| 

Sandboxed Flash Player for Firefox: Adobe Flash update closes several critical holes

  • Post author: Omid Farhang
  • Post published: June 9, 2012
  • Reading Time: 2 min
  • Word Count: 315 words

The H-Online: Adobe has announced the release of an update for Flash Player on Windows, Mac, Linux, Android 3.x and 4.x, and within its own AIR runtime. The update addresses several critical vulnerabilities which involve memory corruption, stack overflows, integer overflows, security being bypassed, null dereferencing and binary planting (DLL hijacking). All, except the security bypass, could lead to code execution. The updates also include a number of security enhancements on various platforms. The Windows version of Flash Player now offers a production version of “Flash Player Protected Mode for Firefox” which brings a sandbox to the running of Flash, making it harder for attackers to get at other processes. ...

Continue Reading Sandboxed Flash Player for Firefox: Adobe Flash update closes several critical holes

Password leaks bigger than first thought

  • Post author: Omid Farhang
  • Post published: June 9, 2012
  • Reading Time: 3 min
  • Word Count: 433 words

The H-Online: There have still been no official statements on the causes and extent of the recent password leaks at LinkedIn, eHarmony and Last.fm. A credible source is now reporting that the published 2.5 million Last.fm MD5 hashes, for example, are just the tip of a 17 million hash iceberg. That iceberg has reportedly been circulating since summer 2011.16.4 million of these – 95 per cent – have, the source claims, already been cracked, a claim which, for unsalted hashes, is entirely credible. ...

Continue Reading Password leaks bigger than first thought

Millions of Last.fm passwords leaked

  • Post author: Omid Farhang
  • Post published: June 9, 2012
  • Reading Time: 1 min
  • Word Count: 212 words

The H-Online: A list with several million passwords belonging to users of the music community site Last.fm has been posted on the internet. The site owners have posted a statement saying that the company is investigating the leak and that all users of the service should change their passwords immediately. This is the third major compromise of a popular web site’s passwords in as many days. The H’s associates at heise Security are in possession of a list containing approximately 2.5 million password hashes. Like the recently leaked data from eHarmony, these are unsalted MD5 hashes that are trivial to crack in today’s world of fast CPU and GPU hardware and specialised techniques such as using rainbow tables. At least one million of these hashes have already been cracked and the clear text passwords have also been posted on the internet. The hashes that were leaked from LinkedIn were generated using the SHA-1 algorithm. ...

Continue Reading Millions of Last.fm passwords leaked

LinkedIn passwords in circulation

  • Post author: Omid Farhang
  • Post published: June 6, 2012
  • Reading Time: 2 min
  • Word Count: 303 words

H-Online: Internet forums are currently circulating a list containing over six million password hashes which allegedly originate from LinkedIn. The passwords are being cracked collaboratively with about 300,000 passwords already published as plaintext. The list contains pure SHA1 hashes with no name or email addresses. If decrypted, the passwords will not easily give access to an appropriate account. However, it is probable that the person who captured the hashes also has the corresponding email addresses. In an initial sampling, The H‘s associates at heise Security didn’t find any known LinkedIn passwords in the list, but with over 160 million members that doesn’t mean a lot. The already cracked passwords often contain “linked” or even “linkedin” in the form, for example, of “lawrencelinkedin”. This suggests that the passwords actually come from the LinkedIn social network. However, this has not yet been confirmed. ...

Continue Reading LinkedIn passwords in circulation

Microsoft revokes certificates used to sign the Flame trojan

  • Post author: Omid Farhang
  • Post published: June 4, 2012
  • Reading Time: 1 min
  • Word Count: 114 words

Avira TechBlog Wrote: Microsoft released Security Advisory 2718704 which revokes some certificated which apparently were used to sign the trojan Flame__. In a blog post, Microsoft explains how they discovered that some components of the malware have been signed by certificates that allow software to appear as if it was produced by Microsoft. The certificates issued by the Terminal Services licensing certification authority, which are intended to only be used for license server verification, were also used to sign code and make it look like as if it was originated from Microsoft. ...

Continue Reading Microsoft revokes certificates used to sign the Flame trojan

Automated Skype calls and Fake Antiviruses

  • Post author: Omid Farhang
  • Post published: June 3, 2012
  • Reading Time: 1 min
  • Word Count: 144 words

This is an old story back from September, 2011, but since recently I’ve seen users complaining about this, I want to share it again [Credit to NakedSecurity, SophoLabs]: You may have received an automated call from a user who claim to be from Skype or somewhere which says: Attention: this is an automated computer system alert. Your computer protection service is not active. To activate computer protection, and repair your computer, go to [LINK] ...

Continue Reading Automated Skype calls and Fake Antiviruses

On Stuxnet, Duqu and Flame

  • Post author: Omid Farhang
  • Post published: June 3, 2012
  • Reading Time: 2 min
  • Word Count: 227 words

F-Secure wrote: When we went digging through our archive for related samples of malware, we were surprised to find that we already had samples of Flame, dating back to 2010 and 2011, that we were unaware we possessed. They had come through automated reporting mechanisms, but had never been flagged by the system as something we should examine closely. Researchers at other antivirus firms have found evidence that they received samples of the malware even earlier than this, indicating that the malware was older than 2010. ...

Continue Reading On Stuxnet, Duqu and Flame

Firefox 13 Final is available for download [Link]

  • Post author: Omid Farhang
  • Post published: June 3, 2012
  • Reading Time: 1 min
  • Word Count: 46 words

Mozilla Firefox 13 is available for download on Mozilla FTP servers. Visual changes in this version is flatten buttons in toolbar, smooth scroll enabled by default, New Home Screen and a new look for New Tab page. Download: Firefox Setup 13.0.exe [Mirror] MD5: 89bc2ab1a1fa1e2d989d1c551f2a6ddf Size: 15.8MB

Continue Reading Firefox 13 Final is available for download [Link]

FAQ: Flame, the "super spy"

  • Post author: Omid Farhang
  • Post published: May 31, 2012
  • Reading Time: 4 min
  • Word Count: 822 words

Copied from H-Online: Source The spyware worm Flame is being billed as a “deadly cyber weapon”, but a calmer analysis reveals it to be a tool by professionals for professionals that doesn’t actually have that many new features compared to, say, the widespread online-banking trojan Zeus. What is Flame? Flame is the code name for a spyware program that is built to be very modular and which is also known as Flamer and sKyWIper. Flame was just recently discovered, and it will be some time before all of its components are analyzed. Anti-virus software companies estimate that Flame has infected about 1,000 computers, mostly in the Middle East. ...

Continue Reading FAQ: Flame, the "super spy"

Painting a Picture of W32.Flamer

  • Post author: Omid Farhang
  • Post published: May 31, 2012
  • Reading Time: 1 min
  • Word Count: 157 words

Symantec Connect: The number of different components in W32.Flamer is difficult to grasp. The threat is a well designed platform including, among other things, a Web server, a database server, and secure shell communications. It includes a scripting interpreter which allows the attackers to easily deploy updated functionality through various scripts. These scripts are split up into ‘apps’ and the attackers even appear to have something equivalent to an ‘app store’ from where they can retrieve new apps containing malicious functionality. ...

Continue Reading Painting a Picture of W32.Flamer