Feeds

Reports of death of email viruses greatly exaggerated?

AV firms attack MoD technology

  • alert
  • submit to reddit

Seven Steps to Software Security

The UK Ministry of Defence (MoD) has come under fire over the capabilities of a product designed to protect business from the effects of email viruses, such as the Love Bug and Anna Kournikova worm.

Anti-virus vendors have said that software developed by the MoD's Defence Evaluation and Research Agency (DERA) is neither innovative nor what the market needs. Dera has hit back by suggesting antivirus software on its own isn't enough to protect people from malicious code.

As previously reported, Dera unveiled a product called ::Mail this week which works on the principle of displaying a pop-up box when a user sends an email, confirmed whether they intended to send it or not. The software is designed as an add-on to antivirus software.

The idea of ::Mail is that it will both highlight the activation of covert email virus from infected PCs and effectively block propagation of viruses by methods such as Visual Basic scripts embedded in harmless looking email attachments, a technique used by the Love Bug.

Promising as this sounds the idea has been criticised on two grounds by antivirus firms: that the idea has been tried before and has been seen as a nuisance by end users and that such techniques would not stop the latest batch of email viruses.

MessageLabs, a managed service provider that scans its customers email for viruses, said that the techniques used by ::Mail would be effective against the not stop the second most common virus this month, W32/Magistr-mm. This is because the virus comes bundled with its own SMTP client.

Eric Chien, chief researcher at Symantec's antivirus research centre, said it might help block the spread of viruses in some organisations but is not a novel approach.

Putting users in control of deciding whether or not it is safe to send a message is likely to lead to more help desk calls in many organisations, he argued.

"Dera's technology sounds like a classic behaviour blocker, it's all a bit draconian and I don't believe the average customer would adopt it," said Chien.

In fairness to Dera, which enjoys a reputation for quality cutting-edge research, it has to be said that ::Mail is far more sophisticated than early reports suggested and in its professional version includes content control and techniques to prevent email spoofing.

Simon Wiseman, an information security specialist at Dera, hit back at the criticism by antivirus software vendors by saying their products, though widely used, failed to prevent the expense and inconvenience caused by viruses like the Love Bug.

Organisations often turn off all the checks their anti-virus scanner can perform in order to speed up operations, said Wiseman, who said that greater defence in depth against malicious code was needed in order to mitigate risks.

Symantec's Chien agreed that misconfiguration of antivirus scanners was an issue and that vendors needed to educate users and ship products with sensible default settings.

He added that there's no good reason for Visual Basic scripting to hook into Outlook and that firms should consider applying Microsoft's Outlook security patch, which is available here. ®

External Links

Technical details of Dera's ::Mail (no pricing or availability on this product yet)

Related Stories

No more I Love You viruses
Rise in viruses within emails outpacing growth of email
Virus plague causes charity to consider Linux
Hardware-trashing virus spreads by email
Anna Kournikova bug drops harmlessly onto the Net
Users haven't learned any lessons from the Love Bug

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.