Feeds

.NET virus is .NOT – Microsoft

Donut the cross-dresser

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Last week, antivirus vendors exposed Donut, supposedly the world's first .Net virus. Only it isn't a. NET virus, Microsoft argues.

Donut is simply a native executable that elects to modify only applications written for the Microsoft .NET Framework in the Microsoft Intermediate Language (MSIL) PE format, the software firm says.

"In fact, the method of infection is the same as many much older viruses, and it is detected by anti-virus software as a much older loader virus," Microsoft states in an open letter on the subject.

Rob Rosenberger, editor of Vmyths.com, the definitive chronicler of the hype and hysteria which envelops computer security, supports Microsoft's assessment. Donut would be better termed an "executable wrapper" than a .NET virus, he says.

"If you can envelop a .ZIP file within a self-extractor .EXE module, then OF COURSE you can do the same with a .NET file.

"It appears the author relied heavily on assembler, plus some C code, plus a token amount of MSIL. The author went to some rather impressive lengths to envelop a .Net file within a non-.NET module."

Describing Donut as the first .NET virus was like "like using the term 'woman' to describe a male cross-dresser", Rosenberger argues.

Jack Clark, product marketing manager for the McAfee division of Network Associates, said since Donut affected only machines with .NET installed and not Win32 machines it was reasonable to describe it as a .NET virus.

He agreed with Microsoft's assessment of the low threat posed by Donut but maintained that its existence was "proof of concept" that .NET might be used maliciously. ®

External links

Description of the virus by McAfee

Related stories

Donut virus highlights holes in .NET
.NET may lead to fewer viruses

Remote control for virtualized desktops

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Getting ahead of the compliance curve
Learn about new services that make it easy to discover and manage certificates across the enterprise and how to get ahead of the compliance curve.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.