
|
|
evolved with viruses is advancing at an alarming rate. Until something
|
|
drastic is done, this will be a issue that will continue to grow.
|
|
|
|
Such practice of data collection, disruption, and disinformation
|
|
can be used in so many different ways and motivations. The possibilities
|
|
are frightening.
|
|
|
|
Things have changed. The desktop operating system has changed. The
|
|
networks have changed. Business has changed. Right now things could go in
|
|
any direction. The future is not yet written. It is up to us to say what
|
|
happens next... To write the next chapter.
|
|
|
|
|
|
The power is in our hands.
|
|
|
|
|
|
|
|
[Contact]
|
|
|
|
|
|
Feel free to contact me.
|
|
|
|
email nucleii@tfz.net
|
|
irc *.undernet.org
|
|
http://www.coderz.net/nucleii
|
|
|
|
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
|
Version: PGP 6.5.8
|
|
|
|
mQGiBDff8ZkRBADKWpTlurCyaVMCAhTnIOm4pWwBgCEHDuDSnYFx+1Yrunq3Pw3m
|
|
/3L6JI9YLDyuETX9nXbA4QJIWbvoNptTnneZpi0FlbgwppQvpCYnsUFw1TwpBj9B
|
|
W31pSDO7RnZwcCjiCe/Tc6lmVIWoNY2KJadeR5qSrlws5a47dLZraaSrnwCg/+E/
|
|
I5k/cLj9xyCDvKaFv2myaq8D/jpHSnw6hhnpk0Gfvt4eMv2FrxU0Bl6RhbeSk/Cx
|
|
eqQwTu4+VTkHFZRN/XQooXkPViVL8IBuzL2b6q6shD7Iw1By37x41MUZMeMr/FeW
|
|
pIA6HHKPUWvXSkRk7B38u7FwUwnaNY6vq4qdL+q0H/xW2tGredrw6HZerhVbiZ9V
|
|
BsJ4A/48Zyeo+z2YaDHKcOOVSbg3KlfUXUBeSIcukXOwIZu1xYbEr3PMeZ8ob493
|
|
LNsJtMw3JHN1Q938sl5gQaULC8wZZKcCKAgm42+s6+qVEzCC30hlfol3vgGThiaG
|
|
bwUwazbViNW9GvMBStdN43rs9Fuv8L7pF6ZTSpbTmkAbWOq9xLQPbnVjbGVpaUB0
|
|
ZnoubmV0iQBLBBARAgALBQI7IrWABAsDAgEACgkQOx6SUs31GvBtUwCdEf0Sx9x1
|
|
wt9z79MRkhgTZsUzHsAAnjBcF2ObgYRntjh/4K7GaXWsdACduQINBDff8ZoQCAD2
|
|
Qle3CH8IF3KiutapQvMF6PlTETlPtvFuuUs4INoBp1ajFOmPQFXz0AfGy0OplK33
|
|
TGSGSfgMg71l6RfUodNQ+PVZX9x2Uk89PY3bzpnhV5JZzf24rnRPxfx2vIPFRzBh
|
|
znzJZv8V+bv9kV7HAarTW56NoKVyOtQa8L9GAFgr5fSI/VhOSdvNILSd5JEHNmsz
|
|
bDgNRR0PfIizHHxbLY7288kjwEPwpVsYjY67VYy4XTjTNP18F1dDox0YbN4zISy1
|
|
Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM2Zafq9AKUJsCRtMIPWakXUGfnHy9
|
|
iUsiGSa6q6Jew1XpMgs7AAICB/4ksuslS4cCNi48FilpW1LTBUf3P8YUKQJX256z
|
|
NnidOlHvXy1ctJDFLS50X4et7cJeI0Prr1l011AOerSECvHaE37nYfRq/OAY9GpX
|
|
QezX0ObjpM0ABaY3AexGXLu5btPAf64Pu7v3wI1IK9yuX2fyW3ctE+neLWCf2ExN
|
|
Z9q4sgxi4DPSJG1oqPsphbcR7t2oOhPU3dx5CFYBIA0BwvCgbkWFxCJ2S+cWdRdQ
|
|
i6DhXsEsEkRBKRhcNepewK2MsDHxO+VmdvBwEX1wy6DebjlmUAYc1iatUSIbCVLj
|
|
xc/GrmY1AGEhRu0DcqEJ2nfcmMX7jTfPN2IW4Xc/7MV4u065iQBGBBgRAgAGBQI3
|
|
3/GaAAoJEDseklLN9RrwMJ4AnR+qwepM5GB9+sqXEtgvFxl6Fme1AJ9N1QluFYtj
|
|
9TExLxttoJpDgjXKNg==
|
|
=xTBK
|
|
-----END PGP PUBLIC KEY BLOCK-----
|