TechBlog

Join me as I explore the fascinating world of technology. This TechBlog is where I share my knowledge and insights on topics like Linux, frontend and backend development, and more. Whether you’re a beginner or an experienced tech enthusiast, there’s something here for you.

Tech Topics

Engineering & Leadership

Technical Depth

TechBlog

Multiple personality disorder?

Published: March 1, 2010 Reading Time: 1 min

Are malware authors and spammers suffering from the same affliction of “word salad“, or are they perhaps devoted students of Afringlish? Why else would one combine random words in an attempt to look legitimate? The reason is a simple one – not only are humans good at associating meaning to names, they are also exceptionally good at filling in the blanks, while machines are not. Thus, by carefully selecting particular names for insertion into the version information of malware samples, such as those of reputable software houses, the authors attempt to exploit this human condition. Presumably, they also hope to bypass security scanners which approve files based on such superficial attributes. ...

Continue Reading

Fighting online fraud in .au

Published: March 1, 2010 Reading Time: 1 min

The Australasian Consumer Fraud Taskforce began its 2010 Fraud Week campaign today with release of the first Australian Competition and Consumer Commission (ACCC) scams activity report. Wednesday it will release information to help small businesses protect themselves. The March 1-7 Fraud Week hopes to reduce the incidence and impact of fraud and scams. The annual event tries to co-ordinate the release of information for consumers, timed to coincide with the International Consumer Protection Enforcement Network Global Consumer Fraud Prevention Month. ...

Continue Reading

Do not even turn on your PS3 today, Sony warns

Published: March 1, 2010 Reading Time: 2 min

Since yesterday evening, PlayStation 3 users have been reporting difficulties in connecting their consoles to the PlayStation Network for online gameplay and system updates. While it was first thought to be a network-related issue, Sony has warned that there is a much more widespread issue currently affecting older PlayStation 3’s. Sony’s offical statement lists the following errors as a part of this internal clock bug: The date of the PS3 system may be re-set to Jan 1, 2000. When the user tries to sign in to the PlayStation Network, the following message appears on the screen; “An error has occurred. You have been signed out of PlayStation Network (8001050F).” When the user tries to launch a game, the following error message appears on the screen and the trophy data may disappear; “Failed to install trophies. Please exit your game.” When the user tries to set the time and date of the system via the Internet, the following message appears on the screen; “The current date and time could not be obtained (8001050F).” Users are not able to play back certain rental video downloaded from the PlayStation Store before the expiration date. “If you have a model other than the new slim PS3, we advise that you do not use your PS3 system, as doing so may result in errors in some functionality, such as recording obtained trophies, and not being able to restore certain data,” Sony warned this afternoon. ...

Continue Reading

Most used Spam Categories in February 2010

Published: March 1, 2010 Reading Time: 1 min

Since January we publish monthly reports about the categories of the spam messages which got sent around the last month. These categories are detected by Avira’s AntiSpam engine. Between January and February 2010 there didn’t change much in the spam landscape. The top 3 is still occupied by Pharmacy, Other (spams which don’t fit any category) and watches. However, this month the Malware category made its way on the 4th with 4.9% after it was only 0.5% in January. ...

Continue Reading

Analyzing PDF Files

Published: March 1, 2010 Reading Time: 1 min

We’ve been seeing a gradual shift in malicious PDF file coding (no surprise there, we know malware authors can and do adapt their techniques). For a long time, we saw malicious PDF files that were simple enough to allow us to readily decipher the intent of the malicious code — shell code, download/execute, drop and load, et cetera. Now we’re seeing more and more complex obfuscation being used, which requires us to break down the PDF file. This can make an Analyst’s daily life more miserable or interesting, especially as the obfuscation can bypass automated analysis tools and even AV detectors. ...

Continue Reading

Massive Earthquake in Chile Leads to a Surge of Rogue Antivirus

Published: March 1, 2010 Reading Time: 2 min

A massive earthquake struck near the Chilean city of Concepcion in the early hours of the morning of February 27th, 2010. The quake measuring 8.8 on the Richter scale was considerably stronger than the one that recently caused widespread destruction on the island of Haiti. Fortunately, despite the size of this latest quake, so far there has been few reported casualties. The quake occurred near the coast and tsumani warnings were issued for many countries bordering on the Pacific ocean. Unfortunately as with any major news event, miscreants are not slow to pounce when such opportunities arise to further their aims. ...

Continue Reading

Old websites are also used in spam SEOs

Published: March 1, 2010 Reading Time: 1 min

A few days ago, I blogged saying that Old websites don’t die they just get infected the other scenario is that they become part of a spammers SEO campaign. Working today, I went to check to see if the local police authority had cleaned up their old web page. So I wgetted the file and scanned it. It was no longer infected (hooray!) but the file was quite big. Opening the file in lynx (a simple web browser) I saw: ...

Continue Reading

ICQ scam in the wild

Published: March 1, 2010 Reading Time: 1 min

I have received a message this morning from an ICQ account with the following text written in UTF-8 and plain text: The message from ICQ.com ****** Hello. _ICQ.com: we Remind you that all ICQ numbers which have not passed activation, 1.1.2010 will be removed from a server without restoration possibility. _ _The status of yours ICQ numbers: NOT activated. _ For activation send SMS on number 8353 with the text 144444 In the reciprocal message you receive acknowledgement on activation and your password from number. ICQ.com Together with AOL.com ...

Continue Reading

SEO poisoning not in well, but it’s aiming for the water heater

Published: February 26, 2010 Reading Time: 1 min

People looking to take advantage of the savings from the government during these harder financial times are being hit with other financial burdens (Rogue AV software). Our (environmentally conscious) researcher Adam Thomas heard about a “green” hot water heater that might be a good addition to his Earth-friendly home. So he did a Web search for “GE geo spring water heater.” What he found wasn’t Earth or anything else-friendly! SEO poisoning galore: ...

Continue Reading

Insight into fake AV SEO

Published: February 26, 2010 Reading Time: 2 min

In this post I want to highlight how SEO attacks are working: Pages using server side kits to fool search engine bots into ranking them high in results are uploaded to legitimate web sites. If all goes to plan, when a user searches for a popular term, high up in the search engine results are links to these pages. In the example below, the malicious SEO page was the 2nd item in the search results (highlighted in blue). When the user arrives on such a page (highlighted in green in the example below), the referrer is typically checked to ensure they came from a search engine. If so, there are redirected (302 redirect) to another site (orange below). There are typically additional levels of redirection from this point. In the example shown below, the user is bounced from the .org to the .in site (purple). Finally, the user will be redirected to the fake AV distribution site (red). This is where the user receives the usual visual trickery, in order to fool them into installing the rogue application. ...

Continue Reading