Feeds

AV vendors sell ‘blunt razor blades’

Three years after Melissa has anything improved?

  • alert
  • submit to reddit

High performance access to file storage

Analysis On March 26 1999, the Melissa virus crippled tens of thousands of messaging servers worldwide in a few hours and sent a security wake up call to corporates and AV firms. Three years on, John Leyden wonders if anything has changed following the outbreak.

Today marks the third anniversary of the outbreak of Melissa, the first prominent example of the mass-mailing virus phenomenon, which continues to bedevil Internet users.

According to papers filed at the trial of the virus's author, computer programmer David L. Smith, Melissa caused damage exceeding $80 million to businesses worldwide after its release on March 26 1999.

Companies such as Microsoft, Intel, Lockheed Martin, and Lucent Technologies were forced to shut down their email gateways because of the large amount of email the virus was generating. It also caused the closure of e-mail systems of government agencies in both the US and UK.

Smith, who is in his 30s, released the Melissa virus by deliberately posting an infected document to an alt.sex.usenet newsgroup from a stolen AOL account. The virus, believed to be named after a stripper Smith knew in Florida, forwards itself to the first 50 addresses in all of your accessible Outlook address books.

Despite pleading guilty of spreading the virus in December 1999, Smith, of Aberdeen Township in New Jersey, is still awaiting sentence.

Despite numerous incidents of similar viruses since (such as Love Bug, SirCam and the Anna Kournikova worm) antivirus experts believe the tide may be turning against virus writers as users get more clued up.

Jack Clark, product marketing manager of the McAfee division of Network Associates, said IT managers are more experienced at how to deal with virus outbreaks.

Users - many of whom have fallen victim to a virus infection at least once - are now generally more cautious about opening email, Clark reckons. In response, virus writers are getting clever in the social engineering tricks they employ.

A virus of the magnitude of Melissa has not been seen for over six months, but that's no reason to become complacent.

A substantial minority of PC users out there who continue to fall victim to viruses which results in the rest of us receiving, for example, a steady stream of bandwidth stealing copies of the SirCam worm almost a year after it first appeared.

Clark reckons the answer to this lies in more user education and better heuristic (automatic detection) and management tools in AV products, so that suspicious emails are blocked at email gateways.

AV vendors have greatly improved their products in these ways over the last three years, he reckons.

We think that the continuing prevalence of email-borne viruses shows they have a long way to go. Greater availability of virus blocking services through ISPs can certainly help, though something even more radical might be needed.

Razor blades are failing to cut it

For a contrarian view we turn to an interesting opinion piece by former AV salesman Robert Vibert on the Virus Myths Web site, run by AV gadfly Rob Rosenburger.

Vibert writes that when he first got into the business of selling antivirus software ten years ago there were various options that he could sell clients, ranging from scanners to behaviour blockers to integrity checkers.

Behaviour blockers and integrity checkers would prevent viruses doing any harm, he argues, but customers had been trained to expect to find each specific virus using a scanner. This spawned an industry geared to selling razor blades scanner updates to deal with the malicious code menace.

Unless we all move to some sort of blended technology, which does not require constant updates on every PC, there's no hope of staying ahead of virus writers, Vibert concludes.

The benefits of blended technology appear, at least at first sight, to outweigh the drawbacks.

Short of a mass defection to Linux (which is far less susceptible to virus infection), greater use of behaviour blockers and integrity checkers looks promising.

Assuming AV vendors are nor frightened of spoiling sales of razor blades scanner updates, that is. ®

External links

DoJ release on the trail of Melissa author, David L Smith

Related stories

Justice mysteriously delayed for 'Melissa' author
Kournikova virus kiddie gets 150 hours community service
Anna Kournikova bug drops harmlessly onto the Net
Anna Kournikova virus spreading like wildfire
Thousands of idiots still infected by SirCam
SirCam virus hogs connections with spam
2001: vintage year for virus infections
Rise in viruses within emails outpacing growth of email
Hybrid viruses set to become bigger threat
Virus toolkits are s'kiddie menace
Users haven't learned any lessons from the Love Bug

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.