Cyber Security Institute

§ Current Worries

Top 3 Worries

  • Regulations
  • Old Firewall Configurations
  • Security Awareness

§ Listening

For the best information

  • The underground
  • Audible
  • Executive Excellence
  • Music (to keep me sane)

§ Watching

For early warnings

  • 150 Security Websites
  • AP Newsfeeds
  • Vendors

Friday, March 05, 2004

Antivirus vendors unzip encrypted email viruses

Security firms have started updating their products with more sophisticated techniques aimed at getting inside the encrypted attachments in which the Bagle worm has spread.

Recent versions of the Bagle worm have bypassed corporate gateway security because they are distributed in password-protected Zip files, which are next to impossible for antivirus programs to scan.  Emails infected with the Bagle worm, however, contain the password required for opening the Zip file.

Antivirus vendors BitDefender and Kaspersky Labs have both launched updates enabling their software to open any encrypted attachments using the password contained in the email text.  Once the file is decrypted, it is treated as an executable file and scanned normally.

Eugene Kaspersky, head of antivirus research at Kaspersky Labs, said: “This new technology protects users from a new generation of worms, specifically worms that hide in password-protected Zip files.  Five worms using this technique appeared within only four days - a new trend has been set in the computer underground,” he said.

Viorel Canja, head of BitDefender Labs, said in a statement: “We have developed an engine tasked with finding the Zip password in the email text.

Most AV products could only offer protection after the archive is extracted; that could be a little too late for inexperienced users,” he said.  Simon Heron, director of Network Box, told ZDNet UK the product combines Kaspersky’s software with Network Box’s own technology to deal with the latest Bagle mutations at the network perimeter.  According to Heron, this does mean the gateway is fractionally slower.  “The worst case scenario is we will take 50 milliseconds extra to parse an email that has a password-encrypted attachment.

More info:,39024655,39118922,00.htm

Posted on 03/05