Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Windows Operating Systems Software Security

LovSan Clone Let Loose 631

JMullins writes "According to Kaspersky Labs the LovSan virus has been re-released in a new form that has changed the appearance of the worm. It looks like the outbreak continues to get worse and worse, with no real end in sight until people can patch their systems. Net slowdowns are expected over the weekend when both versions of the virus start their attack."
This discussion has been archived. No new comments can be posted.

LovSan Clone Let Loose

Comments Filter:
  • by NanoGator ( 522640 ) on Thursday August 14, 2003 @08:19PM (#6701711) Homepage Journal
    "It looks like the outbreak continues to get worse and worse, with no real end in sight until people can patch their systems."

    To be fair, the media's not going to be interested in reporting that it's not as bad as it seems.

    (Note: I'm not saying it's not that bad, I'm saying don't trust the media to tell is its dying.)
  • by Exiler ( 589908 ) on Thursday August 14, 2003 @08:20PM (#6701723)
    that an antivirus lab announced that a new clone was on the way, not spreading but on the way.
  • by NanoGator ( 522640 ) on Thursday August 14, 2003 @08:22PM (#6701741) Homepage Journal
    "Linux has its own problems. But you mod them -1 under the rug until the fsf site gets hax0red. troll but true. "

    That was true like a year or two ago, but since this has come up I've been amazed at how things have changed here. It's not that it's turning pro-Microsoft, but the "Everything Linux does is perfect" attitude has settled back down to realistic levels.

    I agree with you, though, Linux is a root password away from being ssh'd to hell.
  • by blair1q ( 305137 ) on Thursday August 14, 2003 @08:23PM (#6701756) Journal
    How many times do people need to be told this?
  • Let's see here (Score:3, Insightful)

    by Anonymous Coward on Thursday August 14, 2003 @08:24PM (#6701765)
    • FSF FTP site gets hacked. Some people are mined for passwords.
    • A significant proportion of all desktop machines on the internet are compromised by a self-propigating virus, and the internet is affected by the sheer quantity of traffic generated by the worm.
    I think there's a slight difference of scale there.
  • by sgtsanity ( 568914 ) on Thursday August 14, 2003 @08:31PM (#6701810)

    This uses the same vulnerability as before. Which means that if you were hit by but recovered from blaster, you'll be safe from this one. That said, this is a more virulent form, and will screw over unprotected networks even faster. But it won't be nearly as damaging as the original. This is just an example of an anti-virus software producer hyping up a virus to sell their product.

  • by ihummel ( 154369 ) <{moc.liamg} {ta} {lemmuhi}> on Thursday August 14, 2003 @08:35PM (#6701850)
    Is anything that doesn't forbid remote access *not* a root/sysadmin password away from being ssh-ed (or whatevered) to hell?
  • by KshGoddess ( 454304 ) <kshgoddess@@@gmail...com> on Thursday August 14, 2003 @08:43PM (#6701905) Homepage Journal

    We were infected by someone dialing in to (of all places, MSN) and opening an *authorized* VPN tunnel to our network.

    Users will not patch their machines, even if there's a bright icon in their start menu. Even if it reminds you all the damn time. If it doesn't automagically download and install, they're not going to do it.

    Should they have to? No. No one should have to patch as often as they do. Especially not desktops. Home users, for the most part, are technically savvy enough to plug in a USB device and have it 'work'. Office users, forget about it. For the most part, people think computers are magic, and IT people are just weird to be able to understand them.

  • Re: Cloning.. (Score:1, Insightful)

    by Anonymous Coward on Thursday August 14, 2003 @08:47PM (#6701941)
    If AIDS became deadlier, and faster to kill, maybe it would help slow its spread. After all if you die a day after contracting it, only necropheliacs would get it. And I think we can all agree that necropheliacs deserve what they get. Are you with me here !?
  • by Amorpheus_MMS ( 653095 ) <amorpheusNO@SPAMgmail.com> on Thursday August 14, 2003 @08:56PM (#6702001)
    It's not unthinkable that they would get a copy early, if one of their users sends it to them for analysis...
  • by Pompatus ( 642396 ) on Thursday August 14, 2003 @09:02PM (#6702041) Journal
    I agree that everyone should at least check out windowsupdate.com every once in awhile, but I am always hesitant to update my windows box. Windows Media Player 9??? Don't need it, don't want DRM. What about SP1 deactivating xp installs with pirate serial numbers? I've had DirectX updates that actually crashed previously working games (not lately though, gotta say that's getting better).

    I like to wait to update my box for about a week or so to see if there is any outcry about some nasty thing Microsoft slips into the update. I'll bet I am not alone. As far as Blaster is concerned, I rely on independant firewall and antivirus applications to deal with these threats. IMHO it works better than relying on MS to secure their OS.
  • Re:gotta say it (Score:1, Insightful)

    by Anonymous Coward on Thursday August 14, 2003 @09:07PM (#6702078)
    Microsoft released a patch for this on July 16th. I think it's been beaten to death to blame Microsoft for this.

    Would you blame Linus if you didn't apply security patches and got hacked?
  • by Solikawa ( 604301 ) <geek,evolved&gmail,com> on Thursday August 14, 2003 @09:07PM (#6702079) Journal
    yea, thats practical, but still you have the effecs of the worm taking up bandwidth, which can lead to trouble
  • by FuzzyDaddy ( 584528 ) on Thursday August 14, 2003 @09:09PM (#6702086) Journal
    Given the size of the vulnerability (all windows systems connected to the internet, regardless of whether you're running any applications), we should be thankful this worm came out so everyone will get out and patch their system.

    If this worm didn't exist, the systems would remain unpatched until some much more destructive exploit was distibuted (say, deleting all your files).

    Think of it as vaccination - a mild form to shore up our defenses, so a killer form doesn't get us.

  • by spblat ( 26399 ) on Thursday August 14, 2003 @09:14PM (#6702123) Homepage Journal
    Maybe if people would get it through their skulls that Windows ships with a BIG WINDOWS UPDATE LINK in the Start Menu for a REASON...

    The problem is harder to solve than that.

    Consider a gigantic worldwide firm that runs flavors of Windows servers and desktops from NT up through Longhorn on thousands upon thousands of machines, in dozens of facilities across the globe. Then consider that many of these servers may be running mission critical applications which are no longer being maintained. As a result, there are complex and thorough change management procedures in place that prevent casual application of the latest patches and updates. For any given server they may a) require weeks to test the patch to make sure nothing comes down; b) find the patch breaks an application and therefore cannot be deployed; or c) have a total ban on even breathing on their older servers lest something break.

    This is why the "just patch your servers early and often" doesn't work for those larger companies. To the decision makers faced with evaluating business risk, the cost of staying up to the latest versions can seem as high (or higher) than the potential loss caused by a compromise.

    So the answer ends up being in your in-line protection: firewalls, and (as they improve) intrusion prevention technologies that offer "virtual patches" for exploits before they hit the wild.

    (Having said all this, if you have boxes with port 135 open to the public internet, you'd better have a good reason. And there aren't many good reasons.)
  • by wfberg ( 24378 ) on Thursday August 14, 2003 @09:22PM (#6702173)
    You're wondering why a REMOTE Procedure Call service is exposed to the network? There's no good reason for a REMOTE Procedure Call to be exposed to the network?

    127.0.0.1/16? sure! The LAN, (192.168.0.0/24 or 10.0.0.0/8, perhaps some Link-Local/Broadcast addresses..) perhaps. The entire INTERNET? No fudging way, man!

    Other MS weirdness; I have filesharing turned on. It's only associated with the LAN card's TCP/IP stack (NOT the PPTP (DSL) connection's TCP/IP stack). Nevertheless, were it not for my spiffy firewall software thingy you'd be able to access it from the internet! Yippee..
  • Re:gotta say it (Score:2, Insightful)

    by windows ( 452268 ) on Thursday August 14, 2003 @09:25PM (#6702186)
    I agree, there was very good lead time here. Us Slashdot readers, Microsoft, the US government, anti-virus coders, and many others knew and said it was only a matter of time before a worm exploited this hole. And now that it's happening, we shouldn't be surprised. We can get some of an indication of just how serious this worm will be, though, by watching tomorrow during the day and evening. It's already late Friday morning in some parts of Asia. We'll know much better the impact of this worm Friday evening, though, as it'll be Saturday in Europe. If anything particularly serious is going to happen, we'll definitely know it for sure.

    And I'm on a Southwestern Bell DSL. Is it just me or are some ISPs now blocking port 135?

    In my opinion, it's definitely a good thing that they are, if this is the case. And it appears to be.
  • Re:gotta say it (Score:1, Insightful)

    by Anonymous Coward on Thursday August 14, 2003 @09:31PM (#6702242)
    I agree 100percent. Not only was the patch released which should cover all home users well enough, even those people who did not wish to immediately patch their systems due to testing the patch itself KNEW HOW THE EXPLOIT WOULD WORK. The information is there. A month ago now, Microsoft released a fix for the problem and information on the problem itself.

    I've seen so many idiotic followers here state that you just can't patch a production server. That may be very true BUT THE INFORMATION ON THE VULNERABILITY IS THERE. There is quite alot that would of been able to be done to protect these systems before running the official MS patch. Firewalls are one option, and this includes internal firewalls that protect important systems from not only the outside world but vulnerable points of your own network.

    People had the patch and had the information. Anyone infected is getting exactly what they deserve. Anyone running a production system that gets infected deserves to lose their job if they're infected, it's just negligence.
  • by morven2 ( 5718 ) * on Thursday August 14, 2003 @09:45PM (#6702303)
    While some companies in the AV industry have shown (ahem) questionable ethics in the past, I think it's stretching to say they WRITE the viruses, rather than just hype them.

    For one thing, there are plenty of idiots out there quite willing to write a virus for free.

    For another, if the viruses/worms/trojans were written by the AV firms, they'd be MUCH better. My co-workers and I would regularly discuss how one could, hypothetically, write the ultimate virus ... some of our ideas would have been quite evil indeed. And most of us were pretty good programmers.

    Contrast that with the true nature of most successful 'in the wild' viruses -- most of which aren't that well written ...
  • Re:bleh (Score:3, Insightful)

    by Overly Critical Guy ( 663429 ) on Thursday August 14, 2003 @09:54PM (#6702369)
    Honestly, that was a silly rant. What does making money have to do with it? Why do you suddenly end with a rant about what Bill wants to do, as if you know?

    I guess I'm just curious how this became "+4 Interesting." Yes, we know Microsoft tries to make money.

    Why should "M$" (that always-clever dollar sign that never stops being incredibly amusing and funny) take the blame for what you started out saying--people who don't patch their boxes are getting hit?
  • by lump ( 670971 ) on Thursday August 14, 2003 @09:58PM (#6702405)
    One good reason to think that companies such as Symantec are genuine in their efforts against viruses is the fact that the fix for any given worm can usually be found - for free - on their site, along with info, links to patches, etc. NO purchase necessary.

    Sure, they are making money from all this, but that seems to be continuing without them having to be do anything sneaky.

    And can you imagine what it would do to them it they did start manufacturing viruses, and were found out?
  • by sanx ( 696287 ) on Thursday August 14, 2003 @10:18PM (#6702547) Homepage
    OK - maybe this is a -5 Flamebait here, but here's a couple of my thoughts.

    The desktop world is ruled (by numbers, anyway) by Microsoft. Any potential malware s'kiddie can knock together some malware in a few hours, dump it into some unsuspecting newsgroup somewhere or email it to his Outlook-using mates and start an epidemic relatively easily. The sheer number of vulnerable machines makes that easy.

    The installed base of Windows boxes also means that, despite MS not opening up their code to anyone (except governments and universities willing to sign away their first-born as insurance against breaking the NDA), large numbers of people spend vast tracts of time throwing McValue Meal-sized URLs at web-servers and mutant packets at RPC interfaces.

    Lots of people x Lots of time x Lots of machines = lots of vulnerabilities found...

    Now consider *nix. It has a number of advantages straight off the block:

    1. It's open source. Code that finds its way into the kernel goes through the best peer-review system available; public scrutiny.
    2. Generally, the people who run *nix are more tech-savvy than an average Joe Blow.
    3. Any vulnerabilities that are found get acknowledged and fixed very quickly.
    But what would happen if *nix had the sort of desktop penetration that Windows does? How quickly would the kind of person that thinks a computer case is called a 'hard drive' apply a *nix security patch? If *nix was that popular, how many more people would devote vast tracts of time to finding obscure security holes and vulnerabilities?

    Just a thought. Now flame away ;)

  • by insecuritiez ( 606865 ) on Thursday August 14, 2003 @10:32PM (#6702625)
    That is a blanket statement that has little truth to it. The internet is made of the computers that connect to it. Many computers that make the internet are not secure. A fully patched system, be it Linux, Unix, or Windows is for all intensive purposes, secure -- for the time being. What people don't get is that security is not a constant thing. It has to be kept up with. How many times do people need to be told to patch their system? But the model and structure of the internet as a decentralized system, is very secure.
  • by Pharmboy ( 216950 ) on Thursday August 14, 2003 @10:36PM (#6702646) Journal
    Well, to be honest, if it didn't sell, the media wouldn't report it that way. People LOVE catastrophe and doomsday predictions, for some odd reason.

    On a similar not, I am witnessing tv hype disaster now. All the power is out in NY, and people have been calmly walking down the street to leave town. Others are "volunteering" to direct traffic, and people are obeying. People are out together in the street with candles, checking on neighbors, almost everyone is calm, even tho with the power out, getting news in was slow and difficult (like 9-11, but much milder). Sure, some will take advantage of the situation, but burglaries happen every night. On the whole, I am pleasantly surprised at how well organized it is, and how well its going so far. Its a success story on dealing, again.

    Yet the news channels are TRYING to make it out to be worse than it is. They are saying how people are mad and want to know why this happened, but they can't SHOW someone saying that, they just report that its true. fox/cnn all the same.

    The real irony is how calm everyone is, how they are seem to have a "oh well, can't help it, no reason to freak out" attitude even while the news reporters are almost trying to get them to.
  • by mgpeter ( 132079 ) on Thursday August 14, 2003 @11:42PM (#6702957) Homepage
    I was updating a couple computers tonight, and at 10:20 Central Time, windows update worked great. At 10:30 windows update and microsoft.com website is unaccessible.

    Nothing, Nada.

    I guess in a weird sort of way, its ironic.
  • Re:gotta say it (Score:4, Insightful)

    by PhxBlue ( 562201 ) on Friday August 15, 2003 @12:59AM (#6703313) Homepage Journal

    Right, Bill Gates personally wrote this worm and released it into the wild.

    I'm no fan of Microsoft, but cut them some slack. They released a fix for this vulnerability two months ago. If people are still vulnerable, it's their own damned fault.

  • by terbo ( 307578 ) on Friday August 15, 2003 @04:12AM (#6703907) Journal
    They dont write the viruses, they just support a platform that makes it easy for them to proliferate ...
  • by radish ( 98371 ) on Friday August 15, 2003 @05:41AM (#6704148) Homepage
    I keep getting all these people telling me I should upgrade and be current with the times. I would gladly upgrade if the later stuff was actually better and more robust than the earlier stuff - but thats not what I see.

    Believe me, there are many things which are more robust than win95. Whilst your paranoia is your business, saying you run win95 because it's more stable than say, w2k, flies in the face of the evidence. And that's not even going into the realm of things like Linux/BSD, which I assume you can't run due to some CAD app or other.

    Let me give you an alternative view point. I run w2k, behind a linux firewall. I use a variety of browsers (IE6, Moz, Opera) with scripting, java etc enabled. The security settings are set to what I'd consider sensible but not paraniod. I run a standard virus scanner which kills anything incoming before I even see it. My email goes into Outlook. I use the web a lot. I go to sites which contain "suspect" material. I download and run exectuables from unverified sources. In short I do everything you're not supposed to, but with the benefit of knowing what's going on and understanding the risks (and how to mitigate them).

    Result? The last virus I found on my system was in the bootsector of an Atari ST floppy disk about 10 years ago. I run AdAware and other trojan detectors every week or so, never found anything particularly nasty (except some junk morpheus put in one time). In short, I get to see all those websites I want to, I get to run the latest software with all those whizzy features, and I still don't get any of the nasty side effects.

    So you're quite welcome to continue practising ultra-safe computing, but IMHO you really don't need to.
  • by edremy ( 36408 ) on Friday August 15, 2003 @08:45AM (#6704698) Journal
    What cracks me up about the whole thing is reporters talking about how terrible losing electrical power is for a day- shops closed, food spoiling, no transporation...

    Folks, you've just described postwar Iraq. Power there has been intermittant for *months*, in heat worse than anything NYC has ever seen. And we wonder why the Iraqis are pissed off? We can't deal without power for a single day...

  • by julesh ( 229690 ) on Friday August 15, 2003 @09:42AM (#6704973)
    I try to keep the number of installed programs to a minimum, like say half a dozen, maybe a dozen.

    Err, yeah, right. Let me count the apps that I absolutely *need* in order to do my job.

    Things from your list:
    * SSH client. Yep, agree with that one
    * Web browser / email client (one program)

    OK, that's two. What I also need:
    * Other web browsers, for compatibility testing
    * Graphics editor (for designing web sites)
    * Text editor (for editing web sites and programs)
    * Word processor (for writing letters & other
    documentation that'll need printing)
    * Spreadsheet (for doing occasional organisational
    tasks)
    * C++ compiler (for the obvious)
    * Java compiler (ditto)
    * Version control system front end
    * Various 'back end' admin systems for web sites
    that I manage
    * Antivirus software (I sometimes send compiled
    programs directly to clients; company policy is
    scan-before-send).
    * CD writing software

    OK, that's 13 absolute essentials. Then there are the things I'd find it hard to live without:

    * File sharing client. Currently only one [shareaza.com] although in the past I've used more than one at once.
    * Media players. Winamp, MS media player, Real One.
    * Productivity utilities: file compression, a fast image viewer, a task scheduler & reminder program
    * Video editing & conversion software in order to be able to stick my home videos onto VCD.
    * Things that I'm playing [shatters.net] with [osafoundation.org]. The odd piece of free-software-du-jour that I might find useful and have downloaded recently to see if its any good.

    That makes 24. It doesn't include any of my own projects (which probably adds a further 10 separate programs to that figure at any one time).

    And, I haven't had any problems with my Windows 2000 system since I installed it 9 months ago. I don't think I'm "insane". I'm just trying to use my computer as the tool that I want it to be.
  • by op00to ( 219949 ) on Friday August 15, 2003 @10:09AM (#6705109)
    I don't know about that. As much as people put the "blame" on the terrorist attacks on 9/11 for EVERY change in New York City, I disagree.

    It sounds nice and warm and fuzzy to have something "good" come out of the terrorist attacks. I think that in general, New Yorkers behave themselves because if they don't, life will really, really suck. First WTC bombing people? You didn't see people looting or freaking out.

    This isn't the first large power outage that hit NYC recently. It happens every other summer or so, just not as widespread.

    I think many people view cities as being inhabited by some sort of animals which have no self control. These people, all living in McMansions in the suburbs, are amazed when adverse situations affect cities, and they don't burn to the ground. Maybe they're jealous that we get to hang out on street corners and drink beers while the power is out, who knows?

    New Yorkers have helped each other before 9/11, and it's obvious that they'll do it after 9/11. Perhaps it awoke something in you that tells you to be civil to your neighbors, but most New Yorkers grow up this way and don't know another. These things happen when you live on top of 8 million other people.
  • by Experiment 626 ( 698257 ) on Friday August 15, 2003 @12:12PM (#6705939)
    Actually, I've wondered about this a lot. All the viruses you hear about tend to do really lame and boring things like reboot your computer or print out "$USERNAME is a doofus". Ooh, terrifying.

    There is so much potential for greater evil and mayhem...

    The data destroyer: Erase a bunch of files, wipe out the boot record, or just format the whole hard drive. People who keep their system unpatched also tend not to worry about backups.

    The hardware destroyer: Run CPUburn. Set the monitor to way-out-of-spec refresh rates and change around them faster than the monitor can handle. Flash update the periphrials with corrupted data.

    The insidious manipulator: Make small, subtle changes to numeric data in Excel and Access files. The kind that nobody is likely to notice for weeks.

    The mischevious troll: Much like the article mirror trolls with a couple words changed to something rude and uncouth, but on the infected computer's Word and text files. Imagine trying to explain to your client that you didn't _really_ type that epitath in your letter to them. Also, download some random porn and sprinkle it on the user's hard drive.

    But nooooo... the best these guys can come up with is "reboot the computer"? Blah!

Thus spake the master programmer: "After three days without programming, life becomes meaningless." -- Geoffrey James, "The Tao of Programming"

Working...