Feeds

AV vendors sell ‘blunt razor blades’

Three years after Melissa has anything improved?

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

Analysis On March 26 1999, the Melissa virus crippled tens of thousands of messaging servers worldwide in a few hours and sent a security wake up call to corporates and AV firms. Three years on, John Leyden wonders if anything has changed following the outbreak.

Today marks the third anniversary of the outbreak of Melissa, the first prominent example of the mass-mailing virus phenomenon, which continues to bedevil Internet users.

According to papers filed at the trial of the virus's author, computer programmer David L. Smith, Melissa caused damage exceeding $80 million to businesses worldwide after its release on March 26 1999.

Companies such as Microsoft, Intel, Lockheed Martin, and Lucent Technologies were forced to shut down their email gateways because of the large amount of email the virus was generating. It also caused the closure of e-mail systems of government agencies in both the US and UK.

Smith, who is in his 30s, released the Melissa virus by deliberately posting an infected document to an alt.sex.usenet newsgroup from a stolen AOL account. The virus, believed to be named after a stripper Smith knew in Florida, forwards itself to the first 50 addresses in all of your accessible Outlook address books.

Despite pleading guilty of spreading the virus in December 1999, Smith, of Aberdeen Township in New Jersey, is still awaiting sentence.

Despite numerous incidents of similar viruses since (such as Love Bug, SirCam and the Anna Kournikova worm) antivirus experts believe the tide may be turning against virus writers as users get more clued up.

Jack Clark, product marketing manager of the McAfee division of Network Associates, said IT managers are more experienced at how to deal with virus outbreaks.

Users - many of whom have fallen victim to a virus infection at least once - are now generally more cautious about opening email, Clark reckons. In response, virus writers are getting clever in the social engineering tricks they employ.

A virus of the magnitude of Melissa has not been seen for over six months, but that's no reason to become complacent.

A substantial minority of PC users out there who continue to fall victim to viruses which results in the rest of us receiving, for example, a steady stream of bandwidth stealing copies of the SirCam worm almost a year after it first appeared.

Clark reckons the answer to this lies in more user education and better heuristic (automatic detection) and management tools in AV products, so that suspicious emails are blocked at email gateways.

AV vendors have greatly improved their products in these ways over the last three years, he reckons.

We think that the continuing prevalence of email-borne viruses shows they have a long way to go. Greater availability of virus blocking services through ISPs can certainly help, though something even more radical might be needed.

Razor blades are failing to cut it

For a contrarian view we turn to an interesting opinion piece by former AV salesman Robert Vibert on the Virus Myths Web site, run by AV gadfly Rob Rosenburger.

Vibert writes that when he first got into the business of selling antivirus software ten years ago there were various options that he could sell clients, ranging from scanners to behaviour blockers to integrity checkers.

Behaviour blockers and integrity checkers would prevent viruses doing any harm, he argues, but customers had been trained to expect to find each specific virus using a scanner. This spawned an industry geared to selling razor blades scanner updates to deal with the malicious code menace.

Unless we all move to some sort of blended technology, which does not require constant updates on every PC, there's no hope of staying ahead of virus writers, Vibert concludes.

The benefits of blended technology appear, at least at first sight, to outweigh the drawbacks.

Short of a mass defection to Linux (which is far less susceptible to virus infection), greater use of behaviour blockers and integrity checkers looks promising.

Assuming AV vendors are nor frightened of spoiling sales of razor blades scanner updates, that is. ®

External links

DoJ release on the trail of Melissa author, David L Smith

Related stories

Justice mysteriously delayed for 'Melissa' author
Kournikova virus kiddie gets 150 hours community service
Anna Kournikova bug drops harmlessly onto the Net
Anna Kournikova virus spreading like wildfire
Thousands of idiots still infected by SirCam
SirCam virus hogs connections with spam
2001: vintage year for virus infections
Rise in viruses within emails outpacing growth of email
Hybrid viruses set to become bigger threat
Virus toolkits are s'kiddie menace
Users haven't learned any lessons from the Love Bug

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.