| 

Boston Marathon Bombing Links May Hide Java-Based Exploits

  • Post author: Omid Farhang
  • Post published: April 17, 2013
  • Reading Time: 3 min
  • Word Count: 629 words

PCMag: My social media accounts and email inbox are full of links to stories about the horrific incident in Boston earlier this week. I am reading about the victims, the bystanders and first responders that rushed to help, and looking for updates on the investigation. It turns out I should be careful about what links I click on, as cyber-criminals have already started exploiting the tragedy for their own nefarious purposes, security experts told SecurityWatch. ...

Continue Reading Boston Marathon Bombing Links May Hide Java-Based Exploits

New Adobe Vulnerabilities Being Exploited in the Wild

  • Post author: Omid Farhang
  • Post published: February 14, 2013
  • Reading Time: 1 min
  • Word Count: 176 words

Adobe posted a vulnerability report warning that vulnerabilities in Adobe Reader and Acrobat XI (11.0.1) and earlier versions are being exploited in the wild. Adobe is currently investigating this issue. According to the FireEye blog posted earlier today, the malicious file arrives as a PDF file. Upon successful exploitation of the vulnerabilities, two malicious DLL files are dropped. Symantec detects the malicious PDF file as Trojan.Pidief and the two dropped DLL files as Trojan Horse. ...

Continue Reading New Adobe Vulnerabilities Being Exploited in the Wild

LinkedIn spam, exploits and Zeus: a deadly combination ?

  • Post author: Omid Farhang
  • Post published: June 14, 2012
  • Reading Time: 2 min
  • Word Count: 300 words

Is this the perfect recipe for a cybercriminal ?: Hacking LinkedInā€™s password (and possibly user-) database. Sending an email to all obtained email addresses, which is urging you to check your LinkedIn inbox as soon as possible. A user unawarely clicking on the link. An exploit gets loaded. Malware gets dropped. Malware gets executed. Userā€™s computer is now a zombie (part of a botnet). I would definitely say YES. A reader of my blog contacted me today, he had received an email from LinkedIn which was looking phishy. We can verify that Step 1 is accomplished, by the simple fact that in the ā€œToā€ and/or ā€œCCā€ field of the email below, there are about ~100 email addresses. A quick look-up of a few of them on LinkedIn reveals the unconvenient truthā€¦ Hereā€™s the email in question: ...

Continue Reading LinkedIn spam, exploits and Zeus: a deadly combination ?

Fake BBC Website Serves Exploits and Work From Home Offers

  • Post author: Omid Farhang
  • Post published: May 21, 2012
  • Reading Time: 3 min
  • Word Count: 436 words

GFI Wrote: In September, our friends at Sophos wrote about a fake BBC website offering up the ā€œchanceā€ to work from home for predictably large sums of money. No more than a day later, we were covering fake BBC video posts targeting Facebook users. Today weā€™re looking at a fake BBC URL which drops the end-user onto a ā€œwork from home and earn $10,000+ a monthā€ fake news site, but not before itā€™s attempted to load up the PC with malware via a rather nasty collection of exploits. The URL in question is bbcmoneynews(dot)com: ...

Continue Reading Fake BBC Website Serves Exploits and Work From Home Offers

PHP 5.4 Remote Exploit PoC in the wild

  • Post author: Omid Farhang
  • Post published: May 19, 2012
  • Reading Time: 1 min
  • Word Count: 141 words

ISC Diary: There is a remote exploit in the wild for PHP 5.4.3 in Windows, which takes advantage of a vulnerability in the com_print_typeinfo function. The php engine needs to execute the malicious code, which can include any shellcode like the the ones that bind a shell to a port. Since there is no patch available for this vulnerability yet, you might want to do the following: Block any file upload function in your php applications to avoid risks of exploit code execution. Use your IPS to filter known shellcodes like the ones included in metasploit. Keep PHP in the current available version, so you can know that you are not a possible target for any other vulnerability like CVE-2012-2336 registered at the beginning of the month. Use your HIPS to block any possible buffer overflow in your system. Source: http://isc.sans.edu ...

Continue Reading PHP 5.4 Remote Exploit PoC in the wild

Android smartphones infected via drive-by exploit

  • Post author: Omid Farhang
  • Post published: March 2, 2012
  • Reading Time: 2 min
  • Word Count: 415 words

At the RSA Conference 2012, former McAfee executives George Kurtz and Dmitri Alperovitch have presented a Remote Access Tool (RAT) that infects Android smartphones (version 2.2). They used an as-yet unpatched bug in Androidā€™s WebKit browser to inject the malware. The researchers say that they bought the vulnerability information, and a range of other tools, on the black market. The finished exploit is based on 20 components that apparently cost a total of $1,400 on the black market. ...

Continue Reading Android smartphones infected via drive-by exploit

Blackhole Exploit Targeting Steveā€™s Death

  • Post author: Omid Farhang
  • Post published: October 8, 2011
  • Reading Time: 1 min
  • Word Count: 199 words

Symantec: The sad news making the rounds these days is the death of Steve Jobs, Apple Co-founder and former CEO. His death has been a terrible loss to both Apple and Apple fans everywhere. Spammers are capitalizing on this incident by sending malicious links related to the news of Steve Jobsā€™ death. Below is a screenshot of one such spam email containing a malicious link: More malicious links found relating to death spam are: ...

Continue Reading Blackhole Exploit Targeting Steveā€™s Death

Popular sites (including YouPorn) caught sniffing user browser history

  • Post author: Omid Farhang
  • Post published: December 7, 2010
  • Reading Time: 3 min
  • Word Count: 436 words

The Register: YouPorn nabbed in real-world privacy sting Boffins from Southern California have caught YouPorn.com and 45 other sites pilfering visitorsā€™ surfing habits in what is believed to be the first study to measure in-the-wild exploits of a decade-old browser vulnerability. YouPorn, which fancies itself the YouTube of smut, uses JavaScript to detect whether visitors have recently browsed to PornHub.com, tube8.com and 21 other sites, according to the study. It tracked the 50,000 most popular websites and found a total of 46 other offenders, including news sites charter.net and newsmax.com, finance site morningstar.com and sports site espnf1.com. ...

Continue Reading Popular sites (including YouPorn) caught sniffing user browser history

Brand new 0-day Exploit. The world is going to end! Yet againā€¦

  • Post author: Omid Farhang
  • Post published: August 27, 2010
  • Reading Time: 3 min
  • Word Count: 440 words

Sighā€¦ The latest ā€œexploitā€ that affects hundreds of programs and will be the end of the world as we currently know it is actually a well documented feature of Windows. It has actually been around since the DOS days. In the old days we used to call these Companion viruses. It worked by using a different file extension that will be executed before the real executable. For example if you had a ā€œgwbasic.exeā€ you would create a ā€œgwbasic.comā€ anywhere in the path and if the user just typed ā€œgwbasicā€ he would execute the ā€œgwbasic.comā€ and not the ā€œgwbasic.exeā€. If the author of the ā€œgwbasic.comā€ was ā€˜niceā€™ he could execute the ā€œgwbasic.exeā€ so as to make the existence of the ā€œgwbasic.comā€ file harder to detect. ...

Continue Reading Brand new 0-day Exploit. The world is going to end! Yet againā€¦