Sunday, September 30, 2012

Microsoft RDP - Remote Desktop Protocol or Routine Darkside Probe?

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

An article uploaded to Infosec Island the other day got me thinking about RDP, Microsoft's Remote Desktop Protocol.

In the article, Brett Huston, who sells honeypot software, talks about the prevalence of RDP connection attempts seen in his honeynet.

He suggests that the average computer will experience around 50 RDP probes a day - one every half-an-hour - and that the crooks aren't merely looking. If you accept the connection, the guys at the other end will actively try to make use of it.

? A honeypot is a monitored system which aims to attract hackers, seducing them into thinking they've hit paydirt, and thus tricking them into showing their hand, without giving them much - or even anything - of any real value.

Of course, a honeypot only tells you how many people are trying to to connect to what they think is an RDP server, rather than indicating how many actual RDP servers are out there listening directly on the internet. But it's reasonable to assume that regular and systematic attempts to connect imply that there are enough openly-available RDP servers to make it all worthwhile.

With this in mind, I asked my Sydney-based colleague and network security expert Troy Cunningham - who conveniently for me, if not for him, sits within both sight and sound of my desk - what he thought.

Troy runs our free Sophos UTM Home Edition on his own network chez Cunningham, so he kindly offered me the data from his own logs. He'd experienced an average of just under 20 RDP probes per day over the previous month, for a total of 583 connection attempts from 387 different IP numbers in 42 different countries.

That's the level of RDP attention given by the Bad Guys to an Aussie consumer-grade ADSL connection. I can't prove it, but I have to suspect that these figures are at the low end of the scale. In short, if you have a business network, you should expect things to be even worse.

? "Others" include Romania, Iran, Saudi Arabia, Ukraine, Kyrgyzstan, Egypt, Australia and more. These are almost certainly hacked computers used indirectly by the real crooks. That's why security matters: even if you don't think you have anything to protect, you may still end up being part of the problem.

RDP, for those who haven't used it, effectively mirrors the screen and keyboard of a remote system on your local device. Move the mouse in the RDP client, and it moves on the remote system. Pop up a software dialog on the remote system and the screen updates are mirrored on your local desktop. It's almost as good as being right there.

Leaving RDP open to the internet is therefore a little bit like giving a visitor a seat in the corner of your server room and saying, "I'll just leave you here while I go for lunch. Don't touch anything, will you?"

Another reason for hackers to look for RDP servers openly on the internet is that any listening service which lets external, untrusted packets into memory on a potential victim's server can be a handy target for exploits. Microsoft's RDP service has been patched against a couple of high-profile vulnerabilities so far this year, and where exploits are found, crooks are sure to follow.

Don't take risks. If you want to give your techies remote desktop access, let them first connect into your network through a secure VPN tunnel, ideally with two-factor authentication. Then let them RDP from there. Two-factor authentication also raises the bar against stolen or weak passwords.

Follow @duckblog
-

Fancy using the free Sophos UTM Home Edition?

You get web and email filtering, web application security, IPS, VPN and more for up to 50 IP addresses.

Turn that spare PC you have sitting in the corner into a full-on network security appliance!

(Note: registration required.)


View the original article here

How a malicious help file can install a spyware keylogger

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Windows help fileDo you think that Windows help file is safe? Think again.

Malware authors can create boobytrapped .HLP files, designed to infect your computer.

Take for instance, the strange .HLP file which was sent to SophosLabs by some of our customers at the end of August.

The file, Amministrazione.hlp ("Amministrazione" is Italian for "Administration") was an example of how cybercriminals can use social engineering to trick unsuspecting users into infecting their computers.

Details of malicious HLP file

If opened, the help file displays an error message:

Error message from .HLP file

Help could not read the current Help file.
Make sure there are no errors on the disk, or if the file is on a network drive, that the server is active. (163)

In the background, however, a file called Windows Security Center.exe is being dropped onto the computer, which in turn creates a file called RECYCLER.DLL.

Files dropped by malicious HLP file

Since SophosLabs first saw this malware attack we have been writing more generic detections which should help pick up new variants of the attack proactively:

The DLL part of the malware attack is the keylogger. It's partof the DarkShell Trojan that has been tied to GhostNet.

The keylogger component is used to log keystrokes made by the user. These are stored in the following file:

\Documents and Settings\username\Local Settings\Application Data\UserData.dat

(where username is a specific username).

The malware attempts to send this data to images.zyns.com (a domain with a long association with malware).

Stay safe everyone - and remember not to click on .HLP files too readily. They could be harbouring a malware attack.

http://twitter.com/SophosLabs

View the original article here

Saturday, September 29, 2012

MediaFire restores virus researcher’s account, questions copyright troll and DMCA claim

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Score one for the little guy. Or gal in this case.

The cloud-based hosting firm MediaFire has reversed a decision to suspend the account of virus researcher Mila Parkour after Naked Security raised questions about copyright violation complaints made against her by the mysterious firm LeakID.

In an email to Parkour on Friday, MediaFire's director of customer support, Daniel Goebel, said that the company was restoring Parkour’s access to her MediaFire account and apologized for the interruption in service.

MediaFire also said it was asking LeakID, the Paris-based firm that accused Parkour of sharing copyrighted material, to “confirm the status of the counterclaim [Parkour] submitted.” However, the firm is still blocking access to files that LeakID alleged were violating the US Digital Millennium Copyright Act (DMCA), a strict copyright enforcement law in the U.S.

As reported by Naked Security, LeakID flagged three files for what the company considered three copyright violations:

a link to a Microsoft Office patch file related to an August 2011 Contagio blog posttwo encrypted ZIP files containing malicious PDFs used in online phishing scams examined in April and August 2010.

The reversal follows a public protest by Parkour on her Contagio malware blog, a respected resource for virus researchers and security experts.

In his email, Goebel said that the company regretted the inconvenience for Parkour, but that the company had its hands tied.

The circumstances of your case related to a 3rd party notice are unfortunate. Like all online service providers, we are compelled by law to suspend content upon the receipt of a complete DMCA Notice.

Parkour isn’t so sure. Writing on her blog on Friday, she notes that MediaFire took action against her even though LeakID, a Paris-based firm, hadn’t fulfilled key requirements of the DMCA in its request. Namely: the firm failed to identify the copyrighted work that was infringed, or prove that it was authorized to act on behalf of the copyright owner.

Parkour filed a counterclaim with LeakID and said the company has ten days to respond to it. If the company fails to do so, she said that the DMCA claim will be dropped and the blocked files restored. Writing on Friday, she said she suspected that the quick reversal from MediaFire was the result of press attention to the curious copyright claims from Naked Security and other sites.

That prompted a direct response from MediaFire CEO Derek Labian. In it, he said that the company investigates all claims of copyright violations and has a team to handle the claims and counterclaims from customers. Accounts are closed solely on the basis of complaints under DMCA, he said.

He said MediaFire complied with the complaints as stipulated by DMCA and that any mistake, if one was made, was on LeakID’s part.

Labian said Parkour didn’t give MediaFire time to complete its investigation and that he admired the ways in which Parkour was using MediaFire to support her research, according to a copy of the email viewed by Naked Security.

Labian also expressed skepticism about LeakID’s claims, which included a charge of copyright violation for a Microsoft Office patch that Parkour had reposted on her blog.

Labian wrote:

Personally, I find it strange that Microsoft would not want a security patch for one of its products freely distributed to as many users as possible. We think it's more likely at this point that the submissions are inaccurate.

In an email to Naked Security, Parkour said that LeakID’s use of automated scanning and complaint filing tools makes it more likely that those accused will have their accounts suspended. She also suggests many of those targeted don’t go through the hassle of protesting the take down orders.

MediaFire and LeakID did not respond to requests for comment prior to publication.

Parkour’s situation is not unique. In recent weeks, both the Democratic National Convention in the U.S. and the HUGO Awards have had broadcasts blocked by automated copyright scanners.

In March, the Electronic Frontier Foundation (EFF) filed an amicus brief in a similar case, contesting media giant Warner Brothers Entertainment’s use of automated tools to spot copyright infringement.

The brief, filed in a case in U.S. District Court for the Southern District of Florida concerned similar takedown notices affecting users of the hosting firm HotFile.

The EFF said that firms using the automated tools are aware that they make mistakes, and that the firms should be held responsible for denying legitimate users access to their content.

Warner and other firms were undermining DMCA provisions intended to protect internet users from overbroad and indiscriminate take-downs, the EFF argued.

Follow @paulfroberts

Megaphone, copyright symbol and cloud image courtesy of ShutterStock.

Tags: Adobe, Contagio, copyright, DMCA, internet security, LeakID, malicious PDF, malicious software, Malware, Microsoft, Mila Parkour, Patch, PDF


View the original article here

Friday, September 28, 2012

Fingerprint scanner maker cries foul over Russian firm's security warning

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Fingerprint binaryDoes a fingerprint scanner that's widely used on laptops sold by Dell and Sony expose Windows passwords, or not?

The answer is unclear after Authentec, the maker of the biometric scanners refuted claims by the Russian security firm Elcomsoft that its management software contained a dangerous security hole.

Authentec, which makes the widely used UPEK fingerprint scanner, said on Wednesday that it couldn't find any evidence to support the allegation that its software stores Windows passwords insecurely, exposing customers to potential hacking.

In a statement to Naked Security, the Melbourne, Florida security company said that claims by Elcomsoft that its ProtectorSuite management software stored Windows passwords in a "barely obfuscated form" within the Windows registry were "false" and that requests for more information from Moscow-based Elcomsoft have gone unanswered.

In an August 28th blog post titled "UPEK Fingerprint Readers: a Huge Security Hole," Elcomsoft director of Marketing Olga Koksharova described what she said was a dangerous security issue with ProtectorSuite, a Windows application that is used to manage interactions with UPEK finger scanners.

Password picture

The company's researchers "found that... Windows account passwords are stored in Windows registry almost in plain text, barely scrambled but not encrypted. Having physical access to a laptop running UPEK Protector Suite, we could extract passwords to all user accounts with fingerprint-enabled logon."

Authentec acquired the UPEK scanner product with its acquisition of PeerSec Networks in 2010. The hardware enables users to substitute a biometric scan of their fingerprint for a Windows login.

With physical access to a laptop running ProtectorSuite, Koksharova said, "we could extract passwords to all user accounts with fingerprint-enabled logon."

While knowing the Windows passwords associated with a finger scanner-enabled account doesn't allow an attacker to circumvent the scanned login, they could allow an attacker with access to the hard drive to view even encrypted content on that drive, Koksharova warned.

The post provided few details, and Koksharova saying that Elcomsoft is withholding details of the vulnerability "in the interests of public responsibility."

But Brent Dietz, the Director of Corporate Communications at Authentec, said that his company can’t find any evidence to support those claims, and that conversations with Koksharova suggest that Elcomsoft's warning may be overblown.

"Olga could only say the following : 'It was an old version of ProtectorSuite tested over half a year ago that held account passwords protected with fingerprint protection in the registry.' The problem as far as I know is fixed in recent updates," Dietz wrote to Naked Security in an email.

Elcomsoft has not provided any more details to Authentec, but the company says that it will do a "thorough analysis on anything we may receive from Olga or the Elcomsoft team."

Fingerprint scan. Image from ShutterstockDietz said that ProtectorSuite uses AES encryption to protect stored passwords and that the company would never leave passwords in an unencrypted state in its software – past or present. Should the company find evidence to support Elcomsoft's claims, it will push a patch to customers immediately, Dietz wrote.

If Elcomsoft's claims hold up, it could pose a serious problem for organizations that rely on the fingerprint scanners for access to laptop and desktop systems. The UPEK scanners and Protector Suite software are sold to a long list of PC makers, so the damage of any hardware or software vulnerability isn’t limited to a particular hardware maker.

Elcomsoft, based in Moscow, Russia, makes a range of enterprise security products including a wireless security auditor, password recovery tool and a forensic toolkit for devices running Apple’s iOS software.

The company has been a gadfly to prominent firms before.

Notably it revealed tools for cracking passwords on both RIM Blackberry and iPhone devices. In 2001, it was also party to a high profile criminal case, brought by the U.S. Department of Justice, that alleged the company and its employees violated the U.S. Digital Millennium Copyright Act when it produced software that cracked Adobe Systems' e-book file format.

An Elcomsoft employee and Russian citizen, Dmitry Sklyarov, was arrested and detained in the U.S. in that case – which was controversial because creation of the tool in Russia was not a crime.

Follow @paulfroberts

Fingerpint scanning image from Shutterstock.

Tags: Adobe, application security, Authentec, biometrics, Brad Dietz, Elcomsoft, fingerprint reader, Florida, hacking, Moscow, password, russia, scanner, Sklyarov, software, UPEK, vulnerability


View the original article here

Thursday, September 27, 2012

Is Opera *really* the safest browser?

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

An online poll conducted on the Naked Security site has come up with an interesting finding: Opera, a relative minnow in the web browser market, is reckoned to be a more secure browser than the likes of Google Chrome, Mozilla Firefox and Internet Explorer.


Poll results, Thursday noon. Click to vote for your favourite

We were interested in discovering which browser our readers would recommend to friends or family who had suffered a computer security problem.

The poll opened on the morning of Monday 3rd September, and saw Chrome and Firefox take an early lead with Internet Explorer, Safari and Opera lagging far far behind.

Everything changed yesterday, however, as Opera surged in its share of the vote. The Norwegian browser - which had earlier only been receiving less than two votes every hour suddenly was receiving five votes every minute!

Impressive for a browser which has a much smaller marketshare than the big players.

Voting. Click for larger version

So, what happened? Had thousands of people suddenly woken up to the realisation that Opera *was* their favourite browser, and that they should vote for it instead of Chrome or Firefox?

Well, we did a little digging around and found that Opera's marketing department wasn't resting on its laurels.

The guys and gals at Opera tweeted and posted on Facebook, inviting their fans to participate in the poll.

Opera tweet. Click for larger version

Opera has some 1.7 million fans on Facebook, so it's really no surprise to see some of them vote for their browser of choice. And sure enough, straight after Opera publicised the poll via social media, the votes for Opera began to flood in.

Opera votes surge. Click for larger version

As of midday in the UK, Opera had raced into the lead.

We don't actually mind that Opera publicised our browser poll - after all, we didn't say that vendors were bound from rallying their supporters. If anything, Opera's marketroids have shown some admirable velocity in encouraging their fans to take part.

But we do suspect that our (admittedly unscientific) poll may have been skewed somewhat by this spike in Opera-loving votes. (Interestingly, there was also a synchronous rise in votes for Opera's rivals - presumably from those who follow Opera on social networks, but aren't necessarily diehard fans).

So, come on Firefox lovers and those of you who think Chrome is the greatest thing since Netscape Navigator - what are you waiting for? There's still time to cast your vote!

And is there really no-one who has a good word to say about Internet Explorer?

Internet Explorer's poor showing

If you have an explanation for IE's poor showing, or think Opera is right to be considered the safest browser, or have any other opinions on the survey - why not leave a comment below?

Follow @gcluley

Thanks to Sara Warner for helping crunch the data, necessary to write this article.


View the original article here

Wednesday, September 26, 2012

Monday review: the hot 20 stories of the week

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

In case you missed any of these stories, here's everything we wrote in the last seven days:

Polls

Which web browser do you recommend? [POLL]

Do you have a special email address for websites that might send you spam? [POLL]

Apache Foundation creates firestorm over user privacy choices [POLL]

Malware and vulnerabilities

Free-press organisations targeted in malware attack

Google releases Chrome 21, shells out $3,500 for security holes

Attacks on Java security hole hidden in bogus Microsoft Services Agreement email

Cloud storage firm flags malware as "Copyrighted Material," boots security researcher

Microsoft RDP - Remote Desktop Protocol or Routine Darkside Probe?

Fingerprint scanner maker cries foul over Russian firm's security warning

Warbiking in London - insecure WiFi hotspots exposed [VIDEO]

Privacy

Honeypot reveals mass surveillance of BitTorrent downloaders

RoMOS - Russia rolls its own secure tablet because it doesn't trust Google Android

Is Opera *really* the safest browser?

Data loss

Romney tax returns allegedly hacked, supposedly held for $1 million ransom

Bitcoin exchange floored in virtual bank robbery - $250,000 stolen in security lapse

12 million iPhone and iPad device IDs hacked from the FBI, Anonymous claims

FBI hits back at Anonymous - your claims are TOTALLY FALSE

Spam

Watch this - the funniest spam video you'll ever see [VIDEO]

Law and order

Child abuse photo collector forgets to encrypt his USB stick - Bad security is a good thing

Podcast

SSCC 97 - Black Hat and DEF CON review, broken crypto, Frak, smart meters and hacking transit

Follow @NakedSecurity

Days of the week image from Shutterstock.

Tags: Android, anonymous, Apache, bitcoin, BitTorrent, chrome, cloud, DNT, Elcomsoft, FBI, Firefox, Java, monday, monday review, opera, Podcast, poll, RDP, romney, russia, Video, wifi


View the original article here

Tuesday, September 25, 2012

SSCC 97 - Black Hat and DEF CON review, broken crypto, Frak, smart meters and hacking transit

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Sophos Security Chet Chat logoThis Chet Chat is the last one from our summer hiatus and features Peter Szabo and I discussing a few more of our favorite talks from Black Hat and DEF CON 2012.

I started our discussion with Moxie Marlinspike and David Hulton's talk "Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2". They explained some of the mistakes Microsoft engineers made in their implementation of MS-CHAPv2 a common authentication protocol used for VPNs and WiFi access points.

Because of these flaws, the cryptographic strength is somewhere in the neighborhood of 56 bits. This allowed Marlinspike and Hulton to launch a service using general purpose FPGAs that can crack any key in 24 hours or less for approximately $200.

Peter went to a talk on reverse engineering firmware titled "Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole". The tool is not yet available, but will be released allowing anyone to peer inside of firmware blobs for printers, routers, phones or any other flashable device.

I attended a very sensible talk about smart meter security called "Looking Into The Eye Of The Meter" in reference to the infrared "eye" that can be used to talk to this latest generation of meters.

SecureState have released a toolkit to assist others in performing vulnerability assessments of meter infrastructure.

Pete wrapped up by sharing the entertaining talk he attended on hacking public transit systems called "How to Hack All the Transport Networks of a Country". The presenter explored all the different ways that technical skills and social engineering can be combined to manipulate any large, complicated system.

(10 August 2012, duration 14:34 minutes, size 8.4 MBytes)

You can also download this podcast directly in MP3 format: Sophos Security Chet Chat 97, subscribe on iTunes or our RSS feed. You can see all of the Sophos Podcasts by visiting our archive.

http://twitter.com/chetwisniewski

View the original article here

Monday, September 24, 2012

Android SMS malware firm fined £50,000 and ordered to refund victims

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Mobile phone money. Image from ShutterstockBack in February, a SophosLabs researcher Vanja Svajcer discussed how he had discovered a malicious link on Facebook that led to malware being downloaded onto his Android smartphone.

Svajcer analysed the malware, adding detection for it as Andr/Opfake-C, and discovered that while posing as a conduit to popular games, it was coded to send an SMS message which subscribed the phone to an expensive premium rate service.

He even made a very short video of the malware automatically downloading to his Android phone.

(Enjoy this video? Check out more on the SophosLabs YouTube channel.)

Normally, the story stops there. We find malware, we stop malware. The end.

But this time, there's more to report.

Spurred by Naked Security's report of the malware, and complaints from the public, PhonepayPlus - the regulatory body for all premium rate phone-paid services in the United Kingdom - investigated who was hiding behind the phone numbers.

PhonepayPlus also confirmed the app's behaviour:

The Service, which was accessed via downloading an app (the "App"), enabled users to access popular games. Before installation of the App, consumers were presented with a screen titled "Downloader" (Appendix A). On selecting "install" the consumer was presented with a screen which stated, "Do you agree with the rules of downloading" and had two buttons, one marked “OK” and a second marked "Rules" (Appendix B).

Where a consumer selected "OK", a text message was sent to shortcode 80079, which prompted the Service to charge the user £10 by automatically sending a message from shortcode 79555 to the handset. Where a consumer selected "Rules", s/he was presented with eight pages of terms and conditions (Appendix C). Pricing information for UK users was located on the sixth page.

Consumers were given the opportunity to select buttons marked "Agree" or "Disagree". Where "Agree" was selected, a text message was sent to shortcode 80079, which prompted the Service to charge the user £10 by automatically sending a message from shortcode 79555 to the handset. The Executive took the view that consumers were not notified in advance of the charges.

After being charged, the consumer was redirected to the 7mobi.net "GamePortal", where s/he could play popular games.

Android app

PhonepayPlus discovered that the premium rate numbers used by the malware belonged to Moscow-based firm ??? ???????? (translated as Connect Ltd trading as SMSBill), and adjudicated that the company had made "very serious" breaches of the PhonepayPlus Code of Practice.

For one thing, the app's small print (hidden away on the 6th page of the terms and conditions) claimed that charges of "about 5 GBP" were applicable. And yet, the true charge was £10.

Anyone who did go to the effort of reading the T&Cs would not only be told that the fee was less than it actually was, but would also be assured that they would be notified before incurring any charges (they weren't).

PhonepayPlus said that the service provided by the Android app "had the sole purpose of generating high revenue and did so through recklessly misleading promotion and design."

Connect Ltd was also criticised for appearing "to have no regard to the Code and/or Guidance", and failure to co-operate with the investigation in a prompt or adequate manner.

In total, consumers are said to have spent some £100,000 - £250,000 on the service, although it is unclear how much revenue Connect Ltd themselves made.

Old phonePhonepayPlus has ordered Connect Ltd to pay a fine of £50,000 and refund - within three months - all consumers who used the service, whether or not they have claimed a refund.

Additionally, for the next two years Connect Ltd will have to receive prior permission from PhonepayPlus for any premium rate services it attempts to offer in the UK.

Some might wonder if Moscow-based Connect Ltd might be tempted to ignore the penalties imposed on it from the UK, but PhonepayPlus spokesman James McLarin was bullish.

McLarin told Naked Security that PhonepayPlus expects the fines to be paid and that the refund will take place:

"If our sanctions are not met we do have the power to bring a breach of sanction case, where the tribunal can impose tough penalties."

The sending of expensive SMS messages is one of the most common ways in which smartphone malware attempts to earn revenue from its victims.

Always be careful about what apps you install, and - in the case of Android apps - be sure to check that you are happy with the permissions the app requests at installation.

If you haven't already done so, you may consider installing Sophos's free anti-virus for Android to detect Opfake-C and other Android malware.

Follow @gcluley

Phone with money image from Shutterstock.


View the original article here

Sunday, September 23, 2012

Attacks on Java security hole hidden in bogus Microsoft Services Agreement email

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Globe. Image from ShutterstockOnline scammers are using a recent email from Microsoft as bait in a widespread spam campaign that exploits vulnerabilities in Oracle’s Java software to install malicious programs on vulnerable systems.

Experts at The SANS Institute's Internet Storm Center warned on Saturday that operators there received multiple reports of a spam campaign that uses a recent Microsoft email regarding changes to its Services Agreement for products such as Hotmail and Skydrive to fool users.

The attacks have prompted renewed calls for internet users to disable Java on their systems pending a new update from Oracle Corp. to fix critical, remotely exploitable vulnerabilities in the ubiquitous web technology.

According to SANS, the malicious email is based on an August 27 communication from Microsoft titled "Important Changes to Microsoft Services Agreement and Communication Preferences."

The phishing email replaces links in the original messages with malicious links that send unwitting readers to websites that install a new variant of the Zeus malware, ISC handler Russ McRee warned in a post on September 1st.

The actual Microsoft message, dated August 27, can be viewed here.

It details changes in the terms of a services agreement for users of a wide range of products, including Hotmail, Windows Live Messenger, Microsoft Photo Gallery and SkyDrive, the company’s hosted storage offering.

Blackhole, courtesy of ShutterstockThe malicious websites in question are running the latest versions of the Blackhole Exploit Kit, a kind of Swiss Army Knife for compromising vulnerable computers.

The Blackhole Exploit Kit is capable of analyzing the configuration and software installed on machines visiting web sites on which the exploit kit is installed, and then serve up just exploits that are likely to work against the intended target.

The recent addition of exploit code for the Java vulnerability has more than doubled the success rate of Blackhole exploits, compromising tens of thousands of new systems, according to data from the security firm Seculert.

This isn't the first phishing email that has been linked to attacks on the Java vulnerability. Last week, experts at SophosLabs discovered malicious emails purporting to including information on a tax rate increase that contained links to websites exploiting the Java hole.

Database giant Oracle acquired Java when it bought Sun Microsystems in 2009 and has faced criticism from security experts for failing to respond quickly to security vulnerabilities in the ubiquitous web technology before.

The latest security holes haven’t improved the company's image. It was forced to rush out a patch for the Java security hole last week and received withering criticism after the polish security consultancy Security Explorations disclosed that it reported the critical security hole to Oracle in April, four months earlier.

The company's image was further damaged when the patch Oracle released to fix the flaw failed to fully close the security hole. Security Explorations said that it informed Oracle on Friday that systems running the patched Java 7 Version 7 could be circumvented in a similar manner to earlier versions, allowing for "complete Java sandbox bypass."

Oracle has confirmed receipt of that report and is investigating, Security Explorations said.

In the meantime, ISC and others are advising users to disable Java until the next update is ready.

For those who want to keep Java running, SANS ISC said that email recipients should scrutinize the hyperlinks in any email messages by hovering their mouse cursor over the link prior to clicking on it and by inspecting email headers for suspicious messages.

Sophos experts Paul Ducklin and Chet Wisniewski offer more easy-to-understand advice about Java in the latest Techknow podcast: "All about Java".

Follow @paulfroberts

Blackhole and Globe image, courtesy of Shutterstock

Tags: BlackHole, Blackhole exploit kit, Internet Storm Center, ISC, Java, Malware, Microsoft, Microsoft Services Agreement, SANS, Spam, vulnerability


View the original article here

Saturday, September 22, 2012

Child abuse photo collector forgets to encrypt his USB stick - Bad security is a good thing

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

USB stick. Image from ShutterstockSometimes some good can come from poor computer security.

The Burton Mail reports that a 46-year-old British man was found guilty of downloading indecent images of children after he accidentally shared his USB memory stick with a work colleague.

According to reports, Nicholas Hill, of Belvoir Crescent, Newhall, handed a memory stick to a female colleague in order to get a recording of a TV programme, but as soon as his workmate plugged the USB drive into her computer she was shocked to be presented with an array of indecent photos.

Clearly, Hill had not encrypted the data on his USB flash drive.

When police were called they found "279 images in the mildest category and six which were slightly more serious" contained on the memory stick.

Hill's defence team said that he had been collecting such images for a number of years, and told a hearing at Derby Magistrates' Court that their client deeply regretted committing the offence, and was previously a "man of good character".

Presiding magistrate Jill Steiner put Hill on probation for three years, and ordered him to attend a community sex offenders' group work programme. If Hill buys computer equipment in future, he must allow it to be inspected by police officers - although he has said that he will access the net only from a public library in future.

Aside from serving probation, Hill has also been ordered to pay £85 costs. As he is currently between jobs, it was has been agreed that he can pay the fine in monthly installments.

Being a consumer of child abuse imagery only encourages others to supply more, and ultimately abuse the young innocent victims. Hopefully Hill will rebuild his life, and not engage in child abuse material again.

If that's the case then some small good will have come out of poor security.

Follow @gcluley

USB flash memory drive image from Shutterstock.


View the original article here

Friday, September 21, 2012

12 million iPhone and iPad device IDs hacked from the FBI, Anonymous claims

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Hackers have published a collection of what they say is over a million Unique Device Identifiers (UDID), connected with Apple iPhones and iPads.

Headline used by hackers in their posting

The data, claims the hackers, is just part of a larger database of 12,367,232 UDIDs, and personal information such as full names, cellphone numbers, addresses and zipcodes belonging to Apple customers. The data was allegedly stolen via a Java vulnerability from a laptop belonging to an FBI cybersecurity agent:

"During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of ”NCFTA_iOS_devices_intel.csv” turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted on many parts. no other file on the same folder makes mention about this list or its purpose."

Quite why the FBI was collecting the UDIDs and personal information of millions of iPhone and iPad users is not yet clear - but it's obvious that the data (and the computer it was apparently stored on) was not adequately secured.

iPhone

I suppose we should be pleased that the hackers have not, as yet, published the majority of the information they claim to have purloined from the FBI though the hack - including the personal information about members of the public.

As such, my suspicion is that the hackers were more interested in embarrassing the FBI's team than endangering innocent users.

All the same, hacking into computers is a criminal act - and I would anticipate that the FBI and other law enforcement agencies will be keen to hunt down those responsible.

Mitt Romney, journalists wearing tutus, and a shoe on head

If it helps cut down the number of suspects at all, here's a clue to help the FBI with their investigation.

Attached to the end of the hackers' announcement is the following phrase in German:

"Romney aber, sag's ihm, er kann mich im Arsche lecken!"

This translates into English as:

"Romney, however, tell him he can kiss the asses!"

Clearly not a fan of the Republican party then..

Adrian Chen. Image from TwitterAnd someone else that the hackers aren't huge fans of is Gawker journalist Adrian Chen.

Chen has become something of a bĂȘte noire for the likes of 4Chan and Anonymous.

Whoever was responsible for the latest hack says that they will only agree to speak to the press if a photo of Chen, dressed as a ballerina with a shoe on his head, is published on the main page of Gawker.

Hackers demand Chen wears a tutu

The whole "shoe on the head" thing is a 4Chan meme - victims are told they have to take a photograph of themselves wearing a shoe on their head for the amusement of hackers.

Whatever tickles your fancy I suppose..

Follow @gcluley

Tags: Adrian Chen, anonymous, antisec, Apple, Christopher Stangl, FBI, hacking, iPad, iPhone, Java, LulzSec, UDID, vulnerability


View the original article here

Phishing without a webpage - researcher reveals how a link *itself* can be malicious

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

The need for a reliable place to host your malicious website has been the bane of phishers for much of the last decade.

But, no longer.

Web browser, courtesy of ShutterstockA researcher at the University of Oslo in Norway says that page-less phishing and other untraceable attacks may be possible, using a tried and true internet communications standard: the uniform resource identifier, or URI.

Henning Klevjer, an information security student at the University of Oslo in Norway, suggests in a just-released research paper that it may be possible for attackers to dispense with phishing sites altogether, embedding their entire scam webpage in an encoded data URI that can be passed around from victim to victim.

URIs are strings of characters that identify a resource. The term encompasses the better-known Uniform Resource Locator (URL) and uniform resource name (URN). However, whereas URLs specify the location of a specific network resource and how it should be accessed (i.e. with HTTP, HyperText Transfer Protocol), URIs are more flexible and can even be used to host the data they “link” to.

Klevjer's paper, "Phishing by data URI" [PDF], suggests ways that the malleability of the URI could be used to mask malicious content.

For example, an attacker could create a stand-alone phishing webpage using images and content pinched from a legitimate site, then embedded in the external document. They could then encode the page’s content in Base64 to mask its meaning to the intended victim, and then append the encoded page into a data URI.

The encoded URI will be long and forbidding looking, but assuming it doesn’t exceed the maximum URL length of a browser, it can be rendered. And, Klevjer’s paper points out, the widespread use of URL shortening services makes it easy for the attacker to mask the hefty URL and circulate it to victims via social networks like Twitter and Facebook, or via e-mail and IM.

In his paper, Klevjer was able to shrink a 24,682 character URI representing a Wikipedia login “phishing” page to just 26 characters using a URL shortening service.

Fake Wikipedia page

The intention is that victims who receive the link will click on it, launching their web browser. Every modern browser supports the legacy URI scheme and will render the encoded URI as a page in the victim's browser.

The URI-attack method isn’t new. In 2007, researchers Billy "BK" Rios and Nathan McFeters explored similar attacks against Microsoft’s IE6 and IE7 browsers that exploited both documented and undocumented functionality for handling URIs.

The use of URIs creates the possibility that sophisticated attackers could begin circulating individualized phishing pages to small numbers of victims.

It also defeats traditional defenses against phishing attacks, such as web filtering and reputation management, because victims wouldn’t need to communicate out to an attack server to get phished, Klevjer argues.

And the method isn't limited to phishing attacks. Klevjer wrote in an email to Naked Security that fellow Norwegian security researcher Per Thorsheim had pointed out that a data URI could also contain a (compromised) Java applet - worth bearing in mind considering the scare this week about Java zero-day vulnerabilities.

Writing on the SANS blog, Johannes Ullrich points out that attackers would still need to manage some backend infrastructure to receive data stolen in the attack.

Goldfish in bowl, courtesy of ShutterstockHowever, he says that sophisticated attackers could also sneak the phished data out using a specially-crafted DNS request that would transfer the sniffed login credentials to the log file of a remote system.

Klevjer said the URI attack method could gain adherents among sophisticated attackers who are looking for a way around traffic and reputation monitoring and filtering systems. He said it also raises important questions about who “owns” the malicious data used in a URI based attack.

If URL shorteners are used, for example, the malicious content is now located within a link. Kelvjer told Naked Security:

“This fact transfers liability to the URL shortening services hosting the redirection”

There are caveats, of course. Klevjer points out that Google’s Chrome browser blocks redirection to data URIs, whereas other browsers have set ceilings on the amount of data that can be packed into a URI or URL. IE9 refused to load his sample attack page, which weighed in at 26KB.

Still, both the Firefox and Opera browsers did.

Follow @paulfroberts

Goldfish in bowl and web browser images, courtesy of Shutterstock


View the original article here

Thursday, September 20, 2012

Monday review: the hot 27 stories of last week

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

It's Monday review time - here's a little recap, in case you missed any of our stories last week:

Java flaw

Unpatched Java exploit spreads like wildfire

Java flaws already included in Blackhole exploit kit, Oracle was informed of vulnerabilities in April

Zero-day Java flaw exploited in targeted tax email malware attack

How to turn off Java on your browser - and why you should do it now

Oracle releases out of cycle fixes for Java

Sophos Techknow - All about Java [PODCAST]

Malware and vulnerabilities

FLAMING RETORT: Frankenstein Malware - the future of cyberwar, or just a catchy headline?

Oil giant Saudi Aramco back online after 30,000 workstations hit by malware

Android malware authors take a crack at the Japanese market

DDoS attack stymies vote in Miss Hong Kong beauty contest

Firefox 15 released: Seven critical vulnerabilities patched and stealthy updates too!

Reveton/FBI ransomware - exposed, explained and eliminated [VIDEO]

Phishing without a webpage - researcher reveals how a link *itself* can be malicious

Privacy and social networks

Facebook friend added a new photo of you? Beware spammed-out malware attack

Spammers flood Facebook's own Help Center

Dropbox two-factor authentication available to early adopters

Facebook given one week to stop breaching privacy laws

Facebook troll outed as policeman

Facebook glitch lets spear phishers impersonate users' friends and family

Law and order

Woman gets 2.5 years in prison for managing ATM-sucking gang of fraudsters

What is the TPP, and why should you care?

Suspected LulzSec member arrested by FBI for Sony Pictures hack

Times reporter arrested over NightJack blogger email hack

Android SMS malware firm fined £50,000 and ordered to refund victims

Data loss

Toyota says it was hacked by ex-IT contractor, sensitive information stolen

Cancer Care Group leaves unencrypted server backups in car, loses data on 55,000 patients and staff

Guild Wars 2 accounts shuttered due to gold-seller hacking and idiocy

Follow @NakedSecurity

Days of the week image from Shutterstock.

Tags: Android, dropbox, Facebook, FBI, Firefox 15, Frankenstein malware, Java, Java Exploit, Java flaw, LulzSec, reveton, TPP, troll


View the original article here

Google releases Chrome 21, shells out $3,500 for security holes

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Google Chrome 21The folks at the Googleplex have released the newest update to the Chrome browser. The new version, 21, fixes three high priority security issues in the popular web browser, Google disclosed on Friday.

Google paid $3,500 to three separate independent security researchers for information on security holes in the product. Fixes for those holes were rolled into the new version of Chrome for Windows, Mac and Linux, officially labeled 21.0.1180.89, according to a post on the Google Chrome Releases blog by Karen Grunberg of Google's Chrome team.

The patched holes include three rated "High."

The first, CVE-2012-2866, fixes a problem in which Chrome failed to properly perform a cast of an unspecified variable during handling of run-in elements. If left unpatched, it could allow attackers to cause a denial of service (or worse) on a vulnerable Chrome instance using a specially-crafted document.

The second security hole rated "high," fixes a fault, CVE-2012-2869, in which Chrome improperly loaded URLs which could allow remote attackers to create a denial of service or, possibly, take additional actions on a vulnerable system.

The third vulnerability with a "high" rating, CVE-2012-2871, fixes a problem with libxml2 2.9.0-rc1 and earlier, a standard Google Chrome component. Earlier versions of that library don’t properly support a cast of an unspecified variable during XSL transforms – a process in which webpage style sheets are rendered when a page is loaded.

The vulnerability could allow a remote attacker to cause a denial of service attack or take other actions on vulnerable systems using a specially crafted document, Google warned.

Google is one of two major browser makers, with The Mozilla Foundation, that pays independent researchers for information about security holes in its products. The company has been a leader in promoting scrutiny of its platform. In August, Google announced Pwnium 2, the second annual contest that invites top hackers to take a crack at Chrome in exchange for cash prizes.

The first, held in March, awarded $60,000 in prize money to two researchers who created sophisticated, successful attacks against Chrome.

The announcement from Mountain View-based Google follows a similar announcement last week from The Mozilla Foundation, which released an update to its Firefox web browser, Firefox 15, that fixed 16 security holes and a large numbers of stability and memory management problems.

Follow @paulfroberts

View the original article here

Tuesday, September 18, 2012

Sophos Techknow - All about Java

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Welcome to another episode of Techknow, the podcast in which Sophos experts debate, explore and explain the often baffling world of computer security.

In this episode, entitled All about Java, Paul Ducklin and Chester Wisniewski dig into the what, the how, and most importantly the why, of the popular programming language that dominated security headlines in August 2012 for all the wrong reasons.

Java brings with it some significant risks, yet for many people, it's "just there on my computer." And the reason it's there is, "It's always been there. And you need it for lots of websites, don't you?"

Even in the business world, many organisations never quite seem to have got around to asking where, or even if, Java is needed on corporate assets such as laptops and servers.

In this quarter-hour podcast, Duck and Chet tell you All about Java (did you know it was originally named after a tree?), and help you to make an informed decision in balancing its risks and rewards.

Listen now:

(31 August 2012, duration 16'19", size 11MBytes)

Listen later:

Download Techknow podcast

Follow @duckblog
-

Tags: drive-by, drive-by download, Exploit, Java, JavaScript, Linux, Malware, oak, Oracle, osx, solaris, Sun, techknow, vulnerability


View the original article here

Sunday, September 16, 2012

Which web browser do you recommend? [POLL]

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

BrowsersThe browser wars are here - with big players like Google Chrome, Microsoft Internet Explorer and Mozilla Firefox fighting tooth-and-nail for marketshare.

The good news is that users are benefiting from the fight, with vendors using new security features as differentiators in an attempt to make you switch your browser.

And there's good reason for you to be pleased that browsers are tackling security problems, as so much of today's malware is delivered via the web, or has a web-based component.

So, here's the question - if one of your friends or family had suffered a computer security problem, what browser would you recommend that they use? What's your preferred browser security-wise?

And don't just make your vote - tell us why you made your choice by leaving a comment below.

Thanks for sharing your point of view!

http://twitter.com/gcluley

View the original article here

Facebook glitch lets spear phishers impersonate users' friends and family

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Spear fishing. Image from ShutterstockFacebook, blaming a "temporary misconfiguration," accidentally let spear phishers vacuum up users' personal details so they could pose as friends and family and thus make their come-ons convincing, the company told Forbes on Wednesday.

Forbes staffer David M. Ewalt was alerted to the threat when he himself received two targeted spam messages in the preceding week, both sent to a personal email address registered with his Facebook account.

Both emails appeared to come from someone he interacts with on Facebook. The sender personalized the subject line with the text "for David."

When Ewalt checked the messages' header fields (here are instructions on how to do that), he saw his friend's name in the "From" field, but the originating address wasn't their typical account; instead, it was "a bogus-looking Yahoo! Philippines email," he wrote.

He quickly found that others had reported similar spear phishing Facebook emails, all received in the past few weeks.

Facebook told Forbes that it has discovered what it called a "single, isolated campaign that was using compromised email accounts to gain information scraped from Friend Lists due to a temporary misconfiguration on our site."

The social network said it's since enhanced its scraping protections to protect against such attacks and will continue to investigate, but that there's been neither a mass compromise of Facebook accounts nor any leak of private information.

According to Ewalt, the spear-phishing emails pose as messages from close friends or family members, address the intended victim by name in the subject line or body of the message, and include a link to a website controlled by the spammers, all meant to exploit people's tendencies to click on strange links if they come from those whom they trust.

So, has Facebook now fixed the problem? Perhaps not judging by this tweet from Reuters reporter Joseph Menn:

While Facebook tries to get to the bottom of the problem, here are its recommendations on the steps users should take to protect their accounts:

Review your security settings and consider enabling login notifications.Don’t click on strange links, even if they’re from friends, and notify the person if you see something suspicious. How do you determine if a link is "strange"? Hover over a link without clicking on it. You'll see the full URL of the link's true destination in a lower corner of your browser. Don't use the links in an email, instant message, or chat to get to any web page if you suspect the message might not be authentic or you don't trust the sender. Instead, navigate to the website directly.Be suspicious of any email with urgent requests for login or financial information, and remember, unless the email is digitally signed, you can't be sure it wasn't forged or spoofed.Don’t accept friend requests from unknown parties.If you come across a scam, report it so that it can be taken down. Facebook earlier in the month introduced a dedicated email address for reporting phishing scams: phish@fb.com. Don’t download any applications you aren’t certain about.When accessing Facebook from places like hotels and airports, text "otp" to 32665 to receive a one-time password to your account.Visit Facebook’s security page and read the items "Take Action" and "Threats".

And on a related note, how do we verify whether email addresses are fake? Well, you could alway ping it.

Tech blogger Amit Agarwal wrote up instructions on how to ping an email address to determine if it was real of fake.

Or you could plug the questionable email address into this nifty little email verifier I came across.

It seems to work. Therefore, I'm sorry to report, NehemiahHesters@lisavaas.com, that you don't exist, so I guess I can't "Buy Ciails and Viarga online," which is a shame, since they sound like new drugs, tropical resorts, or a combination of both - the last of which strikes me as genius.

Follow @LisaVaas

Spear fishing image from Shutterstock.


View the original article here

Saturday, September 15, 2012

Security tip: Before being interviewed on TV, wipe passwords off whiteboard

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Filed Under: Featured, Privacy

The following screenshot is from a broadcast on TVP (Polish television).

Spot anything interesting?

Still from Polish TV show. Click for larger version

No?

Let's take a closer look..

Closeup of screenshot, showing password

If you haven't already guessed, Haslo is the Polish for "Password".

As we have explained before, if a TV crew is visting your office it may be sensible to remove any passwords which could appear in the background.

In fact, maybe it makes sense not to have these passwords on show regardless of whether someone is pointing a video camera around the place or not.

Just saying..

http://twitter.com/gcluley

Hat-tip: @mikko.


View the original article here

Friday, September 14, 2012

Sophos sucks? Being insulted by malware authors can be the best reward

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Sometimes things can get a little personal between those who write malware, and those whose job it is to protect against it.

Loser sign, blowing raspberries. Image from Shutterstock

Researchers, such as those who work at SophosLabs, may devote significant effort into probing a specific attack, kit or family of malware. Typically the knowledge they acquire is used in writing generic detections such that customers are protected from that threat.

And detection is the last thing the attacker wants. After all, detection means no profit.

So ensues the cat-and-mouse game between the attacker and the researchers, where polymorphism is the attacker's weapon of choice (used in order to evade detection).

Perhaps the most rewarding thing about working for a security company is to think about our efforts thwarting attacks. Sometimes, we see evidence of this in the attacker's behaviour - they may completely switch tactics, effectively accepting defeat in their battle against our protection.

Occasionally we annoy them to such an extent that they vent their anger within the malware itself!

For example, our generic detection on the landing page for a popular exploit kit annoyed the authors to such an extent that, earlier in the year, they temporarily renamed the filename of their landing page.

How charming.

Similar expressions of annoyance have been seen on some scareware (fake anti-virus) landing pages. Search engine optimisation (SEO) is being used to redirect users to these pages, where they are tricked into installing scareware.

The landing page mimics a system scan, using simple JavaScript to fake the file scanning progress. Historically, the filenames used have been embedded within the script as a simple array.

Then, presumably frustrated by our Mal/FakeAvJs-A detection, the attackers split the array up, using "interesting" variable names:

Sometimes, reversed :)

Sometimes, they like to hide the message a little :)

This week I noticed that they have now started to obfuscate that part of the script, using a common, commercial obfuscation tool:

Sigh. Mal/FakeAvJs-A remains.

Messages like this from attackers are encouraging. We should take them as a compliment. It is nice to know that we're having an impact disrupting their criminal business.

Follow @SophosLabs

Man making 'loser' sign, blowing raspberry image from Shutterstock.


View the original article here

Thursday, September 13, 2012

'Assange to be ARRESTED' - British police in document dissemination gaffe

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Already using Google+? Find us on Google+ for the latest security news.

Look out!

Hot on the oh-dear-that-wasn't-supposed-to-happen heels of the organisation which allowed a password-and-a-half to be broadcast on Polish TV...come the British police.

A uniformed police officer at a recent Assange-oriented press briefing fell under the lens of a Press Association snapper. The officer was carrying a clipboard, and zooming in on the paper under the clip revealed a meaningful snippet of what looks like the hapless copper's dutifully-taken meeting notes.

Under the pre-printed headings RESTRICTED - DECISIONS is a half-page of handwritten text partly obscured by the officer's arm; two separate pictures allow the first two sentences to be reconstructed in their entirety, as shown below:

The revelations in the leaked text are hardly surprising: Assange is to be arrested if he leaves the embassy. ARRESTED. Who would have thought?

But the nature of the leak - old-fashioned handwriting captured and disseminated digitally - ought to be a reminder to us all.

In the words of our very own IT Security DOs and DON'Ts guide, which features ten handy poster-sized tips you can print and pin up around the office:

Don't leave printouts containing private information on your desk. Lock them in a drawer or shred them. It's very easy for a visitor to glance down at your desk and see sensitive documents.

Keep your desk tidy and documents locked away. It makes the office look more organized, and reduces the risk of information leaks.

Remember: you don't need to parade your confidential stuff in front of a press photographer for it to be at risk of getting snapped up. Nokia's latest mobile phone, for example - and this is a phone, remember! - sports a 41 megapixel camera. (You read that correctly. Forty-one.)

Any documents lying anywhere in your office are an easily-accessible target for visitors, cleaners and passers-by.

(The Sophos IT Security Toolkit is a free download. No sign-up, no registration, no email address required.)

http://twitter.com/duckblog
-


View the original article here