Viruses and Digital Signatures

Recently, We received some malicious files which appeared to be signed by ā€œAdobe Systems Incorporatedā€. On closer inspection, however, it was seen that the signature was just a ruse used by the malware author to give an air of legitimacy to the files. Virus writers are getting smarter and going that extra mile to digitally sign their files. Using this technique the malware authors could, for example, penetrate an environment where only signed files are allowed but the authenticity of the signature is not checked. ...

March 5, 2010 Ā· 2 min Ā· 376 words Ā· Omid Farhang

Late Dash by Spammers for 2010 Winter Olympics

The 2010 Winter Olympics were held in Vancouver, Canada, from February 12-28. With more than 82 countries participating and millions across the globe catching day-to-day action, it was sadly quite obvious that we would see spam attacks centered on this event. However, the volume of spam relating to the Winter Olympics is actually very low, which is unlike the Beijing Olympics, when spam campaigns had started way before actual event. In the case of the Winter Olympics, spammers seem to be only now waking up from their slumber. ...

March 5, 2010 Ā· 2 min Ā· 233 words Ā· Omid Farhang

Phishing Scam Linked to Valentineā€™s Day Movie

Symantec has been observing several spam and phishing attacks regarding the recent Valentineā€™s Day. One such phishing attack was on an e-card website that asked for user credentials in order to send Valentineā€™s Day greetings to loved ones. The legitimate e-card website has partnerships with several other brands and so accepts credentials from certain other websites as well. Hence, attackers can steal user information from several brandsā€™ sites by phishing on just one e-card website. This particular attack asked for usersā€™ credentials for a popular information services website. The phishing domain was hosted on servers in China and has been reported as ā€œdomain tasting.ā€ Domain tasting is a situation in which a domain name is used for a small period of time and is checked to see if it is making enough money. If it doesnā€™t earn enough, the domain name is deleted and the registrant is refunded the entire registration fee. This is a technique used by attackers to perform phishing activity for small periods of time at low costs. ...

March 4, 2010 Ā· 2 min Ā· 304 words Ā· Omid Farhang

Too many passwords? Here is a solution!

How many web sites do you log into? Your bank? Facebook, Myspace and any number of other social networking sites? Auction sites? Shopping sites? Maybe lots of others too. Every site, of course, requires you to create a password. And if the site is serious about security, it may even set certain rules. For example, it may insist that your password is at least eight characters, or must contain non-alpha-numeric characters, or must use at least one uppercase letter, etc. ...

March 4, 2010 Ā· 1 min Ā· 172 words Ā· Omid Farhang

Haiti relief email scams still circulate

Want a place to check the legitimacy of a charity? ā€œFounded in 2001, Charity Navigator has become the nationā€™s largest and most-utilized evaluator of charities. In our quest to help donors, our team of professional analysts has examined tens of thousands of non-profit financial documents. As a result, we know as much about the true fiscal operations of charities as anyone. Weā€™ve used this knowledge to develop an unbiased, objective, numbers-based rating system to assess the financial health of over 5,000 of Americaā€™s best-known charities.ā€ ...

March 4, 2010 Ā· 1 min Ā· 146 words Ā· Omid Farhang

Battlefield Keygens are Bad Company

In the same way that media event X guarantees Rogue Antispyware Y, a new and highly anticipated videogame thatā€™s about ready to launch will similarly bring out the scams and fakes. If you have any family members that like their PC games but perhaps arenā€™t clued up on their Internet fakeouts, you might want to warn them that no matter how cool the so-called ā€œBattlefield: Bad Company 2ā€ keygens look, they should steer clear: ...

March 4, 2010 Ā· 1 min Ā· 112 words Ā· Omid Farhang

Beware of Targeted Scams and Phishing Attacks!

According to latest State of Spam and Phishing report, scam and phishing messages accounted for 21 percent of all spam, which is the highest level recorded since the inception of the report. For comparison, these types of spam represented only 10 percent of total spam a year ago. Historically, the primary vector for spam attacks was to blast out as many messages as possible, hoping that someone would open a message and click on the call to action. The call to action could be anything from clicking on a link to purchase medications, to visiting an adult website. While we continue to see high volumes of spam originating from expansive botnets, spammers are also moving towards a sophisticated and more targeted approach to spam. Two primary examples of this trend are 419/Nigerian type scams and phishing messages. ...

March 3, 2010 Ā· 3 min Ā· 616 words Ā· Omid Farhang

I'm Feeling Lucky?

Criminals like to attack the biggest target because BIGGER generally provides a better Return On Investment (ROI). Windows is a good example. Mac is indeed safer than Windows but it isnā€™t necessarily because Mac is more secure. Windows has a larger market share and that equals more potential victims. How about search engines? What is the biggest search engine on the block? Google ā€” and the bad guys know it. The result? ...

March 2, 2010 Ā· 2 min Ā· 419 words Ā· Omid Farhang

Donā€™t press F1

Hereā€™s a new vector: exploiting a Windows vulnerability through an Internet Explorer help menu Visual Basic script: ā€œget ā€˜em to hit F1 and you own ā€˜em.ā€ Microsoft is warning of a VBScript vulnerability in Internet Explorer (on Win2K, XP and Server03) that could be used to run malicious code. A malicious operator could create a web site that displays a specially crafted dialog box and prompts a victim to press the F1 key (help menu.) The exploit could then execute malicious code on a victim machine. (Windows versions that are not vulnerable are: Vista, Win7, Server08 R2 and Server08.) ...

March 2, 2010 Ā· 1 min Ā· 212 words Ā· Omid Farhang

This you?? What's the point of phishing a Twitter account?

In Additional to my last post:Ā http://boelectronic.blogspot.com/2010/03/twitter-phished-its-easy-mistake.html Weā€™ve received some questions regardingĀ recent phishing attacksĀ conducted against Twitter.com. Tweets and Direct Messages (DM) containing phases such as ā€œThis you??ā€ or ā€œLOL is this youā€ are linking victims towards a Twitter login phishing page. If the bait is taken and victim enters their password, Twitterā€™s infamous ā€œfail whaleā€ is displayed and the user is returned to their account. They might not even realize that their account details have been compromised. ...

March 2, 2010 Ā· 2 min Ā· 338 words Ā· Omid Farhang