All TechBlog Health Electronics Cozy Corner

New Rogue: SecurePcAv

Author: Omid Farhang Published: February 12, 2010 Reading Time: 1 min

SecurePcAv is a phony antivirus program that has been infecting PC’s across the interwebs in recent days. If your PC is infected with SecurePcAv you will most likely experience the following: Fake system scans that report numerous infections and refuses to remove the supposed infections until you buy the phony software. Alerts and warnings stating the PC is under attack or unprotected and recommends you buy the phony software. Other software will not work, when attempting to open programs a warning stating the program is infected appears and the software is closed. Web browser hijacking, redirecting the user to malicious websites or showing false security warnings on sites like Google.com.

Continue Reading New Rogue: SecurePcAv

Zeus – Exploiting Spear Phishing to Spear Phish

Author: Omid Farhang Published: February 12, 2010 Reading Time: 1 min

The Zeus crimeware family has moved into new territory with its latest spam campaign – purporting to be a warning about targeted phishing attacks on “.gov” and “.mil” domains, by Zeus Trojans no less! In fact, one of the latest spam samples we’ve seen, duplicates the title and first three paragraphs of a blog entry by well-known security expert Brian Krebs, which discusses a previous iteration of this Zeus attack. As seen below, the spam sample starts off with the same three lines of the blog post, before starting into the phony KB content and links that lead to Zeus malware. ...

Continue Reading Zeus – Exploiting Spear Phishing to Spear Phish

New Rogue: Paladin Antivirus

Author: Omid Farhang Published: February 12, 2010 Reading Time: 1 min

Paladin Antivirus is a phony security program, designed to rip people off. Paladin Antivirus tricks people into thinking they are downloading a legit antivirus software, then continually displays false security alerts and warnings followed up with a requests for users to buy or register the software. Once a computer becomes infected with Paladin Antivirus it will instantly begin a system scan and will report multiple infections. Paladin Antivirus will refuse to remove any of these supposed infections until the user buys or “registers” the software. Do not fall for this scam. ...

Continue Reading New Rogue: Paladin Antivirus

History of the Internet

Author: Omid Farhang Published: February 12, 2010 Reading Time: 1 min

Have you ever wondered how Internet initiated 50 years ago in 1957? Below is a nice video which depicts how the Internet changed with respect to time in modern age. Must check it out! Hope you liked watching this video!

Continue Reading History of the Internet

New Google Chrome Beta for Mac gets Extensions

Author: Omid Farhang Published: February 12, 2010 Reading Time: 1 min

Google launched the Mac version of its Chrome browser in Dec 2009. A new beta build is now available which offers new features like extensions, bookmark sync, and more. Now you’ll be able to install any of over 2,200 extensions currently available in Chrome’s extensions gallery. Extensions can add useful, informative,fun, or quirky functionality to your chrome browser. It also adds bookmark and cookie managers in a way that feels completely at home on the Mac ...

Continue Reading New Google Chrome Beta for Mac gets Extensions

The Buzz is getting LOUDER

Author: Omid Farhang Published: February 12, 2010 Reading Time: 2 min

It has been barely two days since Google announced their new social integration and messaging tool called Google Buzz. Today we saw the first example of malware, W32/Zuggie-A, pretending to be Google Buzz. Analysis of W32/Zuggie-A gives the impression of a hastily assembled worm, really a modification of the W32/SillyFDC family of worms but with a twist. When W32/Zuggie-A is installed, it creates the following files: Program Files\Mozilla Firefox\extensions{9CE11043-9A15-4207-A565-0C94C42D590D}\chrome\content\timer.xul Program Files\Mozilla Firefox\extensions{9CE11043-9A15-4207-A565-0C94C42D590D}\chrome.manifest Program Files\Mozilla Firefox\extensions{9CE11043-9A15-4207-A565-0C94C42D590D}\install.rdf System\googlebuzz.exe – copy of W32/Zuggie-A System\GoogleUpte.exe – copy of W32/Zuggie-A W32/Zuggie-A modifies the registry to autostart GoogleUpte.exe and googlebuzz.exe. A quick search shows that the CLSID: 9CE11043-9A15-4207-A565-0C94C42D590D has previously been seen in multiple worms. This supports my theory that this is a hastily assembled worm built from recycled malware. I fired up a copy of Firefox on the infected machine and, as determined from analysis, found an installed Firefox extension called Firefox security 2.0 – Internal security options editor under the extensions tab of Firefox Add-ons. This “security extension” has added a JavaScript (timer.xul), which is triggered when the browser queries: yahoo.com, bing.com, google.com, aol.com/aol/search, ask.com and executes JavaScript hosted on: searchrequest1 . com / request . php ? aid = blackout which will silently click all Google or Yahoo Ads. displayed on the search results page (hey why not make a few bucks while infecting eh?). Google Buzz is new and is garnering quite a bit of interest and adoption among Internet users including myself. Clearly the malware authors view Google Buzz as the fresh big lucrative social fruit to exploit much like they have done with Facebook, MySpace, Hi5 and others. So in the coming weeks and months I predict we will see a host of new malware exploiting or attempting to exploit Google Buzz as the malware authors figure out its internals. This may have only been an exploratory attempt or a quick response to the latest craze – only time will tell.

Continue Reading The Buzz is getting LOUDER

Between a PoC and a Hard Place

Author: Omid Farhang Published: February 12, 2010 Reading Time: 3 min

Several reports have been published detailing a Blackberry proof of concept (PoC) exploit called txsBBSpy that was recently presented at a security conference. Although it may not have been the aim of the original presenter, some reports have framed the PoC as being able to exploit so-called vulnerabilities that the writers believe to be present in the Blackberry platform. The “vulnerabilities” involve secretly forwarding incoming emails, locating devices by way of their GPS capabilities, eavesdropping on conversations by surreptitiously turning on microphones, and other such nefarious behavior. ...

Continue Reading Between a PoC and a Hard Place

Interview with a Nigerian 419 scammer

Author: Omid Farhang Published: February 12, 2010 Reading Time: 3 min

Bruce Schneier, in his blog Schneier on Security http://www.schneier.com/ drew attention to this great interview with an ex-Nigerian-419 scammer on the Scam-Detective site. It’s a fairly long piece and gives a pretty good view of the Nigerian scam industry run by organized crime, how it sucks in young people who have good computer and English skills and pays them a huge amount of money ($75,000 per year in this case) to scam victims they view as white, greedy and rich. ...

Continue Reading Interview with a Nigerian 419 scammer

Fake AV & Talking With The Enemy

Author: Omid Farhang Published: February 12, 2010 Reading Time: 2 min

Fake antivirus software (a.k.a misleading applications or rogue antivirus) is big business nowadays with Symantec reporting 43 million installation attempts from over 250 distinct programs between July 1, 2008, to June 30, 2009. With fake AV software costing the victim anywhere from $30 to $100, this is a lucrative earner for criminals. Over time Symantec has observed various social engineering tactics being used to try and entice victims to hand over their money in this scam. The fake antivirus software known as Live PC Care has now gone as far as offering live online support to potential victims. Once a victim has installed Live PC Care onto their system via a system exploit or social engineering tactics, they are presented with the screen below falsely informing them that their system is riddled with viruses. Any suspicious computer user might wonder what this software is and where exactly it came from. To alleviate doubt and to aid with the whole scam, the designers of Live PC Care have added a yellow online support button in the top, right-hand corner of the fake AV software. ...

Continue Reading Fake AV & Talking With The Enemy

Wi-Fi sensitivity results in Santa Fe lawsuit

Author: Omid Farhang Published: February 12, 2010 Reading Time: 1 min

When you spend your day scouring the Internet (and my blog 😉) for news about computer security topics you cover a lot of territory. Once in a while you just have a weird day. You run into a lot of strange stuff. Today is one of those days. Yahoo’s tech blog is carrying a story about a man in Santa Fe, New Mexico, who is suing because he has “electromagnetic sensitivity” and can’t live in his own home because of the radiation from his neighbor’s wi-fi network. ...

Continue Reading Wi-Fi sensitivity results in Santa Fe lawsuit