, SecurityFocus 2004-03-18
A pair of coders nurturing a deep antipathy for software pirates set off a controversy Thursday when they went public with a months-old experiment to trick file sharers into running a Trojan horse program that chastises users and reports back to a central server.
We were going to see how many executions we'd get, and we thought we could turn it into a tracking thing.
"So, you think you can steal from software companies do you?," the text continues. "That's called theft, don't worry your secret is safe with me. Go thou and sin no more."
The program does not permanently install itself, open a back door or harvest the user's name or other personal information. But it does "phone home" to a central server, sending the filename under which it was executed, and the amount of time the user spent staring in shock at the sermonizing text before closing the window-an average of about 12 seconds. The "Dust Bunny" revision launched last month also sends a unique I.D. number that' embedded in each copy of the program; the server logs the I.D., then sends back a new number that gets patched into the code, allowing the creators to track the program as it's re-distributed across the networks.
The whole thing is logged in real time to a public website, date and time stamped with each user's IP address and country of origin.
"We were going to see how many executions we'd get -- how much people would download it -- and we thought we could turn it into a tracking thing and track how it spread," says 19-year-old Clifton Griffin, the North Carolina college student who wrote the program with an online friend called "Justin X. B."
After initially distributing it on Gnutella from their own machines, the pair stopped sharing it directly when they found that the program was sustaining itself-- eventually even crossing to other networks. "Searching eDonkey and stuff like that, we've found that a lot of people must be using multiple file sharing services," says Griffin, "Certain versions have up to 150 sources on eDonkey alone. It's definitely making its way to different networks."
Legal Issues
On Thursday, the pair finally revealed their "war on illegal file sharing and pirates" on a blog they both run. The online community site Broadbandreports.com picked up the story, and its message boards quickly filled with outraged posters dubbing the project "malware" and a "virus," and suggesting the coders might be in violation of the law - "they infiltrate your computer under false pretenses," wrote one. Some craftier users obtained and reversed-engineered a copy of the program, and someone subverted the phone home mechanism to post unkind comments about Griffin to his own website.
"The response has either been, 'very cool,' 'hilarious,' etc., or, 'I'm offended,' 'you're going down,' 'I'm suing you.,'" says Griffin, who dismisses his critics as likely pirates, and insists that
But Jason Schultz, a staff attorney with the Electronic Frontier Foundation, is wary of the vigilante effort. "It's sort of an invasion of your computer, not much different from other malicious programs or spyware," says Schultz. "When you use file sharing to download an application, you're not giving the person who's sending you the file permission to run rampant on your computer. The fact that they're in some ways tricking you into running it may pose some real problems for them in court."
"I think there's an awful lot of presumptions going on about who's downloading these files and for what reason," Schultz says -- an attorney or a journalists might download software in an investigation, for example. "Even if it's the case that the people who download this are trying to get illegal files, two wrongs don't make a right."
Notwithstanding the controversy, the website
