SIGHTINGS


 
'Remote Explorer' Supervirus Hits Computers At Quietest Time
By Sean Hargrave
12-29-98

 
LONDON - Businesses are being told to be on their guard against the most dangerous computer virus ever detected.
 
But it may be too late. The new virus is the first that can spread through a network unaided and then strike during the night or weekend, turning computer files into unintelligible code.
 
Unlike conventional viruses, Remote Explorer, as it calls itself, can infect a machine without the user having to open a file - usually an attachment to an e-mail.
 
Even more worrying, the virus is so sophisticated it can spread through a network without having to hitch a ride on an e-mail or file. It then uses an internal clock to strike at a quiet time, because it will take longer for problems to be detected.
 
Last week computer security experts at Network Associates' UK base in Aylesbury, Bucks, wrote a program that can detect the virus and destroy it. It is now available on the Internet at www.nai.com.
 
But the virus writer may have an even more sophisticated version he is waiting to unleash. Peter Watkins, general manager of Network Associates' Security Division in San Francisco, says that whoever is behind the threat is the most sophisticated virus writer he has come across.
 
"For sheer complexity and the obvious in-depth knowledge of its creator, nothing comes even close," he says. "When we first had the virus shown to us we were really worried. We looked at what it could do and realised that this was no ordinary virus. They are normally fairly simple - just a few lines of code that the user has to accidentally activate. They may then erase a few files and normally that's it.
 
"This new virus is thousands of lines long. It's got half a megabyte of code in it. We've been through the code now and it is clear this guy really knows what he is doing and probably has a lot more tricks up his sleeve. It is worrying."
 
The name Remote Explorer is a joke on the part of the virus writer because the virus works by using a function of Windows NT called Remote Explorer. This constantly scans the network an NT terminal is linked to so incoming mail or files can be spotted. The new virus is able to use this monitoring system to spread itself around a system without bringing attention to itself.
 
According to Watkins the virus is so clever it can infect applications, such as a word processor or spreadsheet, without the user knowing.
 
"It can just sit there and take on the look of the program's icon so the user has no idea his system has been infected," he says. "It just sort of wraps itself around the application and mimics it. Then, at the alloted hour, its internal clocks ticks down and it strikes.
 
"The main thing it appears to do is to encrypt data so the user cannot get hold of it. We're pretty confident we can restore the data for our customer who was the first to be hit but that's only after we've had a team of security, Windows NT and networking exports in America and Britain working day and night on it."
 
The Remote Explorer is now mainly feared for what it may do in the future. While this version has shown how knowledgeable its author must be, it also hints that there is worse to come.
 
"Going through the thousands of lines of code we've found all kinds of possibilities that might be activated in the second version of this," says Watkins.
 
"There are several architectures and facilities within the virus that the writer seems to have chosen not to activate right now. If he does, it could make the virus a whole lot more destructive. It would erase files, rather than just encrypt them and it would probably be even more prolific at spreading across a network without being spotted."
 
There is no evidence that the virus writer is intending to blackmail companies with the threat of data loss. It would appear the program is so complex that the writer may be creating viruses simply as an intellectual challenge.
 
"We don't know anything about who wrote this," says Watkins. "But it's fair to say there are some virus writers out there who want to show off and say: 'Hey, look at what I can do'. It doesn't make the virus any less destructive, particularly if there are further versions waiting to be launched. Also, if the author posts the code on an Internet site, somebody more malicious could have a field day with it."





SIGHTINGS HOMEPAGE