Risk
1/5/2011
10:52 AM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Japan To Ban Virus Creation? Bad Idea

The Japanese paper, the Yomiuri Shimbun, ran a story during the holidays about how the Japan Ministry of Justice wants to criminalize the creation of viruses. If they pursue this course, it's only going to get messy for security professionals there.

The Japanese paper, the Yomiuri Shimbun, ran a story during the holidays about how the Japan Ministry of Justice wants to criminalize the creation of viruses. If they pursue this course, it's only going to get messy for security professionals there.I understand the desire with efforts like this: make the creation of viruses illegal and (theoretically) the number of viruses in circulation, and thereby risk, goes down.

If only it were that simple.

According to the story, Computer virus creation (and possibly even mere possession) is to be banned. Sources told the paper that the Japan Ministry of Justice is clamping down because more government offices and networks are suffering cyber-attacks.

I could understand criminalizing the release of a virus or a worm or a Trojan, but not the creation. First, what exactly is a 'virus'? Do they mean only viruses that spread through user action as well as Trojans, worms, and spyware? I'll bet they mean 'malware' in the broader sense.

First, such a move could hamper research. Legitimate research. For instance, Microsoft was kicking around the idea of using worms to quickly find at-risk unpatched systems and then remedy them. We covered that story in my February 20, 2008 post Microsoft Moves To Squash 'Friendly' Worm. On the face of it I didn't think using worms to disseminate patches or fight other worms was a good idea. I certainly don't now: there are just too many variables that could go wrong given the state of today's technology. However, it's certainly a noteworthy idea that deserves legitimate research.

You think that idea is an outlier? I don't. There are plenty of similarities between security software and malicious software. Remote monitoring and management tools can be used to steal data and snoop, as easily as they can be used to help a user in trouble. Vulnerability scanners can be used to try to find vulnerabilities on systems so that you can then attack those systems, and they can be used to find vulnerable systems for patching. How about password crackers? They're a vital utility among security professionals necessary to audit the strength of passwords in an organization, for cracking forgotten passwords on documents and the systems a company owns, and even law enforcement who need to access data when they have a warrant but not the password.

Dual-use software is abundant in this industry.

But maybe not in Japan, depending on how the law is crafted.

This news story came to my attention via @weldpond, Chris Wysopal, on Twitter. Wysopal is the CTO at web application security firm Veracode, and he was a vulnerability researcher at the hacker think tank the L0pht. He's always been a advocate of the responsible disclosure of security vulnerabilities and security researchers. I was curious to learn more about what he thought on the topic, and if his thoughts were in line with my own. I asked him, in an email, what he thought and here's his reply:

This is an extremely complex issue to get right. The functionality overlap between malware and remote administration and security tools is very big. And if it is truly creation and not possession would customization of a Zeus toolkit become creation and not just possession? Would repacking malware mean you just created a new virus. This should be a concern for all security tool developers, commercial and open source. Many tools, including ones I have been involved with, L0phtCrack and netcat, have been flagged by antivirus products as malware.

That's how laws with good intentions create bad outcomes. Not only would it fail to stop malware creation and dissemination, but it could criminalize legitimate research and legitimate products.

Let's hope this idea goes nowhere, and certainly doesn't spread beyond Japan.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I've seen worse.  Last week Tim had a dragon."
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.