| 

Apple iPhone Warranty Scam

  • Post author: Omid Farhang
  • Post published: February 21, 2010
  • Reading Time: 2 min
  • Word Count: 422 words

Symantec has recently observed phishing scams targeting Apple iPhones in order to gain serial numbers, IMEI, model, and capacity, etc. What is an IMEI? An IMEI (international mobile equipment identity) is a 15-digit unique number used by GSM networks to identify valid devices. Every GSM, WCDMA, or iDEN mobile phone (and even the odd satellite phone) has an IMEI. It can be found under the battery of the device or by typing *#06# on the mobile. If your phone or device is lost or stolen you can report it to your service provider, providing the IMEI number. The service provider can then blacklist the IMEI number, rendering the device unusable in that country. ...

Continue Reading Apple iPhone Warranty Scam

Phishing the Brands of Online Auction Marketing Tools

  • Post author: Omid Farhang
  • Post published: February 21, 2010
  • Reading Time: 2 min
  • Word Count: 324 words

The popularity of online auctions paves way for the development of online auction marketing tools. These tools are software applications that are intended to facilitate the sellersā€™ side of popular online auction websites. Some of the tools that help sellers in auctions are: image hosting to display galleries of their products, listing of best bidders in a single template, automatic inventory systems to notify sellers during low stocks, etc. With the help of these tools, online auctions are easier and time saving. ...

Continue Reading Phishing the Brands of Online Auction Marketing Tools

Do They Know itā€™s (not) Christmas Time at All?

  • Post author: Omid Farhang
  • Post published: February 21, 2010
  • Reading Time: 1 min
  • Word Count: 207 words

I saw something quite funny when checking out the spam feeds the other day. An attachment kept appearing, once in a while, with a name ofĀ Christmas Card.zip. It was making sporadic appearances in the feeds (and the number of spam email messages was quite low), but there were a couple of these odd messages at equally odd hours of the day: The email message itself was a run-of-the-mill electronic greeting card with an HTML body containing a nice Flash animationā€”the Flash animation actually comes from a legitimate source (123greetings.com). The email body contains a message asking the user to open the attachment to see who sent the email. Of course, opening the attachment yields a malicious file. The name of the file inside isĀ _**Christmas Card.htm[MANY SPACES].exeĀ **_and it is already detected by Symantec as W32.Ackantta.G@mm. ...

Continue Reading Do They Know itā€™s (not) Christmas Time at All?

Tigerā€™s play too rough on Valentines Day

  • Post author: Omid Farhang
  • Post published: February 14, 2010
  • Reading Time: 1 min
  • Word Count: 175 words

While most sane people around the world are enjoying a romantic Valentineā€™s Day today, we at SophosLabs remain vigilant on the front line of the war against malware. This year, Valentines Day coincides with the Chinese New Year as well as the start of the Winter Olympics in Vancouver, and many malware attacks have centred around SEO poisoning of these and other topical search terms. The Chinese New Year of the Tiger is proving a popular target, especially as this ties in with any Tiger Woods related searches: ...

Continue Reading Tigerā€™s play too rough on Valentines Day

Unusual Valentineā€™s Gift Unwraps FakeAV

  • Post author: Omid Farhang
  • Post published: February 14, 2010
  • Reading Time: 1 min
  • Word Count: 117 words

While everyone is searching the web for the unusual gift on Valentineā€™s Day, Cybercriminals take this opportunity to propagate Rouge Antivirus. I have searched for the keywords ā€œunusual-valentines-day-giftsā€, gives the following results: Clicking the highlighted link above will lead to fake message such as ā€œAlert! Your system is exposed to risk of virus attack. Itā€™s highly recommended to check your PC immediately. Press OK to start the scan right nowā€. ...

Continue Reading Unusual Valentineā€™s Gift Unwraps FakeAV

Warning over sexy instant message called ‘Fembot'

  • Post author: Omid Farhang
  • Post published: February 13, 2010
  • Reading Time: 2 min
  • Word Count: 243 words

(BBC) Lonely internet users are being warned about Fembot, a piece of malicious software that poses as a flirtatious woman looking to chat on instant messaging services. Victims are persuaded to give out personal information that could be used for fraud or identity theft, according to security experts. Fembot was first spotted in 2007 but hasnā€™t been seen much since then. However, there are signs she may be back on the scene in time for Valentineā€™s Day. ...

Continue Reading Warning over sexy instant message called ‘Fembot'

Escort service infected with Troj/JSRedir-AR

  • Post author: Omid Farhang
  • Post published: February 12, 2010
  • Reading Time: 1 min
  • Word Count: 76 words

Clients of escorts and call girls are usually aware of the the risks presented from STIs. However, SophosLabs has been monitoring a different type of infection risk for clients of escorts in Indian cities. The Troj/JSRedir-AR infection has morphed slightly: If you look at the variable ā€˜o[e]ā€˜ (two-thirds of the way down) you will see the beginnings of an obfuscated string ā€˜http://ā€™. Previous versions of Troj/JSRedir-AK and Troj/JSRedir-AR have used non-alphanumeric characters to disguise the strings. ...

Continue Reading Escort service infected with Troj/JSRedir-AR

Zeus ā€“ Exploiting Spear Phishing to Spear Phish

  • Post author: Omid Farhang
  • Post published: February 12, 2010
  • Reading Time: 1 min
  • Word Count: 129 words

The Zeus crimeware family has moved into new territory with its latest spam campaign ā€“ purporting to be a warning about targeted phishing attacks on ā€œ.govā€ and ā€œ.milā€ domains, by Zeus Trojans no less! In fact, one of the latest spam samples weā€™ve seen, duplicates the title and first three paragraphs of aĀ blog entry by well-known security expert Brian Krebs, which discusses a previous iteration of this Zeus attack. As seen below, the spam sample starts off with the same three lines of the blog post, before starting into the phony KB content and links that lead to Zeus malware. ...

Continue Reading Zeus ā€“ Exploiting Spear Phishing to Spear Phish

Between a PoC and a Hard Place

  • Post author: Omid Farhang
  • Post published: February 12, 2010
  • Reading Time: 3 min
  • Word Count: 491 words

Several reports have been published detailing a Blackberry proof of concept (PoC) exploit calledĀ txsBBSpyĀ that was recently presented at a security conference. Although it may not have been the aim of the original presenter, some reports have framed the PoC as being able to exploit so-called vulnerabilities that the writers believe to be present in the Blackberry platform. The ā€œvulnerabilitiesā€ involve secretly forwarding incoming emails, locating devices by way of their GPS capabilities, eavesdropping on conversations by surreptitiously turning on microphones, and other such nefarious behavior. ...

Continue Reading Between a PoC and a Hard Place

Interview with a Nigerian 419 scammer

  • Post author: Omid Farhang
  • Post published: February 12, 2010
  • Reading Time: 3 min
  • Word Count: 486 words

Bruce Schneier, in his blog Schneier on SecurityĀ http://www.schneier.com/Ā drew attention to this great interview with an ex-Nigerian-419 scammer on theĀ Scam-Detective site. Itā€™s a fairly long piece and gives a pretty good view of the Nigerian scam industry run by organized crime, how it sucks in young people who have good computer and English skills and pays them a huge amount of money ($75,000 per year in this case) to scam victims they view as white, greedy and rich. ...

Continue Reading Interview with a Nigerian 419 scammer