Risk
1/5/2011
10:52 AM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Japan To Ban Virus Creation? Bad Idea

The Japanese paper, the Yomiuri Shimbun, ran a story during the holidays about how the Japan Ministry of Justice wants to criminalize the creation of viruses. If they pursue this course, it's only going to get messy for security professionals there.

The Japanese paper, the Yomiuri Shimbun, ran a story during the holidays about how the Japan Ministry of Justice wants to criminalize the creation of viruses. If they pursue this course, it's only going to get messy for security professionals there.I understand the desire with efforts like this: make the creation of viruses illegal and (theoretically) the number of viruses in circulation, and thereby risk, goes down.

If only it were that simple.

According to the story, Computer virus creation (and possibly even mere possession) is to be banned. Sources told the paper that the Japan Ministry of Justice is clamping down because more government offices and networks are suffering cyber-attacks.

I could understand criminalizing the release of a virus or a worm or a Trojan, but not the creation. First, what exactly is a 'virus'? Do they mean only viruses that spread through user action as well as Trojans, worms, and spyware? I'll bet they mean 'malware' in the broader sense.

First, such a move could hamper research. Legitimate research. For instance, Microsoft was kicking around the idea of using worms to quickly find at-risk unpatched systems and then remedy them. We covered that story in my February 20, 2008 post Microsoft Moves To Squash 'Friendly' Worm. On the face of it I didn't think using worms to disseminate patches or fight other worms was a good idea. I certainly don't now: there are just too many variables that could go wrong given the state of today's technology. However, it's certainly a noteworthy idea that deserves legitimate research.

You think that idea is an outlier? I don't. There are plenty of similarities between security software and malicious software. Remote monitoring and management tools can be used to steal data and snoop, as easily as they can be used to help a user in trouble. Vulnerability scanners can be used to try to find vulnerabilities on systems so that you can then attack those systems, and they can be used to find vulnerable systems for patching. How about password crackers? They're a vital utility among security professionals necessary to audit the strength of passwords in an organization, for cracking forgotten passwords on documents and the systems a company owns, and even law enforcement who need to access data when they have a warrant but not the password.

Dual-use software is abundant in this industry.

But maybe not in Japan, depending on how the law is crafted.

This news story came to my attention via @weldpond, Chris Wysopal, on Twitter. Wysopal is the CTO at web application security firm Veracode, and he was a vulnerability researcher at the hacker think tank the L0pht. He's always been a advocate of the responsible disclosure of security vulnerabilities and security researchers. I was curious to learn more about what he thought on the topic, and if his thoughts were in line with my own. I asked him, in an email, what he thought and here's his reply:

This is an extremely complex issue to get right. The functionality overlap between malware and remote administration and security tools is very big. And if it is truly creation and not possession would customization of a Zeus toolkit become creation and not just possession? Would repacking malware mean you just created a new virus. This should be a concern for all security tool developers, commercial and open source. Many tools, including ones I have been involved with, L0phtCrack and netcat, have been flagged by antivirus products as malware.

That's how laws with good intentions create bad outcomes. Not only would it fail to stop malware creation and dissemination, but it could criminalize legitimate research and legitimate products.

Let's hope this idea goes nowhere, and certainly doesn't spread beyond Japan.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8802
Published: 2015-01-23
The Pie Register plugin before 2.0.14 for WordPress does not properly restrict access to certain functions in pie-register.php, which allows remote attackers to (1) add a user by uploading a crafted CSV file or (2) activate a user account via a verifyit action.

CVE-2014-9623
Published: 2015-01-23
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quote and cause a denial of service (disk consumption) by deleting an image in the saving state.

CVE-2014-9638
Published: 2015-01-23
oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.

CVE-2014-9639
Published: 2015-01-23
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.

CVE-2014-9640
Published: 2015-01-23
oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted raw file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.