Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

DainBramaged

(39,191 posts)
Tue Jun 5, 2012, 09:49 AM Jun 2012

Why antivirus companies like mine failed to catch Flame and Stuxnet (this is a holy shit moment)

Mikko Hypponen is the Chief Research Officer of F-Secure. He has been working with computer security for over 20 years and has fought the biggest virus outbreaks in the net, including Loveletter, Blaster, Conficker and Stuxnet. His TED Talk on computer security has been seen by almost a million people and has been translated to over 35 languages.



A couple of days ago, I received an e-mail from Iran. It was sent by an analyst from the Iranian Computer Emergency Response Team, and it was informing me about a piece of malware their team had found infecting a variety of Iranian computers. This turned out to be Flame: the malware that has now been front-page news worldwide.

When we went digging through our archive for related samples of malware, we were surprised to find that we already had samples of Flame, dating back to 2010 and 2011, that we were unaware we possessed. They had come through automated reporting mechanisms, but had never been flagged by the system as something we should examine closely. Researchers at other antivirus firms have found evidence that they received samples of the malware even earlier than this, indicating that the malware was older than 2010.

What this means is that all of us had missed detecting this malware for two years, or more. That’s a spectacular failure for our company, and for the antivirus industry in general.

It wasn’t the first time this has happened, either. Stuxnet went undetected for more than a year after it was unleashed in the wild, and was only discovered after an antivirus firm in Belarus was called in to look at machines in Iran that were having problems. When researchers dug back through their archives for anything similar to Stuxnet, they found that a zero-day exploit that was used in Stuxnet had been used before with another piece of malware, but had not been noticed at the time. A related malware called DuQu also went undetected by antivirus firms for over a year

http://arstechnica.com/security/2012/06/why-antivirus-companies-like-mine-failed-to-catch-flame-and-stuxnet/


This is the holy shit moment


Flame was a failure for the antivirus industry. We really should have been able to do better. But we didn’t. We were out of our league, in our own game
22 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Why antivirus companies like mine failed to catch Flame and Stuxnet (this is a holy shit moment) (Original Post) DainBramaged Jun 2012 OP
No amount of security software can compensate for the ID ten T error which causes most infections. hobbit709 Jun 2012 #1
The developer's lament: Every time I make the thing idiot proof, they build a better idiot. n/t Egalitarian Thug Jun 2012 #5
One of Murphy's corollaries hobbit709 Jun 2012 #6
Not to mention PEBCAK. HopeHoops Jun 2012 #8
(Pls excuse if this is a sidetrack, but snot Jun 2012 #2
NOTHING that connects to the outside world is 100% secure. hobbit709 Jun 2012 #3
Agreed! snot Jun 2012 #20
Pretty much so. This is incredibly complex software, and... lastlib Jun 2012 #4
Electronic Voting Machines should Never be connected to he Internet for any reason. RC Jun 2012 #7
The capabilities of this malware are astounding spinbaby Jun 2012 #9
The best an anti-virus/malware company can do is be reactive. HopeHoops Jun 2012 #10
It is good to see you DainBramaged Jun 2012 #11
Just turn off Javascript when you visit "those" sites. HopeHoops Jun 2012 #12
Good post trumad Jun 2012 #13
!!!WINDOWS HAS DETECTED A VIRUS! YOUR COMPUTER IS COMPROMISED! CLICK HERE!!!!" HopeHoops Jun 2012 #15
alt F4, go to application data under you user and there it is, rename it, delete it and you're done DainBramaged Jun 2012 #17
Aren't all these Trojan Horses derivatives of Matix Wellstone ruled Jun 2012 #14
This is one of the very reasons I'm a proud Linux user today madokie Jun 2012 #16
I think DUQu was meant for a Non-Windows application, so it didn't matter, I forget the vendor DainBramaged Jun 2012 #18
If you don't mind what is DUQu? madokie Jun 2012 #19
Here DainBramaged Jun 2012 #21
Thanks, madokie Jun 2012 #22

hobbit709

(41,694 posts)
6. One of Murphy's corollaries
Tue Jun 5, 2012, 10:27 AM
Jun 2012

It's impossible to make things foolproof because fools are so damn ingenious.

snot

(10,538 posts)
2. (Pls excuse if this is a sidetrack, but
Tue Jun 5, 2012, 09:58 AM
Jun 2012

does this suggest that electronic voting and tabulation can never be secured?)

hobbit709

(41,694 posts)
3. NOTHING that connects to the outside world is 100% secure.
Tue Jun 5, 2012, 09:59 AM
Jun 2012

Even if you can see the source code on the machines, doesn't mean I trust anything without a paper trail.

lastlib

(23,309 posts)
4. Pretty much so. This is incredibly complex software, and...
Tue Jun 5, 2012, 10:04 AM
Jun 2012

...difficult even to detect. Few machines would be safe from it.

 

RC

(25,592 posts)
7. Electronic Voting Machines should Never be connected to he Internet for any reason.
Tue Jun 5, 2012, 10:44 AM
Jun 2012

The same goes for Vote Tabulators. There is never any real need, but there are plenty of reasons why they should NOT be.
The same goes for any machines that have any Official vote tallies before they are made official.

For proper voting security, voting needs to be done on paper ballots, which then can then be scanned into a stand alone card reader. The finally tally can then be downloaded to a Flash Drive and taken separately to a secure storage place.

Paper trails are not good enough. If machine generated at any point, they can be faked, spoofed, tampered with and rendered untrustworthy or even moot.

spinbaby

(15,090 posts)
9. The capabilities of this malware are astounding
Tue Jun 5, 2012, 11:10 AM
Jun 2012

Flame selectively steals PDF, Word, and AutoCAD files. It sends screen shots "home," taking a special interest when applications such as IM and email are being used. It can even record conversations using a computer's microphone and eavesdrop on VoIP. It can rifle through your contact lists. The beast is linked to a worldwide network of spoofed addresses that have been established under fake names for years and which immediately went down when the malware was detected.

The question of interest is, which government developed Flame?

 

HopeHoops

(47,675 posts)
10. The best an anti-virus/malware company can do is be reactive.
Tue Jun 5, 2012, 11:13 AM
Jun 2012

There is no proactive. The malcreants will always be two steps ahead. For every hole that's plugged, ten more open up. M$ operating systems are a malcreant's wet dream, but any OS will have back doors. Oh, and for "smart" phone users, they've got an app for that...

 

trumad

(41,692 posts)
13. Good post
Tue Jun 5, 2012, 12:18 PM
Jun 2012

I'm in the Network security business and shit like this is why the business I am in is booming.

 

HopeHoops

(47,675 posts)
15. !!!WINDOWS HAS DETECTED A VIRUS! YOUR COMPUTER IS COMPROMISED! CLICK HERE!!!!"
Tue Jun 5, 2012, 12:39 PM
Jun 2012

Unfortunately, that's the main source of infection. People use the root user (usually the only one) and clicking on popups like that essentially says "HEY! Come give me whatever the STD du jour is. Here are my credit cards and bank info. The house is totally unlocked. The silverware's in the top left drawer of the buffet. There's plenty of beer in the fridge. I keep my stash in the blue coffee mug in the cabinet to the left of the sink. Here are the car keys - tank's full. All of my jewelry is in this bag - take it - TAKE IT ALL!"

The sad thing is that it works, especially with those who panic when they see a warning that tells them the printer is low on ink. I keep telling people - just shut the machine down, boot into safe mode with networking and run MalwareBytes AntiMalware. My kids are about as tech-aware as any but they've still picked up some nasties. So far I've only had two incidents I couldn't figure out. Going back to factory condition (and applying SPs and installing apps) is a long process and a royal pain in the ass - to be avoided whenever possible! "Honey, have you seen the 20 character activation code for this software anywhere?"




DainBramaged

(39,191 posts)
17. alt F4, go to application data under you user and there it is, rename it, delete it and you're done
Tue Jun 5, 2012, 02:39 PM
Jun 2012

delete the start up line using CCleaner and go back to work. While scanning your Java cache of course, because it is hiding there from unpatched Java (at least that's what I've found in almost every case).,

 

Wellstone ruled

(34,661 posts)
14. Aren't all these Trojan Horses derivatives of Matix
Tue Jun 5, 2012, 12:27 PM
Jun 2012


that was developed in Salt Lake City in the late 90's? Novell,LSI and University of Utah.

madokie

(51,076 posts)
16. This is one of the very reasons I'm a proud Linux user today
Tue Jun 5, 2012, 12:50 PM
Jun 2012

I simply got tired of having to run all kinds of anti bullshit programs that was slowing my old computer down. Recently I tried a new AMD quad core with 8 gig of memory with 1 terabit hd and it using windblows 7 compared to my 10 year old computer running Linux, my machine left the new one in the dust. Also ran it back to the point of purchase as unacceptable, an agreement we arrived at prior to my bringing it home.
Go Linux and be happy.
I use autocad 2000 and It runs faster under wine than it did using compatibility mode on the high performance winblows AMD powered 8 gig memory computer. AutoCad 2000 is the best version of AutoCad I've tried too as it is internet ready but with out all the bling that the newer versions have.

DainBramaged

(39,191 posts)
21. Here
Wed Jun 6, 2012, 10:11 AM
Jun 2012
http://en.wikipedia.org/wiki/Duqu


Duqu is a computer worm discovered on 1 September 2011, thought to be related to the Stuxnet worm. The Laboratory of Cryptography and System Security (CrySyS)[1] of the Budapest University of Technology and Economics in Hungary discovered the threat, analysed the malware, and wrote a 60-page report[2] naming the threat Duqu.[3] Duqu got its name from the prefix "~DQ" it gives to the names of files it creates.[4]


Do you DUQu? LOLOL
Latest Discussions»General Discussion»Why antivirus companies l...