| 

Malicious Web Attack Using Executable With facebook.com in Name

  • Post author: Omid Farhang
  • Post published: March 12, 2010
  • Reading Time: 2 min
  • Word Count: 261 words

As we were working through URLs identified as suspicious due to our GTI technology, one of the URLs that presented itself was an average ā€œ.comā€ site that loaded a php. As we processed this ā€“ it was interesting to see that this php actually reached out to download a file that ended with the string facebook.com.exe ā€” as this ā€œ.comā€ site was very social-network friendly ā€“ it would be easy to see how an average user, without web protection in place, would not even realize what was going on. ...

Continue Reading Malicious Web Attack Using Executable With facebook.com in Name

Blogger.com ā€“ -not!

  • Post author: Omid Farhang
  • Post published: March 7, 2010
  • Reading Time: 1 min
  • Word Count: 178 words

Cybercriminals are attacking bloggers who use Googleā€™s Blogger.com. We have received emails intended for bloggers to update their account. Hereā€™s the snapshot email of the email we have received: The email contains link that will redirect to fake login page of the ā€œBlogger.comā€. As seen from the highlighted link, it has a root domain ā€œ*.erdca.krā€ which is differ from the authentic root domain of blogger.com. The fake login page which is known as phishing site appears to be like this: ...

Continue Reading Blogger.com ā€“ -not!

SEO blogger victim of malicious SEO attack

  • Post author: Omid Farhang
  • Post published: March 6, 2010
  • Reading Time: 1 min
  • Word Count: 96 words

On Friday evening I was talking to a North American customer who had been fighting with infections caused by SEO poisoning. They mentioned a particular search term that could generate new samples of FakeAVs. The funny thing was that the website hacked by the SEO poisoner was a blog of someone trying to promote legitimate business use of SEO technologies.. If you click on any of the links returned by the search you would be redirected to an Indian site containing this image: ...

Continue Reading SEO blogger victim of malicious SEO attack

Desperate phishing attempt

  • Post author: Omid Farhang
  • Post published: March 6, 2010
  • Reading Time: 1 min
  • Word Count: 31 words

Somebody is trying to pose as F-Secure. If you see an email like the one below, just ignore it: Before you ask: No, weā€™ve never heard of ā€œF-Secure HTK4S anti-virusā€ either.

Continue Reading Desperate phishing attempt

Viruses and Digital Signatures

  • Post author: Omid Farhang
  • Post published: March 5, 2010
  • Reading Time: 2 min
  • Word Count: 376 words

Recently, We received some malicious files which appeared to be signed by ā€œAdobe Systems Incorporatedā€. On closer inspection, however, it was seen that the signature was just a ruse used by the malware author to give an air of legitimacy to the files. Virus writers are getting smarter and going that extra mile to digitally sign their files. Using this technique the malware authors could, for example, penetrate an environment where only signed files are allowed but the authenticity of the signature is not checked. ...

Continue Reading Viruses and Digital Signatures

Patch Tuesday coming next week

  • Post author: Omid Farhang
  • Post published: March 5, 2010
  • Reading Time: 1 min
  • Word Count: 53 words

Microsoft has issued an advance notification for Patch Tuesday next week. The company said it expects to issue two patches, one for Windows and one for Office. Both are intended to patch vulnerabilities that could allow remote code execution and both are rated ā€œimportant.ā€ Microsoft Security Bulletin Advance Notification for March 2010 here.

Continue Reading Patch Tuesday coming next week

Phishing Scam Linked to Valentineā€™s Day Movie

  • Post author: Omid Farhang
  • Post published: March 4, 2010
  • Reading Time: 2 min
  • Word Count: 304 words

Symantec has been observing several spam and phishing attacks regarding the recent Valentineā€™s Day. One such phishing attack was on an e-card website that asked for user credentials in order to send Valentineā€™s Day greetings to loved ones. The legitimate e-card website has partnerships with several other brands and so accepts credentials from certain other websites as well. Hence, attackers can steal user information from several brandsā€™ sites by phishing on just one e-card website. This particular attack asked for usersā€™ credentials for a popular information services website. The phishing domain was hosted on servers in China and has been reported as ā€œdomain tasting.ā€ Domain tasting is a situation in which a domain name is used for a small period of time and is checked to see if it is making enough money. If it doesnā€™t earn enough, the domain name is deleted and the registrant is refunded the entire registration fee. This is a technique used by attackers to perform phishing activity for small periods of time at low costs. ...

Continue Reading Phishing Scam Linked to Valentineā€™s Day Movie

U.S. Census Bureau warning of phishing scams

  • Post author: Omid Farhang
  • Post published: March 4, 2010
  • Reading Time: 1 min
  • Word Count: 192 words

The U.S. Census Bureau is warning of phishing and other scams that are using the 2010 Census as bait. Here is the warning from the bureauā€™s web site: If you are contacted for any of the following reasons ā€” Do Not Participate. It is NOT the U.S. Census Bureau. Phishing: ā€˜Phishingā€™ is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, social security numbers, bank account or credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by email and it often directs users to enter sensitive information at a fake web site whose look and feel are almost identical to the legitimate one. ...

Continue Reading U.S. Census Bureau warning of phishing scams

Malicious iframes on Google-analitics(dot)net

  • Post author: Omid Farhang
  • Post published: March 4, 2010
  • Reading Time: 1 min
  • Word Count: 30 words

Right! A site registered in the state of ā€œTaliban.ā€ Youā€™re really going to go to a site with this registration: Nice work SANS. Thanks to Daniel Wesemann at SANS: http://isc.sans.org/diary.html?storyid=8350

Continue Reading Malicious iframes on Google-analitics(dot)net

Battlefield Keygens are Bad Company

  • Post author: Omid Farhang
  • Post published: March 4, 2010
  • Reading Time: 1 min
  • Word Count: 112 words

In the same way that media event X guarantees Rogue Antispyware Y, a new and highly anticipated videogame thatā€™s about ready to launch will similarly bring out the scams and fakes. If you have any family members that like their PC games but perhaps arenā€™t clued up on their Internet fakeouts, you might want to warn them that no matter how cool the so-called ā€œBattlefield: Bad Company 2ā€ keygens look, they should steer clear: ...

Continue Reading Battlefield Keygens are Bad Company