| 

Energizer USB charger infected with Trojan

  • Post author: Omid Farhang
  • Post published: March 8, 2010
  • Reading Time: 1 min
  • Word Count: 120 words

Hmmm. A new vector for malware: USB battery chargers. Wonderful. The U.S. Computer Emergency Response Team (CERT) is warning that Energizer DUO USB battery chargers have been found infected with a Trojan that loads backdoor malware on a victim PC along with its battery monitoring software. The charger copies a .dll file named UsbCharger.dll in the application’s directory and another named Arucer.dll in the Windows system32 directory. USBCharger sets a registry entry to autoexecute Arucer.dll when Windows starts. ...

Continue Reading Energizer USB charger infected with Trojan

Cute (and malicious)

  • Post author: Omid Farhang
  • Post published: March 8, 2010
  • Reading Time: 2 min
  • Word Count: 408 words

There’s an angelically tinged infection doing the rounds at the moment that has more than a whiff of sulphur about it. We can’t say for definite, but it looks like the point of this little angel is to turn your PC into a file storage area for an IRC channel since it dumps you into #music IRC channels and makes sure you can accept various media files. Our tale begins with an Email, claiming you have a ā€œfunny picture from Facebook friendsā€ waiting for you at Oast(dot)com: ...

Continue Reading Cute (and malicious)

Steer clear of fake FBI fingerprint scanner

  • Post author: Omid Farhang
  • Post published: March 7, 2010
  • Reading Time: 2 min
  • Word Count: 287 words

Sources on a number of forums tell me that a certain application is going to be released into the wild in a few days, promoted heavily via sites such as Youtube to attract as many potential victims as possible. I thought it might be beneficial to get a head start on the bad guys and get word out before they hit their big green ā€œGoā€ switch. What is it? I believe the following screenshot can answer that question: ...

Continue Reading Steer clear of fake FBI fingerprint scanner

All browsers are (not) created equal

  • Post author: Omid Farhang
  • Post published: March 6, 2010
  • Reading Time: 3 min
  • Word Count: 440 words

My friends often ask me about steps they can take to keep their systems at work and home free from malware. Apart from the usual recommendation to use alternative, less targeted and therefore slightly more secure operating system like Linux or OSX (OpenBSD would also be an interesting alternative) I used to mention that a change of the web browser would also be very helpful. Internet Explorer is still the most commonly used browser with a little above 60% market share, but its market share is steadily in decline in the last couple of years. I am fairly sure that one of the main reasons people move to Firefox or Chrome is perceived lack of security. Internet Explorer is the most common target for malware and various exploit packs although the latest versions have proved to be much more resilient to various attacks. With most of the users finally making the switch away from IE6 we hope that the exploits will be even less successful in the future. This of course means that attackers are changing their focus to other products like Adobe Reader of Flash, the most commonly used internet applications after browsers. Exploiting Flash or Adobe Reader allows the attacker to abstract the browser version and often the browser itself. Adobe’s attitude to security also does not help. ...

Continue Reading All browsers are (not) created equal

Kuwait, Saudi… and PrIv8 ActiveX ExploiT

  • Post author: Omid Farhang
  • Post published: March 6, 2010
  • Reading Time: 1 min
  • Word Count: 160 words

We all know Brazilian hackers have mastered the art of creating banking trojans. The Chinese are very fond of password stealers targeting online games. The bad guys do have preferences for what type of malware they are creating based on their geolocation. Well, I found this exploit source code from a domain named kuwait{removed}.com The exploit downloads a file named unek.exe, very well known to be an IRC bot. ...

Continue Reading Kuwait, Saudi… and PrIv8 ActiveX ExploiT

Viruses and Digital Signatures

  • Post author: Omid Farhang
  • Post published: March 5, 2010
  • Reading Time: 2 min
  • Word Count: 376 words

Recently, We received some malicious files which appeared to be signed by ā€œAdobe Systems Incorporatedā€. On closer inspection, however, it was seen that the signature was just a ruse used by the malware author to give an air of legitimacy to the files. Virus writers are getting smarter and going that extra mile to digitally sign their files. Using this technique the malware authors could, for example, penetrate an environment where only signed files are allowed but the authenticity of the signature is not checked. ...

Continue Reading Viruses and Digital Signatures

The Morphing PDF

  • Post author: Omid Farhang
  • Post published: March 5, 2010
  • Reading Time: 1 min
  • Word Count: 161 words

Just when we thought SEO using Flash was as interesting as SEO poisoning can get, it seems it’s getting even sneakier… Imagine a PDF file posted by someone evil online. Of course, Google being Google, the file is recognized as a PDF. And when we open it, it really is a PDF. No evil codes inside, just a good old vanilla PDF file. Three hours later… Google still says the file is a PDF. Brod (one of our geeky guys here) is attributing this to Google’s cache. ...

Continue Reading The Morphing PDF

Adservers compromised in latest Zbot push

  • Post author: Omid Farhang
  • Post published: March 5, 2010
  • Reading Time: 2 min
  • Word Count: 216 words

As we have commented before when content served up from adservers is compromised, the effects can be far reaching, potentially exposing huge numbers of victims to the malicious code as they innocently browse legitimate sites. The problem is further complicated by the fact that legitimate ad content is often heavily obfuscated, in order to evade ad-blocking technology. During the latter half of this week we have seen a whole batch of compromised adservers injected with malicious JavaScript to silently load malicious content from a remote site. A significant number of popular sites that load ads content from these servers have therefore been affected by this attack. ...

Continue Reading Adservers compromised in latest Zbot push

Contraband Imports

  • Post author: Omid Farhang
  • Post published: March 5, 2010
  • Reading Time: 1 min
  • Word Count: 168 words

One of the issues malware writers deal with is having their programs load and execute on a victim’s computer. An unwary victim may click on an email attachment and have the malware run once. But in order to continue to be of value to the author, that piece of malware has to arrange for itself to be run after the computer inevitably gets rebooted. There are several well known ways to accomplish this task. The problem here is these methods are well known and security software know where to look. Which brings us to the topic of this blog entry. We recently came across a hacked copy of imm32.dll which is Microsoft’s Input Method Manager library. The authors inserted an extra imported library into the file’s import directory. The extra library name starts with ā€œnetā€ and the imported function name is randomized. ...

Continue Reading Contraband Imports

Late Dash by Spammers for 2010 Winter Olympics

  • Post author: Omid Farhang
  • Post published: March 5, 2010
  • Reading Time: 2 min
  • Word Count: 233 words

The 2010 Winter Olympics were held in Vancouver, Canada, from February 12-28. With more than 82 countries participating and millions across the globe catching day-to-day action, it was sadly quite obvious that we would see spam attacks centered on this event. However, the volume of spam relating to the Winter Olympics is actually very low, which is unlike the Beijing Olympics, when spam campaigns had started way before actual event. In the case of the Winter Olympics, spammers seem to be only now waking up from their slumber. ...

Continue Reading Late Dash by Spammers for 2010 Winter Olympics