back to article Microsoft's anti-malware crusade knackers '4 MILLION' No-IP users

Microsoft has won a court order to gain control of 23 No-IP domains owned by dynamic DNS (DDNS) provider Vitalwerks Internet Solutions. The US software giant claimed the domains were being used by malware developed in the Middle East and Africa. Vitalwerks operates its No-IP DDNS service from Nevada, and there is no suggestion …

  1. Anonymous Coward
    Anonymous Coward

    How much will M$ pay me

    I'm affected by your action Microsoft, how much will you pay me in compensation?

    1. Martin-73 Silver badge

      Re: How much will M$ pay me

      I'd say they were in breach of the misuse of computers act here (basically it's a huge denial of service attack). Sue the US legal system, extradite the judge? :D

      1. ModFodder

        Re: How much will M$ pay me

        Rendition the judge to dev/null without a trial

  2. DropBear

    Oh gee...

    ...thanks, Microsoft, for not being able to reach the home box now.

    1. Nathanial Wapcaplet

      Re: Oh gee...

      worse that that around here - the two local computer shops apparently use NoIP (paid-for services) for their SOHO customers, so hundreds are down.

  3. Anonymous Coward
    Stop

    Let's clear it up...

    "Our research revealed that out of all Dynamic DNS providers, No-IP domains are used 93 percent of the time for Bladabindi-Jenxcus infections, which are the most prevalent among the 245 different types of malware currently exploiting No-IP domains. "

    Microsoft has seen more than 7.4 million Bladabindi-Jenxcus detections over the past 12 months, which doesn’t account for detections by other anti-virus providers. "

    " Despite numerous reports by the security community on No-IP domain abuse, the company has not taken sufficient steps to correct"

    Sorry, but No-IP are either a bunch of cowboys, or getting paid a shitload of cash...

    1. petur
      Thumb Down

      Re: Let's clear it up...

      That's all according to Microsoft. No-IP said they weren't contacted.

      So: no conclusions can be drawn until some proof shows up showing they were contacted or not.

    2. Anonymous Coward
      Anonymous Coward

      Re: Let's clear it up...

      If malware writers exploited ActiveX in Internet Explorer to download malware and it was the most common form of infection for PCs running IE for certain strains of malware and if Microsoft knew it was happening but kept producing new version of IE that contained ActiveX with the ability to load on this malware, should Microsoft lose Internet Explorer and it be handed over to a private company, say Netscape to administer?

      Just hypothetical of course?

    3. Ben Tasker

      Re: Let's clear it up...

      Remember it's not No-ip hosting the content either.

      " Despite numerous reports by the security community on No-IP domain abuse"

      I find the structure of this sentence interesting, to me it reads as though it's talking about Papers and articles (reports on), and not reports to No-IP. Given they are just hosting DNS records, without a list of affected subdomains what precisely are they supposed to do?

      1. Whiskers

        Re: Let's clear it up...

        I think the Cisco blog article related to this discussion is here (dated 11th Feb 2014) <http://blogs.cisco.com/security/dynamic-detection-of-malicious-ddns/>. At the time of reading, there are two comments shown - one from No-IP referencing a blog article of their own in response, and inviting contact, and the other from Cisco saying they'll be in touch.

        So No-IP were certainly aware of Cisco's figures and concerns. But we don't know what they were doing about them.

        How long would it take to manually delete sub-domains from a list of (say) 20,000?

    4. ModFodder

      Re: Let's clear it up...

      Because 100% of all systems which fall victim to windows exploits run windows OSs...

      Sounds like a pretty clear-cut impeachment of microsoft.

      We should have MS seized because they facilitate windows exploits by publishing vulnerable OSs?

  4. RyokuMas
    Paris Hilton

    Bet your life...

    ... that if this were some kind of Android malware strain and Google had been handed control of the servers, these comments would have a very different tone...

    1. rizb

      Re: Bet your life...

      Major difference - Google don't give a shit about malware on their platform.

      1. Bladeforce

        Re: Bet your life...

        ..Prob because your efinition of malware is probably built up by how malware works within a windows environment yet in a Linux environment malware just isnt in the same league as its windows cousin

        1. Anonymous Coward
          Anonymous Coward

          Re: Bet your life...

          "yet in a Linux environment malware just isnt in the same league as its windows cousin"

          You must have missed the arrival of Android.

          1. eulampios
            WTF?

            Re: Bet your life...

            Yes I missed it too, so tell us the stats of how many Android user have willingly installed trojaned apps while 1) allowing to install outside of Google play and 2) having slept through all the obvious warnings presented in the permissions page.

            It would be interesting to compare it with those glorious days of the Loveletter, Conficker, Stuxnet et al

    2. ModFodder

      Re: Bet your life...

      because a fallacy of equivocation seems more reasonable to you if it comes from someone other than Microsoft?

      Software will do nothing more and nothing less than what it is coded to do. If a malware exploits an unintended feature of a software, it means that the fault lies with the intention of the coder who wrote it by failing to frame the function of the code specifically enough.

      Those who exploit such weaknesses in software are annoying but how is that a responsibility of any but the writer of the code being exploited and the writer of the code exploiting it?

      Would you sue your neighhbor for owning a car, just because someone else hit you with a car?

      Is membership to the set All People Who Own Cars an attribute which makes all car owners guilty for the actions of one? If you got hit by the car because the driver was doing something stupid, but you weren't watching where you were walking either, shouldn't you share the blame for the consequences?

      Why should your neighbor share any of the consequences just by owning a car?

  5. Mike Taylor

    They might not have been contacted about this specific action, but has anyone else looked at the amount of traffic No-IP were directing according to Cisco. At the beginning of the year? Because there certainly was a conversation being had between NG and Cisco

    http://www.noip.com/blog/2014/02/12/cisco-malware-report/

    It would be good to see the evidence that MS laid in front of the court, to get a fuller picture. But I don't think No-IP can say this has come out of the blue

  6. b166er

    Official statement from No-IP here:

    Formal Statement Microsoft Takedown

    It's affecting our webcam this morning :(

  7. Anonymous Coward
    Anonymous Coward

    That's like selling the Postal Service....

    ... because criminals are using stamps to send letter bombs

  8. GreyWolf

    Accused of providing composting info to cybercriminals...

    ... We are a website in a rural village in Suffolk where those who compost their own food and green waste keep a record of what weights they have recycled. We hope to demonstrate that doing your own food and green waste recycling is worth the (minor) effort. This is of course exactly what cybercriminals need to know, and Microsoft wish to hush up.

    Our site is unreachable because Microsnot are NOT doing what they said they would - they are not allowing innocent traffic through (or they are too incompetent to do the filtering fast enough, before the timeouts).

    1. Anonymous Coward
      Big Brother

      Re: Accused of providing composting info to cybercriminals...

      > Our site is unreachable because Microsnot are NOT doing what they said they would

      Buy a static IP from your ISP, that's what they're for.

      1. Lost in Cyberspace

        Re: Accused of providing composting info to cybercriminals...

        Static IPs don't work if you move your equipment between connections (e.g a laptop that needs to be accessed remotely), transfers between landline and 3G etc.

        Additionally, I distributed a remote support UVNC-SC app to over 800 clients - using a premium No-IP domain to call in - in case I ever needed to change my static IP (move to a new office, change ISP, work from home etc).

        A static IP doesn't always cut it. Nor does No-IP evidently.

        1. Anonymous Coward
          Big Brother

          Re: Accused of providing composting info to cybercriminals...

          "Static IPs don't work if you move your equipment between connections"

          Relying on a dynamic IP is a bit of a hack for whatever usability you are trying to achieve. It also introduces security issues. According to this, UVNC-SC connects to a reserved IP address, so how do the remote clients know which IP address to allow incoming connections on.

  9. Captain Hogwash
    Flame

    Thank you Microsoft

    Without your help I would not have seen the light. You have shown me how unreliable my Owncloud server is. You have made aware of the fact that for reliable online services I should choose from the many excellent products available from Microsoft. I am forever in your debt.

    </sarcasm>

  10. Whiskers

    Punishing the victims

    Surely, as Microsoft know so much about this malware and (I hope) know all there is to know about their own operating systems, they are in a position to stop the malware from functioning at all? A court order obliging them to do so would be a lot fairer than one that virtually destroys at least one independent business and interferes with a great many innocent legitimate internet users.

    Why couldn't Microsoft just give their list of dodgy domain names to No-IP and get a court order requiring them to re-direct all traffic to or from them to some disinterested party for forensic analysis? Microsoft are not at all disinterested in this matter.

    1. Anonymous Coward
      Anonymous Coward

      Re: Punishing the victims

      "Why couldn't Microsoft just give their list of dodgy domain names to No-IP and get a court order requiring them to re-direct all traffic to or from them to some disinterested party for forensic analysis?"

      To permanently take down a botnet, you need to wipe out all of the C&C infrastructure before the writers can react - and update the system to use new addresses. If No-IP hadn't responded to requests to remove this traffic then Microsoft could have suspected that No_IP might tip-off it's malware domain customers...

      1. Whiskers

        Re: Punishing the victims

        "To permanently take down a botnet, you need to wipe out all of the C&C infrastructure before the writers can react - and update the system to use new addresses."

        That's one approach. Just as rounding up the wandering cattle is one approach to fence design - but a better fence makes the roundup un-necessary. In this case, the fence was built by Microsoft; No-IP are just one of the neighbours over-run by the strays.

      2. ModFodder

        Re: Punishing the victims

        Which is irrelevant.

        That's indistinguishable from saying, "We ought to turn over control of the internet to microsft because there are spammers, crackers and trolls. If you were to attempt to remove them from just one service they would just turn it into a game of whack-a-mole."

        Yeah... that.

        Here's an idea.

        Take action against the IP the name resolves to and leave the masses of people just hosting a home website or game server for friends and family the hell out of it.

        By "tip off" the people using a free service that doesn't exactly hold any vested interest for no-ip.com, you must mean that the malware author might become aware that they had been discovered if their account was terminated for violations of ToS? Sorta like microsoft shouldn't be trusted to handle spam on Hotmail.com because they will obviously only warn their "malware customers."

        Let me know when you sort through that head-full of cognitive dissonance and can offer something that doesn't reek of malicious gossip and overt fallacy.

        1. Whiskers

          Re: Punishing the victims

          I do hope that "head-full of cognitive dissonance" clears up soon.

          The only effective cure or prevention of a malware plague, is to design &/or re-design the software being attacked so that the malware cannot function. That should be Microsoft's prime concern and main focus of effort. It's nice that they want to help clear up the mess (albeit more than 20 years late), but there are plenty of others who can do that at least as effectively; only Microsoft can do anything about Microsoft's software, because they don't let anyone else touch it.

  11. d3rrial

    Great Opportunity

    Next Microsoft only have to say that most malware infections come from Google search results and they want the google.com domain.. Then they can just redirect it to 'bing' and get more than 2 people using their search engine!

    1. Anthony Hegedus Silver badge

      Re: Great Opportunity

      What utter crap! you mean to say there are two people using their search engine? What search engine anyway???

  12. Anonymous Coward
    Anonymous Coward

    Oh FFS

    I somehow doubt that NO-IP knew nothing about this, more like they did bugger all when notified (oh but we are only providing a DNS lookup it's not our problem)

    Seems Cisco had didn't get much response in the past and I wonder how many other companys have had the same members of the NO-IP rapid response unit respond to them?

    Perhaps MS went in with a big stick, but sure as hell enough people complain when nobody takes any action.

    Of course if it had been somebody connected with a linux distribution nobody would have minded.

  13. Stretch

    Surely this is then precedent for MS to take over every single TLD that ever had a subdomain containing any trademark of theirs?

    How exactly do they appoint judges over there in crazyland anyway? Raffle at church on sunday?

    1. d3rrial

      Unfotunately I don't know the validity of this article but look here for a nice precedent:

      http://www.timesofisrael.com/israeli-us-terror-victims-now-own-irans-internet

      1. Anonymous Coward
        Mushroom

        oh fun

        To take it one step further, using Microsoft's latest fucked-up reasoning, Why stop at the domain level when you can simply sieze the TLD? Anyone want to make a bid on .com? What about .net? .us, anyone? Weren't they trying to do this with .cc several years ago?

  14. David 18

    Those repulsive, putrid, moronic cretins at Microsoft have really gone too far this time. I am unaffected by most malware because I avoid Windows as much as possible.

    Now I find that because of their high-handed actions and inability to cope with large volumes of traffic I cannot connect to my home server to do what I need to do for work.

    Just who the the hell do those F###ing ####-guzzling ###ts think they are!

    1. Richard Plinston

      > I avoid Windows as much as possible.

      > I cannot connect to my home server

      Job done!!

  15. Anonymous Coward
    Anonymous Coward

    Fucked

    Some of my customers are using no-ip services for their SBS servers at home. This has worked for years and years and years. And now today, it isn't.

    Thanks, Microsoft.

    1. Anonymous Coward
      Anonymous Coward

      Re: Fucked

      Try and leave a comment on their blog article, and it says the comment requires "moderation" -- yeah, fat chance of that appearing then

      1. SimonB

        Re: Fucked

        You need to make sure you email the author of one of the blogs too (link on the right hand side) asking when service will be restored:

        http://blogs.technet.com/b/microsoft_blog/archive/2014/06/30/microsoft-takes-on-global-cybercrime-epidemic-in-tenth-malware-disruption.aspx

        And also send feedback to this blog:

        http://blogs.technet.com/b/security/archive/2014/06/30/microsoft-takes-legal-action-to-fight-malware-bladabindi-and-jenxcus.aspx

        1. Ben Tasker

          Re: Fucked

          You need to make sure you email the author of one of the blogs too (link on the right hand side) asking when service will be restored:

          Yup, Mr Boscovich was indeed included in the recipient list.

          Have ignored the temptation to add a comment to either post though, generally companies are less willing to just cough up if they feel you've gone out of you way to publicise/publically deride the issue.

          Don't send it directly. First contact your law firm (if you don't have one I recommend Dewey, Suem, and Howe) and have them send the bill as an attachment to an official letter.

          When I send 'gimme-money' letters (not that it's that regular), I tend to give a 14 day period to resolve it before I both the lawyers. Works for the most part (I've got a success rate of 98%, though I suspect MS will drag that down shortly), especially if I have the good sense to proof read and make sure I've not dropped a bollock somewhere in what I've written.

          Slightly different if I was responding to a similar letter though, that'd always get looked over by a lawyer from the outset.

          1. Tom 13
            Thumb Up

            Re: I tend to give a 14 day period to resolve it

            Under most circumstances I heartily approve of your standard practice. It is only because of the egregious nature of this particular incident that I went directly to the lawyers.

    2. Ben Tasker

      Re: Fucked

      I figured I'd send MS an invoice for the time I've spent fixing the resulting issues, given that as a third party not covered/protected by my contract with NOIP, they've become the de-facto service provider and fucked everything up through sheer incompetence

      1. Tom 13

        Re: Fucked

        If I might suggest?

        Don't send it directly. First contact your law firm (if you don't have one I recommend Dewey, Suem, and Howe) and have them send the bill as an attachment to an official letter.

  16. Anonymous Coward
    Anonymous Coward

    Payback

    I stay out of the OS war flame threads on The Register but this has me incensed, I have a preference for Linux but use MS wares for work and actually think some of their stuff is OK.

    I am an innocent caught in the crossfire, along with many others. MS needs to get the legitimate requests passing through now or get what they deserve. This whole thing stinks of corruption.

    Lets hope some of the darker side really go to town on Microsoft's websites, there are probably enough people with the skills that might now have the inclination that didn't previously. As far as I am concerned MS has broken the law, forget the toy pretend law that they sell in America, but here in the free world.

  17. slack

    Add me to the list of people burned by this today. Unreal.

    Years of happily toddling along with no-ip and then out of the blue I get zapped by MS through no fault of my own. Screw them.

  18. Tom 13

    One other suggestion for NoIP users

    In addition to suing the pants off MS, drop a tenner in the mail to NoIP. Maybe they could use some additional staff. It certainly sounds like a lot of you are getting at least a tenner's worth of service from them.

    1. Anonymous Coward
      Anonymous Coward

      Re: One other suggestion for NoIP users

      They already got my money, as I paid for a NoIP address which I use for a VPN tunnel (since VPN certificates are tied specifically to domain).

  19. Marshalex

    Thank's Microsoft

    That is all, no remote access to any of my (ironically) System Center Dev environment remotely today. What a bunch of jokers. I would imagine a class action won't be too far away after this.

    I wonder if next time I find a security flaw in a microsoft product I can go to court with it and claim said product.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like