MP3 with virus

Discussion in 'Windows Desktop Systems' started by WiredBrain, Nov 9, 2003.

  1. WiredBrain

    WiredBrain Guest

    I've read some articles saying that the mp3 that we downloaded from P2P network contains malicious software such as virus. From my (limited) knowledge, it's not possible via mp3. Which is correct?
  2. lojow

    lojow Guest

    Actually, if you remember the "Love Letter" virus, one of the things it did was to "hide" (yeah, right) your mp3s and create copies of itself with the same file name as the mp3 but add a .vbs to the end... (eg xxx-xxxxx.mp3.vbs) anyway, The files themselves usually are NOT embedded in mp3s, but look like mp3s to the untrained eye.
    Hope that helps.

    That which Man does not understand, he fears.
    That which Man fears, he destroys
  3. ming

    ming OSNN Advanced

    Just a word of precaution, although as far as most of us are concerned, virii are only found in the common file types like .vbs and .com. However, I've read somewhere that it may soon be possible that .jpg files can contain virii/worms.

    I don't see this happening in the near future, but who knows???
    Just be careful of what you are doing and make sure you're not opening files (like lojow mentioned) that end xxxxx.mp3.vbs or anything like that.
  4. GoNz0

    GoNz0 NTFS Stoner

    the year 2525
    its microsofts fault this kinda thing happens, reason is windows is set to hide known file extension. so the user see's talk.mps as the real filename of talk.mp3.vbs auto hides the vbs extension :)
  5. ming

    ming OSNN Advanced


    I'm not taking sides on this, but it seems that it's all down to human error at the end of the day. How can you be 101% sure you're opening a mp3 file if that 'one' particular file is showing its 'extension' when all the others are hidden??
  6. qoa

    qoa Guest

    There was actually a story on a lot of internet news sites about how it was possible to embed code in mp3s a while back.

    Something to dissprove it:

    f-secure story
  7. Enyo

    Enyo Moderator

    The article is pretty much correct. There are methods to embed data in, mp3's but that code cant be executed.

    Also ming is correct, windows hiding the filename is an issue but its very much down to the user. And even if the user saw the extention of mp3.vbs they would still run it anyway!

    Bottom line is If a AV is installed then its no issue at all as the user does not have to worry this.
  8. WiredBrain

    WiredBrain Guest

    I don't agree with this. Someone can just modify the trojans to bypass
    the AV and what about the latest virus? AV will need at least a week to detect them.
  9. WiredBrain

    WiredBrain Guest

    By the way, the articles I mention were about the cons of free file-sharing network against the legitimate services. It's either those authors didn't know what they are writing or paid ... ;)
  10. Enyo

    Enyo Moderator

    Your expanding the issue now, I was really referring to the majority of double-file named viruses that are in the wild, they are going to be covered.

    I was talking in general about ITW threats that use this kind of desception, users are fooled yes but only because they dont exercise due care because of that they will rely on there AV. I was not suggesting its the only line of defence for the savvy.

    In answer to your statements (doube-file name or not, it makes no odds)

    Yes thats true but most AVs include the ability to detect even modified (packed) Trojan servers. Granted some dont do this well.

    That really varys with vendor but it is not a week.

    Most major vendors update daily, this includes Norton and McAfee.

    KAV updates two to four times a day.
  11. Xie

    Xie - geek - Subscribed User Folding Team

    NY, USA
    I've seen an example of the .jpg thing ... mozilla refuses to open it though telling you its an invalid image :)
  12. Enyo

    Enyo Moderator

    Yes that was a bad one and very much related to the first question about code insertion.

    In this case the .jpg was not a picture rather a HTML file which would have been harmless except for the way the browser handles this situation.

    When IE encounters an invalid image it will parse it as a HTML file hence it was able to have the .jpg extension yet be HTML code.

    The picture contained a VBScript which replaced WMP on the system with a Trojan, then JScript was used to execute the file.

    Clever but in this incarnation very deadly. It affected a forum user here. Nicely documented here
  13. dreamliner77

    dreamliner77 The Analog Kid

    Red Sox Nation
    It's very easy for mp3's to contain malicious code. This was an issue probably about a year ago. It all relates to the tagging scheme used in mp3's. Most common are ID3v1 and ID3v2 tags. v1 tags are actually headers and must be of finite length. v2 tags are added at the end of the file and therefore can be of infinite lenght and allow you add cover art (and virii, amongst other things) to the tags. This become an issue where there was some code that opened winamps browser and redirected users or something like that.

    [offtoptic] I just realized that i surpassed 1000 posts. Yay for me!!!. Let's have a party![/offtopic]
  14. LeeJend

    LeeJend Moderator

    Fort Worth, TX
    There was a reported vulnerability in Realplayer that allowed a virus to be inserted into an mp3 and realplayer would run it.

    They fixed it a while back. Just make sure you have an up to date realplayer. Not sure if applied to other players that could run an mp3.

    But aside from all that:


    Yes, I was shouting. I have received dozens of virus's but never been infected by any of them.
  15. WiredBrain

    WiredBrain Guest

    Thank you for all the replies.