Digg this story   Add to del.icio.us   (page 1 of 2 ) next 
Malware goes to the movies
Robert Lemos, SecurityFocus 2006-11-15

Online attackers have started to experiment with embedding malicious code or links to such code in different video formats.

On Tuesday, antivirus firm McAfee warned Windows users that the company had discovered a worm, dubbed W32/Realor, actively infecting Real Media files. The infected video files do not contain an exploit for the RealOne or Real players, but a hyperlink that points to a malicious Web site. When infected files are opened, the victim is referred to the Web site, which attempts to compromise their computer using a previously patched flaw in Internet Explorer.

There are numerous disadvantages to using video files to carry malicious code, but using the technique may allow attacker to take advantage of users' expectations, said Craig Schmugar, senior threat researcher with McAfee's antivirus emergency response team.

"A chunk of people generally regard video files as safe, where they might treat screensavers and Office documents with some caution," Schmugar said.

While W32/Realor had not spread far, the incident came the same day that Microsoft distributed a patch for five security vulnerabilities in Adobe's Flash Player--software that is frequently used to play video streamed from popular Internet sites. A week earlier, users of the social networking site MySpace attempted to use links in video files to surreptitiously install adware on visitors' computers.

The attention is unsurprising. Vulnerability researchers, for one, have increasingly focused on media players. In 2006, 19 medium- and high-severity flaws were found in Apple's QuickTime Player, two in RealOne and Real Player, another two in Microsoft's Windows Media Player, and three in Adobe's Flash Player, according to the National Vulnerability Database. SecurityFocus sought comment from all four companies. Apple and Microsoft did not respond to the request, while RealNetworks could not provide a spokesperson in time for this article.

To date, actual video files have rarely been used as a vector of attack--typically, video plays only an incidental role. Many mass-mailing e-mail viruses, such as the Kama Sutra or Blackmal worm, attempt to lure victims by offering an attachment that masquerades as a video. In other incidents, a Windows virus shipped on Apple video iPods and the virus--again, Blackmal--sent out to subscribers of Google's Video mailing list.

Yet, the increasing popularity of video downloads and streaming Internet video--as demonstrated by the $1.6 billion valuation that Google placed on Internet video startup YouTube--will likely mean that online attackers will increasingly find ways to utilize the digital media as a method of compromising PCs, security experts said.

"It is my belief that most malware targets the 'large audience,'" said Val Smith, co-founder of OffensiveComputing.net. "So following that, I do think that YouTube is, and will be, a target... As soon as someone comes up with a good and simple video malware kit--if they haven't already--then I think we start to see this become a problem."

Video and other media files to which people frequently link could use unique methods to boost infection rates. Malicious code could use true viral marketing, for example, using the reputation systems of community-oriented video sites such as YouTube to attempt to make infected videos more popular. The MySpace worm Samy used such techniques to build a massive friends list for the MySpace user, "Samy."

Google has processes in place to make such attacks difficult, the company said in a statement e-mailed to SecurityFocus.

"We work constantly to prevent people from misusing our services to distribute malicious software," Google said in the statement. "When we become aware of an instance where this happens, we take immediate action to limit user exposure.

Story continued on Page 2 


    Digg this story   Add to del.icio.us   (page 1 of 2 ) next 
Comments Mode:
Malware goes to the movies 2006-11-16
Nexus7


 

Privacy Statement
Copyright 2010, SecurityFocus