Viral opportunity

Amusing sideshows to the SoBig - Blaster circus.

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

I love the smell of computer virus in the morning. It smells like opportunity!

But not victory.

Opportunity in the sense that it gives me an opening to heckle anti-virus services over another idiot's 'solution': a notification that a forged message not from you contained a virus.

"The e-mail message you sent to [Bloor@Stenchcorp.com] contained the virus SoBig.F."

How helpful! A security feature, designed by someone who knew computer viruses forge addresses, which adds to the deluge hitting the mailbox. So, if by some freak of nature you weren't getting enough copies of SoBig to entertain you, you had bounce messages caused by a dimwitted geek's plan to stop it taking up the slack.

For Microsoft, last week also meant opportunity.

Blaster opened the door for an advertising campaign which admonished us to "install antivirus software and ensure it's up-to-date" and "use [Windows Update] to get and keep your PC up-to-date".

Since it came in the newspaper, you could read it while SoBig was keeping your mailbox up-to-date with 300 copies of itself. Newspapers, you know, are updated every day, and only on Sundays do they come with lots of extra crap - like coupons - that fall out on the floor and make a mess.

Microsoft repeated the ad, too, so you were sure not to miss it. But now it only looked forlorn, still mentioning Blaster while 350 copies of that other "biggest e-mail virus of all time" were... well, you know the routine.

Memo to Microsoft: stop all ads of this nature. Since they are not "updating" the masses in any productive way, persistence will create the impression you're cynics using the opportunity for largely cosmetic purposes.

Look, Windows Update, as a winning strategy, is a failure. Don't stay in denial about it and nurse your neurosis. Realise the train has left the station.

Dear Trustworthy Bill and lieutenants, here's what you can do to rid yourself of the enthusiasm for Windows Update and build a wee bit of good will with users on the side.

Offer cash money incentives every time someone uses Update. And when an Update doesn't take or breaks something, use PayPal to disburse funds from you to Windows Updaters. Price it like the stuff on Redpaper - a dime, 15 cents, a quarter, half-a-buck, maybe even a few bucks sometimes. Work it out.

Not everyone will bang at your door for micropayments but, trust me on this, you'll get sick of Windows Update fast and, who knows, maybe it will incentivise less mistakes. In any case, it will generate lots of free publicity. I can see the headline: "Microsoft to pay for errors!"

"In a breathtaking new cybersecurity plan, Microsoft has unveiled..."

And while we're continuing on the thread of computer viruses and the smell of opportunity, let's consider the Nachi virus guy.

Another pal of computer-using mankind, a Samaritan so outraged over the rampage of Blaster he unleashed a 'good' virus to beat it into submission.

Someone who thought he was godly, someone of such intellectual power he could rush-produce a cure that would never cause a bit of trouble on millions of computers worldwide.

Microsoft must hire him at once! We are saved! Or maybe not, because "a company in Japan, where Nachi was spreading quickly, reported that its network crashed," according to the newspaper.


Here's the alternative thought on the subject: The Nachi guy smelled computer virus in the morning and took the Blaster opportunity. Itching to release a virus, Blaster was a convenience for the Nachi writer.

Do you think the 'good virus' plea would make a good legal strategy?

"Judge, I am sorry for crashing networks. I made a mistake in planning my good virus tool. I am guilty only of incompetence and a desire to help people."

Take note, it could be the germ of an idea.

Finally, a word from the troops overseas. (But first a moment to delete one hundred copies of SoBig from the mailbox.)

On station at a sprawling airbase near the Great Ziggurat of Ur in Iraq, my geek friend sends a postcard, not an e-mail. There's no Blaster, no SoBig yet - just the desert.

"It is so hot, our pens leak."

Writing fast as the dust blows by, "Actual conversation yesterday ... 'Got any useful skills?'" [From the CO.]

"Just computers, I'm a nerd." The CO rolled his eyes.

"Know this - computer security doesn't mean squat in a sandstorm." ®

George Smith is a Senior Fellow at GlobalSecurity.org, a defense affairs think tank and public information group. He also edits the Crypt Newsletter and has written extensively on viruses, the genesis of techno-legends and the impact of both on society.

Copyright © 2003;

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story


Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.