| 

Comodo Group Issues Bogus SSL Certificates

  • Post author: Omid Farhang
  • Post published: April 2, 2011
  • Reading Time: 2 min
  • Word Count: 285 words

from Schneier on Security by Schneier: This isn’t good: The hacker, whose March 15 attack was traced to an IP address in Iran, compromised a partner account at the respected certificate authority Comodo Group, which he used to request eight SSL certificates for six domains: mail.google.com, www.google.com, login.yahoo.com, login.skype.com, addons.mozilla.org and login.live.com. The certificates would have allowed the attacker to craft fake pages that would have been accepted by browsers as the legitimate websites. The certificates would have been most useful as part of an attack that redirected traffic intended for Skype, Google and Yahoo to a machine under the attacker’s control. Such an attack can range from small-scale Wi-Fi spoofing at a coffee shop all the way to global hijacking of internet routes. ...

Continue Reading Comodo Group Issues Bogus SSL Certificates

Massive SQL injection attack making the rounds—694K URLs so far

  • Post author: Omid Farhang
  • Post published: April 1, 2011
  • Reading Time: 3 min
  • Word Count: 517 words

Thanks to my friend, Pondus! Ars Technica: Hundreds of thousands of URLs have been compromised—at the time of writing, 694,000 (it’s over millions of site when you are reading this)—in an enormous and indiscriminate SQL injection attack. The attack has modified text stored in databases, with the result that pages served up by the attacked systems include within each page one or more references to a particular JavaScript file. ...

Continue Reading Massive SQL injection attack making the rounds—694K URLs so far

Analysis of TR/Spy.SpyEye

  • Post author: Omid Farhang
  • Post published: March 30, 2011
  • Reading Time: 1 min
  • Word Count: 120 words

Avira TechBlog: SpyEye is a malware family which we are monitoring for some time. Today we are analyzing a sample which is detected as TR/Spy.SpyEye.flh by Avira products. The Trojan is able to inject code in running processes and can perform the following functions: Capture network traffic Send and receive network packets in order to bypass application firewalls Hide and prevent access to the startup registry entry Hide and prevent access to the binary code Hide the own process on injected processes Steal information from Internet Explorer and Mozilla Firefox A detailed analysis of this malware by Liviu Serban, Virus Researcher at Avira. ...

Continue Reading Analysis of TR/Spy.SpyEye

Installing an Application Using Internet Explorer 9

  • Post author: Omid Farhang
  • Post published: March 20, 2011
  • Reading Time: 3 min
  • Word Count: 468 words

Google Operation System Blog: I tried to download the latest Chromium build using Internet Explorer 9 and it was one of the most painful downloading experiences. Microsoft tries to protect users from downloading malware and uses a feature called SmartScreen Filter that “checks software downloads against a dynamically updated list of reported malicious software sites”. This feature was available in IE8, but the latest version of IE tried to improve it by analyzing application reputation. ...

Continue Reading Installing an Application Using Internet Explorer 9

A Technical Analysis on the CVE-2011-0609 Adobe Flash Player Vulnerability

  • Post author: Omid Farhang
  • Post published: March 17, 2011
  • Reading Time: 3 min
  • Word Count: 459 words

Microsoft Malware Protection Center: On March 14, Adobe released a security advisory (APSA11-01) warning of 0-day attacks affecting Adobe Flash Player (versions earlier than and including 10.2.152.33). These attacks were hidden inside Microsoft Excel documents that were used as a vehicle to deliver the exploit. The Adobe Flash file embedded inside the Excel file is another carrier for the exploit. It loads shellcode inside memory, performs heap-spraying, and loads a Flash byte stream from memory to exploit the 0-day vulnerability, which is tracked as CVE-2011-0609. ...

Continue Reading A Technical Analysis on the CVE-2011-0609 Adobe Flash Player Vulnerability

A Mini-Newsletter From Your Google Chrome Security Team

  • Post author: Omid Farhang
  • Post published: March 9, 2011
  • Reading Time: 3 min
  • Word Count: 432 words

Google Chrome Security Team wrote: We’re always working hard to enhance the Chrome browser with bug fixes, new defenses and new features. The release of Chrome 10 is no different, and there are some items worth highlighting: Chrome 10: Flash sandboxing With Chrome 10, our first cut of the previously announced Flash sandboxing initiative is now enabled by default for the Windows platform on Vista and newer. Additionally, because we automatically update Flash to the latest and most secure version, this should provide useful defense in depth. ...

Continue Reading A Mini-Newsletter From Your Google Chrome Security Team

What's New in Chrome 10?

  • Post author: Omid Farhang
  • Post published: March 8, 2011
  • Reading Time: 4 min
  • Word Count: 762 words

Google Chrome 10 is ready for primetime and it comes with a surprising number of new features. Here are some of them: The Options dialog is now a web page that opens in a new tab. Chrome has one less modal dialog and the new Options page is better suited for netbooks. Another advantage is that each section of the Options page has a permalink that can be bookmarked. Even if Chrome doesn’t have too many customizable settings, there’s a search box that lets you quickly find an option. Try searching for “cookies” and you’ll notice that Chrome finds settings that aren’t immediately obvious. ...

Continue Reading What's New in Chrome 10?

WordPress hit with second big attack in two days

  • Post author: Omid Farhang
  • Post published: March 8, 2011
  • Reading Time: 2 min
  • Word Count: 226 words

CNET wrote: The popular blogging-site hoster WordPress was hit with another distributed denial-of-service attack this morning, the second in two days. “Unfortunately, the DDoS attack from yesterday returned in a different form this morning and affected sitewide performance,” the company said in a notice on its Automattic site, which serves as a dashboard for the service. “The good news is that we were able to mitigate it quickly and performance returned to normal around 11:15 UTC. We are continuing to monitor the situation closely.” ...

Continue Reading WordPress hit with second big attack in two days

Taking a look at fake Amazon receipt generators

  • Post author: Omid Farhang
  • Post published: December 7, 2010
  • Reading Time: 3 min
  • Word Count: 552 words

Sunbelt Blog: Above, you can see a vaguely optimistic VirusTotal user summary in relation to a file that’s been doing the rounds for about a month or two. Here is the file in question: A “receipt generator”, I hear you ask – what do people want with one of those? The answer, of course, is rather straightforward: This is a particularly interesting scam, as it doesn’t target regular PC users – it targets the people who sell you things, such as the merchants on the Amazon marketplace. This is what the would-be social engineer sees when they fire up the program: ...

Continue Reading Taking a look at fake Amazon receipt generators

Twitter Trend Poisoning Cookbook

  • Post author: Omid Farhang
  • Post published: December 7, 2010
  • Reading Time: 7 min
  • Word Count: 1475 words

Symantec Connect: We have become familiar enough with malware creators poisoning popular search engine terms through SEO techniques in order to deliver their malicious files to a greater pool of unsuspecting users. Other popular services such as Twitter have not escaped the watchful eyes of the miscreants. This attack involves pumping out many of the same tweets with different accounts to push them into the Twitter trending list. That way more people are likely to see them even if the individual user accounts being used to send the tweets don’t have that many followers. Incidentally many of the accounts used in this attack don’t have that many followers and are quite fresh – meaning they are probably fake accounts set up specifically for the purpose of spamming tweets. ...

Continue Reading Twitter Trend Poisoning Cookbook