A new virus emerged Wednesday that is the first to target Microsoft Corp.'s .NET platform for building and deploying Web services, posing a early risk for the build-out of the next-generation Internet, according to an anti-virus vendor.
Called W32/Donut, the virus originated in the Czech Republic and targets files running in Microsoft's .NET Framework, the set of building blocks that are needed to create and execute XML (Extensible Markup Language) Web services and other applications in Windows.
Windows XP Professional is Microsoft's first operating system release that will include support for the .NET Framework. It is also the central feature of Microsoft's Visual Studio .NET developer toolkit. Users who have the .NET software running on Windows 2000 or XP could be affected. Anti-virus expert McAfee, however, warned that even users with .NET applications only face a low risk of infection.
Unlike most well-known viruses, Donut does not spread itself automatically via e-mail but must be mailed directly to a user or downloaded from a Web site. The program does not do damage to an infected PC either. It simply infects other .NET files with its code and displays a dialog box with the message, "This cell has been infected by dotNET virus!," said Craig Schmugar, a virus researcher at McAfee's AVERT (Antivirus Emergency Response Team) Labs.
The dialog box appears only one in every ten times an infected file is run.
The virus is a proof-of-concept type of program, letting Microsoft know that attackers are awaiting its new set of software and Web services, Schmugar said.
"It does not do a whole lot right now, but we will see a different type of virus down the road because of this," Schmugar said. "This is forward looking, but it lets people know there will be attacks."
The .NET Framework includes the CLR (Common Language Runtime) -- a developer tool that allows applications to be programmed in various developer languages -- as well as class libraries and other programming tools that enable developers to build XML Web services and execute those in Windows.
Two key pieces of the framework, the CLI (Common Language Infrastructure) and Microsoft's programming language C# (pronounced C-sharp), were approved as standards last month by ECMA (European Computer Manufacturers Association), a European standards body.
The virus was primarily written in Win32 assembly language and some MSIL (Microsoft Intermediate Language), according to AVERT's Web site. The program attacks other .NET executables using the .EXE extension but does not stay resident in memory.
Microsoft did not immediately return calls seeking comment.