Full Disclosure mailing list archives

Re: MyDoom download info


From: Valdis.Kletnieks () vt edu
Date: Sat, 31 Jan 2004 17:54:05 -0500

On Sun, 01 Feb 2004 10:46:09 +1300, Steve Wray <steve.wray () paradise net nz>  said:

but to address the points, as one person wrote, its difficult to spread 
fast when you are trying to be stealthy; I would argue that if one is 
stealthy enough, one doesn't need to spread fast since one is trying to 
evade detection rather than evading elimination.

Very true...

If a virus could spread slowly but stealthily, it could be all over
the planet and activated before any antivirus vendor became aware
of its presence and came out with a fix; it wouldn't matter much
if it took a year of quiet spreading.

On the other hand, it severely limits your growth potential.

If you go for a spread-fast strategy, you *will* set off all the white
hat's detectors (on sheer unexpected traffic volume, if nothing else).
You then have 100 white hats all starting from ground zero in analyzing
the critter, and you're basically limited to however many systems you
can nail in 8 hours before they get a signature out the door.  But since
you're spreading fast, that's still a lot of systems.

What I probably didn't make clear enough the first time I said it was that
if you're propagating slowly, you need to be *very* careful - all it takes
is for you to hit *one* wrong IDS or honeypot and you've been spotted.
And more importantly for the discussion, even if it takes that researcher
a week of evening and lunch hours to figure out what you're up to, you
won't have gotten many more systems during that week.

Consider that a fast-spreading worm can nail several million boxes, while
the average IRC botnet built more stealthily is in the several 10K range.

Sometimes (and here I go sounding paranoid again) it seems that the
viruses and worms we see are nothing but a smokescreen; they are
SO VERY obvious.

Welcome to the club. Want some tinfoil? :)

Attachment: _bin
Description:


Current thread: