Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
The Internet

Fight Virus With Virus? 697

Insanik writes "I am not an expert with internet worms like Code Red. However, I am curious if it would be possible to create a friendly worm/virus/whatever that would fight the original by using the same security holes. For instance, I read that Code Red II opens a back door. Why not have another virus that exploited the back door, closed it, then started sending itself to other servers for a certain period of time? " The submittor raises an interesting question - is this possible? I would guess so, in theory. And while we're working on Code Red, can we send a large man to the home of my latest Sircam senders and politely "ask" them to stop clicking on virii?
This discussion has been archived. No new comments can be posted.

Fight Virus With Virus?

Comments Filter:
  • works until.... (Score:2, Insightful)

    by metalhed77 ( 250273 ) <andrewvc@gmaCOUGARil.com minus cat> on Wednesday August 08, 2001 @12:43PM (#2110958) Homepage
    you have about 600 anti-virus viruses on your server you don't know about some of which were poorly written leaving the admin to weed out the cpu hogging, mem leaking, anti-virus viruses.
  • Re:Why do favors? (Score:1, Insightful)

    by Anonymous Coward on Wednesday August 08, 2001 @12:20PM (#2115898)
    This is such a typical response from a slashdotter. Fine, so these people are using Microsoft, but like it or not there are a bunch of servers that you probably hit all the time that run on IIS. What really pisses me off about this site sometimes is how quick people are to say "screw you" to anything that has to do with Microsoft. I dislike them as much as the next person, but just like all other debates, to each their own. How about we all get to together and help each other instead of constantly ranting about how much 'their' stuff sucks. And if possible, I think the idea of the 'good' worm would be great. Only I doubt the IT people out there would want some random worm playing around with their stuff.
  • by iapetus ( 24050 ) on Wednesday August 08, 2001 @12:25PM (#2121584) Homepage

    The first such anti-virus virus, Den_Zuko, was discovered in 1988. Check out this article [vnunet.com] on VNUnet, which has more info on the history of such software and why it's a bad idea.

    More recently, the Linux.Cheese.Worm has done similar things for Linux users infected by the Linux.Lion.Worm.

  • by isomeme ( 177414 ) <cdberry@gmail.com> on Wednesday August 08, 2001 @08:03PM (#2123745) Journal
    In other words, if counterviruses and antiworms became commonplace, it would turn the internet into one big war zone for autonomous code. And I can't even imagine what might result if an arms race broke out in that contest, though I expect some of its fruits would be quite frightening. I've already drawn the analogy to Core War in a previous thread.

    ...A war which would have no direct effect on those practicing safe computing, and which would encourage everyone to join that group as quickly as possible. In a network of properly secured machines, both 'good' and 'bad' agents would starve.

  • by Tim C ( 15259 ) on Wednesday August 08, 2001 @12:22PM (#2123919)
    A good idea? Absolutely not.

    Part of the problem with worms isn't just the malicious acts that they perpetrate, it's the bandwidth that they use.

    A particularly virulent worm can bring servers and routers to their knees just propagating itself. That's before it even gets the chance to do any of its intended damage. (Remember Melissa, or The Great Internet Worm?)

    Add to this very real concern the fact that striking back in this way, no matter the good intentions, is almost certainly illegal, and the whole idea is a definite no-no.

    (Yes, it does have a certain appeal - but so do many other things that are bad ideas, too)

    Cheers,

    Tim
  • by cnkeller ( 181482 ) <cnkeller@[ ]il.com ['gma' in gap]> on Wednesday August 08, 2001 @12:17PM (#2127108) Homepage
    A while ago (months?) someone had a "beneficial" virus, that was making the rounds and fixing security holes in Windows I believe. The name escapes me. The author (who publicly claimed responsibility) caught quite a bit of flak over it. Who knows what kind of hidden payload your packaging in addition to the helpful features.

    Personally, I feel a virus is a virus, regardless if your intentions were good. You're not any better than the hundreds of losers out there creating this mess. If you want to warn me of security holes in my system, send me an e-mail that doesn't contain a virus.

  • Discussed before (Score:2, Insightful)

    by egjertse ( 197141 ) <slashdot@YEATSfutt.org minus poet> on Wednesday August 08, 2001 @12:28PM (#2128366) Homepage
    This has been discussed before, among other places on Bugtraq [securityfocus.com]. The concept has many flaws:
    • The morality aspect - you are "taking control" of someone elses hardware/software
    • The legal aspect - this still constitutes "cracking" as you have illegally gained access to a computer system that is not yours. Breaking into someones house is not OK just because you only intended to do their dishes.
    • The practical aspect - the worst side effect of internet worms is not primarily damage done to the infected systems, but bandwidth consumed and resources depleted as a result of the worm spreading.
    I don't know of any real-life implementations of this (I somehow have the feeling I have heard of it, but it escapes me right now), but the concept has been debated at length during prior "worm attacks". There are probably many other reasons why this is not a good idea, but I think these are the most signifficant.
  • Why not? (Score:2, Insightful)

    by Aerog ( 324274 ) on Wednesday August 08, 2001 @12:20PM (#2128498) Homepage
    I don't see how it could be a problem, I mean, logically only something like a DoS attack or the like can't be "undone". If it's a bug in the individual system then it should be able to be fixed. The problem arises with the media stigma of a virus.

    Now this just goes right back to the whole "but I thought a virus was bad" response that your typical user will tell you. For the most part, it could work wonderfully, but the big thing is, the only people who will need it are those who did not patch a system for the bug (since if they patched it, then the retrovirus (if you will) will not be able to use the same vulnerablilty). Those are most often the same people that opened 40 SirCam attachments even though they were warned ("But it came from my best friend!"). To these people, a virus is something to be afraid of, regardless of purpose. A virus is always a bad thing that will "break the computer" and we don't want to "break the computer" because we can't "fix the computer" <Cue ominous music>

    But then again, if these people are so oblivious as to how they're infected, then it just may work as long as the media doesn't blow it out of proportion again.

  • It's not 'virii'! (Score:2, Insightful)

    by The Wing Lover ( 106357 ) <awh@awh.org> on Wednesday August 08, 2001 @12:27PM (#2133293) Homepage
    ...it's Viruses. VIRUSES! VIRUSES!

    check out http://www.cknow.com/vtutor/vtplural.htm [cknow.com] for more information...

    (rant mode off)

  • by hillct ( 230132 ) on Wednesday August 08, 2001 @01:02PM (#2133324) Homepage Journal
    So now you have a bunch of viruses, and counter-viruses roaming the net. This is not so bad until you have self-mutating viruses and antigens, several generations down the line. Eventually chaos theory will dictate that the nature of the relationship has become so complex as to be unknowable. This is a pandoras box we don't want to open. It's similar to the human cloning issue, in that there are a lot of good arguments not to do it, but there's one overwhelming argument for making it legal, lincensed and monitored; that is, if it's not legal, those who choose to pursue it will not be hindered in that activity, but will be forced to pursue it without oversight, while in hiding and possible in poorly controlled conditions.

    All you can do here is appeal to the logic of those who would pursue such an activity and suggest that they not undertake it, but regardless of how much you argue, convince and suggest, someone will eventually do it and there will be severe concequences - not all negative, but severe, with respect to how we look at technology and how we use it.

    It could further be argued that those against such undertakings, need to ajust to changing technology and make the appropriate changes to their world view. This is what the recording industry is having to do, as well as companies in other well established industries. The same will eventually be true of how we look at software design (computer viruses), and biology (human cloning).

    --CTH
  • Err (Score:1, Insightful)

    by Anonymous Coward on Wednesday August 08, 2001 @12:17PM (#2134417)
    ... exploited the back door, closed it, then started sending itself to other servers for a certain period of time?

    Anybody think about the bandwidth implications of this? We'll have anti-viruses counteracting viruses, viruses counteracting the anti-viruses, etc. This will all eat up bandwidth just as bad as Sircam and Code Red have.

  • Illegal (Score:4, Insightful)

    by 3prong ( 241218 ) on Wednesday August 08, 2001 @12:18PM (#2134422)
    I keep seeing people talk about how invading a server in some cases is legal, because "the intent was good". That is an incorrect interpretation of the word intent. Intent only refers to the crime itself, i.e. did the criminal intend to break-and-enter or was it accidental.

    This means that unauthorized access in the attempt to do a "good deed" is just as illegal as black-hat unauthorized access.

    For this to happen, someone with the antidote virus would have to break the law to spread it and apply it. Of course, Robin Hood was considered a criminal too.

  • Because... (Score:5, Insightful)

    by 11223 ( 201561 ) on Wednesday August 08, 2001 @12:14PM (#2135943)
    Everybody with the ability to do something like that and the lack of ethics to consider it realistically actually wants the rooted boxes for themselves?

    Seriously, folks, everybody who *could* write something like that either (a) recognizes that infecting someone's box is infecting someone's box, closing holes or not or (b) sees no problems in having the rooted boxen out there anyway. I doubt that anybody else actually has the skills to do it.

  • by Coq ( 204365 ) on Wednesday August 08, 2001 @12:29PM (#2141885)
    Ok, what direcTV did is not exactly the same. They were much nastier. also, the people who were effected by direcTV were not hosts to some virus. They were willing participants. An equivalent would be the DVD CCA putting out a virus to kill DeCSS. If a company like microsoft were to do something like this to viruses, it would only close the door for that virus. It wouldn't kill the machine, or write "Game Over" or anything fun like that. It also wouldn't close any other doors, as they would still be unknown. As far as an arms race goes, it would be no different than now. Except, now that I think about it...

    Virus writers would close the door they came in in advance and write in another door that would be extremely hard to find. The worm would still infect other machines, and it would be a very long time before the other back door kicks in. People would think the worm they got was a purposeful fix worm, when in actuallity it only would be a matter of time before it became a zombie. Now that would be a smart virus. Of course, the hardest part would be giving the new back door the functionality needed while effectively hiding itself.
  • by Mendax Veritas ( 100454 ) on Wednesday August 08, 2001 @12:15PM (#2147800) Homepage
    A "white hat worm" of this sort could be made, but its deployment would be just as illegal as the original "black hat worm" it was created to fight. You're still making unauthorized use of someone else's computer. It doesn't matter that you have good intentions. And what if a bug in your code crashes some machines? How do you prove it wasn't intentional, and that your "white hat worm" isn't really a "black hat worm" in disguise?
  • by Keeper ( 56691 ) on Wednesday August 08, 2001 @12:23PM (#2148574)
    Just put up a website on your computer that advertises the ability to automatically clean the CodeRedII virus off of the viewer's system, if present.

    All the viewer has to do is click a button at the bottom of the screen.

    Just so happens that this particular button sends a request to /default.ida?XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX (etc), which then scans the sender's IP and proceeds to start a command session, download the patches, and do whatever else is needed to done to vanquish the worm.

    Afterall, they did click on the link, right? :)

    Seriously though, if someone wants to get all pissy about you going to their box and fixing their screwup, threatening to sue and the like, I'd just countersue ... afterall, they tried to hack your box first. ;)
  • by brlewis ( 214632 ) on Wednesday August 08, 2001 @02:04PM (#2148659) Homepage

    The indexing server is bundled with IIS, and is one of the main reasons for choosing IIS -- searching is bundled right in. Comparing it with "some CGI script" is disingenuous.

    It would be fair to compare it with Apache modules that are part of the standard distribution and are usually installed. Care to point out a recent hole in such a module?

    Insightful, my foot. The pro-MSFT moderators are busy today.

  • by prgammans ( 134908 ) on Wednesday August 08, 2001 @01:24PM (#2148815)
    As the infected server is requesting an action from your server by contacting you in the firstplace, you could say that this is a obvious request for you to fix there machine.
  • by Sun Tzu ( 41522 ) on Wednesday August 08, 2001 @12:47PM (#2148901) Homepage Journal
    After all, how do you tell a 'good' virus from a bad one? It might be harder than you realize, if you're a virus scanner, for example. There is an article here [librenix.com] that deals with some of the other issues that 'good' viruses raise.
  • by blair1q ( 305137 ) on Wednesday August 08, 2001 @12:38PM (#2148903) Journal
    >Personally, I feel a virus is a virus, regardless if your intentions were good.

    It's probable that you don't understand the difference between right and wrong.

    Think of cops and robbers. We have bad guys with guns running around on the streets, and we have good guys with guns running around on the streets. Neither group is very bright, and both are liable to shoot you for pulling your wallet out too fast in a darkened doorway. Still, we know which group we're going to train and pay to protect us using their own judgment.

    A neighbor who checks and locks my door is far more neighborly than one who walks in, spray paints grafitti on my walls, craps on my carpet, leaves a dead rat hanging between the old coats in the closet, and says "oh, you have a security problem, you should get that fixed before someone does something bad to you".

    People who bought buggy software got ripped off, and you're discouraging conscientious software engineers from providing free, automatic service to those people, and preventing them from becoming unwitting dupes in spreading the bad viri around the world.

    But you shouldn't live in fear that this will become epidemic. People who do know right from wrong and who do choose to do right understand that doing right is often mistaken for doing wrong by people who don't know the difference, and our system of justice isn't based on right and wrong, it's based on perception, so they won't take the chance of being railroaded, Good Samaritan law or no.

    --Blair
  • Re:Why do favors? (Score:2, Insightful)

    by SuiteSisterMary ( 123932 ) <slebrunNO@SPAMgmail.com> on Wednesday August 08, 2001 @01:33PM (#2149145) Journal
    This is NOT an "IIS" hole. That's a fact. This is an Indexing Server hole. That's a fact. Comparing this to 'apache never having an exploit like this' is wrong. That's a fact. Comparing this to some apache module or CGI script being exploited, which has happened, and will continue to happen, is accurate. That's a fact.
  • by Speare ( 84249 ) on Wednesday August 08, 2001 @12:37PM (#2149176) Homepage Journal
    Ethics, sure. Morality, no. There's a difference.

    ethics:
    2. Being in accordance with the accepted principles of right and wrong that govern the conduct of a profession.

    moral:
    1. Of or concerned with the judgement of the goodness or badness of human action and character.

    You want an ethical lawyer, but not one who applies morality. You want an ethical doctor, but not one who judges your morality.

    Ethics is reflective, driving ones own behavior with respect for others. Morality is applied to others, and rarely implies respect for others.

  • by IronChef ( 164482 ) on Wednesday August 08, 2001 @05:31PM (#2149222)
    Anyone who has to be *schooled* in ethics has already lost the battle.

    Arguably true, but the bigger issue is "what are correct ethics?" Some things nearly all people can all agree on: it isn't ethical to copy someone else's work and pass it off as your own. But there are a lot of other ethics issues that will be very decisive. For example:

    "It is permissable to take a person's life if it is the only way to protect your life or the life of another."

    I have had many arguments with people who think that there is never, ever a reason to take a life, whereas I believe that self-defense is a fundamental human right. In the case of a divisive topic such as this, an "ethics class" is useless at best -- and brainwashing at worst.

    I think some kind of critical thinking training is a better idea. If you can think critically, you will develop your own ethical code.
  • by FatOldGoth ( 207461 ) on Wednesday August 08, 2001 @12:30PM (#2149315) Homepage

    ...though it's not quite as effective.

    Since the start of this week, I've been running a Perl script as an hourly cron job that parses my firewall logs, gets the originating IP addresses of any Code Red scans, does a reverse lookup, attempts to extract a meaningful domain name and then mails a polite notification to postmaster and webmaster at that domain. The notification contains a link to the MS page with the details of the relevant patches.

    Since doing so, I've had a number of responses from people thanking me for pointing out the problem and confirming that their server has now been patched. The response rate is only about 1%, largely due to the fact that around 90% of the problem servers are on dial-ups/cable modems/DSL, but it's better than nothing.

    I'm not advocating that everybody, or even a large number of people, do this, as the amount of traffic it would generate would only add to the problem, but it seems like a more legal solution than another, white-hatted, worm.

  • There are a lot of good legal resources out there, both internet law libraries, the supreme court web site, and actual "meatspace" libraries. If people would just do a little research before posting, we would have a lot fewer "it seems to me that" posts and a lot more informative "if we apply the ruling in blank V blank" posts. I can dream, can't I?

  • by SirSlud ( 67381 ) on Wednesday August 08, 2001 @12:41PM (#2149681) Homepage
    Actually, there's nothing like a challenge to a virus writer .. so I'll bet if you started spreading a good one, you'd just start escalating the war. Sometimes I believe viruses havn't caused major catastrophes yet because we dont fight viruses with viruses. Think of guns .. since we fight guns with guns, it really ends up coming down to who has the most/biggest guns. Do we really want to find out who has the most time and haxoring genius, the black hats or the white hats?
  • by Rinikusu ( 28164 ) on Wednesday August 08, 2001 @04:05PM (#2149915)
    Hell, I'd give even another example.

    When I was 4, I was in my apartment complex running around like a, well, screaming 4 year old. One of the residents (happened to be a RN) was watching me play with my brother and then called me over to him. He took a good look at me, grabbed my hand and took me to my apartment.

    "Your son has the measles. Take him to the doctor, now."

    There was a person, completely unrelated to me, who didn't even have kids whom I could "endanger" with my measles. Was he within his rights?

    The original poster must realize that an infected machine has already been compromised by an intruder. If you walk past an apartment and see someone has forced the door open and is ransacking it, do you continue walking by? Or do you yell at the thief? Call the Cops?

    Those "infected" machines are flooding the pipe that I'm paying for, so doesn't that make them some part of a "commons" that makes them part of everyone's responsibility?

    If my neighbor is playing his music too loudly, don't I have the right to knock on his door and say "Hey, turn that down, please?"

    If I'm being constantly probed by thousands of infected machines, my internet access greatly slowed down by all the garbage in the pipe, don't I have a right to find the owners and tell them "Hey, knock that shit off. Fix your damn machine, it's hurting everyone."

    Furthermore, to pick on another pet peeve of /., doesn't the consumption of bandwidth by infected machines remind one of the arguments *against* spam? "I pay for my access, I don't want to pay for spam." Twist that into "I pay for my access, I don't want to pay for some virus propagating at my expense..."

    Just some thoughts...
  • by VivianC ( 206472 ) <internet_update@ ... o.com minus city> on Wednesday August 08, 2001 @06:23PM (#2149918) Homepage Journal
    IANAL but....

    There is really no single law that covers this so a lawyer would be useless in this case. You could get ten different opinions from five different lawyers and any or all of them could be right. Or wrong. That's what Judges do.

    Now, with the PHP or CGI programs that do something to a computer, it would be a very grey area. After all, the 'attacking' computer is actualy requesting information from your machine. You are simply returning information. Then you can get into the motive of the requestor and the motive of the author and it gets even worse.

    Basically, all a lawyer is going to tell you is his theory of how a set of laws will be interpretted. Only Judges can actualy do the interpretting.
  • net police (Score:5, Insightful)

    by SKicker ( 27704 ) on Wednesday August 08, 2001 @03:32PM (#2149957)
    If these worms are illegal because they gain unauthorised entry then of course making a 'friendly' virus is illegal because it is doing the same thing.

    Having good intentions is nice but consider this (fictional) scenario: A local cat keeps trying to have 'relations' with my cat and I dont know who the owner is, plus the owner is unaware of their cat's activity. I catch the cat and get it 'fixed' without the owner knowing. When the owner finds out I doubt they or the police would be too pleased about it. Swap 'cat' for 'web server' and you have this code red situation.

    Yes the internet is unpoliced but I dont think the 'Do-Gooder' virus is a very good answer. Internet policing is an interesting new subject but traditional security ideas still apply - the owner of the house is the one responsible for making sure the door is locked. People need to be taught this applies to the internet too.

    (And no jokes about unauthorised entries thank you very much)
  • by Anonymous Coward on Wednesday August 08, 2001 @05:44PM (#2150057)
    /* If someone is breaking into your house to use your coffee maker, are you allowed to kick down their door and throw away all their coffee? */

    If the bastard is in *your* house, it really doesn't matter *why* he's there. You don't know for sure why he's there, all you know is he broke in your house. That's why if someone breaks into your house and you blast him, it's generally held as self-defence.

    Yeah, but you missed the point. Sure it's probably kosher to defend yourself against a stranger who's broken into your house by attacking him. What would not be kosher is to go to his house, break in, and throw away his coffee.

  • by Anonymous Coward on Wednesday August 08, 2001 @04:00PM (#2150090)
    It's fun!

    Fun with guns is unnecessary. Guns kill people and should be banned no matter how "fun" they are.

  • by mgkimsal2 ( 200677 ) on Wednesday August 08, 2001 @12:31PM (#2150375) Homepage
    The worm goes after 'default.ida' as I can see. They're trying to execute a program on my system. (default.ida). If my default.ida was actually a script that sent a payload back, and that payload just HAPPENED to be commands to disable their system, what's the harm there? I'm not ACTIVELY exploiting their system. I'm only sending a payload back in response to a request that THEIR system requested. Seems pretty clear cut to me.

    Code red backdoor checker [aspsourcecode.com]
  • by iabervon ( 1971 ) on Wednesday August 08, 2001 @02:41PM (#2150521) Homepage Journal
    While you're at it, why not set up your server to document that it does that? E.g.

    Go <a href="default.ida">here</a> to check your server for the Code Red worm and remove it if found.

    Unlike an actual anti-security-hole virus, in this situation you are providing a legitimate and documented response to an actual request. If you're not scanning other machines unless they actually ask (either by following the link or by attacking you), it's not really any more unethical than, say, active FTP (if you send this message, I will open a connection back to you and send some data over it). It is no more using the other person's machine than, say, slashdot forcing my machine to render an HTML document or an FTP server forcing my machine to store the document I download.
  • by hexx ( 108181 ) on Wednesday August 08, 2001 @12:25PM (#2151665)
    Cheese, a linux worm did this.
    Read This [thestandard.com]
  • by johnwbyrd ( 251699 ) on Wednesday August 08, 2001 @12:37PM (#2151997) Homepage
    Slashdot desperately needs is a full-time lawyer. It's a great site for Internet geek stuff but nobody on the site has the first fucking clue about liability law. That in itself would not necessarily be awful if it were not the case that all discussions here invariably end up with a bunch of laymen talking legal theory. Lawyers, help!
  • by Ed_Moyse ( 171820 ) on Wednesday August 08, 2001 @01:52PM (#2152496) Homepage
    Maybe in places like the UK they don't mind that robberies while the owner is home have gone up since the draconian gun laws. I do.
    Interesting. I read this over and over again on the internet, and it is complete and utter bollocks. If you were a burglar in the UK you were (and are) very, very unlikely to get shot even before the "draconian" gun laws came in. There simply weren't enough guns around to make it a worry. So even if burglaries HAVE gone up since then, it's completely and totally unrelated.
  • This is a Bad Idea (Score:4, Insightful)

    by Satai ( 111172 ) on Wednesday August 08, 2001 @12:19PM (#2156567)
    This is a very Bad Idea. First of all, unauthorized access to a computer is, by definition unauthorized. Any worm which spreads changes is illegal and as such a Bad Idea.

    No matter how good your intentions are (RTM just wanted to play around, right?) you cannot take the "law" into your own hands.

    Ethical issues aside, it would be very dangerous to being publicizing that there was a beneficial worm available; immediately, we would get copycat worms everywhere, appearing the same (yes, this could probably be circumvented by MD5 checksums or something, but jeez, if the webmaster was going to go through THAT much trouble, they'd install the damn patch themselves!) but doing far worse things.

    I'm not usually one to spout Libertarian philosophy - but in this case, if somebody wants to leave their box open - through ignorance, laziness, or some other ineffable reason - that is their choice and not the choice of some 15-year old hacker who thinks he'll redeem his l33t friends' images in the media's eyes.

    The defenses always have to be kept up - or else you have to start making judgment calls about which outside sources to give access to, which is a path no one wants to go down.
  • by startled ( 144833 ) on Wednesday August 08, 2001 @01:31PM (#2156582)
    How the fuck does this increase bandwidth use? I've seen several comments like this modded up; what am I missing?

    Good virus resides on your computer. Computer gets scanned; good virus cleans up offending computer, installs itself. Now, rather than sending out 300 requests at a time, the offending computer is sending out nothing, unless it is scanned as well.

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...