RE: in case nobody else noticed it, there was a mail worm released today
Vivien M. wrote: Someone made the argument to me privately that the problem is that MS lets you run attachments from Outlook, while other clients would require you to save the files to disk. That's not a solution: if these people are like my parents used to be, they'd dutifully save the attachment, open up a file manager, and open it up to see the "cool new screensaver" their best friend sent them ("hey, even if it's a virus, I have an antivirus" is the usual excuse). Sure, that's three steps instead of one, but for as long as the HUMAN behind the keyboard wants to open the attachments, whether it takes two clicks or fifty keystrokes, that attachment will get open.
Indeed. I remember the good old days when I was working with an OS called Flex, which was designed mainly for S-100 machines running the 6809 processor (ISTR that it was a competitor to something called OS/9). Anyway, when one wanted to delete a file or do something like that, it asked "are you sure" and your had to type "y" and then it asked "are you really sure" and you had to type "y" again. After a while our brains rewired our fingers so whenever the "y" key was required it was hit twice in a row, which eventually led to new words (spell check was unknown at the time) such as yyankee, honeyy, new-yyorker, and so on. We ended up hacking the kernel so it did not ask twice....
and ISTR one patch for Outlook 2000 that blocked your ability to save executables was released)
It default in Outlook XP and Outlook 2003, which has prompted large numbers of persons to download Winzip, which as not stopped worms to be propagated as you pointed out. Michel.
Please pardon my ignorance, but I am *mightily* confused. In a message from Michel Py is the following: <snip>
and ISTR one patch for Outlook 2000 that blocked your ability to save executables was released)
It default in Outlook XP and Outlook 2003, which has prompted large numbers of persons to download Winzip, which as not stopped worms to
be
propagated as you pointed out.
Michel.
The bit I don't get is how a zip file is created such that launching it invokes winzip and then executes the malware. When I open a normal .zip file, winzip opens a pane that shows me the contents. After that I can extract a file or I can "doubleclick" on a file to open it - which if it is executable will cause it to execute. I haven't seen a case where simply opening a zip archive causes execution of something in its contents unless it is a self extracting archive in which case it unzips and executes, but doesn't have the .zip suffix. Would anyone explain to me how this occurs (and if RTFM with a pointer to the M is the best way, then so be it!) Thanks in advance Chris
Christopher Bird wrote:
Please pardon my ignorance, but I am *mightily* confused. In a message from Michel Py is the following: <snip>
and ISTR one patch for Outlook 2000 that blocked your ability to save executables was released)
It default in Outlook XP and Outlook 2003, which has prompted large numbers of persons to download Winzip, which as not stopped worms to be propagated as you pointed out.
Michel.
The bit I don't get is how a zip file is created such that launching it invokes winzip and then executes the malware. When I open a normal .zip file, winzip opens a pane that shows me the contents. After that I can extract a file or I can "doubleclick" on a file to open it - which if it is executable will cause it to execute. I haven't seen a case where simply opening a zip archive causes execution of something in its contents unless it is a self extracting archive in which case it unzips and executes, but doesn't have the .zip suffix.
Would anyone explain to me how this occurs (and if RTFM with a pointer to the M is the best way, then so be it!)
I don't think that was the point Michael was trying to make. I believe he meant that MS stopped the ability to _even_ save executables attached to emails to disk in some forms of Outlook, but this did nothing to stop the spread of viruses. People simply sent executables as zipped files, which people then had to extract to run. Dispite the fact that an external program has to be used to get to to the executable, people still run them. Sam
participants (3)
-
Christopher Bird
-
Michel Py
-
Sam Stickland