ARN

Barring executables stops worms, says expert

Automatic software security measures can ensure malicious executable and program files such as that in the latest W32/Palyh-A e-mail worm do not make it into users' inboxes, a security expert claims.

Companies that block Windows–based programs at the mail gateway will help to both prevent and reduce the spread of self-propagating viruses across the Internet, according to Sophos head of technology for Asia-Pacific, Paul Ducklin.

His comments follow the announcement over the weekend of the latest W32/Palyh-A e-mail worm.

The offending e-mail, which purports to come from support@microsoft.com, carries a hoax Windows program with the file extension ".pif" (program information file). PIF is an older programming file type that was used in Windows version 3.1 and DOS as a shortcut for loading an application. The W32/Palyh-A attachment is accompanied by the message text "All information is in the attached file".

Although the worm is not technically malicious, opening the attachment allows the file to copy itself to the user's PC Windows folder and then send the .pif-based program to any email address stored on the hard drive.

Ducklin said the huge risks associated with accepting program files such as .pif, .vbs (visual basic script) or the more common .exe (executable) as attachments via e-mail outweighed the usefulness of distributing such files in this manner.

"There's no business sense for distributing programs via email," he said.

To illustrate the point, Ducklin said six of the top 10 viruses reported to Sophos in April spread as Windows programs inside emails.

"By getting rid of these viruses through email, you're likely to protect yourself from future worms like Palyh-A," he said.

Businesses could also block files that they don't need but which might otherwise be useful to other companies, such as .doc files, he said, as a way of reducing their virus risk.

But despite the introduction of many straightforward mail monitoring software products, many companies were yet to take that step and block the exchange of programs, Ducklin said.

"We continue to hear administrators saying that it would be 'unbusinesslike' to block executable e-mail attachments," he said. "What many of them seem to mean is that their users still haven't allowed themselves to be weaned off joke programs like 'frog-in-a-blender', which are commonly circulated by e-mail for amusement."

"It's unfortunate that simply disallowing programs in email, as a matter of corporate policy, hasn't caught on as an equally important part of 'best practice'."

Ducklin also said smaller SME organizations could benefit from implementing email monitoring or scanning programs in their operations. "You don't need a terribly powerful machine [to run these programs]," he said.

Alternatively, SMEs could sign up for a similar e-mail scanning service with their ISP, Ducklin said.

Both businesses and home users should also have regularly updated antivirus desktop products in place as an "extra layer of protection" against viruses, he said.