New Virus Attacks Via RAR Files 585
sscottsci writes "A new article at eWeek indicates that Virus writers are using .RAR files to bypass Filters and Anti-Virus systems to infect computers. Most anti-virus software cannot scan a .RAR file, and most firewalls do not block the extension yet."
Is this really a big deal? (Score:5, Interesting)
Well, I know of a few that do now... Seriously, is this that much of a threat? Winzip (AFAIK) doesn't handle Rar archives, and most users wouldn't know how to open one if they did find one in their inbox...
Re:Is this really a big deal? (Score:5, Informative)
Re:Is this really a big deal? (Score:5, Interesting)
I'm waiting for the email attachments without extension that include 'instructions' on how to 'save as' to add the extenion, then execute the code. The password protected zip file worms were close...
Re:Is this really a big deal? (Score:3, Interesting)
Actually, I suspect that e-week is exactly the demographics. Many ppl in that group do not care about the legality of such an action and yet, must have enough knowledge to get to warez.
Re:Is this really a big deal? (Score:5, Insightful)
Contrary to popular opinion, Corporate admins aren't the only people who worry about security.
LK
Re:Is this really a big deal? (Score:3, Insightful)
Re:Is this really a big deal? (Score:5, Informative)
http://www.infoworld.com/articles/op/xml/00/10/30
Re:Is this really a big deal? Use WordPad (Score:4, Informative)
The workaround is to open all received e-mail on Windows machines using the included WordPad program. It reads both .DOC and .RTF files, but can't run macros.
Re:Is this really a big deal? Use WordPad (Score:4, Funny)
"Why won't my Office work, and what is this silly 'wordpad' that started up?"
Re:Is this really a big deal? (Score:5, Insightful)
Attack against users? What user needs to receive
All the typical vectors of viruses/worms. Who in billing, or sales/marketing, or whatever NEEDS those files?
When you weigh the cost between the constant drain on IT resources broken OSs (from viruses, unapproved 3rd party apps, etc) would cost, you can't SERIOUSLY hold your position as someone in charge of security.
Our email server blocks up to 2000 (sometimes more) of the above extentions. Most are IDd viruses (netsky, bagle, etc). The RARE occation it blocks something not IDd is due to a NEW virus that hasn't made it to the virus-def file on the scanners. And I'm constantly amazed by the number of ACs who pretend to know things and act indignant.
Re:Is this really a big deal? (Score:5, Insightful)
IT people all too often lose perspective. They see the network as an end to itself. The users are just pains in the neck who screw up my beautiful setup and can't be trusted to use my equipment properly. The whole point of having a network is to enable people to do their jobs more effectively and more efficiently, and part of doing the job includes exchanging various types of files. If you're going to stop the network from being useful, why not shut it down and save all the money you're spending on it?
Blocking executables and having solid, updated virus protection is part of good network security. So is temporarily blocking certain extensions if there's an alert for a new worm or virus that uses a specific type of file. Once your antivirus is updated to reflect the new beastie and the initial infection crisis is over, unblock the extension. Blanket blocking long lists of extensions is a DoS on yourself.
Re:Is this really a big deal? (Score:3, Insightful)
I don't work in corporate I.T. anymore (thankfully... pretty tired of the "cube farm" and useless meetings, etc.) -- but when I did, this type of thing was always a battle.
The quickest way to turn the entire company's perception of I.T. from positive to negative is to keep putting up barriers to their computer usage under the auspices of being "for their own good".
My take on it is; Your job as an I.T. worker is to provide customer servi
Re:Is this really a big deal? (Score:3, Interesting)
Now, I understand about the
concern for warez ... not really (Score:5, Insightful)
Re:concern for warez ... not really (Score:5, Insightful)
Re:Is this really a big deal? (Score:4, Insightful)
Re:Is this really a big deal? (Score:5, Insightful)
If zip (or any) files are blocked, I like sending files encrypted, or merely scrambled.
You would be surprised how few email filters detect an attachment which is simply sent as Base64 or UUEncoded text, in the body. As it's not an attachment, it frequently gets ignored.
Re:Is this really a big deal? (Score:3, Funny)
You would be surprised how few email filters detect an attachment which is simply sent as Base64 or UUEncoded text, in the body. As it's not an attachment, it frequently gets ignored.
Why would we be surprised? People who write e-mail filters have to balance between security and convenience of the user.
I mean, imagine a super complex e-mail filter program that blocked every conceivable way of sending an attachment. If I sent a letter to my mom asking her how her stay was in the hospital, and got someth
Re:Is this really a big deal? (Score:3, Informative)
Gmail blocks sending attachments of "executable" files, which includes .pl .exe .bat .com etc..., It even checks inside of zip, tar/gz archives to see if a file with matching extension is found. If it is found, gmail will not allow you to send your email.
On the other hand if you compress your archive using RAR, gmail cannot check the contents and thus does not complain about executable files.
Comment removed (Score:5, Insightful)
Re:Is this really a big deal? (Score:5, Insightful)
You've answered your own question - most corporations and free email providers block executables.
Re:Is this really a big deal? (Score:5, Funny)
A more clever approach is to have another program do the extracting for you - for example, to distribute it as a password-protected zip file and make the password known to the user. That way, you don't need the identifiable extractor.
Re:Is this really a big deal? (Score:5, Interesting)
Associating the name of a file with its content type is quite ludicrous; Apple used to do a better job of this with the file resources (the average user couldn't change file type - the name wasn't the type!) but with the transition to OS X (Unix) the metadata with files can be lost and is associated via file extension again.
This boils down to the fact that digital data is inherently untyped; there is no way to tell if something is *really* a word document, bitmap, executable, or a random collection of bits (you can use signatures in the data to help with this, but that's about it).
However, more on topic: I didn't know RAR files had "executable" content. If a file in a .RAR archive has a virus, that's no different than any other "hidden" trojan: shouldn't the virus scanner realise there is a problem as soon as the user tries to do something with the uncompressed/unencrypted file?
Re:Is this really a big deal? (Score:3, Informative)
Re:Is this really a big deal? (Score:5, Informative)
As you note, most people don't know about rar files. And even if they do, the anti-virus program will block the virus as soon as the rar set is put back together.
This is a complete non-issue. Not to mention, Winrar, which creates and reassembles
Re:Is this really a big deal? (Score:3, Insightful)
ZIP has been able to do this since long before RAR has existed; it just wasn't very convenient. ARJ and loads of other archivers could do it conveniently, but ZIP became a de-facto standard on PR grounds, rather than technical ones. RAR is pretty much exactly the same as any number of formats that existed 15 years ago, but people are willing to adopt it because it's new and better, rathe
Slow news day! (Score:5, Insightful)
Why exactly does putting viruses into .rar's count as a new virus attack technique?
This is the same thing that has been going of for a long time with viruses in compressed files.
What's next, complaining that there are viruses in tar files? Suggesting that propagation of viruses by usb-flash drives, DVD-RW's, SD camera memory and so on... are new vectors of propagation?
This seems like a really lousy way of trying to instill virus paranoia in people to sell more A/V software.
Then again, maybe my tinfoil hat is just a bit tight today. Does anyone think there is merit to this article?
Oh, the horrid memories (Score:5, Funny)
Re:Oh, the horrid memories (Score:5, Funny)
Re:Oh, the horrid memories (Score:3, Funny)
Of course, remotely putting that into the autostart folders of pesky coworkers is nice too. Praise Billy Boy
uh... (Score:5, Funny)
Re:uh... (Score:3, Funny)
For those that don't know (Score:5, Funny)
Re:For those that don't know (Score:5, Funny)
Nah, it's 100% legal - you're simply a small part of someone's distributed offsite backup and archive model.
Can't scan rar?? (Score:5, Insightful)
What? Is it really a case where the software can't scan the archive or is it just that it's not included in the default types of files to scan?
Just tested this on AVG and it indeed scans rar archives.
It can't scan INSIDE the rar (Score:3, Informative)
Re:It can't scan INSIDE the rar (Score:5, Interesting)
I can't say I've ever paid much attention to other products but I would have hoped Norton and the like would also have this capability.
Re:It can't scan INSIDE the rar (Score:2)
Re:It can't scan INSIDE the rar (Score:5, Interesting)
Of course, I don't know whether you have WinRAR installed. Can AVG scan your RAR files if you don't have WinRAR installed?
Re:It can't scan INSIDE the rar (Score:4, Insightful)
How the bleep do you expect a user to get infected from a file inside a RAR (which is the point of this discussion) if he doesn't have a RAR decompressor?
If he can decompress, so can AVG. If he can't, AVG only scans the outside of the RAR, which is the only part that can infect him. Where's the problem?
Re:It can't scan INSIDE the rar (Score:3, Informative)
No problem! (Score:4, Insightful)
Carry on with the downloading, there's nothing to see here...
Re:No problem! (Score:3, Funny)
Cumulatively, it could be a big waste reduction.
Re:No problem! (Score:4, Insightful)
Just another example of how very often trying to make computers "easier to use" actually makes things more of a pain in the butt when it comes down to it.
Big deal (Score:4, Interesting)
Re:Big deal (Score:2)
Re:Big deal (Score:3, Insightful)
- write a program that installs a trojan
- write documentation that says it handles
- make sure Google has indexed it
- send
People will download and install your trojan all by themselves! Profit!
The Bright Side (Score:5, Insightful)
Re:The Bright Side (Score:2, Insightful)
Slashdot Headline! (Score:5, Funny)
RAR is very popular (Score:5, Interesting)
Of course, such people are less likely to be taken in by a virus, so I'm forced to believe that this new spin on virus writing isn't going to be very effective.
Similarly, I suppose virus-writers could rename their
Re:RAR is very popular (Score:4, Informative)
Re:RAR is very popular (Score:3, Interesting)
Re:RAR is very popular (Score:3, Informative)
I've been opening .rar files for a while (Score:2, Insightful)
It just makes sense to me.
appealing to lustful young men (Score:2)
How's this new? (Score:5, Insightful)
Not seeing the problem, aside from the same old 'don't go happy-assing around executing any damn old executable that someone emails you.'
Trojan? (Score:2)
eWeek ... (Score:5, Funny)
In other news (Score:2, Funny)
Fortunatelly, no one got it, as no one remembers anymore what the heck an
Rumors said the password is "G04TSE.CXR0X".. go now then, have some fun...
Re:In other news (Score:3, Informative)
ClamAV wins again... (Score:5, Informative)
Re:ClamAV wins again... (Score:5, Interesting)
ClamAV just wins period. Not having to pay per-seat licensing is awesome. Never needing to track or renew a subscription is worth every penny you'll spend on Clam AV (umm...$0.00).
I can't think of any reason to run anything else for an email server. Am I missing something really big that ClamAV just can't do?
Re:ClamAV wins again... (Score:4, Informative)
Am I missing something really big that ClamAV just can't do?
Get updates about a major new virus a week too late to do any good?
I was working for a client who had a vigorously-enforced anti-virus policy. Before anyone is allowed to connect to the network, the I/T security dept. has to verify that they have an anti-virus package installed, running and up-to-date. This policy created a bit of a problem when I showed up with my laptop running Debian Linux. I tried to argue that there are no Linux viruses in the wild and, further, that as a 100% Windows shop, even if my machine did have a virus, it wouldn't run on any of *theirs*. No luck. "NO AV, NO NETWORK," was the decision from on high.
Not expecting much, I ran "apt-cache search anti-virus" and was shocked to see that there were two different AV tools packaged by Debian, and that clamav even had the ability to scan local files on my system. I set it up to scan periodically, left "freshclam" set on the default update schedule (daily), showed the I/T security guy how it worked (and that it had found nothing), and he grudgingly allowed me on the network, convinced, I think, that my open source anti-virus tool *had* to be crap.
A couple of days later, I noticed that ClamAV had flagged a file in my mailbox as being infected. It was a document that the client's project manager had sent me -- from a machine running an up-to-date copy of Norton Anti-Virus Gold, Corporate Edition. I reported the incident and didn't think much of it. I figured the manager that sent it to me must not have had his AV software running (Lord knows if I ran Windows I'd be tempted to shut the CPU- and RAM-hogging thing down so I could get some work done).
Over the next two days, nearly all productive work in the I/T dept. ground to a halt, because by the time I got the infected document, almost the entire company was infected. I don't recall which virus it was (it didn't really interfere with anything I was doing), but I know they had a devil of a time getting it all cleaned up.
As it turned out, NONE of the three major commercial AV tools deployed at the company detected the new virus until about a week later.
I found out later that this experience is the rule, not the exception, with fast-moving new viruses. ClamAV is not only community-developed, but the databased is community-maintained as well, so whenever a sysadmin somewhere notices a new virus, it gets added to the database very quickly. The commercial AV vendors don't move as quickly, and consequently their tools often miss fast-spreading viruses long enough for them to become a problem.
ClamAV rocks.
Not by Default! (Score:3, Informative)
Whats the point? (Score:4, Interesting)
How about a .virus file type? (Score:5, Funny)
Is anyone with me?
RAR bombs (Score:2, Insightful)
RAR is very popular in China (Score:4, Informative)
So.. (Score:2, Insightful)
If your firewall blocks ZIP files and RAR files, then how are you supposed to exchange groups of files with your friends efficiently?
Isn't the WHOLE POINT of having archive file software on your computer defeated by blocking content with these extensions?
Not a big deal (Score:3, Informative)
The user still has to be dumb enough to click on that
The article expresses a fear that there are people out there in cluelessland that will think "Gee, I know I should scan
There may be three people on the whole planet who are actually at that particular mix of clueless and clueful states. The rest either still don't know the first thing about what a
If a journalist tried to make us all afraid of the risk of terrorists that try to sneak through customs by disguising themselves as Mexican Banditos, complete with bandoleers of bullets, some people would probably buy that too.
REALLY old news (Score:3, Informative)
The solution is worse than the problem (Score:3, Insightful)
Educate the users not to be morons. At our site, we've had trouble working with a university because our ISP removes .exe files from attachments and their server removes .zip files. Pretty hard to exchange executables in that kind of environment.
Now we use an ftp server. All because idiots click on attachments without thinking.
Re:The solution is worse than the problem (Score:4, Informative)
Another strike against Linux (Score:3, Funny)
All my household systems come with software to decrypt rars, bzip2s, gzips, tars, etc. .
All this extra functionality results in vulnerabilities, eh?
Oh. Wait. Even when I get the file open, the trojan won't excute. Guess I better fire up Wine, see if I can get it to work.
If only Win32 was better supported in Linux, then I wouldn't have these cross-platform issues.
Ohh, it's just about user stupidity as usual (Score:3, Funny)
It's not a problem with RAR in specific... If they block RAR files, I'm sure they could instead just be guided to a web page and told to install an ActiveX control instead.
If you could only patch the real serious security holes here -- the ones in the users' brains...
*sigh* (Score:5, Insightful)
Why didn't we have problems like this in the past? Why did virus writers have to be so much more clever? It was because the only people using computers had at least something of an idea of what they were doing. Viruses are, for the most part, easily avoided. It's only when users are clueless and trusting that they are allowed to flourish.
Re:*sigh* (Score:3, Insightful)
While I agree with you to some extent, you picked a really poor example there. The international characters in the URL toolbar are really very deceptive. Allow me to offer you two picture links.
Letter "a" [fileformat.info]
Letter "a" [fileformat.info]
Now you tell me which one is the cyrillic character, and which is the roman charact
Not sure how this is a new threat (Score:5, Insightful)
Scenario 1: System cannot unpack
Scenario 2: System can unpack
I just tested eTrust Antivirus, and it does catch the EICAR test file if I try to open it from a RAR, so I don't see what the problem is.
When will we see a .TXT virus? (Score:5, Interesting)
Many companies block
So, once people get into the
And it's going to be fun seeing the whole IT infrastructure that relies on file extensions fall into a crumbling heap.
-ch
Again I think we missed the point (Score:3, Insightful)
THEY ARE USEFUL ESPECIALLY OVER A NETWORK, you know, they reduce file sizes.
Instead: educate, and write decent sandboxing / active protection software that will scan on decompress.
OK, don't bothc the job, do it right.
blocking rar files... great then all warez sites will rename to
I solved this problem back in July, 2004... (Score:3, Interesting)
In this manner the incoming file attachments can be safely scanned for viruses, deleted, quarantined, or renamed by removing the '.txt' at the end and put to use.
If you want to learn more and download my quality (but bland-looking) Windows freeware/shareware, visit now. [cf13.com]
P.S. since July 2004, I've only gotten a handful of 'no content' email spam at iamcf13@hotpop.com. This technique is used by spammers to validate working email addresses that do not bounce. That is the only spam I recieve nowadays. All the rest is autodeleted by cf13-pop3.
However, I DO wish I could run my shareware mailserver cf13-smtp and avoid downloading the spam in the first place.
Re:limited scope at best (Score:2, Informative)
Re:limited scope at best (Score:5, Insightful)
Unfortunately, WinZip sucks beyond words.
XP's Native handling of Zip files is annoying at best, and is usually one of the first things I disable whenever I install XP.
I guess I just don't understand what the "nightmare" part is about WinRAR.
How easy does it have to be, really? Select files, right click, select "add to archive" or "add to filename.rar" and let it run. You're done.
Extracting is even easier. Right click, select "Extract files" to get a path choice, "Extract Here" to uhm, extract in the current folder or "Extract to filename" which creates a folder with the same name as the file.
Not to mention the bonus features you get if you bother to open the program, such as file recovery and repair, authentication checking, and the ability to extract from a partial set and even extract broken files if you really, really need them.
However, this should not be an issue at all, since most people don't have any support for RAR files and therefore can't open them to run the executable inside it (which is monumentally stupid anyway and whoever does, deserves whatever crap they get installed as a result of that action).
As for the "yet" part of blocking...
When are we going to put the responsibility in the hands of the user and stop dumbing down the internet? There are those of us who actually know what we're doing, don't open unknown attachments, never get viruses or trojans and always get pissed off when email servers filter out valid files.
I can't even send a bloody Word document because of the "risk of macros".
Gimme a freakin' break already.
Listen up people, if you're too dumb to use email without infecting your computer with the latest malware, maybe you should reconsider email as your communications method of choice.
Re:limited scope at best (Score:3, Insightful)
When the stupid end users stop downloading everything they can to infect thier PC's with spy/mal-ware. You are the EXCEPTION. "End User" is equivalent to a 4-letter word in our department. Every inch you give them is a mile they make you walk to fix their problems.
Sounds like you've never worked any kind of support job. People do stupid things that you tell them
Re:limited scope at best (Score:3, Informative)
LOL, yes, this is exactly why I use RAR, honestly! Jesus you're dumb.
You know, the horse and carriage has been a standa
Re:limited scope at best (Score:3, Interesting)
Clearly you've never experienced line noise. Me, personally, if I was downloading something back in the BBS days and I had a bit of line noise I'd rather be able to download another smaller RAR piece than have to redownload the whole thing. Z-Modem wouldn't have done squa
Re:limited scope at best (Score:4, Interesting)
"Because the releases consists of small parts you don't have to worry about re-downloading the whole release if something goes wrong and a file gets corrupted." BS. In this day and age of high speed internet this is not relevent. Especially while using torrent files. It really wasn't ever relevent during the modem/bbs days. Z-modem had resume downloads and everyone used it. No need for rar then.
You have obviously never done binary transfers over usenet (which is still very common today). It's done almost exclusively using RAR because news servers DO drop posts which means that you WILL lose parts of the archive.Re:Good news! (Score:5, Interesting)
The reason Zip became so popular was its speed/efficiency comprimise back in the days where it mattered. Using zip, nowadays, is simply due to habit and culture. There isn't an advantage for MOST like there used to be.
RAR compression is better and has a very nice archive spanning feature. Believe me... this is ever so handy when backing up 40GB of data to a file system/Software that can't address files larger then 2GB. Couple that with the free Stuffit Expander, and I can't come up with a reason you WOULDN't use RAR.
Re:Good news! (Score:2, Informative)
Re:Good news! (Score:5, Insightful)
There isn't an advantage for most users.
bzip2, 7z, and many more compression formats are better, and you can find archive spanning programs for every single compression technique because that's such a trivial algorithm to implement.
I can't come up with a reason why you'd use rar OR zip.
Well, er, good news! (Score:3, Informative)
OK, the pzip people (p7zip project [sourceforge.net]) have ported it to the posix command line. But you'll have to compile it yourself and write your own GUI. But you can at least work with 7zip archives now.
Re:Good news! (Score:3, Informative)
Re:Good news! (Score:2, Informative)
Re:Good news! (Score:5, Informative)
Re:Good news! (Score:3, Informative)
Re:Good news! (Score:3, Insightful)
Face it, people are slowly moving to a better and more efficient format. All we have is some virus protection companies who are on the slow end of adapting to new technologies. And it's not all that new, RAR has been around for at least 5 years.
Do you really want to trust an ant
Re:Good news! (Score:2, Insightful)
Nice elitest answer there. YOU can't thin
Re:Well, duh. (Score:2)
Did you think that Windows automatically knows to try and execute
Re:first post (Score:2, Funny)