Digital Picture Frames Infected by Trojan Viruses 174
CR0WTR0B0T writes "The San Francisco Chronicle is running a story on viruses loaded into digital picture frames, similar to the ones we discussed at the end of last year. The difference is in the virus used: 'The authors of the new Trojan Horse are well-funded professionals whose malware has 'specific designs to capture something and not leave traces ... This would be a nuclear bomb of malware.' Apparently, a number of regular folks have hooked them up to their home computer and loaded the virus. And if you think you're too smart to be fooled, apparently the Anti-Virus software makers have not caught up to the threat quite yet."
Well... (Score:5, Insightful)
- Run an OS that does not execute programs on devices once mounted, without user interaction but preferably not at all. (Autorun, I'm looking at you)
Although what doesn't seem to mentioned specifically is if the viruses are contained on the memory of the frames themselves (i.e. just like any other removeable drive) or whether they are on some sort of driver/bundle CD. It does seem to hint that it means the device itself, which begs the question how is it getting executed? Is there a setup.exe that autoruns like on certain brands of USB drive (DUMB IDEA OF THE CENTURY)? Are there infected data files like JPEG's that just so happen to allow execution of their code on certain OS's? Is there an actual executable that isn't supposed to be on there at all that autoruns or waits for the user to double-click it?
Either way, it's hardly a brilliant way to spread and only a dozen or so people seem to have been affected out of whichever country it's talking about (presumably the US). That sounds more like they had the virus already and it made its way onto their digital photo frames when they first connected them. Yes, it's a worry that malicious code could make its way onto a consumer device at the factory, but more at fault here are the OS and the user practices - we had all this back in the 80's/90's... don't take floppies off people you don't trust without scanning them first. Have we seriously come full-circle to the same dumb, preventable "problem"?
Re:Well... (Score:5, Insightful)
And this would help HOW? Maybe it'd allow certain wiseguys to point at and blame the user for mounting the volumne in question - but ordinary users who just want to put pictures on their frame would *have* to mount it it, and it doesn't matter whether you have to click or whether it happens automatically. In fact, given that you'll likely only ever plug in the frame when you actually do want to access it, automounting seems like a good idea that does save you work in this case.
Automatically running code without the user asking for it is another issue, of course - that is a colossally stupid idea indeed, yes.
Re:Well... (Score:5, Informative)
, so not having something run auomatioally doesn't really matter, when you do open the picture it Runs by exploiting a flaw in the program that renders it. whether it starts automatically or not is of less relevance.
This fact isn't being made very clear in this forum or the document.
Pictures are not viruses they ar caused to become one on very specific software that render them .
EX: The same image when viewed or if even viewable on different rendering software will have no effect .
Re:Well... (Score:4, Insightful)
Re: (Score:3, Insightful)
you plucked this assertion out of your ass
Re:Well... (Score:4, Funny)
Re: (Score:3, Insightful)
> hardcore gamers aren't likely to use digital picture frames
you plucked this assertion out of your ass
Since there are somewhere over 8 million WoW players (as an example) then I'd have to agree with your comment about the source of the assertion. Many, many of the WoW gamers I chat with online have difficulty upgrading video drivers and managing their PC. If they want to proudly display their WoW toons to their friends of course they will buy a digital picture frame at Best Buy.
Re:Well... (Score:4, Funny)
They could infect the driver (Score:2)
But if everyone used the computer this way, the attackers would just adapt.
The problem is homogenity, there is no one solution.
Re: (Score:3, Insightful)
Re: (Score:2)
Is this true? windows autoruns on CDs and fixed disks. You need to go out of your way to enable autorun on a usb drive. The drive needs to support auto-assist notification. These usb drives dont. Ive handled many a digital frame and have not seen them do anything like this. I know this is slashdot which is the source for MS FUD, but does anyone have some proof that these infected frames actually do run co
Re: (Score:3, Interesting)
Run procmon when you plug in a usb storage device, watch and see.
Re: (Score:2)
http://dailycupoftech.com/usb-drive-autoruninf-tweaking/ [dailycupoftech.com]
Right a big GUI prompt, not a stealth start.
Straight from microsoft:
Q: What must I do to trigger Autorun on my USB storage device?
The Autorun capabilities are restricted to CD-ROM drives and fixed disk drives. If you need to make a USB storage device perform Autorun, the device must not be marked as a removable media device and the device must cont
Re: (Score:2)
And obviously, it'd be impossible to tinker with the firmware such that 'normal' USB drives self-reported as CDs...
You're obviously the one tossing around FUD. Shame on you.
Re: (Score:2)
>You're obviously the one tossing around FUD. Shame on you.
Oh piss off, if youre unwilling to read my posts and think about what is being claimed then youre just another "me too" guy towing the slashdot line.
Re: (Score:2)
Windows autoruns things that want to be autorun. You are right that there's a small roadblock in there, but obviously not much of one.
And most definitely you cannot tell by physically looking at the media, if it contains an autorun script.
Honestly, think about i
Re: (Score:2)
[autorun]
open=rundll.exe
shell\open=??(&O)
shell\open\Command=rundll.exe
shell\open\Default=1
shell\explore=?????(&X)
shell\explore\Command=rundll.exe
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_VB.ERN&VSect=T [trendmicro.com]
Re: (Score:2)
Where is the question ... (Score:2, Interesting)
Oh, and run a *nix-based desktop.
It is not "professional", but gov. (Score:3, Insightful)
Re: (Score:2)
Keep up the good work, gentleman. Let me know when you get somewhere.
Nuclear bomb of malware? (Score:3, Insightful)
Re: (Score:3, Funny)
Re: (Score:3, Informative)
Re: (Score:2)
Normal picture frame: £5 ($10) [amazon.co.uk]
Cost of devloping photo from a camera? About £2.50 a memory stick in lots of stores. You can do it at the same place you buy a cheap frame from.
In addition the 'digital' frame uses power, can fail (especially if it gets dropped), is only viewable from certain angles, etc.
There's a reason you rarely see
Re: (Score:2)
Could be but I like to think they are purchased by gadget lovers who probably gave birth to current Slashdot readers........
Re: (Score:2)
Hey, I resemble that remark. I actually bought a couple for Christmas gifts. They were quite well received - folks that have digital cameras (or have family that have digital cameras) that want something quick and easy to view pics with. They work admirably.
The quality isn't all that good, the ones I got where 13" 1024 x 768 with a early generation TFT. With some fiddling with
Re: (Score:2, Insightful)
Re: (Score:2)
I got one for my parents, and they like it (they've had digital cameras for ages). You're right in that they're very expensive which is why I chose it as a gift: they're a nice thing to have, but hard to justify spending your own money on.
Almost your entire argument is that they're worthless because they're expensive. New tech is always expensive. When they become more affordable I think they'll grow in popularity a lot. The viewing angle is pretty good on the one I got, and LCDs are always improving.
Th
Re:Nuclear bomb of malware? (Score:4, Interesting)
At least, my mom thinks so. In the end, that's the key thing to remember about specialized technology - there is/should always be a niche it fills, and it's most profitable when niche > 1. Nearly nothing is too esoteric to be useful to someone - ask me to show you some of the glassware in my chem lab!
Re: (Score:2)
Take one to work and place it where you can see it. It actually surprised me how much I love it.
Re: (Score:3, Insightful)
Re: (Score:2)
Put the pieces together (Score:5, Insightful)
2. Computer Associates has traced the Trojan to a specific group in China
3. It spreads by USB drives
4. "It is a nasty worm that has a great deal of intelligence,"
Follow the money. My money's on an espionage tool from the Chinese government or its affiliated corporations. Let the flaming begin...I said "China" and "espionage" in the same sentence, I'm sure folks out there would like to lynch me just for even suggesting that there is such a laughable concept as espionage, or bash me for so-called China-bashing (which includes any criticism of China except those for human rights, that's OK).
Re: (Score:3, Interesting)
Re: (Score:2)
If you're trying to covertly undermine the US military industrial complex AND your vector is low end commercial electronic junk then you aren't going to do much damage. GWB (or even a flunky in the Pentagon) is not likely to have one of these on the desk.
And by doing this sort of low end annoyance, you've raised yet another flag that so security and supervision is heightened further. If you are responsible for securing a serious private or
Follow the bullshit too (Score:2)
What flavor of crap is that? Most nuclear bombs leave plenty of traces.
Easy Solution (Score:2, Funny)
And before anyone says it, yes, yes, I'm in no danger...right.
Cheers!
Strat
Be Safe: Roll Your Own DPF (Score:5, Informative)
ALERT: People at SANS, incoming CHAIRS! (Score:4, Insightful)
Deborah Hale at SANS suggested that PC users find friends with Macintosh or Linux machines and have them check for malware before plugging any device into a PC.
Oh boy, you gotta love that bit. Amusing as the suggestion that Mac's and Linux "machines" are not PC's may be, do you realize just how damning of MS software this is? SANS, a security organisations basically says that if you don't trust a piece of hardware, then it is okay to plug it into a mac or linux machine, to test wether it is safe to plug it into a windows pc.
Is this like those warnings on tv, kids do not try this, if you want to do this experiment, get an adult to help you. Kids do not use windows blindly, if you do wish to add a new device, get someone with a real OS to help you out.
Oh well, to all the windows using women out there, remember, the standard rate for getting a guy to help you out is ONE blowjob. Please form an orderly cue.
Re: (Score:2)
Re: (Score:2)
(Disclaimer: I'm a Linux user and I have no friends.... Will you be my friend?)
Re: (Score:3, Funny)
Do those sores on your mouth mean anything? No? Carry on then...
Re: (Score:2)
Ah, I never get tired of open source jokes.
Re: (Score:2)
The chicken or the egg (Score:4, Interesting)
Three R's again!!! (Score:5, Funny)
reboot the machine
reload the applications *
reformat/reinstall the OS *
revert to the previous version
but it must be fun cause we do it over and over and over and over and over and over and over and over and over.
Re: (Score:2)
Retry (it might work the second try)
Restart (the program)
Reboot (the O/S)
Reinstall (the program, and various versions)
Reformat
Reinstall (the O/S + application)
Reinstall (another O/S + application)
Retry (who knows...)
Resign
Resume (rhymes with cafe)
Resume (rhymes with consume)
Then there was: plug and pray and plug and pay and plug and pray and plug and play and plug and pray and plug and yay... finally it works
Re: (Score:2)
Yes.
Well, thats because it will work if you do it that way - but you don't *need* to do it that way. About the only time I reboot a linux box is if I'm upgrading the kernel or a process is so I/O bound that it becomes unkillable, that's a rarity, and at home the boxes go down cause I'm going to sleep and I'm doing all I can to minimise my power consumption. As for re-install (I'm using fedora) most of the apps ar
Words of Advice (Score:2, Funny)
You really just got to wonder what they were .... (Score:3, Insightful)
Don't virus writers have better thens to do?
Unless they are vested in anti-virus software, whats teh point other than just causing countless people problems.
Re:You really just got to wonder what they were .. (Score:4, Insightful)
Virus writing is highly profitable, each second a piece of malware goes unstopped on a machine is a second that the machine can continue to spew spam, spy on an internal network, or be a part of a DDoS attack.
Goatse frames? (Score:2)
Re: (Score:2)
Believe it or not; Goatse as seen from inside (Score:2)
Re: (Score:2)
Network Virus Innoculation (Score:3, Insightful)
I should be able to subscribe to an antivirus site that distributes inoculation viruses, just like in nature. Install it on my home/office server, and it gets updates which attack my own hosts the same way as the enemy virus does in the wild. But its attack payload is removed, replaced with a payload that patches the infected host against the attack virus. The home server should also scan the network's devices for other signs that they're already infected, including emailing me with instructions how to inspect each device for UI signs that it's infected with the attack vir And periodic (daily/weekly/etc) reports of "health status". When it detects a host, like a networked picture frame, that seems to be already infected but can't be autopatched, it can recommend further manual steps if possible, including wiping the host's storage if that will work. Or just recommend unplugging and throwing away a doomed host, perhaps with a mail-in "thorough treatment" by the antivirus vendor experts, if there's a chance to recover data and the device. Or just throw away a hopeless device.
There's a lot of talk lately about "good worms" which would cruise the Net just like "bad worms", but patch instead of infect. Since "patch vs infect" is in the eye of the human operator, that unsupervised release into the wild can easily go wrong. But this kind of managed release in each LAN, rather than just over the entire WAN (Internet), leaves the "doctor virus" compartmentalized - don't let it route between LAN segments. And more importantly, it leaves the vendor and the home user who started it each responsible, and accountable, for using it right. If it's made extremely simple to operate, with the most minimal user intervention required, this kind of product could really improve security without a lot of hassle. And make antivirus vendors a new ton of money.
Re: (Score:2)
Re: (Score:2)
For another, that's the cat/mouse game they're already playing. So the antivirus I'm describing has to be able to protect from that attack, too. Again, regardless of whether the antivirus is deployed as I describe, or not.
The only change I make is that the software the user is already installing now will also cruise their network patching their own hosts without an admin UI or admin user (probably eventually all
Re: (Score:2)
"Penetration + patch" looks identical to "penetration + destroy" at the high level. Both have malicious code in the penetration portion and both require access to disk/network to
Re: (Score:2)
This doesn't seem to do any harm, but can do a lot of good. Especially when it sometimes succeeds in attacking hosts whic
Re: (Score:2)
I just don't see much coming down the line that is going to solve anything: Spam, Spoofing, Virii, Worms, etc. Some things give me hope, like the spread of Linux, but even then, how is it really g
Re: (Score:2)
And I said that the user doesn't need any knowledge of anything. The "good virus" vendor knows what virus wrapper it's inoculating against, and what patches to put in the wrapper.
And if these devices are patched against the original bad version of a virus, clicking an infected email with it isn't going to do any harm.
And I pointed out that the devices these are primarily designed to fix, like digital picture frames, are not the kind where you
Re: (Score:2)
I didn't say "the tubes", I said over and again "the user's LAN". And I said that the user doesn't need any knowledge of anything.
I see that now. However, if it's safe for a LAN, why wouldn't it be safe for the tubes? Maybe because it isn't?
The "good virus" vendor knows what virus wrapper it's inoculating against, and what patches to put in the wrapper.
There's a huge leap from writing a signature for some AV software to catch a virus and writing a "good virus" that patches the bug that the virus is exploiting, if it even is a bug and not some deeper problem. Not to mention, different versions of the same software/hardware requiring a completely different patch.
You can't just add 'Doesn't allow ...' and 'Will do ...' verbiage to your spec
Re: (Score:2)
Don't bother telling me some past employers. Not onl
Re: (Score:2)
Take your ball er bad idea a go home for all I care...
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
As for its resource intensity, that's required only from the separate LAN server that operates its up
Re: (Score:2)
Computer, heal thyself. (Score:2)
For your idea to work, we would need an OS capable of detecting and eliminating the bad stuff, something that biological systems still have a hard time with. For example, a body's solution to
Re: (Score:2)
For my idea to work, the treated devices don't need anything they don't have now. The point is that the healing viruses attack ex
Re: (Score:2)
Also, why wouldn't the "good virus" payload operate gracefully, rather than just restart your device without warning?
Automation like I described (external) doesn't take over the role of all software updates. But it does augment existing support, in a way that existing support doesn't offer.
Re: (Score:2)
It is centrally administered.
It's interesting how so many people replying in this thread have projected their own fears onto my propositi
Switch off autorun already, huh? (Score:3, Informative)
NoDriveTypeAutorun (Score:3, Informative)
Strange virus (Score:3, Funny)
Fire the metaphor writer (Score:5, Funny)
Say what? Whenever I want to sneak in somewhere and get away all quiet-and-subtle-like, my first thoughts are of atomic weaponry. Want to steal sensitive documents? Just detonate a small thermonuclear device and no one will even realize you were there, and you'll leave no traces (unless you count a loud bang, bright light, mushroom cloud, charred corpses, fallout and a spike in cancer rates and radiation levels).
Ninjas. Men in Black-style mindwiping. Cat burglar. Evil hypnotist. Lots of available analogies. Nuclear bomb ain't one of them.
No traces, huh? (Score:2)
Clearly, this isn't true. It's on slashdot. Everything leaves traces.
not leave traces? (Score:2)
Is this virus VIsta capable? (Score:2)
Protecting against these new computer viruses, which so far are aimed at PCs running Windows, is hard - and sometimes impossible.
Windows XP or Vista? Are the infection rates similar for the two operating systems? I just hate it when a virus or trojan is treated like a uniform infectious agent. There can be big differences in the infection rates even among Windows machines, depending on configuration.
Autorun is from the devil. Right up there with ActiveX in my book. I think it does point up how dif
i don't trust china at all (Score:2)
Best protection against a virus/trojan/worm (Score:2)
It doesn't rely on virus definitions or anything else. It only requires that you take a minute to think about whether the software which wants to connect is doing so at your request or has gone renegade. Now of course once you find that you've got something trying to get out you need to clean it, which is where an
Best picture frame is a Nokia N770 or N800 (Score:2)
These picture frames typically have built in memory or require USB synching... what about 802.11 or bluetooth instead? Batteries?
Which brings me to my point.... the Nokia N800 is $200 and runs to 400 MHz, and can do all this and more. The Nokia N770 closed out at $125 (if you can still find one) and has the same relevant features.
Too smart to be fooled? (Score:3, Informative)
There's a few simple rules that you can follow to do this yourself:
1. Hardware router. I personally use pfSense, due to the necessary complexity of my home network, considering that I run my computer service business out of my home. Any consumer router will work, though, as long as it's got UPnP turned off, and the password's been changed.
2. Never, ever, ever plug an untrusted computer into your trusted network. See my point number 1. Customer machines are plugged into a completely separate subnet that is firewalled off from my trusted network.
3. Turn off everything like autorun, automatically find network shares, etc.
4. Secure your wireless. Mine's open, but it's even firewalled from my untrusted network. Use WPA-PSK, with a password that looks like this: awdfvA@#F54q2a3A#% Don't even think about using WEP. I've broken it in less than 30 minutes, and the longest it's ever taken me is 45. If you're wireless devices won't support WPA, replace them, or upgrade the wireless. A Startech PCMCIA card that supports WPA is only about $55 retail, so there's really no excuse.
5. Don't be a moron, and click on anything someone sends you. Even if you think they're really computer savvy. Even if you know they have functional antivirus software.
6. Anything that's of even remotely questionable trustworthiness, scan with an online scanner. But don't do it right away. Wait a week or two, then scan it, then run it. This is what I do with things like program cracks that people seem to get hosed with all the time. Download it from P2P, then let it sit for a week or so. Then scan it. If it's fine then, you're probably OK.
Some people tell me I'm paranoid, and they're probably right. But there are two people in the world that I know of that have never had a virus. Myself, and Bill Gates. And I'm sure Bill Gates probably runs antivirus software to prevent it.
Re: (Score:3, Funny)
Re: (Score:2)
Now, how do you think that blacklist is generated? By people. So, if antivirus software doesn't report an infection for a new virus, because it's not in the blacklist, how do you think it ends up in the blacklist? People discover it and put
Comment removed (Score:5, Informative)
WARNING: GNAA (Score:1, Troll)
Re: (Score:2)
Re: (Score:2)
*face palm*
Re: (Score:3, Funny)
Re: (Score:3, Insightful)
Good enough for you?
Re: (Score:2)
*double facepalm*
Re: (Score:2)
Buy Intel, install OSX. Flamebait, really.
Re: (Score:2, Informative)
no no No NO! (Score:2)
Re: (Score:2)
Re: (Score:2)