Facebook Chat is now accessible on popular instant messaging clients

Author: Omid Farhang Published: February 12, 2010 Reading Time: 1 min

Making good on a promise delivered just about one year ago, Facebook announced that its popular chat feature can now be accessed through any Jabber (XMPP)-compatible desktop instant messaging software, including AIM, iChat, Pidgin, Adium, Miranda, Trillian and… Users can simply connect their Facebook account with their instant messaging client of choice and they can then chat with Facebook friends without having to stay logged into the social networking site. Further, Facebook Chat has been integrated into the Facebook Connect platform for developers so other services wishing to integrate instant messaging into their sites. ...

Continue Reading Facebook Chat is now accessible on popular instant messaging clients

WinXP users: hold off on installing MS010–15 [BSOD]

Author: Omid Farhang Published: February 12, 2010 Reading Time: 3 min

Security blogger Brian Krebs is reporting that some Windows XP users are reporting blue screen of death on reboot after installing Microsoft’s Tuesday patch KB977165 (MS010–15: “Vulnerabilities in Windows kernel could allow elevation of privilege.”) “Turns out, a non-trivial number of XP users are reporting that their systems suffer from the dreaded Blue Screen of Death (BSoD) and fall into an interminable reboot loop after installing the latest batch of patches from Redmond,” ...

Continue Reading WinXP users: hold off on installing MS010–15 [BSOD]

New Rogue: SecurePcAv

Author: Omid Farhang Published: February 12, 2010 Reading Time: 1 min

SecurePcAv is a phony antivirus program that has been infecting PC’s across the interwebs in recent days. If your PC is infected with SecurePcAv you will most likely experience the following: Fake system scans that report numerous infections and refuses to remove the supposed infections until you buy the phony software. Alerts and warnings stating the PC is under attack or unprotected and recommends you buy the phony software. Other software will not work, when attempting to open programs a warning stating the program is infected appears and the software is closed. Web browser hijacking, redirecting the user to malicious websites or showing false security warnings on sites like Google.com.

Continue Reading New Rogue: SecurePcAv

Zeus – Exploiting Spear Phishing to Spear Phish

Author: Omid Farhang Published: February 12, 2010 Reading Time: 1 min

The Zeus crimeware family has moved into new territory with its latest spam campaign – purporting to be a warning about targeted phishing attacks on “.gov” and “.mil” domains, by Zeus Trojans no less! In fact, one of the latest spam samples we’ve seen, duplicates the title and first three paragraphs of a blog entry by well-known security expert Brian Krebs, which discusses a previous iteration of this Zeus attack. As seen below, the spam sample starts off with the same three lines of the blog post, before starting into the phony KB content and links that lead to Zeus malware. ...

Continue Reading Zeus – Exploiting Spear Phishing to Spear Phish

New Rogue: Paladin Antivirus

Author: Omid Farhang Published: February 12, 2010 Reading Time: 1 min

Paladin Antivirus is a phony security program, designed to rip people off. Paladin Antivirus tricks people into thinking they are downloading a legit antivirus software, then continually displays false security alerts and warnings followed up with a requests for users to buy or register the software. Once a computer becomes infected with Paladin Antivirus it will instantly begin a system scan and will report multiple infections. Paladin Antivirus will refuse to remove any of these supposed infections until the user buys or “registers” the software. Do not fall for this scam. ...

Continue Reading New Rogue: Paladin Antivirus

History of the Internet

Author: Omid Farhang Published: February 12, 2010 Reading Time: 1 min

Have you ever wondered how Internet initiated 50 years ago in 1957? Below is a nice video which depicts how the Internet changed with respect to time in modern age. Must check it out! Hope you liked watching this video!

Continue Reading History of the Internet

New Google Chrome Beta for Mac gets Extensions

Author: Omid Farhang Published: February 12, 2010 Reading Time: 1 min

Google launched the Mac version of its Chrome browser in Dec 2009. A new beta build is now available which offers new features like extensions, bookmark sync, and more. Now you’ll be able to install any of over 2,200 extensions currently available in Chrome’s extensions gallery. Extensions can add useful, informative,fun, or quirky functionality to your chrome browser. It also adds bookmark and cookie managers in a way that feels completely at home on the Mac ...

Continue Reading New Google Chrome Beta for Mac gets Extensions

The Buzz is getting LOUDER

Author: Omid Farhang Published: February 12, 2010 Reading Time: 2 min

It has been barely two days since Google announced their new social integration and messaging tool called Google Buzz. Today we saw the first example of malware, W32/Zuggie-A, pretending to be Google Buzz. Analysis of W32/Zuggie-A gives the impression of a hastily assembled worm, really a modification of the W32/SillyFDC family of worms but with a twist. When W32/Zuggie-A is installed, it creates the following files: Program Files\Mozilla Firefox\extensions{9CE11043-9A15-4207-A565-0C94C42D590D}\chrome\content\timer.xul Program Files\Mozilla Firefox\extensions{9CE11043-9A15-4207-A565-0C94C42D590D}\chrome.manifest Program Files\Mozilla Firefox\extensions{9CE11043-9A15-4207-A565-0C94C42D590D}\install.rdf System\googlebuzz.exe – copy of W32/Zuggie-A System\GoogleUpte.exe – copy of W32/Zuggie-A W32/Zuggie-A modifies the registry to autostart GoogleUpte.exe and googlebuzz.exe. A quick search shows that the CLSID: 9CE11043-9A15-4207-A565-0C94C42D590D has previously been seen in multiple worms. This supports my theory that this is a hastily assembled worm built from recycled malware. I fired up a copy of Firefox on the infected machine and, as determined from analysis, found an installed Firefox extension called Firefox security 2.0 – Internal security options editor under the extensions tab of Firefox Add-ons. This “security extension” has added a JavaScript (timer.xul), which is triggered when the browser queries: yahoo.com, bing.com, google.com, aol.com/aol/search, ask.com and executes JavaScript hosted on: searchrequest1 . com / request . php ? aid = blackout which will silently click all Google or Yahoo Ads. displayed on the search results page (hey why not make a few bucks while infecting eh?). Google Buzz is new and is garnering quite a bit of interest and adoption among Internet users including myself. Clearly the malware authors view Google Buzz as the fresh big lucrative social fruit to exploit much like they have done with Facebook, MySpace, Hi5 and others. So in the coming weeks and months I predict we will see a host of new malware exploiting or attempting to exploit Google Buzz as the malware authors figure out its internals. This may have only been an exploratory attempt or a quick response to the latest craze – only time will tell.

Continue Reading The Buzz is getting LOUDER

Between a PoC and a Hard Place

Author: Omid Farhang Published: February 12, 2010 Reading Time: 3 min

Several reports have been published detailing a Blackberry proof of concept (PoC) exploit called txsBBSpy that was recently presented at a security conference. Although it may not have been the aim of the original presenter, some reports have framed the PoC as being able to exploit so-called vulnerabilities that the writers believe to be present in the Blackberry platform. The “vulnerabilities” involve secretly forwarding incoming emails, locating devices by way of their GPS capabilities, eavesdropping on conversations by surreptitiously turning on microphones, and other such nefarious behavior. ...

Continue Reading Between a PoC and a Hard Place

Interview with a Nigerian 419 scammer

Author: Omid Farhang Published: February 12, 2010 Reading Time: 3 min

Bruce Schneier, in his blog Schneier on Security http://www.schneier.com/ drew attention to this great interview with an ex-Nigerian-419 scammer on the Scam-Detective site. It’s a fairly long piece and gives a pretty good view of the Nigerian scam industry run by organized crime, how it sucks in young people who have good computer and English skills and pays them a huge amount of money ($75,000 per year in this case) to scam victims they view as white, greedy and rich. ...

Continue Reading Interview with a Nigerian 419 scammer