| 

Zeus botnet continues: 2,500 victims estimated

  • Post author: Omid Farhang
  • Post published: February 21, 2010
  • Reading Time: 1 min
  • Word Count: 141 words

Herndon, Va., forensics firm NetWitness has said that the Zeus botnet has breached the networks of nearly 2,500 organizations in nearly 200 countries, including 10 U.S. federal agencies. NetWitness researchers said many victims are Fortune 500 companies in energy, finance and high tech sectors. NetWitness based its conclusions on information from a 75-gigabyte collection of data that they intercepted. It was information the botnet had stolen in one month. The Zeus botnet, which started in 2008, is believed to have 74,000 machines infected. ...

Continue Reading Zeus botnet continues: 2,500 victims estimated

30 percent of U.S. is totally safe from Internet threats

  • Post author: Omid Farhang
  • Post published: February 21, 2010
  • Reading Time: 1 min
  • Word Count: 105 words

A survey of 54,000 households (129,000 people) commissioned by National Telecommunications and Information Administration (NTIA) last year found that 30 percent of U.S residents did not use the Internet at home or at work. The study, based on Census Bureau work, found that 64 percent of households had connections. In 2007, only 51 did. The NTIA researchers found that of those without connections, 38 percent said they didn’t need Internet and 26 percent said it was too expensive. In rural areas, 11 percent said they didn’t have any Internet access available. In urban areas, one percent said they couldn’t get it. ...

Continue Reading 30 percent of U.S. is totally safe from Internet threats

Symantec Reputation-based Security: Suspicious.Insight detections on VirusTotal

  • Post author: Omid Farhang
  • Post published: February 21, 2010
  • Reading Time: 4 min
  • Word Count: 657 words

Symantec recently upgraded their scanner on VirusTotal to include their new reputation-based security engine. That has caused a spike in their detection rates, in particular Suspicious.Insight detections, and so I thought I’d take a few minutes to explain some of the background and what is going on. So what exactly is a Suspicious.Insight detection? These detections are derived from Symantec’s new reputation-based security technology. They highlight files that have not yet developed a strong reputation (either good or bad) amongst Symantec’s community of users. their goal is to keep their users’ machines safe, and part of achieving that goal means helping their users make informed choices about the files they allow on to their systems. Suspicious.Insight detections help shine a spotlight on files that have not yet developed a full reputation. ...

Continue Reading Symantec Reputation-based Security: Suspicious.Insight detections on VirusTotal

Internet users skip security because of jargon

  • Post author: Omid Farhang
  • Post published: February 21, 2010
  • Reading Time: 2 min
  • Word Count: 418 words

Representatives of computer companies and governments meeting at the EastWest Institute security meeting in Brussels said that an industry culture of obscure jargon is preventing the world’s two billion Internet users from putting security measures in place to protect themselves. The group met to figure out how to protect computer users from massive abuse, fraud, online theft, vandalism and espionage. The New York Times story carried the following quotes from those at the meeting: ...

Continue Reading Internet users skip security because of jargon

Real life Mafia Wars: Spy Eye tool kit goes after Zeus botnet

  • Post author: Omid Farhang
  • Post published: February 13, 2010
  • Reading Time: 2 min
  • Word Count: 270 words

Peter Coogan at Symantec put up a very interesting blog post yesterday about a crimeware kit called SpyEye v1.0.7 (on sale now on Russian sites — $500) that has a module that will kill a Zeus bot infection on a victim’s computer so the bot created by SpyEye can take it over. In September, Computer Weekly reported the Swedish telco Telia Sonera shut down the Internet connections of Latvian company Real Host after it was linked to the Zeus botnet. At the time, researchers said they believed Real Host’s servers had captured about 3.6 million PCs for the Zeus botnet. ...

Continue Reading Real life Mafia Wars: Spy Eye tool kit goes after Zeus botnet

Windows 7’s strange Battery Notification isn’t any error but a Feature

  • Post author: Omid Farhang
  • Post published: February 12, 2010
  • Reading Time: 2 min
  • Word Count: 353 words

Many users have complained about Windows 7 strange Battery notification saying “Consider replacing your Batteries” on Laptops and there was a noise about it in Blogosphere but Microsoft has replied to it. There were many Forum posts and blog articles implying Windows 7 is falsely reporting this situation or even worse, causing these batteries to fail. After upgrading to Windows 7, Many users are seeing a** pop-up window that suggests they “consider replacing” their battery**, as capacity has slipped below the 40 per cent level. Butt, official MSDN blog has confirmed that Windows 7 isn’t killing Laptop batteries or causing them to fail but it’s a new intelligent feature of Windows 7. ...

Continue Reading Windows 7’s strange Battery Notification isn’t any error but a Feature

Phony Firefox update comes with Hotbar adware

  • Post author: Omid Farhang
  • Post published: February 7, 2010
  • Reading Time: 2 min
  • Word Count: 231 words

Our good friends at Broomfield, Colo., security firm eSoft have found an interesting scam to trick Internet users into installing the Hotbar adware: a fake Firefox download site. The eSoft researchers are theorizing that an affiliate of Pinball Publisher Network (PPB). is responsible. Pinball bought the Zango assets after that pestilent operation failed last spring. However Sunbelt Software Spyware Research Manager Eric Howes did some more digging and found that PPN offers the download file on a site they own so affiliates can send customers victims there for downloads. ...

Continue Reading Phony Firefox update comes with Hotbar adware

Phishing scam steals carbon credits

  • Post author: Omid Farhang
  • Post published: February 5, 2010
  • Reading Time: 1 min
  • Word Count: 109 words

Wired magazine has run a story on a phishing scam in Europe, New Zealand and Japan that resulted in the loss of 250,000 carbon credit permits worth $4 million from six companies. The phishing emails spoofed the German Emissions Trading Authority and said that the victim companies needed to re-register their accounts with the authority. When victims entered their information on a fraudulent web page from the link in the phishing emails the scammers accessed their accounts, transferred emissions credits to accounts they controlled then sold them. The amount the scammers made hasn’t been disclosed. ...

Continue Reading Phishing scam steals carbon credits

Hackers Disrupt European CO₂ Market

  • Post author: Omid Farhang
  • Post published: February 2, 2010
  • Reading Time: 2 min
  • Word Count: 256 words

In recent weeks, various cybercrime attacks have disrupted the computer systems that allow nations to manage their national greenhouse-gas emissions quotas and their possession of carbon assets according to international agreements (the Kyoto Protocol and the European system). One quota is the right to emit the equivalent of one ton of carbon dioxide during a specified period. The initial attack targeted the Danish CO₂ quota register that was shut down on January 12. The Danish authorities took this decision after registry users received a fake email purporting to originate from the Danish Energy Agency and redirecting the recipients to a mirror site to steal their credentials. ...

Continue Reading Hackers Disrupt European CO₂ Market

Troj/JSRedir-AK: 40% of a month’s malware

  • Post author: Omid Farhang
  • Post published: January 25, 2010
  • Reading Time: 1 min
  • Word Count: 181 words

It has been a month since Sophos added detection for Troj/JSRedir-AK and figures generated today show that over 40% of all web-based detections have been from this malicious code. [Graph shows Malware hosted on websites from 2009-12-22 11:00:00 to 2010-01-21 11:00:00 (GMT-8)] Translating the numbers into a more human comprehensible form: 1 site every 15 secs was being detected as Troj/JSRedir-AK. The affected sites include well-known names, including: ...

Continue Reading Troj/JSRedir-AK: 40% of a month’s malware