Feeds

Malware goes to the movies

Dangerous liaisons

Providing a secure and efficient Helpdesk

While video files, as entertainment, evoke less suspicion on the part of users, they also have a number of disadvantages.

In the world of data, video files are the lumbering cruise liners, the Titanics. For standard TV quality video, a 30-second clip may only require downloading 2Mb to 3Mb, but a 23 minute TV episode weighs in at a third of a gigabyte, and a full-length movie can easily top a gigabyte. A video of any appreciable length contains enough bits to slow down a home internet connection to a crawl, though more highly compressed video takes up less bandwidth.

The sheer size of such files make them a less appealing target, said OffensiveComputing's Smith.

"I think users are a bit more likely to open a video file but they are also a little harder to transport around because of their size," he said. "Often malware authors want something small."

The cross-platform nature of video files also makes them less appealing, Smith said. An attacker would either have to target an exploit for a single platform or attempt to encode the file in such a way as to work on different systems. In the 40,000 samples of malware that OffensiveComputing has in its database, none use video as an infection vector, he said.

Not only is video harder for an attacker to use, the files are easier for a defender to secure, said Adrian Ludwig, senior manager for secure software engineering at Adobe.

"The threat models for video are far more well understood," Ludwig said. "It is either a good piece of video or it's not."

Run-of-the-mill Flash content, which contains scripting and is event driven, can be far more complex, Ludwig said. Flash-creator Macromedia - and then Adobe, which bought the company in April 2005 - has increasingly focused on the security of the multimedia technology as its popularity grew.

"We have been responding to the issues for many years now, and I think we put out releases as fast as anyone else," Ludwig said.

In the end, while virus writers are currently experimenting with video files, other media files will likely become more popular, said McAfee's Schmugar.

"As more users adopt any technology, that's where there attacker will go," McAfee's Schmugar said. "It is a little early to say it is the beginning of a trend, but it's safe to say that we expect to see continued attention on media files as a vector."

This article originally appeared in Security Focus.

Copyright © 2006, SecurityFocus

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.