Fujitsu To Develop Vigilante Computer Virus For Japan 129
wiedzmin writes "Japanese Defense Ministry has awarded Fujitsu a contract to develop a vigilante computer virus, which will track down and eliminate other viruses, or rather — their sources of origin. Are 'good' viruses a bad idea? Sophos seems to think so, saying, 'When you're trying to gather digital forensic evidence as to what has broken into your network, and what data it may have stolen, it's probably not wise to let loose a program that starts to trample over your hard drives, making changes.'"
A Polite Virus (Score:5, Interesting)
Would be the answer. A polite virus doesn't migrate automagically- it *asks* before it migrates.
Re: (Score:2)
Methinks the Japanese have been reading too much into the "Diamond Age [wikipedia.org]".
Maybe Matter Compilers are next....
Re: (Score:1)
Re:A Polite Virus (Score:5, Insightful)
Malicious authors would love that - another angle for them to take advantage of. Anyone with clue isn't going to trust a polite virus unless they've been told to expect it, and by the time they've been told this polite virus is friendly, the malicious authors will already be using polite messages to get users clicking where they want them to.
Re:A Polite Virus (Score:5, Insightful)
You've got it right. Malicious authors will just reverse-engineer Sophos's virus, tweak the payload, and then they're off to the races.
And other antivirus houses, RIGHTLY, will peg Sophos's virus as malicious and work to block or eliminate it.
This is the catch-22. If your virus tries to use a "break in then pull up the ladder with it" mentality, someone else will co-opt your work. Pretty soon, your "beneficial virus" will be meaningless. In the real world, virus writers have been caught "pulling up the ladder" from time to time, removing their competitors' viruses and taking over existing botnets. Sophos is trying the same tactic, which isn't going to be helpful for anyone.
Re: (Score:2)
Sophos is trying the same tactic, which isn't going to be helpful for anyone.
Are you sure Sophos is trying the same tactic? Or is Sophos saying more-or-less what you are saying. Perhaps you meant Fujitsu? Or the Japanese Defense Ministry which is funding the effort? At least, that is according to the fine summary...
Re: (Score:1)
"And other antivirus houses, RIGHTLY, will peg Fujitsu's virus as malicious and work to block or eliminate it." -fixed that for you.
Even if they didn't, their heuristics would probably make some noise.
Re: (Score:3, Informative)
Re:A Polite Virus (Score:4, Informative)
That just trains people to click OK/ALLOW more. So the next 'polite' virus will do more then just kill other virii.
Re: (Score:2)
Would be the answer. A polite virus doesn't migrate automagically- it *asks* before it migrates.
No a polite virus will offer you a nice warm blanket...
Re: (Score:2)
Does Canada have virus programmers? I thought they would be too nice of a
Re: (Score:2)
If you don't believe me, contrast it to impolite malware (like most commercial AV, *cough*) that comes pre-installed.
Re: (Score:2)
Truly polite viruses and malware pop up a message box on install that says "I am a virus. My intent is to do X. Are you sure you want to Install? Type YeS (with that capitalization) to continue, anything else to cancel."
Re: (Score:1)
It's all there on page 172 in the EULA that can only be viewed in a 2 row high textarea.
Re:Source (Score:5, Funny)
Re: (Score:1)
So Skynet was really just after Windows users?
Re: (Score:3)
even windows 7 has infection rate of 4 per 1,000 machines. Let's talk about using real OS instead of Bill Gate's stupid glorified program loader.
http://www.computerworld.com/s/article/9216654/Windows_7_s_malware_infection_rate_climbs_XP_s_falls [computerworld.com]
Re:Source (Score:5, Insightful)
Every time I see this, I remember the obvious counterargument.
- If OSX had better than 8% market share, wouldn't there be hordes of virus programmers (russian mafia, bored script kiddies and pranksters, whatever) looking for holes in it to take over?
- If Linux had better than 1% market share, wouldn't there be hordes of programmers trying to break it? Actually, if you look at the server market where Linux has a larger market share, they DO try to crack it - and lo and behold, they tend to succeed relatively on the same pace as breaking into Windows server boxes.
The question isn't, is Windows insecure? Of course it is - due in no small part to being not-securely-configured by hordes of user-level operators at their houses. But if everyone magically switched to your OS of choice, are we really likely to find that the situation improved at all? Probably not. Even at their smaller market share, it turns out OSX has had its fair share [google.com], and Linux as well.
And then, of course, there's the old "Problem between keyboard and chair" issue. Users willing to click on ANYTHING are going to be your worst source of problems, especially in the home market. Again, would that change if all of them switched to OSX or Linux? Of course not, they're still going to click on anything and enter their password to install the Free Puppy Screensaver or whatever else it is.
Re: (Score:3)
Did you by chance watch the Chaos Computer Club talk about Stuxnet? [youtube.com] I was thinking the whole time: "Well there's part of the reason right there, MS: You hire folks like this moron."
The vulns exploited are a direct evidence of lack of security in design. I mean, Guest accounts telling printer drivers to "print to file" ANY WHERE on the drive?! AS ROOT?!?
Don't give me that "Mac & Linux are just as bad" bullshit. I deal with the Linux sources, MS isn't even in the same league. I've seen the (lea
Re: (Score:3)
Yawwwwwnnnn. [theregister.co.uk]
Bugs are committed to Linux all the time. You just don't hear about it as much. It's not "big news" because (a) less people are trying to make a botnet out of a couple million Linux boxes and (b) it doesn't feed the "let's bash on MS" crowd on Slashdot.
I'm not a Microsoft fanboy, but I'm willing to recognize the hurdles they have to face: trying to not break backwards compatibility, dealing with the fact that most home users will be the "fuck security, I don't want to have to enter a password it
Re: (Score:1)
(Disclaimer, I worked for Freescale around the time of the zune bug.)
Re: (Score:2)
Linux 1% market share?
Well, maybe desktop. But internet backbone? Facebook/Amazon/Google/etc server farms? Hate to break it to you, but those are almost all Linux. And that's where the real data is.
Re: (Score:2)
I believe that was my point:
Actually, if you look at the server market where Linux has a larger market share, they DO try to crack it - and lo and behold, they tend to succeed relatively on the same pace as breaking into Windows server boxes.
But thanks for responding without reading.
Re: (Score:2)
Sorry, but the rate of success is nowhere near as good. If it were, ALL of your data would already be completely out in the open.
Also, you quote the 1% figure as though it were gospel - which it is not.
Both your logic and your presentation/writing are flawed.
Re: (Score:2)
Well let's go to the numbers [netmarketshare.com].
Also, you quote the 1% figure as though it were gospel - which it is not.
So I rounded to whole numbers. BFD.
Re: (Score:3)
You persist in using desktop numbers, not internet server farm numbers. Which don't get published so much; they're mostly considered proprietary information. But it is easily verifiable that Google, Facebook, eBay, Amazon (including AWS), and pretty much all the other big names use Linux for their server farms, not Windows.
Yes, I concede that for desktops, Linux has a tiny market share.
For the internet backbones, server farms, research farms, and so forth, Windows doesn't get used all that much. And that
Re: (Score:2)
How often do they get hacked?
Re: (Score:2)
Except that Linux has a large percentage of the server market so that makes it a high value target.
I will admit that Windows gets blame for things that I just do not think are it's fault.
For instance I do not think it is right to blame any OS for trojans. If you run a program as admin that infects your system that isn't the OSs fault. Of course for the longest time Windows pretty much was useless if you where not running as admin and it has taken a while for software to learn to play nice when it is being r
Re: (Score:2)
Except that Linux has a large percentage of the server market so that makes it a high value target.
Did I NOT say the following: "Actually, if you look at the server market where Linux has a larger market share, they DO try to crack it - and lo and behold, they tend to succeed relatively on the same pace as breaking into Windows server boxes."
Yes. I'm looking at my post and it is RIGHT FREAKING THERE. Wow.
In the server market, Linux is a high value target. So it gets hacked into. Fairly regularly.
In the home
Re: (Score:3)
Except that they don't have the same rate of success, as evidenced by the fact that all the hosts on AWS and Google and so forth haven't been turned into bot farms and all the data exposed to the world.
Re:Source (Score:5, Insightful)
OS X has it's fair share? Really? They have, say, 10% of the computer market, and about 0.0001% of the actual, in-the-wild viruses. The main problem on OS X is trojans (to which ANY platform is vulnerable) and OS X has NEVER had a self-replicating virus the way Windows has. (Nimda, Code Red, Sasser, etc.)
So yeah, if everyone switched to OS X or Linux, we probably WOULD be better off. Maybe not perfect, but much, much better.
Re: (Score:2)
Re: (Score:3)
the freebsd port tree was the first attempt at a 'voluntary' walled garden, eg they would monitor and fix the ports tree, and you wouldn't get virused in the expected lifespan of the hardware. debian improved on the concept. with repositories, and ubuntu took away root with sudo commands... i realize from the software side there is no mechanism against installing 3rd party software, or making your user root, but the people who they intended to run the stuff wouldn't actually know they weren't in a walled gu
Re:Source (Score:4, Informative)
Face the facts. The malware problem today is the result of large, highly-profitable, highly-competitive criminal empires. These programs are written by hired developers working in a business infrastructure, not random script kiddies locked away in their parents' basements. The developers creating this malware are typically doing so on Windows systems, though much of the delivery infrastructure does run on other platforms. It has nothing to do with ideology, vendettas, social failures or platform choices. It's all about the money.
Ugh (Score:5, Insightful)
Any "good" virus will be caught, captured, studied, mutated, and turned into a "bad" virus very quickly.
Also, a virus by definition installs software on a machine without the owner's consent. So it's never a good idea.
Re: (Score:2)
"Also, a virus by definition installs software on a machine without the owner's consent."
I disagree with that definition. KOH is an example of a good virus that asked *before* it installed.
Re: (Score:3)
KOH virus, used in several industries to encrypt hard drives across a network. Or at least was back in the 1990s. It was very polite- asked by drive letter if you wanted it to migrate, asked you for each boot volume for a 256 byte private key and a pass phrase. It was NOT just "Click OK to install" either- you needed to type YeS, with both capitals, to go, at least in the version my company sold as "CasinoCrypt" to casinos in British Columbia (based on a gaming commission requirement). It would even mig
Re: (Score:2)
So, by your virus definition, Windows is a virus ?
Re:Ugh (Score:5, Funny)
I propose then we name the new "good virus" "Agent Smith"
Agent Smith: I'd like to share a revelation that I've had during my time here. It came to me when I tried to classify your operating system and I realized that its not actually an operating system at all. Every OS on the Internet develops a natural equilibrium with the surrounding hardware environment, but your Windows does not. Its installed on fresh hardware and grows and grows until every hardware resource is consumed and the only way you can survive is to wipe the machine and start over. There is another program on the Internet that follows the same pattern. Do you know what it is? A virus. Windows is a disease, a cancer of the Internet. You're a plague and we are the cure.
Re: (Score:2)
I have found my new sig.
Oh, and thanks butthead. I have to go get some windex and paper towels to get the coffee off my monitors :)
P.S - I think we should create a crowd funded website to pay that actor to make a commercial for Linux with your script.
Re: (Score:2)
I would totally chip in for that. However, I'm not sure we could get away with it:
- We could be accused of libel/defamation
- We could have problems with trademark (Microsoft)
- We could have problems with copyright (Matrix's authors)
However, if we had the backing of any established comedy/humor media, we could get away with it. Maybe The Onion. SNL could pull this one, but I doubt they would buy the idea. Hummmm ... Does anyone know the people from SNL ? :)
Re: (Score:2)
Does anyone know the people from SNL?
Oh sure. I go to temple all the time with Adam Sandler. I'll ask him this weekend.
Re: (Score:2)
parody is legal in the usa. and this is definitely parody.
Re:Ugh (Score:4, Funny)
Parody (tm) was retroactively patented last week, and the name trademarked and copyrighted. Use of the word Parody in it's verb form ("Parodying") is now an actionable civil offense.
You can be sued for applying unlicensed Parody (tm) to any situation.
You must have a valid license to apply Parody (tm). Furthermore, you need Parody Enterprise (tm) for any published, non-personal application of Parody. Parody Student Edition (tm) may only be used in an educational environment. Release of Parody (tm) works under GPL is prohibited.
Note that a Parody (tm) license does not allow you to publish Satire (c); a separate license is required for such publications.
Re: (Score:2)
Also, a virus by definition installs software on a machine without the owner's consent.
Well, technically, by definition, viruses don't install anything - they inject themselves into existing host files/applications/processes. You're thinking of worms... which is technically, by definition, what this is :) But regardless, yes, this is a bad idea.
P.S. Yay, my story got posted.
Re: (Score:2)
I'm almost certain that nearly everyone that's even a little involved in IT has had the idea mentioned in the summary. This isn't a new thought, and I believe it hasn't been done because we all keep deciding in the end that it'd cause more harm than good (or may have bad/legal repercussions the good guys aren't willing to deal with).... but it sure is tempting.
I'm all for them giving it a go. If designed right, it'd reduce the number of virus-laden machines and leave no additional vector for infection:
* wor
They clearly haven't read... (Score:1)
Begun the Core Wars has (Score:1)
Um, no. (Score:5, Funny)
Are 'good' viruses a bad idea?
McAfee, Norton, AVG, etc have built businesses around good viruses.
Re: (Score:3)
Re: (Score:1)
We know where this is going... (Score:3)
Skynet, Landru, M5, the Matrix, HAL
There's plenty of art for reality to follow.
Re: (Score:2)
Which brings up a good point, or question that is.
Does art imitate life, or does life imitate art?
How much Japanese Mange and Anime out there have the premise, much like Johnny Mnemonic, that there can be AI viruses out there designed to travel from system to system carrying out search and destroy orders.
I think the new Japanese politicians are Ghost in the Shell fans.....
It's going to be hard to tell... (Score:5, Insightful)
... the white cells from the attacking entities.
And the ramifications could get interesting.
For example, will it be illegal to tamper with such a white cell virus that's on your system? To reverse engineer it? To release your own distributed anti-virus system that might view such a white cell virus as a threat, and hunt it down and destroy it across multiple networks?
Re: (Score:3)
For example, will it be illegal to tamper with such a white cell virus that's on your system? To reverse engineer it? To release your own distributed anti-virus system that might view such a white cell virus as a threat, and hunt it down and destroy it across multiple networks?
Only if they copyright it.
Back Hack? (Score:3)
Re: (Score:3)
Considering this is Japan, I'm pretty sure they got the idea from Ghost in the Shell. The Major often times references performing a Back Hack, to determine the location of an attacker. Now if only I could ...
... I was thinking more along the lines of what to do with those who bring virii onto my network ... tentacles ....
Re: (Score:1)
Source of Origin (Score:5, Funny)
An Exercise in Futility (Score:3, Interesting)
An arms race against an opponent that know no boundaries is typically futile.
It would be extremely difficult to develop a virus that could effectively spread and eliminate other infections without stooping to the same low levels as the malicious developers, at which point the friendly virus isn't so friendly anymore.
Sophos is right that such a counter-attack launched on a managed network with security-aware personnel capable of removing the malicious infections and performing a proper investigation is only going to complicate matters.
Re: (Score:2)
This is for companies like Sony who just don't seem to want to hire competent security personnel. I really don't think it's any surprise this is coming out of Japan, the home country of Sony. While I pick on Sony lots of Japanese companies don't seem to care about security in any way except physical. The Japanese government has had some issues as well with seeming complete lack of network security concepts the last couple decades as well.
I think the bigger issue is even if they go ahead and make this it wil
Collateral Damage (Score:3)
Re: (Score:2)
Distributed IDS (Score:2)
Aside from all the hype, its basically a distributed IDS. Since everything I do as a sysadmin is done in puppet, and my ids image is an ids image because of about one line, I'm half way tempted to try it at home, "everything under puppet control instantly becomes an IDS".
The biggest problem I can find is scalability of alerts. So now when one machine sees something weird I get it in the daily status report. What happens when 25 or so machines see something weird and all decide to simultaneously spam me?
Re: (Score:2)
They don't spam you they send the events to you SIM tool which correlates all the events and sends you one alert with some additional data that the event was seen by 25 machines on 4 subnets etc etc
Imposters? (Score:1)
what would be better is (Score:3)
that would more than likely put Microsoft in to a niche corner and out of the desktop operating system & office software suite business...
Re: (Score:1)
This is beyond silly - a OS resistant to malware is by nature resistant to users. Something I would HOPE the /. crowd would be against.
The problem with the government getting into the malware business is the way malware spreads. Do you want the government to be doing fishing attacks (possibly with the knowledge of confidential information) or sending you 0-day exploit enabled trojans through email? I don't. Though the intention to remove malware is nice, the problem is it first has to get onto my system
Re: (Score:2)
How do you prove it without getting in? How do you differentiate the actions of an authorized user on THEIR system from a hacker who compromised them? If my employee is attacking your system, you contact me, an
Re: (Score:2)
There exists no lock that will secure a house when the owner doesn't use common sense and lock the door.
There exists no OS that will secure a computer when the owner doesn't use common sense and not execute unknown code.
There are very few true 'viruses' on any OS these days - a virus being a program that can propagate without any user assistance at all. The vast majority of malware is trojans et al that exploit the user.
Re: (Score:2)
This is a much easier problem to deal with. Users who can't be bothered to learn to keep their computer secured shouldn't be permitted to own a HDD. If you boot from a CDROM, DVD or a read only thumb drive your chances of getting a virus is going to be quite low and the rewards for people to write them would be practically non-existent.
The way to win this in the long term is to remove the incentive to write the viruses in the first place.
Re: (Score:2)
This is a much easier problem to deal with. Users who can't be bothered to learn to keep their computer secured shouldn't be permitted to own a HDD
It's easy to pose 'bell the cat' solutions. Easy, but never helpful.
Re: (Score:1)
Actually, there have been a number of experiments around this for a number of years. A File and OS immunity system was the concept, and it was working in the labs to some degree.
Cane Toads in Australia (Score:4, Insightful)
The Internet and the vast number of computers connected to it form a vast, dynamic, and complex system whose detailed behaviour is difficult to fully understand and impossible to confidently predict.
Just like the introduction of Cane Toads in Australia, ( http://en.wikipedia.org/wiki/Cane_toads_in_Australia [wikipedia.org] ), and so many other similar introductions of organisms to 'fix' some problem in a complex ecosystem, this will probably turn out badly. And it may be impossible to undo once the virus is released into the favourable ecosystem that is the Internet.
Bad idea, it will become and exploit vector. (Score:2)
In theory, if you could deploy such a worm within your own network (e.g. corporation) and guarantee it wouldn't infect any other machines, then MAYBE, but how would you guarantee that?
What works is a vulnerability scanner (e.g. satan type programs) to detect and inform you of potential vulnerabilities in your system
plus a known malware scanner (e.g. MSRT, MalwareBytes, AV software).
plus "behavior detection" software that flags malware-like behavior.
Such software must be installed and run by an administrator
Charles Bronson in DeathWish! (Score:2)
Depends on if you liked that movie and what the character did. Or..if you like the "Jack Bauer" consequentialism approach to justice. You know...."Chaotic Good" in D&D parlance where the ends justifies the means.
Except when the ends don't end up the way you wanted it to go after exercising your idea of what the "means" should be....
im torn (Score:1)
Goodby Redmond! (Score:2)
Don't let the door hit you on the bob side!
What Could Possibly Go Wrong? (Score:2)
Sorta like the Morris Worm? (Score:2)
See http://en.wikipedia.org/wiki/Morris_worm [wikipedia.org] That didn't turn out so well, did it? One minor miscalculation, and it'll shut down the internet. And how will it adjust itself to handle different versions of Windows, let alone different versions of Mac, Linux, PalmOS, etc, etc?
Re: (Score:1)
Mac? PalmOS? What decade did you dredge this comment out of?
This comment sounds like something that would have been posted on /. in 1998....
Of course, it's still true with s/Mac/OS X/, s/PalmOS/Android, WebOS and iOS/ etc. :D
Call them "agents." (Score:2)
Call good viruses "agents" and then it's perfectly okay.
History repeats (Score:2)
They should first read some history about the very first computer virus, written by Robert Morris (Jr) in 1988. If for no other reason than to realize they are so very late to this ideas party...
He had the same idea and only wanted to make a program that can spread itself around, but not actually do anything (aka payload), however due to a single incorrect counter value in an otherwise harmless virus, the very act of spreading itself so aggressively is what ended up taking down the entire Internet (Or at l
Re: (Score:2)
this isn't the first time they've been that devoted to destroying the internet. i recall sony installing rootkits on users who purchased their music to watch for p2p downloads.
Already exists (Score:1)
Agree (Score:2)
I think it is a great idea but is not legal, as it can also delete by error files that are infected, so that legal copy of LMFAO mp3 is deleted because it had a virus...no thank you! The best is what MS is doing, hunting down the C&C and shutting them down as well as shutting down all infected pcs.
No, thanks (Score:1)
Giant Robot must be fought with Giant Robot! (Score:2)
It's obvious!!!
Bad idea (Score:2)
Reminds me of some movie plots.
It'll be the virus the users deserve... (Score:2)
...but not the one they need right now.
It'll never work. (Score:1)
Test runs in closed networks have helped the ministry to confirm the cyberweapon's functionality and compile data on cyber-attack patterns.
I'd like to see these test networks, I am willing to bet they are just some group of corporate big-shots trying to sell a few more government contracts to a broken government that is trying to assure their naive populace that they are doing everything they can against those nasty Chinese hackers.
What makes them think their test network is any representation of the real world? What makes them think they can actually discover viruses using viruses when anti-virus software can do no better? They can't do it. O
Isn't that illegal? (Score:1)
This is 2012 and that's a GOOD idea (Score:1)
Virii today use these infection paths:
1.- Exploits on browsers/plugins while browsing infected servers.
2.- Exploits on open ports.
3.- User installing software that carries spyware or trojans.
The paths 1 & 2 are caused by non-updated vulnerable software and somebody MUST do something about that if the user doesn't care.
Path 3 can be mitigated by using an updated antivirus. An antivirus would block the "good virus"
SkyNet (Score:1)
You kids nowadays don't know your history! (Score:2)
Fukashima your Sushi (Score:1)
Shame they could not have done this at the nuclear power plant.
Re: (Score:2)
"Com with me if you want to live." - Terminator, 1984
Re: (Score:2)
And created by worshipers of SATAN
Maybe... ftp://ftp.uni-magdeburg.de/pub/mirror/hpux.ask.uni-karlsruhe.de/Networking/Admin/satan-1.1.1/satan-1.1.1.man.html [uni-magdeburg.de]