Virus writers target Windows Powershell scripting language

Virus writers target Windows Powershell scripting language


Yet another point of caution, researchers warn

An Austrian group of virus writers has published new proof-of-concept malware code that targets Microsoft's forthcoming Windows Powershell technology.

The MSH/Cibyz worm does not exploit any vulnerability in the scripting tool. Instead it's similar to batch-type viruses written in Javascript or Visual Basic (VB) that instruct a system to install malware after a user executes the script.

"The moral of the story is that there is no particular file type that is inherently safe. There is the possibility of using vulnerabilities in any software application," Allysa Myers, a virus research engineer with McAfee said.

Powershell malware poses an increased risk over other batch-based threats because enterprises currently do not block Powershell scripts on their network. Malware authors could also be attracted to the tool because it offers a new challenge.

Windows Powershell is a command-line shell tool that lets IT administrators manage a system. It is similar to the command shell in Unix, Linux and OS X. The tool is slated for release in the fourth quarter of this year.

PowerShell was originally scheduled to ship as part of Windows Vista but will now be used for the forthcoming releases of Exchange and Microsoft Operations Manager.

The tool gained instant notoriety last summer after security vendor F-Secure sighted the first proof-of-concept virus and referred to it as Damon. The company mistakenly labelled it as the world's first virus for Windows Vista.

The Damon virus was developed by the same group of malware authors as this year's Cibyz virus. However, the new version is more advanced, said Myers.

"They are taking it further. This one actually works on the older operating systems and not just Windows Vista beta."

The worm also changes every time it infects a file. While that makes it more difficult for primitive scanners to detect the malware, most modern anti-virus tools won't be fooled by this capability.

A Microsoft spokesperson said that it is aware of the worm and stressed strethat the virus doesn't exploit any vulnerabilities in its software.

"Microsoft recommends consumers do not accept files from un-trusted sources and should use up-to-date third-party anti-virus products," he added.