->PConnect(script.ftech.net,mi2gl,m4d2e,mi2gl)
 

Countering New Wrapper Viruses

press release

London, UK, 01:00 GMT 14th June 1999 - Worm Virus ExploreZip, a data destruction virus with a Zip 'benign' wrapper around it has spread swiftly on a global scale. "It is the first of many wrapper based viruses, which can be dealt with early using a preventive security architecture, middleware and proper man-machine procedures", according to mi2g's Security Intelligence Products & Systems (SIPS) Division.

The Worm virus ExploreZip, Melissa and Chernobyl are only the tip of the iceburg. New and far more dangerous viruses are already being developed. As an example, there is an entire breed of viruses that can move system clocks forward or backward, thereby bringing the effects of the millennium bug early or crashing invoicing systems. Also the disguise of wrapper delivery is going to be a real threat in the coming months, whereby a benign wrapper, such as a Graphic (jpeg or gif) or working document (txt, xls or doc), could be actually delivering a lethal virus. Wrapper programs can be written in a sophisticated way so that they are undetected for days or weeks while they spread through a corporation's network before being activated by a remote signal. Therefore, the first indication an IT Manager will have of a viral attack of this sort, will be widespread damage within the organisation.

"Having developed and perfected counter terrorism techniques for internet communities over the last three years, we know that the bespoke security architecture and customised middleware needed to deal with sophisticated viruses has not been understood, let alone installed, in most corporations. Regrettably, the primary cause of this delay is lack of appreciation at board level about the threat the internet is posing to business. When a self-inoculation architecture is in place, the paralysis, which now seems to come about in large corporations every time a sophisticated virus hits them, will begin to recede." said DK Matai, Managing Director, mi2g.

Data recovery may take several days or may not be possible in all cases of the new viral attacks. If data recovery is not an issue, because backup is available, the safest method of cleaning the machine(s) is to reformat the hard disk and reinstall the operating system and software applications.

"Until a corporation has deployed a foolproof preventive security architecture, anti-virus computer security relies heavily upon procedures, both human and machine based. Personnel need to be made fully aware that they are risking business continuity by not adhering to established e-mail guidelines for deleting messages with suspicious attachments from known sources and all messages from unknown sources. Customised middleware must also be installed to halt executables other than a trusted set of applications like a word processor and spread sheet." added DK Matai.

Editor's Notes:

1. 1999 is the year that is expected to end up with potentially the biggest computer bug "Y2k" of all time and it has already seen three major computer outbreaks in the first six months - Melissa, Chernobyl and ExploreZip.

2. MELISSA - This computer virus struck at the end of March. It was the fastest-spreading virus ever seen. It attacked over 100,000 computers in less than a week. Sent via e-mail, it took control of Microsoft Outlook address books and secretively sent up to 50 e-mail messages to various locations. Melissa was just inconvenient. It blocked network capacity but caused no data damage or destruction.

3. CHERNOBYL - Also known as CIH virus, it was timed to go off on April 26th, the 13th anniversary of the Chernobyl nuclear disaster. The virus overwrote the data on a target computer's hard drive, rendering it inoperable. Deadly to computers, it was not as widespread as Melissa in Western countries but caused severe disruption in Asia.

4. EXPLOREZIP - ExploreZip has the speed of Melissa and the destruction capability of Chernobyl. If an e-mail message is received with a zipped file attachment zipped_files.exe the message should be deleted. Organisations attacked will have files damaged or destroyed. If the attachment is opened, the virus will destroy any file including Word, Excel and Powerpoint as well as files with the extension .h, .c, .cpp and .asm on the hard drive. The infected machine should be taken off the network immediately because the Worm also searches the mapped drives within the network for Windows Installations to modify the initialisation and registry files. ExploreZip appears to begin by attacking Microsoft based software only.

5. Y2K - The infections so far in 1999 could be an early dress rehearsal for the widespread problems expected when some computers, embedded processors and networks will be unable to distinguish the "00" in the year 2000 change. This is expected to cause widespread, costly damage to computer systems and disruption to business activities.

Renowned worldwide for the ATCA Briefings. Subscribe now.
 
Home - Profile - Values - People - Careers - Partners - Contact Us
D2 Banking - Bespoke Security Architecture - Digital Risk Management - Tools

Intelligence Briefings - Brochures - Case Studies -
SIPS Methodology FAQ (pdf)
Keynote Speeches - Articles - News Feeds - Glossary (pdf)
Terms and Conditions - Privacy Policy