| 

Now you too can mount your own Operation Aurora Attacks!!!

  • Post author: Omid Farhang
  • Post published: January 22, 2010
  • Reading Time: 1 min
  • Word Count: 163 words

But donā€™t. Please donā€™t!ā€¦ justā€¦. donā€™t!ā€¦ Instead, why donā€™t you apply the out-of-band patch ( MS10-002 ) that Microsoft has just releasedā€¦?!!! Patching remote-code-execution vulnerabilities is usually ā€œa good ideaā€ to say the least. But, considering that: Microsoft rushed to get this patch outā€¦ā€¦ ( Thank you Microsoft! ) And that, this patch addresses several Internet Explorer vulnerabilities ā€“ of which includes CVE-2010-0249 ā€“ the infamous ā€œAurora attacksā€ related vulnerability thatā€™s well known to be making the rounds in the wild. ...

Continue Reading Now you too can mount your own Operation Aurora Attacks!!!

Salesmen Are Not My Friends

  • Post author: Omid Farhang
  • Post published: January 22, 2010
  • Reading Time: 1 min
  • Word Count: 208 words

I dislike salesmen. The look on their faces irks me when I can feel the dollars flicking in their eyes. I hate it when my car insurance company ask if i want to get home insurance as well. I do not like it when my credit card company tries to sell me a great new insurance product. In general, I hate to be a victim of cross selling. Malware authors are just like salesmen. They cross-sell as well. A fake AV tried to do the same to me. Besides offering great AV protection, it wants me to get some useful codecs so that I can watch all my legit DVDrips. Thus, someone decided that in order to get me to install their codecs, he/she will have to terminate all processes related to media players. ...

Continue Reading Salesmen Are Not My Friends

Web users still donā€™t select good passwords

  • Post author: Omid Farhang
  • Post published: January 21, 2010
  • Reading Time: 2 min
  • Word Count: 254 words

Security firm Imperva of Redwood Shores, Calif., found a unique way to gage the quality of the passwords that Web users select: they analyzed the 32 million passwords in the unencrypted file of passwords that miscreants stole from the servers of RockYou.com in December and posted on the Internet. RockYou creates and distributes entertainment widgets that work with social networking networks. What they found wasnā€™t good, according to their report. ā€œKey findings: ā€” About 30% of users chose passwords whose length is equal or below six characters. _ _ ā€” Moreover, almost 60% of users chose their passwords from a limited set of alpha-numeric characters. _ _ _ā€” Nearly 50% of users used names, slang words, dictionary words or trivial passwords (consecutive digits, adjacent keyboard keys, and so on).Ā _ _ _ The most common password among Rockyou.com account owners is ā€œ123456ā€. ...

Continue Reading Web users still donā€™t select good passwords

Targeted Attack using "Operation Aurora" as the lure

  • Post author: Omid Farhang
  • Post published: January 21, 2010
  • Reading Time: 1 min
  • Word Count: 87 words

Now hereā€™s an interesting turn of events. In the middle of all the attention to the ā€œOperation Auroraā€ attacks, weā€™re now seeing new targeted attacks that are using this very event as the lure to get the targets to open a malicious attachment! Hereā€™s the email we saw: The attachment Chinese cyberattack.pdf (md5: 238ecf8c0aee8bfd216cf3cad5d82448) is a PDF file which exploits the CVE-2009-4324 vulnerability in Adobe Reader (again, this is the one which was patched last week). ...

Continue Reading Targeted Attack using "Operation Aurora" as the lure

Intelligence sector hit by a targeted attack

  • Post author: Omid Farhang
  • Post published: January 21, 2010
  • Reading Time: 1 min
  • Word Count: 113 words

We just blogged about a highly targeted attack against military contractors. Now we saw one against the intelligence sector. This attack was done with a PDF file. Again. It was targetting the CVE-2009-4324 vulnerability. Again. When opened, the PDF file (md5: c3079303562d4672d6c3810f91235d9b) looked like this: What really happens in the background? Just like last time, the exploit code drops a backdoor in a file called Updater.exe (md5: 02420bb8fd8258f8afd4e01029b7a2b0). Now, what is the document talking about? Presidentā€™s day? DNI Information Sharing Environment? We donā€™t know, but a quick web search tells us that apparently there is going to be an Intelligence fair & expo in Germany next month. ...

Continue Reading Intelligence sector hit by a targeted attack

Microsoft Vulnerabilities

  • Post author: Omid Farhang
  • Post published: January 21, 2010
  • Reading Time: 1 min
  • Word Count: 128 words

Microsoft is releasing an out-of-band update for their IE vulnerability. Internet Explorer 6 is affected and is being actively exploited in the wild. The patch will be released on the 21st, today, see Microsoftā€™s Security Bulletin for additional details. Also in Microsoft news, Security Advisory (979682). Thereā€™s a vulnerability in Windows kernel privilege escalation. The vulnerability affects all versions of Windows (NT 3.51 up to Windows 7), on non x64-based systems, unless 16-bit application support is disabled. ...

Continue Reading Microsoft Vulnerabilities

Microsoft will patch Internet Explorer today

  • Post author: Omid Farhang
  • Post published: January 21, 2010
  • Reading Time: 1 min
  • Word Count: 102 words

Microsoft has said it will issue an out-of-band patch today for critical vulnerabilities in Internet Explorer that allow remote execution of code. The company said yesterday it would not wait until the February ā€œPatch Tuesdayā€ to fix the vulnerabilities. The much discussed ā€œAuroraā€ vulnerabilities in IE have been held at least partially responsible for cyber attacks on Google and more then two dozen other major companies. The attacks on Google were aimed at Gmail accounts of dissidents and Googleā€™s source code. The attacks on the other companies were aimed at stealing intellectual property. ...

Continue Reading Microsoft will patch Internet Explorer today

Haiti Earthquake: Another Rogue Rides the News

  • Post author: Omid Farhang
  • Post published: January 16, 2010
  • Reading Time: 1 min
  • Word Count: 130 words

A day after the disaster that struck the Caribbean nation of Haiti, Rogue perpetrators have once again been busy with their SEO poisoning schemes. Searching for terms related to this earthquake leads to a website that installs a Rogue into the system. It happens when an unsuspecting user searches for Haiti Earthquake details. Happily clicking the link leads to this page: Then thisā€¦ And thisā€¦ ...

Continue Reading Haiti Earthquake: Another Rogue Rides the News

Seasons of Scams

  • Post author: Omid Farhang
  • Post published: January 16, 2010
  • Reading Time: 2 min
  • Word Count: 266 words

With the holiday season behind us, cyber scammers and spammers will now be looking towards the upcoming events and worldwide happenings that they can leverage to form the next waves of online trickery. The noteworthy ones on the horizon include Valentineā€™s Day, tax-filing season, and the FIFA World Cup ā€“ all of which will, in all likelihood, produce their own variety of social engineering techniques, online fraud, malware, fake websites, phishing, and spam. ...

Continue Reading Seasons of Scams

Rimecud and Hamweq ā€“ birds of a feather

  • Post author: Omid Farhang
  • Post published: January 13, 2010
  • Reading Time: 2 min
  • Word Count: 227 words

Following the addition of Win32/Hamweq to the MSRT last month, MMPC will continue cleaning PCs in 2010 by adding another prevalent worm, Win32/Rimecud, to this monthā€™s removal tool. This is due not only to Win32/Rimecudā€™s high detection numbers, which immediately follow those of Win32/Hamweq, but also to the similarities the two families share with each other. In fact, as part of its payload, Win32/Hamweq may download Win32/Rimecud, contributing to Rimecudā€™s suitability as the next target for MSRT. ...

Continue Reading Rimecud and Hamweq ā€“ birds of a feather