Comodo Group Issues Bogus SSL Certificates

from Schneier on Security by Schneier: This isn’t good: The hacker, whose March 15 attack was traced to an IP address in Iran, compromised a partner account at the respected certificate authority Comodo Group, which he used to request eight SSL certificates for six domains: mail.google.com, www.google.com, login.yahoo.com, login.skype.com, addons.mozilla.org and login.live.com. The certificates would have allowed the attacker to craft fake pages that would have been accepted by browsers as the legitimate websites. The certificates would have been most useful as part of an attack that redirected traffic intended for Skype, Google and Yahoo to a machine under the attacker’s control. Such an attack can range from small-scale Wi-Fi spoofing at a coffee shop all the way to global hijacking of internet routes. ...

April 2, 2011 Â· 2 min Â· 285 words Â· Omid Farhang

Massive SQL injection attack making the rounds—694K URLs so far

Thanks to my friend, Pondus! Ars Technica: Hundreds of thousands of URLs have been compromised—at the time of writing, 694,000 (it’s over millions of site when you are reading this)—in an enormous and indiscriminate SQL injection attack. The attack has modified text stored in databases, with the result that pages served up by the attacked systems include within each page one or more references to a particular JavaScript file. ...

April 1, 2011 Â· 3 min Â· 517 words Â· Omid Farhang

Analysis of TR/Spy.SpyEye

Avira TechBlog: SpyEye is a malware family which we are monitoring for some time. Today we are analyzing a sample which is detected as TR/Spy.SpyEye.flh by Avira products. The Trojan is able to inject code in running processes and can perform the following functions: Capture network traffic Send and receive network packets in order to bypass application firewalls Hide and prevent access to the startup registry entry Hide and prevent access to the binary code Hide the own process on injected processes Steal information from Internet Explorer and Mozilla Firefox A detailed analysis of this malware by Liviu Serban, Virus Researcher at Avira. ...

March 30, 2011 Â· 1 min Â· 120 words Â· Omid Farhang

Installing an Application Using Internet Explorer 9

Google Operation System Blog: I tried to download the latest Chromium build using Internet Explorer 9 and it was one of the most painful downloading experiences. Microsoft tries to protect users from downloading malware and uses a feature called SmartScreen Filter that “checks software downloads against a dynamically updated list of reported malicious software sites”. This feature was available in IE8, but the latest version of IE tried to improve it by analyzing application reputation. ...

March 20, 2011 Â· 3 min Â· 468 words Â· Omid Farhang

A Technical Analysis on the CVE-2011-0609 Adobe Flash Player Vulnerability

Microsoft Malware Protection Center: On March 14, Adobe released a security advisory (APSA11-01) warning of 0-day attacks affecting Adobe Flash Player (versions earlier than and including 10.2.152.33). These attacks were hidden inside Microsoft Excel documents that were used as a vehicle to deliver the exploit. The Adobe Flash file embedded inside the Excel file is another carrier for the exploit. It loads shellcode inside memory, performs heap-spraying, and loads a Flash byte stream from memory to exploit the 0-day vulnerability, which is tracked as CVE-2011-0609. ...

March 17, 2011 Â· 3 min Â· 459 words Â· Omid Farhang

A Mini-Newsletter From Your Google Chrome Security Team

Google Chrome Security Team wrote: We’re always working hard to enhance the Chrome browser with bug fixes, new defenses and new features. The release of Chrome 10 is no different, and there are some items worth highlighting: Chrome 10: Flash sandboxing With Chrome 10, our first cut of the previously announced Flash sandboxing initiative is now enabled by default for the Windows platform on Vista and newer. Additionally, because we automatically update Flash to the latest and most secure version, this should provide useful defense in depth. ...

March 9, 2011 Â· 3 min Â· 432 words Â· Omid Farhang

What's New in Chrome 10?

Google Chrome 10 is ready for primetime and it comes with a surprising number of new features. Here are some of them: The Options dialog is now a web page that opens in a new tab. Chrome has one less modal dialog and the new Options page is better suited for netbooks. Another advantage is that each section of the Options page has a permalink that can be bookmarked. Even if Chrome doesn’t have too many customizable settings, there’s a search box that lets you quickly find an option. Try searching for “cookies” and you’ll notice that Chrome finds settings that aren’t immediately obvious. ...

March 8, 2011 Â· 4 min Â· 762 words Â· Omid Farhang

WordPress hit with second big attack in two days

CNET wrote: The popular blogging-site hoster WordPress was hit with another distributed denial-of-service attack this morning, the second in two days. “Unfortunately, the DDoS attack from yesterday returned in a different form this morning and affected sitewide performance,” the company said in a notice on its Automattic site, which serves as a dashboard for the service. “The good news is that we were able to mitigate it quickly and performance returned to normal around 11:15 UTC. We are continuing to monitor the situation closely.” ...

March 8, 2011 Â· 2 min Â· 226 words Â· Omid Farhang

Taking a look at fake Amazon receipt generators

Sunbelt Blog: Above, you can see a vaguely optimistic VirusTotal user summary in relation to a file that’s been doing the rounds for about a month or two. Here is the file in question: A “receipt generator”, I hear you ask – what do people want with one of those? The answer, of course, is rather straightforward: ...

December 7, 2010 Â· 3 min Â· 552 words Â· Omid Farhang

Twitter Trend Poisoning Cookbook

Symantec Connect: We have become familiar enough with malware creators poisoning popular search engine terms through SEO techniques in order to deliver their malicious files to a greater pool of unsuspecting users. Other popular services such as Twitter have not escaped the watchful eyes of the miscreants. This attack involves pumping out many of the same tweets with different accounts to push them into the Twitter trending list. That way more people are likely to see them even if the individual user accounts being used to send the tweets don’t have that many followers. Incidentally many of the accounts used in this attack don’t have that many followers and are quite fresh – meaning they are probably fake accounts set up specifically for the purpose of spamming tweets. ...

December 7, 2010 Â· 7 min Â· 1475 words Â· Omid Farhang