| 

Be wary of Steam password stealers

  • Post author: Omid Farhang
  • Post published: April 3, 2010
  • Reading Time: 2 min
  • Word Count: 286 words

There are a couple of programs in circulation at the moment designed to steal Steam account login credentials. People can have a lot of money invested in Steam purchases (if you purchase PC games online Steam is probably the best digital delivery service around), and it isnā€™t really the greatest thing in the world to have one stolen. Steam is a popular thing to have in webcafes, and the company behind it actually support this in a very big way. These particular infection files would cause the most trouble on the networks of netcafes with minimal security in place, allowing chancers to install files with a USB stick, let the stealer grab account logins then come back later toĀ collect the passwords. ...

Continue Reading Be wary of Steam password stealers

Jon and Kate Plus Eight ā€¦ plus fake codecs

  • Post author: Omid Farhang
  • Post published: April 3, 2010
  • Reading Time: 2 min
  • Word Count: 281 words

One our researchers was reading the comments about Dancing With The Stars, and Kate Gosselinā€™s performance (Heā€™s a huge fan ā€¦ donā€™t ask), when he noticed a link to a URL shortening service. Given that it was advertising a video of Kate Gosselin topless, he astutely realised that was a bit suspicious, and checked it out inside a nice, safe virtual pc. Indeed, the shortening service immediately transferred to a website showing a picture of Kate at the beachā€¦ ...

Continue Reading Jon and Kate Plus Eight ā€¦ plus fake codecs

When is a picture not worth 1000 words?

  • Post author: Omid Farhang
  • Post published: April 3, 2010
  • Reading Time: 1 min
  • Word Count: 154 words

When it is not actually a picture but an obfuscated malicious VB script! Thatā€™s the story with W32/VBSAuto-F ā€” yet another autorun worm that sets a number of self-starting registry entries, spreads via USB drives, and downloads further malware. The worm embeds code in a JPEG comment field of an ambiguously named file ā€œimage.jpgā€ or ā€œimwin.jpgā€. Previewing such files as images remains innocuous, as picture viewers tend not to execute meta data by default. This is unfortunately not the case when the file is run through the VB script engine, which is happy to interpret the same JPEG comment 0xFFFE header bytes to indicate Little-Endian UTF-16 encoded data and execute the remaining portion of the file as code. ...

Continue Reading When is a picture not worth 1000 words?

4.4 percent in China have no AV ā€“ that might not be too bad

  • Post author: Omid Farhang
  • Post published: April 3, 2010
  • Reading Time: 1 min
  • Word Count: 193 words

The number for the rest of the world might be 26 percent There is a story making headlines on the computer security news sources today about estimates that 4.4 percent of Chinese Internet users have no anti-virus software, up from 3.9 percent last year. Thatā€™s about 17 million machines. The numbers came from surveying by the China Internet Network Information Center (CNNIC) and Chinaā€™s National Computer Network Emergency Response Technical Team (CNCERT). ...

Continue Reading 4.4 percent in China have no AV ā€“ that might not be too bad

Giant Facebook database destroyed amid legal threat

  • Post author: Omid Farhang
  • Post published: April 3, 2010
  • Reading Time: 2 min
  • Word Count: 265 words

New Scientist is reporting that a massive database culled from the public profiles of 210 million Facebook users has been destroyed before its anticipated ā€” and controversial ā€” release to researchers. Pete Warden, aĀ former Apple engineer, reluctantly deleted the data after Facebook threatened legal action, saying he could not afford to fight a lawsuit. He said Facebook was not aware that such information was available and that the flaw is beingĀ patched. ...

Continue Reading Giant Facebook database destroyed amid legal threat

Spam web sites moving from .cn to .ru

  • Post author: Omid Farhang
  • Post published: April 3, 2010
  • Reading Time: 1 min
  • Word Count: 209 words

Scum on the run Security blogger Brian Krebs is reporting some good numbers that show spammers are no longer registering their domains in China (.cn) since that country started requiring actual on-paper registrations and business licenses, which precludes anonymous registration. AND their new top-level domain of choice, Russia (.ru), is going to make life for sca/spammers difficult there. ā€œRussiaā€™s Coordination Center for domain registration will require individuals and businesses applying for a .ru address to provide a copy of a passport or legal registration papers.ā€ Krebs wrote. ...

Continue Reading Spam web sites moving from .cn to .ru

Eliminate two thirds of comp security risk!

  • Post author: Omid Farhang
  • Post published: April 2, 2010
  • Reading Time: 2 min
  • Word Count: 261 words

Donā€™t run your PC with admin privileges Sometimes in life you know something is a risk, but you donā€™t know how BIG a risk it is until somebody actually checks it out. There was a German scientist in Russia who repeated Ben Franklinā€™s kite-in-the-thunder-storm experiment but didnā€™t live to write up his results. Los Angeles security firm BeyondTrust has released an analysis of Microsoftā€™s 75 security bulletins last year. They came to the startling conclusion that if users had operated their computers without administrative rights they would have eliminated 64 percent of their risk from Microsoft vulnerabilities! ...

Continue Reading Eliminate two thirds of comp security risk!

Forbes: "It's all just Malware now"

  • Post author: Omid Farhang
  • Post published: March 31, 2010
  • Reading Time: 1 min
  • Word Count: 80 words

It seems I prompted an exploration of infection related search terms in Google Trends over on the Forbes.com Firewall blog. ā€œMalwareā€ is becoming a sort of catch-all term for end-users, slowly replacing the various types of Ad/Mal/Spyware classifications. Article here ā€“ worth checking out the comment by Andy Hayter, Anti-Malcode Program Manager of ICSA Labs, too. Of course, I like to think I might have contributed in some small way to certain search terms going the way of the Dinosaurā€¦ ...

Continue Reading Forbes: "It's all just Malware now"

EXEs in word docs

  • Post author: Omid Farhang
  • Post published: March 30, 2010
  • Reading Time: 1 min
  • Word Count: 168 words

Today, our friends at Trend Micro blogged about a new attack vector using Microsoft Word documents. We saw this as well last week, and have written a detection for the dropped trojan. Itā€™s not just a ā€œlawsuitā€ thatā€™s being spammed, we also picked up another form of this attack in our honeypots over the weekend: When you open the Word document, you see a ā€œPDFā€, but itā€™s actually not. Itā€™s a JPG, which links to an executable. ...

Continue Reading EXEs in word docs

Test of China Internet connections reveals heavy filtering

  • Post author: Omid Farhang
  • Post published: March 30, 2010
  • Reading Time: 2 min
  • Word Count: 335 words

Using a Firefox 3.0 add-on created by developers in Hong Kong, Betanews was able to briefly establish a connection with the Internet via a proxy based in mainland China. With that proxy, we were able to confirm that searches performed using Googleā€™s Hong Kong-based page were effectively blocked. Firefox 3.0 reported the blockage with this message: ā€œThe connection to the server was reset while the page was loadingā€ ā€” a message from the browser, not from an ISP. We used version 3.0.16 of Firefox (an older edition) because it is the only version compatible with China Channel, a tool made for the express purpose of testing Chinaā€™s filtering ability. It has not been upgraded for version 3.6. ...

Continue Reading Test of China Internet connections reveals heavy filtering