ad info




CNN.com
 MAIN PAGE
 WORLD
 U.S.
 LOCAL
 POLITICS
 WEATHER
 BUSINESS
 SPORTS
* TECHNOLOGY
   computing
   personal technology
 SPACE
 HEALTH
 ENTERTAINMENT
 BOOKS
 TRAVEL
 FOOD
 ARTS & STYLE
 NATURE
 IN-DEPTH
 ANALYSIS
 myCNN

 Headline News brief
 news quiz
 daily almanac

  MULTIMEDIA:
 video
 video archive
 audio
 multimedia showcase
 more services

  E-MAIL:
Subscribe to one of our news e-mail lists.
Enter your address:
Or:
Get a free e-mail account

 DISCUSSION:
 message boards
 chat
 feedback

  CNN WEB SITES:
CNN Websites
 AsiaNow
 En Español
 Em Português
 Svenska
 Norge
 Danmark
 Italian

 FASTER ACCESS:
 europe
 japan

 TIME INC. SITES:
 CNN NETWORKS:
Networks image
 more networks
 transcripts

 SITE INFO:
 help
 contents
 search
 ad info
 jobs

 WEB SERVICES:

COMPUTING

Viruses boom on the Net

January 18, 2000
Web posted at: 3:05 p.m. EST (2005 GMT)

by Mark Leon

From...
InfoWorld
Image

(IDG) -- Year-2000 viruses proved to be as impotent as the infamous year-2000 bug itself. As the long-anticipated date approached, fears grew that hackers would take advantage of the millennium to launch new attacks. But it didn't happen, and Charles Rutstein, an analyst at Forrester Research, in Cambridge, Mass., is not surprised.

"We have been saying for the last six months that the millennium would be a complete nonevent as far as viruses are concerned," Rutstein says.

He cites two reasons for this. "First of all, most virus writers had better things to do on New Year's Eve than to sit around and watch their creations take life. Secondly, even though the propagation rate for new viruses is much faster than before, the notion that any virus writer could time a virus outbreak to occur exactly on the eve of Y2K is ludicrous."

The worst problems came from malicious code that took advantage of year-2000 fears.

"Some of our biggest challenges came from people springing Y2K hoaxes," says Don Jones, director of Y2K readiness at Microsoft, in Redmond, Wash. "There was one that claimed to be from Microsoft Support.com, and another claimed to be from Bill Gates."

They were both bogus and contained malicious macro code.

"A lot of our customers don't realize how vulnerable they are to this kind of hoax," Jones says.

Technically, the year-2000 bug itself could qualify as a Trojan horse virus. If it rears its head, it will do something unexpected the hallmark of a Trojan horse. In this case, the unexpected action is simply that the program with the bug is still running. Such year-2000 problems are a direct consequence of the fact that programmers never expected their code to last so long.

Although year 2000 didn't initiate the onslaught of viruses expected, the proliferation of computer viruses today has been ushered in by technical innovations such as the Internet that created infinite opportunities for unsuspecting technology users to be thwarted.

So even though Jan. 1, 2000, came and went without much incident on the virus front, IT managers will need to be ever more vigilant about protecting their companies from a business-halting virus outbreak as the new millennium brings increased dependence on the Web and interconnectivity of networks.

A hacker's dream

Imagine an exploding population of homogeneous organisms, with each one able to initiate intimate contact with any other. Add a small group of wily predators who love to tinker with the forces of nature, and the stage is set for artificially induced epidemics.
  ALSO
$12.1 billion reportedly spent to ward off computer viruses in 1999
 

This describes exactly the present state of affairs in information systems, and the increased vulnerability to viruses and malicious code, according to Carey Nachenberg, chief researcher at Symantec's anti-virus research center, in Cupertino, Calif.

"It is very different from anything we have seen before," Nachenberg says. "For the first time, we have a computing monoculture. Monocultures in the natural world are extremely vulnerable to pests such as viruses."

The same is true, he adds, in the not-so-natural world of computing.

"By the end of last year, there were more than 200 million PCs connected to the Internet," Nachenberg says. "Ninety percent of these are Windows machines running the same applications, such as Word, Microsoft Exchange, and Excel."

The reasons for concern do not stop there. Not only do the unscrupulous have a bigger field to play in, they also have tools that are easier to use and potentially more dangerous.

"The advent of macro and script viruses -- viruses written in Macro languages such as Word Macro and VBScript -- makes it fairly easy to write new ones," says Vincent Gulotto, director of Avert, the emergency response team at Network Associates (NAI), in Santa Clara, Calif.

MORE COMPUTING INTELLIGENCE
IDG.net   IDG.net home page
  InfoWorld home page
  InfoWorld forums home page
  InfoWorld Internet commerce section
  E-BusinessWorld
  Reviews & in-depth info at IDG.net
  IDG.net's personal news page
  Year 2000 World
  Questions about computers? Let IDG.net's editors help you
  Subscribe to IDG.net's free daily newsletter for IT leaders
  Search IDG.net in 12 languages
  News Radio
  * Fusion audio primers
  * Computerworld Minute

ActiveX and Java add to this problem, says Sal Viveros, group marketing manager for total virus defense at NAI.

"This is mobile code. As it becomes easier to use, we will see more mobile virus code," Viveros says, adding that this kind of mobile virus code is particularly scary because it can be activated simply by surfing to a Web site.

It can also be argued that Microsoft is a victim of its own success when it comes to malicious code. It is precisely because Windows is the predominant platform that almost all attacks are targeted at the Windows environment. And most of these are completely impotent on the Macintosh. Malicious applets, however, could change this. Steve Lipner, manager of the security response team at Microsoft, points out that because Java is cross platform, it might offer an even more tempting target for hackers. "A Java virus will run on Microsoft, Sun, Apple, and just about anywhere else," Lipner says.

But Ken Bereskin, director of O.S. technology at Apple, says that Mac users have been fortunate that the more malicious, Internet-borne, macro viruses have no effect on the Macintosh.

Most analysts and users agree that it is only a matter of time before the invasion of the bad applets begins.

Don't panic ... yet

Anti-virus software vendors such as Symantec and NAI enjoy a steady revenue from selling protection from just these kinds of threats, so IT professionals must take such warnings with healthy skepticism. However, analysts tend to support all of the above concerns. And while they, too, stress the need for calm, they also caution against complacency.

"When macro viruses first came on the scene, most viruses were still written in assembly language or machine code," says Roger Thompson, technical director of malicious code research at ICSA, a computer security research company in Reston, Va. "And they were spread by physically transporting infected floppies from one machine to another. In those days, we recommended that you upgrade your anti-virus software every two to three months."

Now it can be as often as every few hours.

"Anti-virus software that automatically updates itself makes sense in the present environment," says Ron Krantz, chief IT architect at Niagara Mohawk Power, in Syracuse, N.Y. "Vendors like Anti-Virus Pro offer four or five fixes a day."

This may sound a little extreme to IT managers who support thousands of clients. Krantz emphasizes that businesses need to find the right balance when implementing an anti-virus solution.

"Rarely will you need to get updates that often," Krantz says. "The vendors are already very quick to get fixes out to everyone when a new virus appears. So daily updates will matter only if you are the unfortunate one to get hit first."

Another factor, according to Krantz, is resource allocation. In other words, productivity lost from constant software upgrades can easily be greater than the productivity lost from a new virus.

"It takes time to download the new fixes to each desktop," Krantz says.

No-hands attack strategy

Two of the biggest anti-virus vendors, NAI and Symantec, are scrambling to make their anti-virus code smart enough to automatically upgrade only when necessary. This method has yet to be proven, but if successful, it could give network managers a little more breathing room.

Anti-virus software operates by scanning for a match with a signature file. These signatures are the fingerprints that identify malicious code. Signature scanning technology is mature, and the software is now quite effective. But no matter how good the software is, it can't finger a new virus unless that virus's signature is known and filed in a repository.

When viruses used to spread primarily via "sneakernet," upgrades to such databases every few months were usually adequate to protect most networks. But Web and e-mail viruses have increased the rate of transmission by several orders of magnitude. "Today, it is entirely possible that a virus which surfaced for the first time in Malaysia could show up on your desktop the very next day," Forrester's Rutstein says.

This is why NAI and Symantec are working to completely automate the process of providing signature updates. NAI calls it the AutoImmune system, and Symantec has its Digital Immune system. Neither is fully functional yet, but both employ heuristic technology to identify suspicious code.

"Think of it like this: If you see someone walking down your street wearing a mask and carrying an automatic weapon, you might get suspicious," Symantec's Nachenberg says. "Our heuristic software is designed to recognize suspicious code."

Once that code is identified, the software will automatically send a copy to the vendors' labs. The code is analyzed, and if it is indeed malicious, experts will create both a signature file and a fix. These will then be sent via the Internet as automatic upgrades.

"Ideally each workstation will be capable of detecting what it thinks is a new virus," says Thompson. "And it should be able to get a response in 30 minutes."

Batten down the hatches

Whether these solutions will really offer users the security they promise remains to be seen. Meanwhile, IT managers struggle to make do.

"We are considering doing virus scanning on all incoming e-mail," Krantz says, but he adds that there are some major problems with implementing such a solution.

"It is expensive, it creates a bottleneck at the mail server, and it isn't clear that such a scan will be all that effective," Krantz says.

This last concern is a direct consequence of the new methods employed by hackers

"We aren't just scanning for binary code inside an executable anymore," Krantz says. "The bad code could be hidden in a password-protected Zip file or encrypted in SMIME [Secure MIME]. These are things we can't even scan."

So as new applications and systems continue to open doors for hackers, and the interconnected Internet landscape expands, IT managers will have to keep closer watch over their growing networks in the coming years. At the same time, IT can count on anti-virus vendors to work on fighting the latest exploits.


RELATED STORIES:
Protect against Trojan Horses
January 17, 2000
Windows 2000 virus: Stunt or preview?
January 17, 2000
First Windows 2000 virus detected
January 14, 2000
Viruses anew pop up post-Y2K
January 5, 2000
Governments ready to fight cyber-crime in new millennium
January 2, 2000
CA warns of Y2K-triggered virus
December 31, 1999

RELATED IDG.net STORIES:
E-mail virus creates links to porn sites and raids your address book
(PC World)
Top 10 anti-virus downloads
(PC World)
Windows 2000 virus: Stunt or preview?
(PC World)
$12.1 billion reportedly spent to ward off computer viruses in 1999
(InfoWorld)
'Bubbleboy' e-mail virus benign, but also a warning
(NetworkWorld Fusion)
Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

RELATED SITES:
Forrester Research
Symantec Antivirus Center
Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.
 LATEST HEADLINES:
SEARCH CNN.com
Enter keyword(s)   go    help

Back to the top   © 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.