Monday, September 20, 2010

F-Secure on how to "un-Google" yourself. Privacy tips for the paranoid!

A personalized web-experience comes at a price to your privacy.  We all (to some degree) probably appreciate personalized content, relevant ads (since we have to look at them anyway) and the ability to easily share with others the timely nuggets we find about the web.

Check out this article from the Safe and Savvy  blog about how to limit what information Google can use when you are on their services/sites.

Wednesday, July 28, 2010

Facebook Data Harvested to Build List of Likely Logins

A researcher published a torrent file containing the name of every Facebook user that hasn't specifically opted out. The list was obtained by harvesting a public directory that Facebook maintains.

This list was then used to determine the likely variations of "first initial last name", "first name last initial" and so on, which could be helpful at increasing the success of users attempting to log in to systems using brute-force tactics.

The details of how this was done are available at: http://www.skullsecurity.org/blog/?p=887

Monday, July 19, 2010

Security Secrets the Bad Guys Don't Want You to Know

PC World has a nice easy read on safer Internet browsing.

From the article:

"You already know the basics of internet security, right?

You know to keep your antivirus program and patches up to date, to be careful where you go on the Internet, and to exercise online street-smarts to resist being tricked into visiting a phishing site or downloading a Trojan horse.

But when you've got the basics covered, but you still don't feel secure, what can you do? Here are a few advanced security tips to help you thwart some of today's most common attacks.

Remember, however, that security is all about trade-offs. With most of these tips, what you gain in security, you lose in convenience. But hey, it's your computer. Be as paranoid as you want to be."

http://www.pcworld.com/article/201309/security_secrets_the_bad_guys_dont_want_you_to_know.html?tk=hp_new



Thursday, July 1, 2010

Scareware/Rougeware Propogation Tactics

If this article doesn't make you uncomfortable, you may need to re-read it.

The infection routines being used by some scareware and rogue AV gangs are much more comprehensive and far-reaching than many current analysis have shown

Quote from SANS -
""Once the site has been compromised, the attackers install their script in any directory, preferably in a directory that is not accessible directly from the web since they will not need to access it directly. The next step the attackers do is to infect all (and I mean all!) PHP files on the compromised web site. If it's a shared web site, and the permissions are not setup correctly, they will actually infect absolutely every web site hosted on that machine," 

Read the full article and Threatpost

Saturday, June 5, 2010

The Asprox Spambot Resurrects (apparently with some new tricks)

Been awhile since we've heard anything about this particular Botnet, but seems it's sparked back to life -

"With the help of Pushdo and Bredolab downloader, it seems Asprox has risen from the dead to build another spamming bot network. The above analysis also highlights the intricate relationships between individual malware components, and hint at a common gang behind it all."






Thursday, June 3, 2010

Stable release of Firefox 3.6.4 delayed

Mozilla has confirmed that it is delaying the the release of [Firefox] version 3.6.4.  Launch date TBD

The development of browsers that "sandbox" or isolate historically problematic plugins and processes is encouraging. Look forward to seeing how this changes development of other apps that are reliant on external programs.

RC for this release can be found here

NetMarketshare's OS report

Graph showing OS market share over the past year (my apologies, but you have to click on the images to look at them.. too much info for a small graph).



Here is the current month -


One of the things that stood out to me was the number of mobile devices/OSes captured from last years reports in June (e.g. iPhone from .20 to .60%).

Wednesday, June 2, 2010

McAfee - Interesting look at common "exploit packs" and target vulnerabilitites

Affordable and readily available tools for miscreants who want to use your computer for bad things...

Very interesting look at the kits and what well-known exploits they go after -

Check out McAffee's blog post for other images from these kits and their very informative write-up (including prices) on this.

Mac users get own their version of a Windows Spyware variant

.."some [free Mac downloads] include a new piece of invasive spyware"


List of applications known to contain this malicious code -


  • Secret Land ScreenSaver v.2.8
  • Color Therapy Clock ScreenSaver v.2.8
  • 7art Foliage Clock ScreenSaver v.2.8
  • Nature Harmony Clock ScreenSaver v.2.8
  • Fiesta Clock ScreenSaver v.2.8
  • Fractal Sun Clock ScreenSaver v.2.8
  • Full Moon Clock ScreenSaver v.2.8
  • Sky Flight Clock ScreenSaverv.2.8
  • Sunny Bubbles Clock ScreenSaver v.2.9
  • Everlasting Flowering Clock ScreenSaver v.2.8
  • Magic Forest Clock ScreenSaver v.2.8
  • Freezelight Clock ScreenSaver v.2.9
  • Precious Stone Clock ScreenSaver v.2.8
  • Silver Snow Clock ScreenSaver v.2.8
  • Water Color Clock ScreenSaver v.2.8
  • Love Dance Clock ScreenSaver v.2.8
  • Galaxy Rhythm Clock ScreenSaver v.2.8
  • 7art Eternal Love Clock ScreenSaver v.2.8
  • Fire Element Clock ScreenSaver v.2.8
  • Water Element Clock ScreenSaver v.2.8
  • Emerald Clock ScreenSaver v.2.8
  • Radiating Clock ScreenSaver v.2.8
  • Rocket Clock ScreenSaver v.2.8
  • Serenity Clock ScreenSaver v.2.8
  • Gravity Free Clock ScreenSaver v.2.8
  • Crystal Clock ScreenSaver v.2.6
  • One World Clock ScreenSaver v.2.8
  • Sky Watch ScreenSaver v.2.8
  • Lighthouse Clock ScreenSaver v.2.8

Tuesday, May 25, 2010

Microsoft continues uphill battle against the Alureon rootkit

"According to the Microsoft Malware Prevention Center (MMPC), this month's Malicious Software Removal Tool (MSRT) has scrubbed the Alureon rootkit from over 360,000 Windows PCs since its May 11 release. That represented 18.2% of all MSRT detections for the month, more than double the 8.3% the rootkit accounted for in Apr"


"Almost two-thirds (65%) of the PCs infected with Alureon this month were running Windows XP Service Pack 3 (SP3), with the No. 2 spot taken by Windows XP SP2 (14%). Only 3.5% of the rootkit-infected PCs were running Windows 7, said Microsoft."


Have to give Microsoft credit for not giving up on this.  The longer this problem persists, the longer these machines stay vulnerable.  They are aiming at an unpredictable, moving target though.

Devious New Phishing Tactic Targets Browser Tabs

The essence of phishing is taking advantage of user trust. This attack exemplifies that in every form. Even advanced users may be caught off guard by this scheme. Make sure you check your address bar!

Some good news is that users running NoScript, Safari or Chrome don't seem to be affected by these iterations of the attack.

Example of concept is here

Thursday, May 20, 2010

Present Day History of Conficker

This entertaining write-up on the history of Conficker reveals some of the complexity behind the worm. The story also explains the back and forth escalation between the highly proficient authors of the worm and the Conficker Cabal including some interesting details like Confickers implementation of bleeding-edge encryption.

Wednesday, May 19, 2010

New Rogueware links identified in many popular entertainment related search queries

MySecurityEngine is a FakeAV (Rougeware) application that seemed to surface towards the end of April. This strain of Rogueware is seeing heavy propagation due to what appears to be a very effective employment of Malicious Search Engine Optimization.

The distributors have been observed achieving very high search rankings for queries on the following topics:

Lost episodes
Friday Night Lights
The Boondocks
The Hills
Family Guy
Iron Man 2
Misc. Popular Musicians

Death of Ronnie James Dio
.. and others

Panda Labs describes the software as:
"MySecurityEngine is an adware program that deceives users warning them of unexisting threats in their computers so that they purchase a certain program that removes them from the computer.

Additionally, it prevents users from accessing certain search engines and from running certain security programs, like antivirus solutions, firewalls, or even fils belonging to fake antivirus programs. It also modifies the searcher that is displayed in the Search option of the Internet Explorer browser.

MySecurityEngine can reach the computer in spam messages containing a link or an attached file, or through malicious websites that have obtained googd positions in the search engines by using BlackHat Seo techniques"


File-sharing can be risky business!

There are many free or inexpensive ways to consume high-quality media online such as Centurylink Video Store, CenturyLink Unlimited Music (and videos), Netflix, iTunes, Hulu and others.

Using reputable services like these can provide great content and save a lot of frustration.

Tuesday, May 18, 2010

New and improved Zueskit payload from spam messages

Be very careful of this one. It appears that there is limited detection for these variants.

"for instructions and an executable that is meant to be the patch to apply. The executable file named adbp932b.exe (SHA1 0632f562c6c89903b56da235af237dc4b72efeb3) has minimal coverage of about 7%."

Monday, May 17, 2010

Facebook Privacy Check - From the F-Secure Blog

Often, the lines between online privacy and online security merge. Such is the case with many of the changes made on Facebook recently. Many folks don't think about the impacts of data they share online. How is it used, is it shared, and what is the impact to your "friends".

Try this interesting app to see what the privacy and security footprint of your Facebook profile really looks like. It may surprise you!

We'll try to add some discussion about social networking (from both sides of the field) and specifically the recent changes to Facebook in our next webcast.

Phishlabs baits a phisher (and reports some great insight)

Another great article from Brian Krebs. This one shows some really detailed info about what goes on behind the scenes in a "phishing racket".

The fact that this type of activity is now being made available to mainstream opportunists is a double-edged sword. While the prevalence is increasing, it allows allows researchers more opportunities to capitalize on amateurs making mistakes. This was just one such case.

This SC based research organization found this phisher's "back door" and watched it.

AS50896 - (PROXIEZ) Gets Taken Offline

This network was harboring some really bad stuff. While I'm sure these miscreants will find a new home for their garbage, it's always encouraging to see this. If law enforcement keeps up the tempo on arrests and take-downs, it increases the risk and potential loss associated with this type of activity.

Increased risk (and potentially higher operating costs) drastically changes the equation for online fraudsters and provide deterrent that has been lacking in the past.

As a "double whammy" today, I'm including a video of yet another Romanian Law Enforcement agency taking a group of scammers into custody.

Saturday, May 15, 2010

"Sexiest Video Ever" on Facebook is a front for Malware

Websense article about this very successful campaign currently running on Facebook.

Adding this to your profile puts you and your friends in jeopardy. Please don't follow these links!

"When clicking on the "video" you are taken to an application installation screen asking you to allow it to access your profile, wall etc. Once approved it claims you have to download an updated FLV Player to view the video and promptly sends an EXE your way...

This is the Hotbar Adware which displays ads in your browser based on your browsing habits etc. In addition, the Facebook application just installed will post messages on your friends wall on your behalf with the same "sexiest video ever" message
."

Monday, May 10, 2010

Attack Method Bypasses Anti-Virus

Researchers have revealed a method for bypassing just about any anti-virus software by swapping "safe" code for "malicious" code after it has been scanned, but before it has been executed.

Links:

Updates 5/11/2010 --
Responses from AV Vendors:

Tuesday, May 4, 2010

US Treasury Websites Serving Malware

The Register reports that the US Treasure Department website has been compromised and was serving up malware to visitors as recently as Monday.

Full details at The Register:

Wednesday, July 8, 2009

On-going Denial of Service (DDoS) Against US Sites

There's currently a large-scale denial of service underway that appears to be affecting sites like ftc.gov.

More information available from F-Secure:
Lyzapo DDoS attack on US and South Korean websites

Wednesday, July 1, 2009

Message Labs spam traffic analysis

A pretty quick and informative look at what Message Labs is currently seeing on the spam front.
- 90% of all email was spam
- 83.2% was botnet generated
- 45% of botnet generated spam appears to be from Cutwail
- Although one of it's main distribution channels was shut down earlier this month, this botnet showed great resilience by getting right back up. Very little reprieve was seen in traffic
- Virus infected emails 1:269
- Phishing emails 1:280

That's a lot of badness floating around out there. Article Here

Friday, June 26, 2009

Security Researchers Claim to Have Located Dropbox with High-profile FTP Logins

Representatives for Prevx claim they have accessed a server containing valid FTP logins for some high-profile domains (amazon.com, monster.com, bbc.co.uk, etc). This type of compromise goes hand-in-hand with the recent increase in drive-by-downloads.

Article courtesy of The Register.

Interest attack attempting to use security software update

Sophos has reported this morning that they have received copies of a malicious email that attempts to lure customers into downloading "updates" to their security software. The email looks very authentic, and anyone taken by the scheme ends up with Troj/Spoof-H which in turn allows additional malware to be installed.

The email message is:

“Download latest virus identity (IDE) files

If you are running an older version of Sophos Anti-Virus and do not automatically update your protection, you should download virus identity files (IDEs), which provide detection and disinfection of viruses, worms, Trojans and spyware.

All the IDEs you need are available in a single compressed file. NOTE: Please RUN the application accordingly.”


Additional details in the article

General phishing email reported 6/25

We got reports of several users getting this yesterday-

Origin -
85.25.132.91
NetRange: 85.0.0.0 - 85.255.255.255
CIDR: 85.0.0.0/8
NetName: 85-RIPE
NetHandle: NET-85-0-0-0-1

Received: from uf5.cybercity.dk (uf5.cybercity.dk [212.242.42.163])
by smtp2.cybercity.dk (Postfix) with ESMTP id 04DDC313CC2;
Thu, 25 Jun 2009 19:07:31 +0200 (CEST)
Received: from webmail.telenor.dk (localhost [127.0.0.1])
by uf5.cybercity.dk (Postfix) with ESMTP id 840D4205D31;
Thu, 25 Jun 2009 19:07:29 +0200 (CEST)
Received: from 85.25.132.91
(SquirrelMail authenticated user onlineid2@mail.telenor.dk)
by webmail.telenor.dk with HTTP;
Thu, 25 Jun 2009 19:07:30 +0200


Dear mail subscriber,
We are currently verifying our subscribers email accounts in
order to increase the Efficiency of our web mail features.

We are deleting all unused Web Mail account,

To confirm your account is currently in use and join in the
Recent Upgrade Taking Place,

You must Reply to this email by Providing your email Password
in the blank space below. Failure to do this will immediately
render your email address deactivated from our database.

Confirm Your Web Mail Login information
:::::::::::::
FIRST AND LAST NAME:
USERNAME:
PASSWORD:
:::::::::::::

Attention! Account holder who refuses to update
his account within Seven days after receiving this warning will
lose his account permanently.

Thanks for using Web mail

WebMail Admin System
Warning Code :UCIX782X

Several links and info on Twitter devleoping as target for attackers

I don't pass along every single attack I read about using Twitter, but this one described on Trend Micro's blog certainly caught my attention. Koobface seems to have updated it's components to increase mayhem on a user's Twitter (and other social networking sites).

According to the article
The new component uses a victim’s Twitter account to post tweets using Internet-browsing cookies to log in to the target user’s account. Tweets can more successfully be posted when the victim is currently logged on to his/her Twitter account as the ‘evil’ Koobface binary runs in the background.


The content is allegedly updated from a C&C server and then uses shortened URLs from Tinyurl.com to further obfuscate the threat.

In other big Twitter related attack news this week, Sophos has posted a video showing exactly how Guy Kawasaki's feed was exploited and used to try to propagate malware. It's interesting that they used a Mac to show how this exploit worked.

### Warning, this video shows the researcher going to the exploit site which contains erotic imagery which may be offensive or inappropriate in some environments ###
The link to the video is located HERE

Thursday, June 25, 2009

Dangers of auto "redistributing" data and Mac Malware updates

Lot's of buzz about how Guy Kawasaki inadvertently put over 100k PC AND Mac users are risk when one of the users his service was setup to automatically redistribute sent a tweet with a malicious link. Those of us who like to share info can take away a very valid warning from this. We're responsible for the info we relay as well as what we post ourselves.

Full article Here

Great analysis and update on the inner workings of "Nine Ball" Attacks

Atif Mushtaq from FireEye provides some great info and research details on the inner workings of this attack.

We just picked up two samples that appear to be part of this last night.

Well worth the read in the threatfire blog HERE

Tuesday, June 23, 2009

4 Guilty Pleas in Spam Ring Prosecution


Brian Krebs of the Washington Post has an article (photos courtesy of Spamhaus) covering the guilty pleas of four individuals involved with what is described as "on of the worlds top spam kingpins".

The complete list of those pleading guilty of involvement and associated charges:

  • Scott K. Bradley - Up to 87 months in prison and $1,000,000,000 fines

  • John Bown - Up to 63 months in prison and $75,000 fine

  • William Neil - Up to 37 months incarceration and $30,000 fine

  • James Fite - 2 years incarceration and $30,000 fine


Sentencing is scheduled for 29 Oct, 2009

Full article is HERE

Your PC "for rent"

bestsecuritytips.com has an interesting article about a network that Finjan calls the "Golden Cash Network". The complete article is HERE

There are attached whitepapers covering the following


  • On the buyer side of the trading platform, batches of 1,000 malware-infected PCs can be purchased for $5 up to $100; depending on territory

  • Partners are paid for successfully distributing the bot and collecting FTP-credentials of legitimated websites through the infected PCs

  • On the seller side of the trading platform, cybercriminals sell batches of 1,000 malware-infected PCs for $25 up to $500

  • Compromised malware infected PCs may be infected with additional malware each time they are purchased by a new "owner"

  • For attacks and exploitations, an exploit toolkit with obfuscated code and the Trojan Zalupko attack toolkit are provided


Very interesting and easy to follow article about a fairly standard botnet.

Monday, June 22, 2009

Very simplistic and hard to mitigate DoS for Apache Servers

With the prevalence of Apache webservers out there, this is a fairly disturbing bit of news. Will be interesting to see what types of mitigation folks employ to defend against THIS.

Some recommendations for protecting against this type of attack are HERE and HERE, but there may be some impacts on "normal" usage as well.

Sunday, June 21, 2009

Some discussion on new Virut activity from Threatfire research

This article is a bit old, but it caught my eye due to the volume of this we've seen in some of our sample collections. The article located HERE provides some historical reference and great current information on the state of this code. WARNING - The article may link to some LIVE malicious code. Following these links is not recommended unless you are a researcher and are taking appropriate precautions.

Hosting company loses user data due to zero-day exploit

Over 100,000 folks relying on low-cost "virtual hosts" became an unfortunate example of why data backup is often worth it's weight in gold. Attackers took advantage of zero-day exploit to destroy a large amount of data on these servers before administrators could react. Story here

Cybercrime gets more accessible

Another outstanding article by Brian Krebs about how cybercrime is developing itself as big business. The complete article Web Fraud 2.0: Franchising Cyber Crime goes into pretty sordid detail as to how even beginning deviants can get into the action and profit from the propagation of malicious code.

Saturday, June 20, 2009

Two new malware attacks against Mac users

Earlier this week, we saw an interesting article on theage.com.au that discusses two new malware variants (named OSX/Tored-A and OSX/Jahlav-C).

Also noteworthy aside from the fact that these target the Mac user base (which is normally considered to be a less valuable target to attackers due to the smaller user base) is the fact that the authors are using adult content websites for propagation. There has been a declining trend of this on the spam scene over the past couple years.

Nice articles from Cloudmark on Deliverability Issues

Cloudmark has a two-part blog on some history and causes for deliverability issues. I think it's a great primer for users to understand what often causes legitimate senders to be blocked.

Part I Some Background
Part II Basic Steps and Information to get if you are blocked

If these steps don't work, contacting the Abuse Desk or deliverability manager for the "blocking party" should get the issues resolved.