Tag Archives: virus

Conficker: the new warfare

Remember the quasi-Millennial panic about the Conficker worm back in April? It turned out to be nowhere near as nasty and damaging a threat as it had been painted, but it was still unique in a number of ways – most notably in its own methodologies, and in the way the security and computer industries pulled together to defend against it. New Scientist tells the story:

… frenzied headlines were proclaiming the impending meltdown of the internet. But 1 April passed without event. This was not a total surprise. After all, it was just the first date on which the worm’s URL strategy could change – it was still up to its creators to flick the virtual switch. To the outside, it looked like a gigantic April Fool.

And indeed it may have been. In fact, the whole URL business was probably a red herring: using a centralised URL to release a worm upgrade – even one as painstakingly concealed as Conficker’s – is not a particularly sensible approach. It gives the authorities a specific target to counter-attack. From the second version onwards, Conficker had come with a much more efficient option: peer-to-peer (P2P) communication. This technology, widely used to trade pirated copies of software and films, allows software to reach out and exchange signals with copies of itself.

It’s an interesting story – one with a remarkably movie-like plot, albeit devoid of the vest-wearing tough guy heroes and big CGI explosions that you’d need to script in to sell it to Hollywood…

But what’s worth noting is that this is a new form of warfare, a bloodless and almost entirely computer-based iteration of fourth-generation insurgency that relies on subterfuge and networking to achieve its aims, and demonstrates complex strategic thinking on the part of its instigators. It’s good to see that the expertise exists to combat it, but you have to wonder what would happen if something similar was targetted specifically at a nation-state like the US, whose military brass have demonstrated a poor understanding of the web’s flat battlefield.

You can’t deploy tanks against this sort of threat; the game has changed.

Viruses for nanotech components

virusTurns out viruses are good for more than just killing cancer cells. Researchers at MIT have developed a method whereby viruses are coated with iron phosphate, then attached to carbon nanotubes, thus creating  the building-blocks of nanoscale electrical components:

This advanced ‘bio-industrial’ manufacturing process, which uses biological agents to assemble molecules, could help to evolve key energy material components (e.g. cathodes, anodes, membranes) used in batteries, fuel cells, solar cells and organic electronics (e.g. OLEDs).

It’s interesting to see how researchers are making use of the native biological territory instead of reinventing the wheel when it comes to nanotechnology – using viruses to make nanomaterials to make power cells.

[from Future Blogger][image from noii’s on flickr]

Viruses used to kill cancer cells

tamedviruswiA fascinating concept: researchers at the University of Oxford have developed a method that uses modified viruses to destroy cancerous cells, whilst leaving healthy cells intact:

The research team modified a common virus – called an adenovirus – so that it could deliver genetic therapy to destroy tumours without poisoning the liver.

The changes enabled the virus to keeps its natural ‘infectious’ characteristics to replicate in, and kill, cancer cells in mice.

But for the first time the virus is also recognised and destroyed by healthy mouse liver cells, so it is no longer toxic.

Poachers make the best gamekeepers, no?

[from Physorg][image from Physorg]

Botnet blue-screens 100,000 PCs

Ye olde Blue Screen of DeathUsually, it’s in the best interests of a botnet operator to let the infection sit on the host machine until finally detected and expunged by the end user. After all, the longer you stay in, the more chance you’ve got of hoovering up useful goodies and infecting other computers.

But the worms and trojans that carry the infections often have less subtle capabilities built into them, as was demonstrated last month when the person (or persons) controlling the Zeus botnet used it to completely FuXx0r a hundred thousand windows machines:

Zeus, unlike many other malware programs, managed to make each installation appear different to virus trackers so that it would be more difficult to remove. But Zeus had another interesting feature—one that isn’t terribly uncommon among botnet software, it turns out. A command was built into the software to kos—or “kill operating system”—and it was apparently executed some time last month.

The reason for BSODing 100,000 machines isn’t quite clear, but several security experts have offered up their opinions. S21sec wrote on its blog that those behind Zeus might have wanted more time to exploit the financial data they had harvested by removing the user’s ability to get online and see that money was being transferred.

It may even have been a momentary error, or a flashy cut-and-run. What interests me about this story is that it shows a new potential angle for so-called cyberwarfare – one that could be more easily justified as a politically motivated attack.

Let’s say you could target all the computers belonging to a specific government or corporation; that wouldn’t be too hard to do with a little research into IP numbers and so forth. If you get a good enough infection rate – and knowing how weak most computer security procedures are, even in organisations that should know better, that shouldn’t be too hard a trick either – you could then choose to deep six that organisation’s computer infrastructure at a time of your choosing with the press of a few keys. If your trojan was designed to do nothing else, or its other capabilities were left inactive, that potential could sit unnoticed for some time – until your revolution was ready, perhaps, or your planned day of protest actions, or your stock value raid. To put it in medieval terms, it would be like having a bunch of sleeper-agent sappers spread throughout your enemy’s castle, waiting for the horns of Jericho. [image by Justin Marty]

It’s probably not the sort of thing that an organisation or country with any reasonable military clout would bother deploying, but destructive botnet warfare (as opposed to corrosive attacks, fraud or espionage) will appeal to the geographically-scattered groups who lack the sort of conventional leverage that can be gathered in one place; 100,000 dead PCs won’t bring down a government or kill a company, but it’s going to make a loud and expensive statement for a very small financial outlay.

Botnets still seem predominantly the concern of criminals with a financial motivation, but as the recent Palestinian conflict demonstrated, political factions are waking up to the potentials; when the situationists and anarchists get wind of this stuff, they might start thinking bigger than smashing bank windows or releasing the penguins from your local zoo.

NEW FICTION: A PROGRAMMATIC APPROACH TO PERFECT HAPPINESS by Tim Pratt

I can’t tell you how proud I am to be introducing a story by Tim Pratt at Futurismic. Seriously; this isn’t a man short of professional venues for his wide-ranging fictional output, but he tells us he’s been keen to sell us a story for some time now, and “A Programmatic Approach to Perfect Happiness” rang Chris’s editorial bell in just the right way. It’s something a little different to our usual house style: a little Gonzo, a little retro, but all Tim Pratt. I hope you enjoy it!

A Programmatic Approach to Perfect Happiness

by Tim Pratt

My step-daughter Wynter, who is regrettably prejudiced against robots and those who love us, comes floating through the door in a metaphorical cloud of glitter instead of her customary figurative cloud of gloom. She enters the kitchen, rises up on the toes of her black spike-heeled boots, wraps her leather-braceleted arms around my neck, and places a kiss on my cheek, leaving behind a smear of black lipstick on my artificial skin and a whiff of white make-up in my artificial nose. “Hi Kirby,” she says, voice all bubbles and light, when normally she would never deign to utter my personal designation. “Is Moms around? Haven’t talked to her in a million.”

I know right away that Wynter has been infected.

I carefully lay my spatula aside. “Your mother is… indisposed.”

She rolls her eyes. “Whatever makes you two happy.” She flounces off toward her bedroom, the black-painted shadowy forbidden portion of our home that my wife April calls “the tumor.”

I go to our bedroom door, push it open gently, and say, “Darling, your post-coital brunch is ready, and I believe Wynter has been infected by the H7P4 strain.”

A groan emerges from the pile of blankets, straps, and oddly-angled cushions that constitutes our bed. “Oh, god. Which one is that again?”

“The one that makes you happy,” I say, and close the door on April’s sardonic laughter. Continue reading NEW FICTION: A PROGRAMMATIC APPROACH TO PERFECT HAPPINESS by Tim Pratt