| 

Wiseguys Botnet First in Line for Concert, Sports Tickets

  • Post author: Omid Farhang
  • Post published: March 6, 2010
  • Reading Time: 3 min
  • Word Count: 444 words

We frequently read stories about spammers who can circumvent CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) authentication. Using bot-infected machines, they can create a vast number of random e-mail accounts for spamming purposes. This week, a federal judge in Newark, New Jersey, revealed the latest use of a botnet-like network with a CAPTCHA breaker. In this case, the computers overseen by the defendants were used to buy seats for high-profile concerts and sports events from ticket sellersā€™ websites. The defendents later allegedly resold the tickets on Internet at much higher prices. ...

Continue Reading Wiseguys Botnet First in Line for Concert, Sports Tickets

All browsers are (not) created equal

  • Post author: Omid Farhang
  • Post published: March 6, 2010
  • Reading Time: 3 min
  • Word Count: 440 words

My friends often ask me about steps they can take to keep their systems at work and home free from malware. Apart from the usual recommendation to use alternative, less targeted and therefore slightly more secure operating system like Linux or OSX (OpenBSD would also be an interesting alternative) I used to mention that a change of the web browser would also be very helpful. Internet Explorer is still the most commonly used browser with a little above 60% market share, but its market share is steadily in decline in the last couple of years. I am fairly sure that one of the main reasons people move to Firefox or Chrome is perceived lack of security. Internet Explorer is the most common target for malware and various exploit packs although the latest versions have proved to be much more resilient to various attacks. With most of the users finally making the switch away from IE6 we hope that the exploits will be even less successful in the future. This of course means that attackers are changing their focus to other products like Adobe Reader of Flash, the most commonly used internet applications after browsers. Exploiting Flash or Adobe Reader allows the attacker to abstract the browser version and often the browser itself. Adobeā€™s attitude to security also does not help. ...

Continue Reading All browsers are (not) created equal

Adservers compromised in latest Zbot push

  • Post author: Omid Farhang
  • Post published: March 5, 2010
  • Reading Time: 2 min
  • Word Count: 216 words

As we have commented before when content served up from adservers is compromised, the effects can be far reaching, potentially exposing huge numbers of victims to the malicious code as they innocently browse legitimate sites. The problem is further complicated by the fact that legitimate ad content is often heavily obfuscated, in order to evade ad-blocking technology. During the latter half of this week we have seen a whole batch of compromised adservers injected with malicious JavaScript to silently load malicious content from a remote site. A significant number of popular sites that load ads content from these servers have therefore been affected by this attack. ...

Continue Reading Adservers compromised in latest Zbot push

Late Dash by Spammers for 2010 Winter Olympics

  • Post author: Omid Farhang
  • Post published: March 5, 2010
  • Reading Time: 2 min
  • Word Count: 233 words

The 2010 Winter Olympics were held in Vancouver, Canada, from February 12-28. With more than 82 countries participating and millions across the globe catching day-to-day action, it was sadly quite obvious that we would see spam attacks centered on this event. However, the volume of spam relating to the Winter Olympics is actually very low, which is unlike the Beijing Olympics, when spam campaigns had started way before actual event. In the case of the Winter Olympics, spammers seem to be only now waking up from their slumber. ...

Continue Reading Late Dash by Spammers for 2010 Winter Olympics

Everybody uses Web 2.0, but IT might not know it

  • Post author: Omid Farhang
  • Post published: March 5, 2010
  • Reading Time: 1 min
  • Word Count: 183 words

Communications security firm FaceTime of Belmont, Calif., has released the results of a survey (of 1654 people) that strongly indicates we are all using a lot of Web 2.0 applications at work and a third of our IT staffs arenā€™t aware of it. It was FaceTimeā€™s fifth annual survey. Social media and Web 2.0 apps are being used by virtually all end users (99 percent) to support business processes, but 38 percent of IT professionals surveyed think there is no social networking on their networks. ...

Continue Reading Everybody uses Web 2.0, but IT might not know it

FakeAV, now for Windows 7!

  • Post author: Omid Farhang
  • Post published: March 4, 2010
  • Reading Time: 2 min
  • Word Count: 348 words

Itā€™s been over a year since we first started seeing the familiar Windows XP My Computer page where it appears your drives are being scanned and it reports a bunch of non-existent malware on your computer. Yesterday I was investigating the latest hot news item where there was a FAMU (Florida Agricultural and Mechanical University) sex tape released on the internet and sure enough I found many SEO poisoned links claiming to have the video. Imagine my surprise when I saw the following. ...

Continue Reading FakeAV, now for Windows 7!

Phishing Scam Linked to Valentineā€™s Day Movie

  • Post author: Omid Farhang
  • Post published: March 4, 2010
  • Reading Time: 2 min
  • Word Count: 304 words

Symantec has been observing several spam and phishing attacks regarding the recent Valentineā€™s Day. One such phishing attack was on an e-card website that asked for user credentials in order to send Valentineā€™s Day greetings to loved ones. The legitimate e-card website has partnerships with several other brands and so accepts credentials from certain other websites as well. Hence, attackers can steal user information from several brandsā€™ sites by phishing on just one e-card website. This particular attack asked for usersā€™ credentials for a popular information services website. The phishing domain was hosted on servers in China and has been reported as ā€œdomain tasting.ā€ Domain tasting is a situation in which a domain name is used for a small period of time and is checked to see if it is making enough money. If it doesnā€™t earn enough, the domain name is deleted and the registrant is refunded the entire registration fee. This is a technique used by attackers to perform phishing activity for small periods of time at low costs. ...

Continue Reading Phishing Scam Linked to Valentineā€™s Day Movie

U.S. Census Bureau warning of phishing scams

  • Post author: Omid Farhang
  • Post published: March 4, 2010
  • Reading Time: 1 min
  • Word Count: 192 words

The U.S. Census Bureau is warning of phishing and other scams that are using the 2010 Census as bait. Here is the warning from the bureauā€™s web site: If you are contacted for any of the following reasons ā€” Do Not Participate. It is NOT the U.S. Census Bureau. Phishing: ā€˜Phishingā€™ is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, social security numbers, bank account or credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by email and it often directs users to enter sensitive information at a fake web site whose look and feel are almost identical to the legitimate one. ...

Continue Reading U.S. Census Bureau warning of phishing scams

Malicious iframes on Google-analitics(dot)net

  • Post author: Omid Farhang
  • Post published: March 4, 2010
  • Reading Time: 1 min
  • Word Count: 30 words

Right! A site registered in the state of ā€œTaliban.ā€ Youā€™re really going to go to a site with this registration: Nice work SANS. Thanks to Daniel Wesemann at SANS: http://isc.sans.org/diary.html?storyid=8350

Continue Reading Malicious iframes on Google-analitics(dot)net

Haiti relief email scams still circulate

  • Post author: Omid Farhang
  • Post published: March 4, 2010
  • Reading Time: 1 min
  • Word Count: 146 words

Want a place to check the legitimacy of a charity? ā€œFounded in 2001, Charity Navigator has become the nationā€™s largest and most-utilized evaluator of charities. In our quest to help donors, our team of professional analysts has examined tens of thousands of non-profit financial documents. As a result, we know as much about the true fiscal operations of charities as anyone. Weā€™ve used this knowledge to develop an unbiased, objective, numbers-based rating system to assess the financial health of over 5,000 of Americaā€™s best-known charities.ā€ ...

Continue Reading Haiti relief email scams still circulate