1. Welcome! Please take a few seconds to create your free account to post threads, make some friends, remove a few ads while surfing and much more. ClutchFans has been bringing fans together to talk Houston Sports since 1996. Join us!

New Virus Can Infect Picture Files

Discussion in 'BBS Hangout' started by x34, Jun 13, 2002.

  1. x34

    x34 Member

    Joined:
    Oct 16, 1999
    Messages:
    640
    Likes Received:
    1
    Is our hero, rockHEAD finished?

    Will the problematic Perrun plague our prominent picture protagonist?

    Stay tuned...

    New Virus Can Infect Picture Files

    By D. Ian Hopper
    AP Technology Writer
    Thursday, June 13, 2002; 12:17 PM

    WASHINGTON –– A new computer virus is the first ever to infect picture files, an anti-virus firm reported Thursday, making sharing family photos on the Internet a potentially dangerous activity.

    The virus, dubbed Perrun, is not currently infecting computers but worries anti-virus experts because it is the first to cross from program infection into data files, long considered safe from malicious data.

    "Our concern is more for what might be coming," said Vincent Gullotto, head anti-virus researcher at McAfee Security. "Potentially, no file type could be safe."

    Until now, viruses infected program files – files that can be run on their own. Data files, like movies, music, text and pictures, were safe from infection. While earlier viruses deleted or modified data files, Perrun is the first to infect them.

    Perrun still needs some tweaking to become dangerous. The virus arrives via e-mail or a floppy disk as an executable file. Security experts always warn against opening programs sent as e-mail attachments.

    Once run, the file drops an "extractor" component onto the victim's hard drive. When a computer user clicks on a picture file with the extension .JPG – a common picture file found on the Web – it is infected before it appears. Because the picture displays normally, Gullotto said, the victim may not know there's anything wrong.

    In its current form, an infected JPG file sent to a friend or placed on a Web site isn't dangerous without the extractor file. But Gullotto said there's no reason a virus writer couldn't stuff the entire virus code into the JPG, making the picture file a virus itself.

    That evolution should make computer users think twice about sending pictures – or any other media – over the Internet, Gullotto said.

    "I think there's a possibility that this could change the playing field," he said. "Going forward, we may have to rethink about distributing JPGs."

    McAfee researchers received the virus from its creator. Gullotto declined to identify the author, and McAfee anti-virus software can detect and remove Perrun.

    Perrun is known as a proof-of-concept virus, and does not cause damage. Gullotto said he fears that virus writers may use Perrun as a template to create a more destructive version.
     
  2. heypartner

    heypartner Member

    Joined:
    Oct 27, 1999
    Messages:
    63,511
    Likes Received:
    59,008
    This looks like some major, alarmist misinformation.

    A virus infecting a file is not the same as an infected file becoming a virus. The virus is the "extractor file" that loads itself on your machine. Without it having already infecting your machine, you are safe. And I don't buy anyone saying that JPGs could execute code by themselves, no matter if the JPG was "infected" or not.

    The "extractor" appears to infect your machine through standard email means that we all know about, then becomes the JPG viewer for IE, so that it can pull code out of a JPG from a malicious web site, and pass that code to IE to run.

    Is anyone else reading this differently?
     
  3. Jeff

    Jeff Clutch Crew

    Joined:
    Feb 14, 1999
    Messages:
    22,412
    Likes Received:
    362
    Any virus information should include the word "Windows" with it. After all, we Mac users have very little to worry about.

    Muwahhahahahaha!!!

    :D
     
  4. x34

    x34 Member

    Joined:
    Oct 16, 1999
    Messages:
    640
    Likes Received:
    1
    heypee,

    In this 'proof of concept', the JPEG holds the payload, and needs an external executable in order to run and/or distribute itself. I'm kind of at a loss myself understanding how a picture could execute the code without one. I'm not a programmer, so I'm trusting that this guy Gullotto, (being the senior director for McAfee AVERT) knows more than I do about this...

    What's troublesome to me is that even as a two (or more) part virus with a TXT, JPEG, GIF, etc as a payload would be much harder to detect, since without the executor, a potential payload could be or appear harmless.

    (This kind of reminds me of the Joker's chemical terrorism in Batman) :D

    I also wonder if the amount of work that virus scanners have to do (especially in corporate environments) will increase now that previously benign files like pictures, movies, and music files might have to be scanned.
     
  5. x34

    x34 Member

    Joined:
    Oct 16, 1999
    Messages:
    640
    Likes Received:
    1
    I knew THAT was coming! :D:)
     
  6. heypartner

    heypartner Member

    Joined:
    Oct 27, 1999
    Messages:
    63,511
    Likes Received:
    59,008
    x34,

    I just don't see it. Reads to me that McAfee is worried about people being infected by EXEs and passing around popular images.

    What is the "proof of concept?" The fact you can get infected by an EXE that will become your JPEG viewer then you get hit by payloads when people propagate infected JPGs...OK. I agree. That's something to worry about. Doesn't sound revolutionizing though.

    The McAfee guy was never quoted as saying there could be a self-executing JPGs. Reads like the journalist asked him, and he said, "I'm not going to say it could never happen," then the journalist said "he wouldn't deny it." you know?!

    They are using a traditional extractor method, no? What difference does it make if the EXE that infected you has its payload with it, or waits for it view people viewing infected JPGs. When you get infected, you are vulnerable to anything.

    I just don't buy a JPG ever self loading
     
    #6 heypartner, Jun 13, 2002
    Last edited: Jun 13, 2002
  7. x34

    x34 Member

    Joined:
    Oct 16, 1999
    Messages:
    640
    Likes Received:
    1
    hey no fair! you changed what you wrote before i could respond ;)

    I think we've got pretty much the same take on this one. This one in and of itself is harmless and pretty primitive. If it seems a little sensationalist, you might be right; I should have attached a story from a more technical site (C|Net, Infoworld), but I was already at the Post doing some other reading...

    The idea behind a multi-part virus/worm, though, is what's interesting to me. Kind of like guerilla warfare...

    This virus puts its payload into a JPEG file, but at the same time, causes the file to become corrupted, so what's the point? Why would someone distribute a picture that won't open?

    Another way of doing it would be to encode the data into the picture itself by way of digital watermarking, so that the picture appears and opens normally (this is different from the way viruses currently append data on to files). Potentially, even the primary executing code could be encoded into the picture. Perhaps a second or third piece, containing a scanner/extractor or partial executatble could complete the code necessary to activate it...

    Another scenario would be distributing partial code (which itself might pass AV scanning) via a popular, or funny picture, as a way of setting up an installed user base before deploying the final piece. Infections could potentially be higher and more swift, since the code (or part of it) is already present and the "missing piece" is also benign.

    Perhaps the executor virus could appear to distribute only a simple worm in a somewhat obvious manner, while quietly activating other code?...

    I don't know...these are the things that come to mind.

    I meant proof-of-concept, because that's all it really is...its not in the wild; it was only sent to the major AV companies. In order to prevent new types of infections, its first necessary to understand new distribution methods and vehicles that may be used in the future. I didn't mean to freak anyone out...Don't worry, if anyone's PC ever falls prey to something, Jeff will be more than happy to let you come to his place...
     
  8. Dr of Dunk

    Dr of Dunk Clutch Crew

    Joined:
    Aug 27, 1999
    Messages:
    46,634
    Likes Received:
    33,637
    I'm with heypee on this one. I don't get it. If you embed viral code into a JPEG and need an exe to trigger it, why not write the code into the exe? You have to execute the exe anyway, right? This seems more like a cute trojan than a virus. Or maybe I'm just not understanding this. :confused:

    The fact that you can embed something into JPEGs or other files is nothing new. This is the whole premise of steganography. If you remember, this is what everybody was talking about when it was suggested that terrorists were communicating by embedding and encrypting messages into JPEGs. I've used Steganos' encryption suite for years now based on this technology.

    Anyway, if anyone finds any info on exactly how this thing could potentially allow a JPEG to execute let's say through a browser loading it, please fill me in...
     

Share This Page

  • About ClutchFans

    Since 1996, ClutchFans has been loud and proud covering the Houston Rockets, helping set an industry standard for team fan sites. The forums have been a home for Houston sports fans as well as basketball fanatics around the globe.

  • Support ClutchFans!

    If you find that ClutchFans is a valuable resource for you, please consider becoming a Supporting Member. Supporting Members can upload photos and attachments directly to their posts, customize their user title and more. Gold Supporters see zero ads!


    Upgrade Now