Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Windows Technology

In Test, Windows 7 Vulnerable To 8 Out of 10 Viruses 843

As Windows 7's market share passes 3.6%, up from 1.9% the day before launch, llManDrakell notes an experiment they did over at Sophos. They installed Windows 7 on a clean machine — with no anti-virus protection — with User Access Control in its default configuration. They threw at it the next 10 virus/worm samples that came in the door. Seven of them ran; UAC stopped only one baddie that had run in the absense of UAC. "Lesson learned? You still need to run anti-virus on Windows 7."
This discussion has been archived. No new comments can be posted.

In Test, Windows 7 Vulnerable To 8 Out of 10 Viruses

Comments Filter:
  • Not suprising (Score:3, Informative)

    by plague3106 ( 71849 ) on Tuesday November 03, 2009 @05:36PM (#29968644)

    For one, they watered down UAC. Second, UAC won't do anything if the virus simply attaches itself to your user account, instead of the whole system. UAC is supposed to help keep malware gaining admin rights and infecting your system, not to stop it from running.

  • Re:Not News!! (Score:5, Informative)

    by jeffb (2.718) ( 1189693 ) on Tuesday November 03, 2009 @05:43PM (#29968764)

    Anyone who uses any computer (including Mac AND Linux) without anti-virus is asking for what they get.

    Yep, I've been "asking for what I get", and getting what I ask for, by running Macs without anti-virus for almost 25 years now.

    I use Avast Home Edition. It's free (just registration required), fast, and small-footprint.

    Yeah, I'll pop that right onto my Macs, especially after reading these five-star reviews [cnet.com]. Five reviews with one star each makes five stars, right?

  • Re:Not suprising (Score:3, Informative)

    by mcgrew ( 92797 ) * on Tuesday November 03, 2009 @05:45PM (#29968796) Homepage Journal

    For one, they watered down UAC

    I did in fact RTFA, and they did NOT "water it down"; they ran it in its default configuration.

  • by Space cowboy ( 13680 ) * on Tuesday November 03, 2009 @05:47PM (#29968832) Journal
    I'm running several macs, both at home and at work, and the only time I've ever run an anti-virus on any of them was at the request of my ISP last month - there was a report of a virus originating from my home IP address. I downloaded and ran the latest ClamAV, and of course there was no virus on the machine, it was a spoofed IP address...

    Over the past 5 years, that's the only time I've ever run a virus check. It came up with 0 viruses. I conclude that the likelihood of me getting a virus on a mac is still small compared to my XP box, which every time I run a virus check flags *something* new as wrong/suspicious. Sometimes I can even tell if the something is innocuous or dangerous...

    Slashdot likes to say that anecdotal evidence is meaningless (which of course it is), but when a sufficiently large collection of anecdotes all say the same thing, we call that consensus. The general consensus is (I believe) that Macs are a lot less likely to be infected than Windows boxes, so your 'Anyone who uses any computer (including Mac AND Linux) without anti-virus is asking for what they get' statement is in fact news to me.

    Simon
  • Re:Not suprising (Score:2, Informative)

    by bakawolf ( 1362361 ) on Tuesday November 03, 2009 @05:47PM (#29968834)
    Microsoft did, due to all the complaints from vista.
  • Testing Methodology (Score:0, Informative)

    by Chris453 ( 1092253 ) on Tuesday November 03, 2009 @05:49PM (#29968870)
    Were these run on an administrator account? Also what does 'run' actually mean? Does it mean that the viruses performed their full function or just that they were allowed to run but didn't cause any real damage to the OS? I would be interested if the viruses could still cause OS damage with UAC enabled on a non admin account. The article doesn't do a good job of answering any questions. The articles goal seemed to be to grab headlines.
  • Re:Not suprising (Score:2, Informative)

    by SparkEE ( 954461 ) on Tuesday November 03, 2009 @05:51PM (#29968896)
    I believe the GP meant they=MS, not they=Sophos
  • by Anonymous Coward on Tuesday November 03, 2009 @05:51PM (#29968900)

    You call this a test worthy of coverage here? The guy don't even state whether he's using 32-bit version which I suspect is the case. This won't happen on 64-bit Vista/7.

    Bullshit. Microsoft made the same claim when they made the switch from 16-bit to 32-bit - "Viruses will be a thing of the past." 64 bits is not "magic pixie dust" - it's just the size of a native integer or memory pointer on your cpu.

    no, majorme is right... 64-bit does make a big difference since you're not allowed (even as an admin with elevated privileges) to run kernel level code that's unsigned. 64-bit Vista/Win7 is more resilient to malware than 32-bit Vista/Win7.

  • MS did by default (Score:4, Informative)

    by Sycraft-fu ( 314770 ) on Tuesday November 03, 2009 @05:54PM (#29968940)

    So in Vista, UAC had only two settings: On and off. When it was on the system functioned with real separate privileges. You had to escalate to perform administrative actions. Ok well people bitched and whined and bitched and whined about that since you had to do it for things like changing file permissions or accessing system control panels. Thus Microsoft relented and watered it down for 7, having two settings in between on and off. It is set to one of those by default. More or less it asks for permissions for a program trying to get admin access, but not a user initiated operation.

  • Re:Not News!! (Score:3, Informative)

    by Kohenkatz ( 1166461 ) on Tuesday November 03, 2009 @05:54PM (#29968950) Journal

    Yeah? Can you point to ONE virus in the wild that has ever bitten any Mac or Linux user?

    Yes, I know it's from 2006. But it answers your question: http://www.internetnews.com/dev-news/article.php/3601946 [internetnews.com]

  • Re:Not News!! (Score:5, Informative)

    by abigsmurf ( 919188 ) on Tuesday November 03, 2009 @06:03PM (#29969086)
    Remote Shell trojan [securiteam.com] (which despite the name is self replicating and therefore a virus). Designed specifically to be spread by users running trustworthy executables without the need for admin rights. And yes, it did infect a number of systems 'in the wild'
  • Re:Not News!! (Score:2, Informative)

    by zelbinion ( 442226 ) on Tuesday November 03, 2009 @06:05PM (#29969130)

    Yeah? Can you point to ONE virus in the wild that has ever bitten any Mac or Linux user?

    Well, here's one: Ramen [wikipedia.org]. Got that about 8 years ago when I was pretty inexperienced with Linux. I placed an unpatched RedHat system on the internet with no firewall, and picked up a worm and rootkit for my trouble.

    There's actually a number of malware programs, worms, etc out there for linux:
    Linux Malware [wikipedia.org]

    There are bound to be people out there that have been bitten by these guys. Oh, and while my family members have gotten viruses on their windows machines, I never have. I don't even run anti-virus. I'm just a lot more careful now....

  • by Sycraft-fu ( 314770 ) on Tuesday November 03, 2009 @06:07PM (#29969160)

    Seriously, this guy is almost pathological in his determination to distribute as much FUD as possible about Windows.

    Taco: Fire this retard. The stuff he posts is NOT news for nerds. It is thinly veiled, and ineffective, smear pieces. Real stories about OS problems are interesting. Kdawson's FUD isn't.

  • Re:Not News!! (Score:5, Informative)

    by Bacon Bits ( 926911 ) on Tuesday November 03, 2009 @06:09PM (#29969194)

    When you have little or no say in what software gets selected for use but are required to maintain local support for the same software as well as maintain the security of the network, it is not a waste of time at all. You do not give users Admin privileges. You give them the permissions they require to do their job and no more. That's basic best practice.

    It's really not even that difficult to figure out. Nine times out of ten, the program either wants to write to HKLM\Software\$appname or wants to write to two or three configuration or log files in %programfiles%\$appname. About a quarter of the time (IMX) the documentation contains detailed information about what permissions are necessary. After that it's merely a case of using the various SysInternals monitors to figure out what's causing the problem. Between Xcacls and regini it's not difficult at all to script the changes. I typically maintain a single script which checks for the presence of each application and, if found, applies the necessary permissions changes.

  • Re:Not News!! (Score:5, Informative)

    by Animaether ( 411575 ) on Tuesday November 03, 2009 @06:11PM (#29969238) Journal

    Exactly.

    From GP:

    Trojans don't count.

    Well there go the vast majority of Windows viruses, too.

    In fact, from the test they did...

    - didn't run
    Troj-Bredo-M
    W32/Autorun-ATK
    Troj/Banker-EUT

    -- Ran
    Troj/FakeAV-AFY
    Mal/EncPk-KY
    Mal/EncPk-KP
    Troj/Agent-LIW
    Troj/FakeAV-AFX
    Troj/Zbot-JN
    W32/Autorun-ATC

    So 6/10 were definite Trojans (Troj/). I.e. some piece of software saying it's all sorts of good stuff, but in reality is a virus.

    Then there's the Autoruns - last I knew, autorun, even on Vista, by default doesn't open a darn thing. So I guess either they changed Autorun settings, or they simply told Windows to run the program (a virus).

    Lastly, the Mal/EncPk ones. They're deemed malware because they're packaging and encryption signatures that often get used by malware authors (even though they have legitimate uses, blabla). What do they envelop?
    Mal/EncPk-KY: sadly sophos' site doesn't detail, but other sites will tell you that this, too, is a Trojan with Bredolab blargh.
    Mal/EncPk-KP: "About this threat: The Trojan arrives as an attachment in fake e-card messages, with text as follows"

    So that's 8/10 trojans, and 2/10 that might as well be classified as such unless I'm wholly mistaken about autorun.

    Again GP:

    provided you're not stupid enough to run an executable from an untrusted source

    That's the real issue - and one that applies to any operating system.
    Not saying Windows isn't less secure.. on the other hand, I don't remember Microsoft suggesting that UAC was a 100% solution against viruses. Just against those that try to do admin-y things when you yourself aren't running as admin. That's usually the thing people point out with Linux "it can't infect the rest of the system". Well that's great - but that won't stop it from, for example, turning your machine into a spam zombie as long as the user is allowed to send e-mail.

  • Re:Not News!! (Score:3, Informative)

    by Abreu ( 173023 ) on Tuesday November 03, 2009 @06:17PM (#29969324)

    Please remember that the vast majority of hardware and peripherals are designed from the ground up to work with Windows and that most computers are sold with Windows preinstalled and preconfigured.

    If you want a similar experience, I suggest buying a computer with Linux preinstalled and preconfigured. I recommend System76 [system76.com]

  • Re:MS did by default (Score:5, Informative)

    by jpmorgan ( 517966 ) on Tuesday November 03, 2009 @06:18PM (#29969340) Homepage
    Not quite. Microsoft added a cryptographic whitelist of programs that are automatically allowed to elevate. Certain parts of Windows are then allowed to automatically elevate (like file properties dialogs, the control panel, etc...). Since there's no way to distinguish the source of events, NT 6.x also enforces mandatory access controls, and places programs with administrator privileges in a high integrity level, which prevents low integrity processes from interacting with them.

    That's why some things still require two steps. The 'first click' causes explorer (or whatever part of Windows you're dealing with) to automatically elevate and switch to a high integrity level. But since that click could have been injected by unprivileged malware, rather than an actual mouse click, the program then requires a 'second click' confirmation. Since it's running at a high integrity level now, that second click can only come from other high privilege programs or drivers. One special case is the UAC settings control panel... that places itself into a high integrity level immediately so that malware can't inject keystrokes to turn off UAC.
  • Re:Not News!! (Score:2, Informative)

    by Anonymous Coward on Tuesday November 03, 2009 @06:20PM (#29969368)

    Pro-tip: Windows security has changed a little in the 13 years since NT 4.0 was released.

  • Re:Not News!! (Score:2, Informative)

    by mwvdlee ( 775178 ) on Tuesday November 03, 2009 @06:21PM (#29969386) Homepage

    Yeah? Can you point to ONE virus in the wild that has ever bitten any Mac or Linux user?

    I can't, but google can:
    http://www.google.nl/search?q=linux+virus+in+the+wild [google.nl]
    http://images.google.nl/search?q=osx+virus+in+the+wild [google.nl]
    More than one, actually.
    So yeah, thinking you're safe from virusses simply by using a different OS is still as stupid as it ever was.

  • newsflash... (Score:3, Informative)

    by damn_registrars ( 1103043 ) <damn.registrars@gmail.com> on Tuesday November 03, 2009 @06:24PM (#29969428) Homepage Journal
    ... you can use your preferences to choose which authors you do or do not want to see stories from. If you dislike KDawson's choice of stories so much, you can opt to not display them. Hell, you have a lower UID than I do, and this feature has been available for the entire time I have been a member here. Why you don't know about it is beyond me; why you opt not to use it is even more of a mystery.

    Or you can just continue trolling. The choice is yours.
  • Re:Not News!! (Score:2, Informative)

    by sexconker ( 1179573 ) on Tuesday November 03, 2009 @06:24PM (#29969440)

    And MS pays heavily in terms of $, time, and raw manpower to get hardware vendors to create Windows drivers. And MS creates their own generic drivers for millions of hardware devices.

    What's your point?

  • Re:Not News!! (Score:5, Informative)

    by 99BottlesOfBeerInMyF ( 813746 ) on Tuesday November 03, 2009 @06:24PM (#29969442)

    The funny thing is the article you cite doesn't mention any virus for Linux or OS X that is in the wild. It talks about malware, which it claims is increasing, but does not list any specific item. It doesn't say if any of the malware is a virus or if any of it is propagating in the wild. You've failed in that regard.

  • Re:Not News!! (Score:1, Informative)

    by bonch ( 38532 ) on Tuesday November 03, 2009 @06:27PM (#29969484)

    So all those critical remote execution vulnerabilities that Microsoft patches every month are a figment of our imaginations?

    Hell, anyone else remember when Windows machines started rebooting themselves due to an RPC exploit?

  • Re:Not News!! (Score:3, Informative)

    by PixieDust ( 971386 ) on Tuesday November 03, 2009 @06:28PM (#29969512)
    This article is little more than FUD aimed at Windows. This just in, FIRE HOT! I run without AV, and I haven't had a virus in years. The few things that ALMOST happened, were caused by exploits within Flash or Shockwave. Vista stopped those cold. Yes, VISTA. How do I know I am virus free? Because I know how to scan my system without installing AV. I know how my system should perform, and I know how to see what's running. I periodically check the health of my system by checking what's currently being accessed compared to what's running. I haven't found something out of place in years. Since about 2003 to be exact. Since that time I've had at least 2 machines that I haven't run any sort of protection on. There has yet to be a difference between the machines WITH AV, and the machines WIHTOUT AV. Lesson Learned? Stupid users are stupid. And even the best AV won't protect from that. When I worked retail (shudder), the following was a fairly regular occurrence: Me: So, it looks like your computer is severely infected. Without even running a scan I see about 30 different infections of viruses/spyware. Them: Oh my, well how did I get them? I have (insert Popular Anti-Virus program here)! Me: Well, I do see (insert random P2P app, shady internet history, random items in download directory, etc. here). That could be it. Also it looks like your (insert popular anti-virus here) has been turned off. Them: Oh well yea everytime I (insert high risk activity here) it popped up and annoyed me so I turned it off. Again, stupid users are stupid.
  • Re:Not News!! (Score:2, Informative)

    by punzada ( 1557247 ) on Tuesday November 03, 2009 @06:30PM (#29969544)
    Apparently you weren't around when Blaster hit. All you needed was a machine that was online to get infected. DCOM Exploit and such.
  • Re:Not News!! (Score:1, Informative)

    by Anonymous Coward on Tuesday November 03, 2009 @06:32PM (#29969574)

    Prettymuch the same story here. I consider myself to be fairly computer literate, and spent the last 3 years or so without getting any viruses on my machines. I knew what to avoid, knew how to sandbox anything questionable etc... and about a month ago I picked up a virus anyway. It's not that interesting of a story really, but the way I got infected may be of interest. The virus got on through a compromised advertisement on a torrent site. Now, normally I wouldn't get hit with such attacks since I'm wise enough to use firefox with Adblock Plus and Noscript. However, I unwittingly found out that the browser that Azureus uses for its "search" function provides no such protection. Hell, I didn't even know it used a browser interface for searching. I just clicked "search" and all of the sudden it switches to an in-app browser with ads flashing everywhere and Avast warnings popping up like back in the Win98SE days. I had been using Azureus (vuze) trouble-free for over a year at that point; I just hadn't used their search function before. A week of trying out various solutions failed to remove it and I ended up backing up everything and reformatting (installed the RC of win7 as replacement OS) to get rid of the thing (installed utorrent instead of Azureus).
     
    Captcha: plotted

  • Re:Not News!! (Score:5, Informative)

    by negRo_slim ( 636783 ) <mils_orgen@hotmail.com> on Tuesday November 03, 2009 @06:36PM (#29969638) Homepage
    And I would be willing to bet the same could be said for Security Essentials.

    Been running AVG for years, but ever since I installed SE it's caught shit in video files before they've even finished downloading. As well as a couple JavaScript attacks from websites I wouldn't think twice about visiting. I can't even remember the last threat AVG found aside from cookies.
  • by jpmorgan ( 517966 ) on Tuesday November 03, 2009 @06:37PM (#29969662) Homepage
    Windows 7 has a whitelist (based on authenticode signatures) of programs which are allowed to automatically elevate. However, it also has mandatory access controls, which segregates programs into different integrity levels. When UAC elevates a program, it is placed in a high integrity level. Lower integrity levels aren't allowed to inject things like keystrokes into higher integrity levels.

    So you are somewhat right, but mostly wrong. Malware could trick a trusted program into bypassing UAC and autoelevating, but after elevation the malware won't be able to interact with the trusted program anymore. And since all the trusted programs require a second user interaction before doing anything after elevation, tricking a part of Windows into auto-elevating doesn't help malware at all.
  • by ledow ( 319597 ) on Tuesday November 03, 2009 @06:40PM (#29969768) Homepage

    The facilities are there, in Windows registry and group policy for instance (Software restriction policy, I believe it is called). Some networks might even use those settings, but in general it's FAR FAR too much hassle (especially for a home user). Some software firewalls even work this way already too - I know that pay-for versions of ZoneAlarm come with signature checking of the most popular apps and allow users to black/white list them from accessing the Internet/local network.

    The problem is that people would still authorise the same crap as they do now to run because they just click yes when they see a security dialog. And every time that software is updated (as specified by good network practice), you have to update all the signatures again (and query the user again, who gets bored/annoyed and just keeps clicking Yes). And most viruses on home machines are because people *chose* to run a program that they didn't know the origin of, either by downloading, clicking I Agree or turning their security settings off. And viruses still get through program exploits (macro viruses would be one old example - they appear to be Microsoft Word, which would obviously be "allowed" on the whitelist).

    Also most "whitelists" can usually be hacked / added to by the virus itself if it gains the permissions of the user (how else would the user authorise it to run?) so they again become useless. There are ways around this but they all annoy the user.

    Basically, either these schemes stop everything working (and users cry foul every time they want to run something new or update their software) or throw so many "Do you want to allow this?" dialogs at the user that they quickly disable it or just click Yes to everything when they want run their spiffy new download from disreputable sites.

    Network admins find it far too much hassle to exercise this level of control because of the problems it can cause (basically, users want to be able to run arbitrary code under their user accounts).

    The problem is not viruses, or the whitelist/blacklist, the problem is providing glaring holes in the OS, running as administrator (or making privilege escalation trivial) and running programs that you don't know the origin of. Stop those three things (the easiest of which is just to stop people wanting to run every program they download) and you stop the problem of computer viruses. Whitelists just make that a little trickier, but always provide an avenue to either bypass the whitelist (by the program itself inserting itself into the list, like Windows Firewall allows in some Windows versions) or piss the user off with so many dialogs that they turn the security off / click Yes to everything each time (Windows UAC).

  • by 1s44c ( 552956 ) on Tuesday November 03, 2009 @06:41PM (#29969792)

    I could write a virus attached to an executable that deleted your favorites file or all of the documents in your user's document folders. This would still be a nasty virus and would not be classified as an administrative activity, thus not triggering UAC. This would not indicate any flaw in the OS or it's level of security. This is no different from any other platform, running as admin or not, if you run untrusted code, it will be able to do anything your logged in user can do.

    It's not a virus if it doesn't replicate, it's a Trojan. Virii often using administrative functions and/or OS bugs to spread and hide. UAC should at least make some difference but it's unclear if it makes any.

  • Re:NEWSFLASH! (Score:3, Informative)

    by 1s44c ( 552956 ) on Tuesday November 03, 2009 @06:46PM (#29969880)

    A machine without AV is vulnerable to viruses!

    News at 11!

    Talk about a useless piece of FUD...

    My Linux, Solaris, HP-UX, and OpenBSD machines don't run antivirus software. Yet they have never had a virus.

    It's not the 'machine' that gets the virus, it's the badly written operating system.

  • Lesson learned? (Score:3, Informative)

    by Yunzil ( 181064 ) on Tuesday November 03, 2009 @06:52PM (#29969992) Homepage

    "Lesson learned? You still need to run anti-virus on Windows 7."

    Or you could start by turning up the UAC level.

    People complain that UAC in Vista was too intrusive, so MS turned it down by default. Now people are complaining that it doesn't do enough.

  • Re:Not News!! (Score:4, Informative)

    by tomhudson ( 43916 ) <barbara,hudson&barbara-hudson,com> on Tuesday November 03, 2009 @06:53PM (#29970022) Journal
    Not really. First, the most it could do is infect your own files, not the system. Second, you would have to run it - it can't spread by itself. Do people running linux run strange executable binaries that people send them? No. It's not like Windows, where reading your email can infect your machine.
  • Re:MS did by default (Score:3, Informative)

    by Jugalator ( 259273 ) on Tuesday November 03, 2009 @06:53PM (#29970030) Journal

    Also, on this topic...

    http://www.istartedsomething.com/20090611/uac-in-windows-7-still-broken-microsoft-wont-fix-code-injection-vulnerability/ [istartedsomething.com]

    You can elevate arbitrary code in Windows 7 to admin privileges with the Windows 7 default settings, no UAC questions asked, and MS won't fix that.

  • by Tomji ( 142759 ) on Tuesday November 03, 2009 @07:10PM (#29970334)

    Just recently had to edit the Host file. (Local DNS file).
    Could not save it because of UAC, and didn't get a UAC prompt either, had to give up and disable UAC first.

  • Re:Firewall? (Score:5, Informative)

    by LordLimecat ( 1103839 ) on Tuesday November 03, 2009 @07:22PM (#29970540)
    I thought it was common knowledge that viruses dont need admin to do a large number of things? I could swear this comes up every time arguments about whether linux can get viruses start. Viruses dont need admin to auto run (users can have per-user settings on that), send packets, send email, launch popups, install BHOs, install firefox addons, read files, etc etc etc.

    The things "non-admin" stops are the important things, like installing drivers, installing rootkits, installing LSPs, hooking system files, patching system files, etc etc etc. THOSE are all that matters. If you have a computer set up for the family to use with a non admin account (on XP), the point isnt that you think itll prevent them from getting crapware, its that the crapware wont affect other parts of the system (hopefully).

    Its also a hell of a lot easier to remove viruses installed with non-admin priveleges-- the difference is night and day. Non admin viruses usually just stick a single entry (maybe 2) in the startup list, and SysInternals Autoruns or HijackThis cleans that in about 15 seconds. Admin-installed viruses tend to take on the order of 15-30 minutes of manual removal, or booting into linux, or running combofix, or some combination of the 3, and if you screw up once and miss a file the whole thing reinstalls.

    FWIW Im an IT consultant (part of my job is helpdesk) and I have yet to deal with a nasty virus / rootkit on Vista. XP on the other hand, I've seen viruses that took 45 minutes to remove even with tools like SDFix, the SysInternals suite, and launching ubuntu to manually remove the infected DLLs sorting by date.
  • by Tanman ( 90298 ) on Tuesday November 03, 2009 @08:05PM (#29971226)

    You still need seat belts in cars with airbags, fire departments for neighborhoods with fire resistant code compliance, and ambulances even if a doctor lives next door.

    I mean, really . . . this is stupid.

  • by trouser ( 149900 ) on Tuesday November 03, 2009 @08:26PM (#29971482) Journal

    Valid point but......the plural of virus is viruses. No need to capitalize trojan either, unless you're referring specifically to The Trojan Horse or the brand of condom.

    http://en.wikipedia.org/wiki/Plural_form_of_words_ending_in_-us#Virus [wikipedia.org]

  • by flappinbooger ( 574405 ) on Tuesday November 03, 2009 @09:11PM (#29971982) Homepage
    I dont recall seeing MS claim win7 was virus proof...
  • Re:I'm shocked! (Score:3, Informative)

    by Nadaka ( 224565 ) on Tuesday November 03, 2009 @10:25PM (#29972598)

    Depends on what you mean by "self propagating"? There are a number that run on macs with MS office. There were quite a few for OS9 and earlier.

    Ah... Found a few references for os x virus's.

    http://www.sophos.com/virusinfo/analyses/osxleapa.html [sophos.com] (spreads via ichat)
    http://www.sophos.com/virusinfo/analyses/osxinqtanaa.html [sophos.com] (spreads automatically via bluetooth)
    http://www.sophos.com/virusinfo/analyses/shrenepoa.html [sophos.com] (spreads to other macs on the same network)
    http://www.sophos.com/virusinfo/analyses/osxinqtanab.html [sophos.com] (spreads automatically via bluetooth)
    http://www.sophos.com/virusinfo/analyses/macamphimixa.html [sophos.com] (spreads as an mp3 file)

  • Re:More data needed (Score:3, Informative)

    by Johnno74 ( 252399 ) on Tuesday November 03, 2009 @10:31PM (#29972660)

    And another thing the "article" (and by "article" I mean "infomercial") didn't mention was how many of those malware apps successfully *infected* the machine.

    Out of the 10, 2 threw an error and crashed, 8 "ran". Whats his criteria for "ran". I'm betting that means "didn't crash and burn horribly with an error message shown to the user."

    I looked up the details on the first virus sophos listed (troj/fakeAV) here [ca.com] and apparently one of its actions is to add a link to the all users start menu folder here:

    %Documents and Settings%\All Users\Start Menu\Programs\XP_Antispyware\Uninstall.lnk

    I know for a fact you can't write to this folder without UAC elevation on vista/7, so I'd say it is more likely than not that when the malware ran it tried to write to this folder, failed, and *caught the exception*. The machine was NOT infected.

    I'm not going to check each of the 8 malware apps he ran "successfully" but I'd be surprised if any of them were able to "infect" the pc in any meaninful way with UAC enabled, or if the user was running as non-admin.

    In other words 8/10 malware apps are probably well written enough to have some sort of error handling that eats any errors that may occour without alerting the user.

  • Re:MS did by default (Score:3, Informative)

    by Foolhardy ( 664051 ) <`csmith32' `at' `gmail.com'> on Tuesday November 03, 2009 @10:45PM (#29972754)
    Yeah, I tried the linked proof of concept on the RELEASED version of Windows 7 (the site only references beta and RC versions), and it didn't work. Either it prompted, or it failed to acquire admin or high integrity rights. I notice the site hasn't been updated for build 7600 (the RTM version), even though it's been available for some time. Even if MS patched the specific thing the proof of concept was using but failed to fix the underlying problem, they still need to release an updated version to be taken seriously. The fact that pre-release versions of Windows 7 were incomplete is hardly surprising.
  • by Valdrax ( 32670 ) on Tuesday November 03, 2009 @11:53PM (#29973222)

    Hitting Google is apparently easier than doing research. I went through the articles on your "osx+virus+in+the+wild" link, and what I found on the first pages was...

    • 4 pages on Leap-A: A Trojan that requires one to give an admin password after opening what's supposed to be an image file. It propagates itself via iChat file transfers, but it still requires an idiot to give a password upon opening a file that shouldn't require one.
    • 1 forum post by someone worried about an unidentified Mac virus in the news around the same time as Leap-A.
    • 1 page on Inqtana-B: A false positive from an AV package.
    • 1 blog post by someone bragging about how there aren't any self-propagating Mac viruses in the wild.
    • 1 nigh-incomprehensible wiki article on AV software for Macs.
    • 2 articles on Inqtana-A: (See below.)

    None of these (except possibly Inqtana-A) would be a threat to semi-competent users, and the only article that isn't from 2006 is the garbled wiki page.

    Now if you want some actual research on Mac OS X viruses, you can check a vendor's site:
    http://www.sophos.com/security/analyses/viruses-and-spyware/search-results/?search=OSX&action=search&x=0&y=0 [sophos.com]

    Interestingly, what the site won't tell you is that most (if not all) of these viruses are phantom menaces; you have to Google each one yourself for that kind of detail. Many are proof-of-concept never seen in the wild, and most exploit holes already patched in the OS. All are trojans that require serious PEBKAC to run, even the only two known "worms" for the plantform -- Inqtana and Tored.

    Inqtana [macworld.com], a virus one that got some notoriety and media attention is an example of all three -- a proof of concept (with an expiration date) that attacked an old hole in the Bluetooth stack and which required victims to consent to accept the download from an infected machine. Tored [ca.com] was an email worm that required you to execute an attachment on a very stupid looking spam email payload. Both are basically glorified trojans -- nothing on par with Conficker.

    Now, trojans aren't complete non-issues, but savvy computer users currently have very little to fear from running a Mac w/o AV software since there are currently no self-instantiating viruses for the platform in the wild. Don't download pirated software (and risk something like iWorkS which hides itself in installers for certain programs), and don't trust installers where none should be present.

  • Re:High quality! (Score:0, Informative)

    by nitro316 ( 1179211 ) on Wednesday November 04, 2009 @12:57AM (#29973718)
    even if they did require the permission the average slack jawed yokel windows user will just click allow anyway.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...