Viruses and Digital Signatures

Author: Omid Farhang Published: March 5, 2010 Reading Time: 2 min

Recently, We received some malicious files which appeared to be signed by “Adobe Systems Incorporated”. On closer inspection, however, it was seen that the signature was just a ruse used by the malware author to give an air of legitimacy to the files. Virus writers are getting smarter and going that extra mile to digitally sign their files. Using this technique the malware authors could, for example, penetrate an environment where only signed files are allowed but the authenticity of the signature is not checked. ...

Continue Reading Viruses and Digital Signatures

Late Dash by Spammers for 2010 Winter Olympics

Author: Omid Farhang Published: March 5, 2010 Reading Time: 2 min

The 2010 Winter Olympics were held in Vancouver, Canada, from February 12-28. With more than 82 countries participating and millions across the globe catching day-to-day action, it was sadly quite obvious that we would see spam attacks centered on this event. However, the volume of spam relating to the Winter Olympics is actually very low, which is unlike the Beijing Olympics, when spam campaigns had started way before actual event. In the case of the Winter Olympics, spammers seem to be only now waking up from their slumber. ...

Continue Reading Late Dash by Spammers for 2010 Winter Olympics

Phishing Scam Linked to Valentine’s Day Movie

Author: Omid Farhang Published: March 4, 2010 Reading Time: 2 min

Symantec has been observing several spam and phishing attacks regarding the recent Valentine’s Day. One such phishing attack was on an e-card website that asked for user credentials in order to send Valentine’s Day greetings to loved ones. The legitimate e-card website has partnerships with several other brands and so accepts credentials from certain other websites as well. Hence, attackers can steal user information from several brands’ sites by phishing on just one e-card website. This particular attack asked for users’ credentials for a popular information services website. The phishing domain was hosted on servers in China and has been reported as “domain tasting.” Domain tasting is a situation in which a domain name is used for a small period of time and is checked to see if it is making enough money. If it doesn’t earn enough, the domain name is deleted and the registrant is refunded the entire registration fee. This is a technique used by attackers to perform phishing activity for small periods of time at low costs. ...

Continue Reading Phishing Scam Linked to Valentine’s Day Movie

Too many passwords? Here is a solution!

Author: Omid Farhang Published: March 4, 2010 Reading Time: 1 min

How many web sites do you log into? Your bank? Facebook, Myspace and any number of other social networking sites? Auction sites? Shopping sites? Maybe lots of others too. Every site, of course, requires you to create a password. And if the site is serious about security, it may even set certain rules. For example, it may insist that your password is at least eight characters, or must contain non-alpha-numeric characters, or must use at least one uppercase letter, etc. ...

Continue Reading Too many passwords? Here is a solution!

Haiti relief email scams still circulate

Author: Omid Farhang Published: March 4, 2010 Reading Time: 1 min

Want a place to check the legitimacy of a charity? “Founded in 2001, Charity Navigator has become the nation’s largest and most-utilized evaluator of charities. In our quest to help donors, our team of professional analysts has examined tens of thousands of non-profit financial documents. As a result, we know as much about the true fiscal operations of charities as anyone. We’ve used this knowledge to develop an unbiased, objective, numbers-based rating system to assess the financial health of over 5,000 of America’s best-known charities.” ...

Continue Reading Haiti relief email scams still circulate

Battlefield Keygens are Bad Company

Author: Omid Farhang Published: March 4, 2010 Reading Time: 1 min

In the same way that media event X guarantees Rogue Antispyware Y, a new and highly anticipated videogame that’s about ready to launch will similarly bring out the scams and fakes. If you have any family members that like their PC games but perhaps aren’t clued up on their Internet fakeouts, you might want to warn them that no matter how cool the so-called “Battlefield: Bad Company 2” keygens look, they should steer clear: ...

Continue Reading Battlefield Keygens are Bad Company

Beware of Targeted Scams and Phishing Attacks!

Author: Omid Farhang Published: March 3, 2010 Reading Time: 3 min

According to latest State of Spam and Phishing report, scam and phishing messages accounted for 21 percent of all spam, which is the highest level recorded since the inception of the report. For comparison, these types of spam represented only 10 percent of total spam a year ago. Historically, the primary vector for spam attacks was to blast out as many messages as possible, hoping that someone would open a message and click on the call to action. The call to action could be anything from clicking on a link to purchase medications, to visiting an adult website. While we continue to see high volumes of spam originating from expansive botnets, spammers are also moving towards a sophisticated and more targeted approach to spam. Two primary examples of this trend are 419/Nigerian type scams and phishing messages. ...

Continue Reading Beware of Targeted Scams and Phishing Attacks!

I'm Feeling Lucky?

Author: Omid Farhang Published: March 2, 2010 Reading Time: 2 min

Criminals like to attack the biggest target because BIGGER generally provides a better Return On Investment (ROI). Windows is a good example. Mac is indeed safer than Windows but it isn’t necessarily because Mac is more secure. Windows has a larger market share and that equals more potential victims. How about search engines? What is the biggest search engine on the block? Google — and the bad guys know it. The result? ...

Continue Reading I'm Feeling Lucky?

Don’t press F1

Author: Omid Farhang Published: March 2, 2010 Reading Time: 1 min

Here’s a new vector: exploiting a Windows vulnerability through an Internet Explorer help menu Visual Basic script: “get ‘em to hit F1 and you own ‘em.” Microsoft is warning of a VBScript vulnerability in Internet Explorer (on Win2K, XP and Server03) that could be used to run malicious code. A malicious operator could create a web site that displays a specially crafted dialog box and prompts a victim to press the F1 key (help menu.) The exploit could then execute malicious code on a victim machine. (Windows versions that are not vulnerable are: Vista, Win7, Server08 R2 and Server08.) ...

Continue Reading Don’t press F1

This you?? What's the point of phishing a Twitter account?

Author: Omid Farhang Published: March 2, 2010 Reading Time: 2 min

In Additional to my last post: http://boelectronic.blogspot.com/2010/03/twitter-phished-its-easy-mistake.html We’ve received some questions regarding recent phishing attacks conducted against Twitter.com. Tweets and Direct Messages (DM) containing phases such as “This you??” or “LOL is this you” are linking victims towards a Twitter login phishing page. If the bait is taken and victim enters their password, Twitter’s infamous “fail whale” is displayed and the user is returned to their account. They might not even realize that their account details have been compromised. ...

Continue Reading This you?? What's the point of phishing a Twitter account?