Feeds

AV vendors sell ‘blunt razor blades’

Three years after Melissa has anything improved?

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Analysis On March 26 1999, the Melissa virus crippled tens of thousands of messaging servers worldwide in a few hours and sent a security wake up call to corporates and AV firms. Three years on, John Leyden wonders if anything has changed following the outbreak.

Today marks the third anniversary of the outbreak of Melissa, the first prominent example of the mass-mailing virus phenomenon, which continues to bedevil Internet users.

According to papers filed at the trial of the virus's author, computer programmer David L. Smith, Melissa caused damage exceeding $80 million to businesses worldwide after its release on March 26 1999.

Companies such as Microsoft, Intel, Lockheed Martin, and Lucent Technologies were forced to shut down their email gateways because of the large amount of email the virus was generating. It also caused the closure of e-mail systems of government agencies in both the US and UK.

Smith, who is in his 30s, released the Melissa virus by deliberately posting an infected document to an alt.sex.usenet newsgroup from a stolen AOL account. The virus, believed to be named after a stripper Smith knew in Florida, forwards itself to the first 50 addresses in all of your accessible Outlook address books.

Despite pleading guilty of spreading the virus in December 1999, Smith, of Aberdeen Township in New Jersey, is still awaiting sentence.

Despite numerous incidents of similar viruses since (such as Love Bug, SirCam and the Anna Kournikova worm) antivirus experts believe the tide may be turning against virus writers as users get more clued up.

Jack Clark, product marketing manager of the McAfee division of Network Associates, said IT managers are more experienced at how to deal with virus outbreaks.

Users - many of whom have fallen victim to a virus infection at least once - are now generally more cautious about opening email, Clark reckons. In response, virus writers are getting clever in the social engineering tricks they employ.

A virus of the magnitude of Melissa has not been seen for over six months, but that's no reason to become complacent.

A substantial minority of PC users out there who continue to fall victim to viruses which results in the rest of us receiving, for example, a steady stream of bandwidth stealing copies of the SirCam worm almost a year after it first appeared.

Clark reckons the answer to this lies in more user education and better heuristic (automatic detection) and management tools in AV products, so that suspicious emails are blocked at email gateways.

AV vendors have greatly improved their products in these ways over the last three years, he reckons.

We think that the continuing prevalence of email-borne viruses shows they have a long way to go. Greater availability of virus blocking services through ISPs can certainly help, though something even more radical might be needed.

Razor blades are failing to cut it

For a contrarian view we turn to an interesting opinion piece by former AV salesman Robert Vibert on the Virus Myths Web site, run by AV gadfly Rob Rosenburger.

Vibert writes that when he first got into the business of selling antivirus software ten years ago there were various options that he could sell clients, ranging from scanners to behaviour blockers to integrity checkers.

Behaviour blockers and integrity checkers would prevent viruses doing any harm, he argues, but customers had been trained to expect to find each specific virus using a scanner. This spawned an industry geared to selling razor blades scanner updates to deal with the malicious code menace.

Unless we all move to some sort of blended technology, which does not require constant updates on every PC, there's no hope of staying ahead of virus writers, Vibert concludes.

The benefits of blended technology appear, at least at first sight, to outweigh the drawbacks.

Short of a mass defection to Linux (which is far less susceptible to virus infection), greater use of behaviour blockers and integrity checkers looks promising.

Assuming AV vendors are nor frightened of spoiling sales of razor blades scanner updates, that is. ®

External links

DoJ release on the trail of Melissa author, David L Smith

Related stories

Justice mysteriously delayed for 'Melissa' author
Kournikova virus kiddie gets 150 hours community service
Anna Kournikova bug drops harmlessly onto the Net
Anna Kournikova virus spreading like wildfire
Thousands of idiots still infected by SirCam
SirCam virus hogs connections with spam
2001: vintage year for virus infections
Rise in viruses within emails outpacing growth of email
Hybrid viruses set to become bigger threat
Virus toolkits are s'kiddie menace
Users haven't learned any lessons from the Love Bug

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.