Page 524 - Using MIS
P. 524

Security Guide







            pSSt. there’S another way, you Know . . .





               “All this talk about BPM, and SDLC, and scrum is really un-  ACAD/Medre.A was spread by unsuspecting engineers.
               necessary. There’s another way, you know. We just download a   An AutoCAD design consists of many files, and to transfer a
               copy of their source code, and we’re in business. I have a friend   design to a collaborator, engineers routinely compress the
               who knows how to do that. We’d have the application in sec-  files in an AutoCAD design directory into a zip file and send
               onds, and it would save so much time and agony, no?”
                                                                 it to legitimate recipients. Once the worm gets into a design
            Industrial  espionage  is  as  old  as  commerce.    directory, it’s compressed with the legitimate files and rides
            Infiltrating your competitors with spies and stealing what-  along in the compressed file. When the recipient decom-
            ever you can is nothing new. It’s a way to save hundreds of   presses the zip file, ACAD/Medre.A is decompressed as
            labor years, maybe more. Of course, if you’re so stupid as to   well. It then runs its payload to steal designs and email data.
            steal the designs of an iPad, and next month bring your own   Why Peru? Apparently, the original infection was
            iPad to market, the jig will be up. Apple, the FBI, and who   on a server of a Peruvian manufacturer whose suppliers
            knows who else will be upon you.                     needed the manufacturer’s engineering designs to create
               So, instead, you can just learn from the stolen designs
            and apply your new knowledge to build similar devices,
            doing it much faster than you could without the theft. Use
            what you learn from, say, iPad touch-screen design to build
            your own auto navigation touch screen.
               Or choose a company less prominent than Apple. For
            example, find out where Jared and his team keep the PRIDE
            source code and take it. Then build your own PRIDE system
            in another country . . . say, New Zealand or Singapore. How
            likely is it for Jared to know you’re running his code in New
            Zealand? Not likely, and, if he does learn of it, how much
            does he want to pay the one attorney in Austin, Texas, who
            knows New Zealand law and prosecution? Plus, how would
            he prove you got the code from him?
               Sound far-fetched? In June 2012, ESET, the antivirus
            software vendor based in Bratislava, Slovakia, detected a
                                                           8
            big spike in infections of a worm named ACAD/Medre.A.
            Initially the spike was in Peru, but the malware soon spread.
            Investigation revealed that this worm copies itself into file
            folders containing drawings produced using AutoCAD, the
            world’s  most  popular  computer-based  design  software.
            Once there, it installs code to send copies of engineering
            drawings it finds on the host machine to one of several
            email servers in China. If Outlook is installed on the in-
            fected computer, it also sends copies of the computer’s con-
            tact list and other email data.
                                                                                             Source: © Eliane SULLE/Alamy

            8 www.eset.com/fileadmin/Images/US/Docs/Business/white_Papers/ESET_ACAD_Medre_A_whitepaper.pdf.
        492
   519   520   521   522   523   524   525   526   527   528   529