Showing posts with label vulnerability. Show all posts
Showing posts with label vulnerability. Show all posts

Thursday, June 11, 2009

Pirated Windows 7 Builds Botnet with Trojan

· 0 comments

Attackers pushing pirated, malware-laced copies of Microsoft's upcoming Windows 7 operating system have been actively trying to build a botnet.

Windows7According to researchers at Damballa, attackers hid a Trojan inside of pirated copies of the operating system and began circulating them on BitTorrent sites. Damballa reported that it shut down the botnet's command and control server May 10, but by that time infection rates had risen as high as 552 users per hour.

"Since the pirated package was released on April 24th, my best guess is that this botnet probably had at least 27,000 successful installs prior to our takedown of its CnC [command and control] on May 10th," said Tripp Cox, vice president of engineering at Damballa.

Targeting users through pirated software is nothing new for hackers. Earlier in 2008, for example, attackers sought to build a Mac botnet on the backs of users of pirated versions of iWork '09 and the Mac version of Adobe Photoshop CS4.

Even aside from the malware threat, piracy is big business. A joint report by the BSA and IDC estimated software companies experienced $50 billion in losses in 2008 due to piracy.

In the case of Windows 7 RC, pirated copies were leaked on BitTorrent sites with a Trojan horse that, once downloaded, attempts to install a bundle of other malware on the infected machine. Blocking infections is tricky, as many anti-virus tools do not yet support Windows 7 and the operating system is infected before the tools can even be installed, according to Damballa.

"We continue to see new installs happening at a rate of about 1,600 per day with broad geographic distribution," Cox said. "Since our takedown, any new installs of this pirated distribution of Windows 7 RC are inaccessible by the botmaster. The old installs are accessible. The countries with the largest percentage of installs are the U.S. (10 percent), Netherlands (7 percent) and Italy (7 percent)."

from EWeek ..

Njoy !!!

Tuesday, June 9, 2009

Conficker still infecting 50,000 PCs per day

· 0 comments

The Conficker worm is still infecting systems at a brisk rate and continues to snag computers in Fortune 1000 companies, according to security researchers.

The worm is infecting about 50,000 new PCs each day, according to researchers at Symantec, who reported that the U.S., Brazil and India have been hit the hardest.. "Much of the media hype seems to have died down around Conficker/Downadup, but it is still out there spreading far and wide," Symantec said in a blog post.

Conficker began spreading late last year, taking advantage of a recently patched flaw in Microsoft's Windows operating system to infect entire networks and also using removable storage devices to hop from PC to PC. Security experts say it has now infected millions of computers worldwide, which now comprise the world's biggest botnet network.

"We can see that companies that spend literally millions of dollars on equipment and gear to prevent infections … these Fortune companies have had this infection and it's stayed in their networks for a long period of time," said Rick Wesson, CEO of Support Intelligence and a member of the Conficker Working Group. "It's really hard and really expensive, and if the Fortune companies can't stop it, how can you expect small businesses to do it?"

The Working Group has set up so-called sinkhole servers that can communicate with infected machines. It has spotted infections within many Fortune 1000 companies, Wesson said. "Everybody got hit," he said. "Even Microsoft still has infections."

The worm got a lot of media attention in late March, and while the news stories have tapered off, the worm isn't going anywhere.

Some worried that an April 1 change in the way Conficker received updates could mark the beginning of a new round of Internet attacks, but in reality the Conficker network has been only lightly used, security experts say.

"It's still a significant botnet. It hasn't done anything of significance, but it has not gone away," said Andre DiMino, cofounder of The Shadowserver Foundation and a member of the Working Group. "The remediations need to ramp up."

Njoy !!!

Saturday, April 25, 2009

Hackers created 1.6m security threats last year !!!

· 0 comments

 

Hackers were responsible for creating 1.6 million new security threats last year, says Symantec.

According to the security vendor's Internet Security Threat Report, the web was the primary source of infection, with hackers relying on methods to embed malicious code into websites.

"As malicious code continues to grow at a record pace we're also seeing that attackers have shifted away from mass distribution of a few threats to micro-distribution of millions of distinct threats," said Stephen Trilling, vice president at Symantec Security Technology and Response.

The report also revealed that 90 percent of attacks were designed to steal personal information such as names, addresses and credit card details.

"The unfortunate reality is that innocent web surfers can visit a compromised website and unknowingly place their personal and financial information at risk," added Marc Fossi, executive editor of the report.

"Computer users have to be extra vigilant about their security practices."

Symantec said that phishing websites had increased by 66 percent since 2007, with 55,389 found on the web. Spam also increased by 192 percent.

Symantec said that 349 billion spam messages were received in 2008, compared to the 119 billion in 2007. The security vendor blamed botnets, saying were responsible for 90 percent of the spam received.

from PCADVISOR

Njoy … fingerscrossed

Thursday, April 23, 2009

DOD says … We're always under cyberattack

· 0 comments

 

In an interview for an upcoming edition of 60 Minutes, CBS News anchor Katie Couric asked Gates about the nation's cybersecurity after hackers stole specifications from a $300 billion fighter jet development program as well as other sensitive information.

In a series of spy attacks, hackers stole information about the Pentagon's F-35 Joint Strike Fighter project and the Air Force's air traffic control system, according to a Wall Street Journal report Tuesday.

The computer spies copied several terabytes of data from the Joint Strike Fighter project, the most expensive in Defense Department history, pertaining to the electronics and design systems of the aircraft, several current and former officials told the Journal. Officials said the separate incursion into the air traffic control system could allow intruders to interfere with military aircraft.DoD_Logo

Gates would not discuss the specifics of the attacks, but said, "I believe we still have security of the sensitive systems." Generally, "We think we have pretty good control of our sensitive information both with respect to intelligence and equipment systems, but we, like everybody else, is under attack. Banks are under attack. Every country is under attack," Gates told Couric.

But, he said, "It's sometimes very difficult to figure out a home address on these attacks so one of the things that I am doing in the budget is significantly increasing the resources for cyber experts. We're going to more than quadruple the number of experts that we have in this area. We're devoting a lot more money to it."

The source of the espionage appears to be China, according to a former official, though the origin of any attacks could be masked. Chinese officials deny any involvement and say U.S. suspicion is the result of a "Cold War mentality." Similar attacks have become more frequent in recent months, underscoring the increasingly heated battles taking place in cyberspace. Earlier this month, the Wall Street Journal reported that Russian and Chinese spies gained access to the U.S. electrical grid, inserting software that could disrupt the system.

In the Joint Strike Fighter attack, officials said that while spies made off with some data, the most sensitive information is stored on separate, non-networked computers. But the vulnerability lies in the Pentagon's reliance on private defense contractors, some foreign, who have less-than-secure networks. The breaches apparently took place in Turkey and another U.S. ally nation, according to the report.

While there is no U.S. agency currently dedicated solely to cybersecurity, the Obama administration is expected tode propose a senior White House post to coordinate military efforts to guard against further breaches. The White House may also look to extend a $17 billion security initiative originally planned by the Bush administration.

"This is going to be an enduring problem and it is going to be a challenge not just for the Department of Defense but for the entirety of the United States," Gates said.

from ZDnet ..

Njoy ??? … fingerscrossed

Saturday, April 18, 2009

PIN Crackers Nab Holy Grail of Bank Card Security ….

· 0 comments

 

Hackers have crossed into new frontiers by devising sophisticated ways to steal large amounts of personal identification numbers, or PINs, protecting credit and debit cards, says an investigator.  The attacks involve both unencrypted PINs and encrypted PINs that attackers have found a way to crack, according to an investigator behind a new report looking at the data breaches.

The attacks, says Bryan Sartin, director of investigative response for Verizon Business, are behind some of the millions of dollars in fraudulent ATM withdrawals that have occurred around the United States.

"We're seeing entirely new attacks that a year ago were thought to be only academically possible," says Sartin. Verizon Business released a report Wednesday that examines trends in security breaches. "What we see now is people going right to the source ... and stealing the encrypted PIN blocks and using complex ways to un-encrypt the PIN blocks."

The revelation is an indictment of one of the backbone security measures of U.S. consumer banking: PIN codes. In years past, attackers were forced to obtain PINs  piecemeal through phishing attacks, or the use of skimmers and cameras installed on ATM and gas station card readers. Barring these techniques, it was believed that once a PIN was typed on a keypad and encrypted, it would traverse  bank processing networks with complete safety, until it was decrypted and authenticated by a financial institution on the other side.

But the new PIN-hacking techniques belie this theory, and threaten to destabilize the banking-system transaction process. Information about the theft of encrypted PINs first surfaced in an indictment last year against 11 alleged hackers accused of stealing some 40 million debit and credit card details from TJ Maxx and other U.S. retail networks. The affidavit, which accused Albert "Cumbajohnny" Gonzalez of leading the carding ring, indicated that the thieves had stolen "PIN blocks associated with millions of debit cards" and obtained "technical assistance from criminal associates in decrypting encrypted PIN numbers."

But until now, no one had confirmed that thieves were actively cracking PIN encryption.

Sartin, whose division at Verizon conducts forensic investigations for companies that experience data breaches, wouldn't identify the institutions that were hit or indicate exactly how much stolen money was being attributed to the attacks, but according to the 2009 Data Breach Investigations report, the hacks have resulted in "more targeted, cutting-edge, complex, and clever cybercrime attacks than seen in previous years." "While statistically not a large percentage of our overall caseload in 2008, attacks against PIN information represent individual data-theft cases having the largest aggregate exposure in terms of unique records," says the report. "In other words, PIN-based attacks and many of the very large compromises from the past year go hand in hand."

Although there are ways to mitigate the attacks, experts say the problem can only really be resolved if the financial industry overhauls the entire payment processing system. "You really have to start right from the beginning," says Graham Steel, a research fellow at the French National Institute for Research in Computer Science and Control who wrote about one solution to mitigate some of the attacks. "But then you make changes that aren't backwards-compatible."

PIN hacks hit consumers particularly hard, because they allow thieves to withdraw cash directly from the consumer's checking, savings or brokerage account, Sartin says. Unlike fraudulent credit card charges, which generally carry zero liability for the consumer, fraudulent cash withdrawals that involve a customer's PIN can be more difficult to resolve since, in the absence of evidence of a breach, the burden is placed on the customer to prove that he or she didn't make the withdrawal. Some of the attacks involve grabbing unencrypted PINs, while they sit in memory on bank systems during the authorization process. But the most sophisticated attacks involve encrypted PINs.

Sartin says the latter attacks involve a device called a hardware security module (HSM), a security appliance that sits on bank networks and on switches through which PIN numbers pass on their way from an ATM or retail cash register to the card issuer. The module is a tamper-resistant device that provides a secure environment for certain functions, such as encryption and decryption, to occur.

According to the payment-card industry, or PCI, standards for credit card transaction security, PIN numbers are supposed to be encrypted in transit, which should theoretically protect them if someone intercepts the data. The problem, however, is that a PIN must pass through multiple HSMs across multiple bank networks en route to the customer's bank. These HSMs are configured and managed differently, some by contractors not directly related to the bank. At every switching point, the PIN must be decrypted, then re-encrypted with the proper key for the next leg in its journey, which is itself encrypted under a master key that is generally stored in the module or in the module's application programming interface, or API.

"Essentially, the thief tricks the HSM into providing the encryption key," says Sartin. "This is possible due to poor configuration of the HSM or vulnerabilities created from having bloated functions on the device." Sartin says HSMs need to be able to serve many types of customers in many countries where processing standards may be different from the U.S. As a result, the devices come with enabled functions that aren't needed and can be exploited by an intruder into working to defeat the device's security measures. Once a thief captures and decrypts one PIN block, it becomes trivial to decrypt others on a network.

Other kinds of attacks occur against PINs after they arrive at the card-issuing bank. Once encrypted PINs arrive at the HSM at the issuing bank, the HSM communicates with the bank's mainframe system to decrypt the PIN and the customer's 16-digit account number for a brief period to authorize the transaction.

During that period, the data is briefly held in the system's memory in unencrypted form. Sartin says some attackers have created malware that scrapes the memory to capture the data. "Memory scrapers are in as much as a third of all cases we're seeing, or utilities that scrape data from unallocated space," Sartin says. "This is a huge vulnerability." He says the stolen data is often stored in a file right on the hacked system. "These victims don't see it," Sartin says. "They rely almost purely on anti-virus to detect things that show up on systems that aren't supposed to be there. But they're not looking for a 30-gig file growing on a system."

Information about how to conduct attacks on encrypted PINs isn't new and has been surfacing in academic research for several years.  In the first paper, in 2003, a researcher at Cambridge University published information about attacks that, with the help of an insider, would yield PINs from an issuer bank's system.

The paper, however, was little noticed outside academic circles and the HSM industry. But in 2006, two Israeli computer security researchers outlined an additional attack scenario (.pdf) that got widespread publicity. The attack was much more sophisticated and also required the assistance of an insider who possessed credentials to access the HSM and the API and who also had knowledge of the HSM configuration and how it interacted with the network. As a result, industry experts dismissed it as a minimal threat. But Steel and others say they began to see interest for the attack research from the Russian carding community. But until now no one had seen the attacks actually being used in the wild.

Steel wrote a paper in 2006 that addressed attacks against HSMs (.pdf) as well as a solution to mitigate some of the risks. The paper was submitted to nCipher, a British company that manufactures HSMs and is now owned by Thales. He says the solution involved guidelines for configuring an HSM in a more secure manner and says nCipher passed the guidelines to customers.

Steel says his solution wouldn't address all of the types of attacks. To fix the problem would take a redesign. But he notes that "a complete rethink of the system would just cost more than the banks were willing to make at this time."

Thales is the largest maker of HSMs for the payment-card and other industries, with "multiple tens of thousands" of HSMs deployed in payment-processing networks around the world, according to the company. A spokesman said the company is not aware of any of the attacks on HSMs that Sartin described, and noted that Thales and most other HSM vendors have implemented controls in their devices to prevent such attacks. The problem, however, is how the systems are configured and managed. "It's a very difficult challenge to protect against the lazy administrator," says Brian Phelps, director of program services for Thales. "Out of the box, the HSMs come configured in a very secure fashion if customers just deploy them as is. But for many operational reasons, customers choose to alter those default security configurations — supporting legacy applications may be one example — which creates vulnerabilities." Redesigning the global payment system to eliminate legacy vulnerabilities "would require a mammoth overhaul of virtually every point-of-sale system in the world," he says.

Responding to questions about the vulnerabilities in HSMs, the PCI Security Standards Council said that beginning next week the council would begin testing HSMs as well as unattended payment terminals. Bob Russo, general manager of the global standards body, said in a statement that although there are general market standards that cover HSMs, the council's testing of the devices would "focus specifically on security properties that are critical to the payment system." The testing program conducted in council-approved laboratories would cover "both physical and logical security properties."

From Wired

Njoy … fingerscrossed

Tuesday, April 7, 2009

Are we really ready for Cloud ??

· 0 comments

cloud-computing-kitchen-sink

All the data that make up our lives seem to be heading for the clouds. From photos on Flickr to memos on Google Docs, we are entrusting more and more to computers in giant data centers—a model called cloud computing. It's certainly convenient to have access to our stuff wherever we are and on whatever device we choose. But is it safe?

There are two kinds of risks in putting your data online. One is that you can never be quite sure who has access to your information once it has migrated beyond the hard drives and backup storage devices in your home. The other risk is that the information, and sometimes the applications you need to make use of it, may be available only when you are connected to the Internet and the service is up and running. These twin dangers are now abundantly obvious to users of a collaborative Web-based word-processing program called Google Docs. Google recently notified its users that a software glitch had allowed some subscribers unauthorized access to "a very small percentage" of these documents, which are stored on Google's servers.

The security of data stored in the cloud varies with both the design of the system and how well the safety measures are implemented. Some services encrypt information both in transit and in storage in such a way that only the owner can decrypt it. These services are generally the most secure against either accidental or malicious disclosure—though your information can be lost forever if you lose the password. In general, services that allow Web access to data from any computer are riskier than more restrictive systems, and those that allow the information to be shared among a group of users pose even greater hazards.

Sometimes you have control over this—for example, by declining an option that lets you access your data from a Web site. This choice is available on many online backup services and can be handy if, say, you are on the road and need to get a file that's on your home or business computer. But clearly that access increases the risk that your information could be exposed to third parties.

The security practices of cloud storage systems are usually described in the fine print of their security and privacy policies, but in practice it's difficult to assess safety. Corporations run security audits to gauge the practices of cloud computing operations, but this is beyond the reach of individuals or smaller businesses. The simpler course for most of us is to think before committing data to the cloud. Those photos from the family trip to Disney World ? No problem. But the term sheet for a proposed merger or acquisition should probably stay encrypted on a hard drive that you control. Anything in between? Just consider how much embarrassment or trouble it would cause in the wrong hands.

The issues of getting to your online data are less serious. The growing ubiquity of wireless services means there are fewer and fewer places where you can't get on the Net if you need to. Wi-Fi is even slowly creeping onto airplanes, the last wireless frontier.

Will your cloud service be there when you need it? Google got a lot of unwelcome attention recently when its Gmail service was unavailable for about three hours. Back in the days of the Ma Bell monopoly, AT&T promised 99.999% availability, which allowed a bit over five minutes of downtime a year. But "five nines" of reliability is fabulously expensive. Google promises its corporate Google Apps customers 99.9% uptime, which leaves room for outages of nearly nine hours a year. The fact is, most enterprises don't deliver higher reliability on their own systems; the difference is that outages on big public services get publicity.

Ultimately, putting your data in the cloud involves choosing convenience and productivity at the cost of some security risk. In the real world, convenience almost always wins, and there's nothing wrong with that. What's important is that you understand the dangers.

from BusinessWeek

Njoy …fingerscrossed

Friday, April 3, 2009

EVERY LINK YOU CLICK IS DANGEROUS !!!!

· 0 comments

 

internet-marketing

Well , title seems to be a bit more paranoidal … i should say …. every link you click can be dangerous ??? or simply … don’t click randomly ??? …. what ever it is … but the essence of the story is as follows …. from one of my fav. sites ….

Magic tricks are all about suggestion, psychology, misdirection and showmanship (see Tricks of the Mind), or as Cutter perhaps will say, every magic trick has tree parts: the pledge (where the magician shows you something ordinary), the turn (where the ordinary becomes something extraordinary), and the prestige (where the extraordinary turns into something you have never seen before).

In a similar way, real world information security breaches are combination of the characteristics you will often find in the performance of skillful magicians. Therefore, allow me introduce you to a simplistic form of an attack, perhaps so simple that in fact it may work far more often than we would like to admit, which skillfully uses suggestion, psychology, misdirection and a great doze of showmanship.

So, we’ve all heard of clickjacking and we know that it is a design bug and therefore it is very hard to deal with. However, are there other flawed areas of modern browsers design which can be abused? Of course there are. It just takes time to find them all because they are often well hidden underneath our common believes, ignorance and prejudice. Here is some code

<html> <body>

<script>

function clickme() {

var w = window.open('http://www.google.com');

setTimeout(function () { w.location = 'http://www.gnucitizen.org'; }, 5000); }

</script>

<input type="button" value="click me" onclick="clickme(this)"/> </body> </html>

 

Quite boring! I agree. First of all the user clicks on a button/link. Then a new tab/window opens which loads the content of http://www.google.com. Five seconds later, the newly created tab is preloaded with the content of http://www.gnucitizen.org. Do you find this code disturbing? I do. It is disturbing because it breaks the trust relationship that is going on between the user and google.com in this specific example. Call it surfjacking, framejacking,tabjacking or whatever you want to call it, but at the end of the day, I believe that this is just yet another form of bad design.

Here is another example. You browse the web, you click to digg a story, you get redirected to digg.com to login. SSL looks fine. The browser lights up all green. It is OK to type your username/password and you do. In the background, the page which initially took you to digg.com waits for you to login. It subsequently queries the digg.com login page for changes in the DOM structure by using script tags and error handlers to capture different error code offsets (check AttackAPI), and as such it tries to detect when you are fully logged on. It does these checks every half a second. Once a successful login is detected, it simply fires w.location = "some evil url here"; which will force the browser to render something else, perhaps something malicious, instead of the page that should have came after a successful authentication. Perhaps, the evil caller could even fire just a simple alert('Hey there!'); message as a form of misdirection and than return back the control with another w.focus().

Would you check the address bar again? Perhaps not, because the page which was forced onto you now contains similarly looking digg.com login page accompanied with some red and quite scary looking text which tells you that your login was unsuccessful. This is the psychology. The attacker uses the red color to distract your from the address bar so that you put all of your attention into the login form. You cannot escape your instincts. The forms screams at you that all you have to do is to fill in your username and password and everything will be fine again. You rush to fill in your credentials again. Your request is recorded. A 302 redirect fires back and the browser redirects you to your digg.com account like nothing has ever happened. This is the prestige.

As far as I know, although I might be wrong, this form of an attack is new. It is definitely not devastating and it wont break the Web. However, my honest opinion is that it does break a lot of things. For example, it breaks the user’s normal surfing experience. The good news is that there is an easy fix. Simply put, do not allow pages to redirect windows which are preloaded with content from a different origin! We fix this, we save the Web again.

from GNU Citizen

Njoy … fingerscrossed

Wednesday, April 1, 2009

US-CERT Advisory for Conficker worm …

· 0 comments

 

HISTORY …

Conficker, also known as Downup, Downadup and Kido, is a computer worm that surfaced in October 2008 and targets the Microsoft Windows operating system. The worm exploits a previously patched vulnerability in the Windows Server service used by Windows 2000,Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008, Windows 7 Beta, and Windows Server 2008 R2 Beta . The worm has been unusually difficult for network operators and law enforcement to counter because of its combined use of advanced malware techniques.

Although the origin of the name "conficker" is not known with certainty, Internet specialists and others have speculated that it is a German portmanteau fusing the term "configure" with "ficken", the German word for "fuck !!!".  Microsoft analyst Joshua Phillips describes "conficker" as a rearrangement of portions of the domain name 'trafficconverter.biz'

Four main variants of the Conficker worm are known and have been dubbed Conficker A, B, C and D. They were discovered 21 November 2008, 29 December 2008, 20 February 2009, and 4 March 2009, respectively.

SYMPTOMS …

  • Account lockout policies being reset automatically.
  • Certain Microsoft Windows services such as Automatic Updates, Background Intelligent Transfer Service (BITS), Windows Defender and Error Reporting Services disabled.
  • Domain controllers responding slowly to client requests.
  • Unusual amounts of traffic on local area networks.
  • Websites related to antivirus software becoming inaccessible.

EFFECTS …

Experts say it is the worst infection since 2003's SQL Slammer. Estimates of the number of computers infected range from almost 9 million PCs to 15 million computers.The initial rapid spread of the worm has been attributed to the number of Windows computers—estimated at 30%—which have yet to apply the Microsoft MS08-067 patch.

Another antivirus software vendor, Panda Security, reported that of the 2 million computers analyzed through ActiveScan, around 115,000 (6%) were infected with this malware.

Intramar, the French Navy computer network, was infected with Conficker in 15 January 2009. The network was subsequently quarantined, forcing aircraft at several airbases to be grounded because their flight plans could not be downloaded.

The U.K. Ministry of Defence reported that some of its major systems and desktops were infected. The worm has spread across administrative offices, NavyStar/N* desktops aboard various Royal Navy warships and Royal Navy submarines, and hospitals across the city of Sheffield reported infection of over 800 computers.

On 13 February 2009, the Bundeswehr reported that about one hundred of their computers were infected.

A memo from the British Director of Parliamentary ICT informed the users of the House of Commons on 24 March 2009 that it had been infected with the worm. The memo, which was subsequently leaked, called for users to avoid connecting any unauthorized equipment to the network.

IN NEWS !!!

As of 13 February 2009, Microsoft is offering a $250,000 USD reward for information leading to the arrest and conviction of the individuals behind the creation and/or distribution of Conficker.

On 24 March 2009, CIRA, the Canadian Internet Registration Authority, locked all previously-unregistered .ca domain names expected to be generated by Conficker C over the next 12 months.[35]

On 31 March 2009 NASK, the Polish national registrar, locked over 150,000 .pl domains expected to be generated by Conficker C over the coming 5 weeks. NASK has also warned that worm traffic may unintentionally inflict a DDoS attack to legitimate domains which happen to be in the generated set.

Message , FROM United State Computer Emergency Readiness Team …

Conficker/Downadup worm, which can infect a Microsoft Windows system from a thumb drive, a network share, or directly across a corporate network, if the network servers are not patched with the MS08-067 patch from Microsoft.
Home users can apply a simple test for the presence of a Conficker/Downadup infection on their home computers. The presence of a Conficker/Downadup infection may be detected if a user is unable to surf to their security solution website or if they are unable to connect to the websites, by downloading detection/removal tools available free from those sites:
http://www.symantec.com/norton/theme.jsp?themeid=conficker_worm&inid=us_ghp_link_conficker_worm
http://www.microsoft.com/protect/computer/viruses/worms/conficker.mspx
http://www.mcafee.com
If a user is unable to reach any of these websites, it may indicate a Conficker/Downadup infection. The most recent variant of Conficker/Downadup interferes with queries for these sites, preventing a user from visiting them. If a Conficker/Downadup infection is suspected, the system or computer should be removed from the network or unplugged from the Internet - in the case for home users.
Instructions, support and more information on how to manually remove a Conficker/Downadup infection from a system have been published by major security vendors. Please see below for a few of those sites. Each of these vendors offers free tools that can verify the presence of a Conficker/Downadup infection and remove the worm:
Symantec:
http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-011316-0247-99
Microsoft:
http://support.microsoft.com/kb/962007
http://www.microsoft.com/protect/computer/viruses/worms/conficker.mspx
Microsoft PC Safety hotline at 1-866-PCSAFETY, for assistance.
US-CERT encourages users to prevent a Conficker/Downadup infection by ensuring all systems have the MS08-067 patch (seehttp://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx), disabling AutoRun functionality (see http://www.us-cert.gov/cas/techalerts/TA09-020A.html), and maintaining up-to-date anti-virus software.

 

currently this worm is set to get active at 1st April , 2009 ( TODAY !!! ) … and yet nobody knows what’s it upto smile_zipit … lets hope people come with some sound solution to this perhaps the most notorious virus in history of viruses !!!

 

Njoy … fingerscrossed

parts from … US-CERT  and Wikipedia

Tuesday, March 31, 2009

Security professionals fear smart phone threat …

· 0 comments

 

Ninety per cent of security professionals believe that smart phones pose a significant risk to the enterprise, according to a new survey of over 2,000 members of security certifications organization ISC2.

Employees are increasingly bringing their own smart phones to work and using them for corporate purposes, but ISC2 explained that, instead of banning them outright, IT security chiefs should learn how to accommodate them safely into the organization.

"Internet phones are like wireless networks four or five years ago: security professionals are against them because of the security problems, but in reality people like to use them," said John Colley, European managing director at ISC2.

"We have to relax and find ways of making them secure, which will need a combination of rules, education and technology."

However, Colley warned that, aside from the BlackBerry, many smart phones "do not have a good security model behind them". He urged security professionals to engage with manufacturers and suppliers to address the problem.

"Targeted attacks represent a significant threat, but most losses come from the accidental threat - leaving handsets in taxis and so on - where password protection can help," he said.

Njoy … fingerscrossed

Saturday, March 28, 2009

Online Banking Fraud is at its peak !!!

· 0 comments

 

Software allowing fraudsters to track what you type led to the level of online banking fraud more than doubling in 2008, according to a banking body.

Fraudsters use a device called keylogging - when keystrokes on a computer are tracked to gather passwords and credit card numbers.

Online banking fraud jumped to £52.5m last year, up from £22.6m in 2007, said UK payments association Apacs. Total fraud losses on UK debit and credit cards rose by 14% to £609m. Most victims of card fraud are not liable, so their money is refunded.

Malicious programs

Online banking has become increasingly popular in recent years, with consumers becoming more comfortable using their home computers rather than queuing at branches.

Card fraud graph

But fraudsters tend to adapt to new technology more quickly than consumers, so online banking fraud losses have been rising steadily in recent years. The £52.5m stolen from accounts in 2008 compares with £12.2m in 2004. Malicious computer programs, including those that track what users type without their knowledge, generally find their way onto computers when users click on an unsolicited e-mail. "The industry continues to remind customers to ensure that they have their computer's firewall switched on and anti-virus software up to date," said an Apacs spokeswoman.

Targeting cards

UK credit and debit card fraud had been falling following the introduction of chip-and-pin, but in 2007 and 2008 the figures have started to rise again. The biggest area of card fraud continued to be with goods bought over the internet, phone or by mail order - where chip-and-pin was not used. Fraud levels in these instances rose 13% to £328m. The most significant rise in 2008 was when criminals took over other people's accounts, known as card ID theft, with losses up by 39% to £47.4m.

Apacs said that, although card fraud losses had increased during the last year, losses as a percentage of card turnover were falling, dropping to 0.12% of turnover in 2008 from 0.14% in 2004. The group also stressed that over the last five years, the most rapid acceleration in fraud has not been in the UK, but by fraudsters using UK cards overseas. This was usually in countries where chip-and-pin technology was not in place. Apacs said it was putting pressure on countries such as the US to introduce chip-and-pin.

Anyone in the UK who is a victim of fraud is not liable, under terms outlined in the Banking Code. As long as they have not acted fraudulently or without "reasonable care", they will be reimbursed if somebody uses their card, steals it, or clones it. The code says that if somebody uses a card before it is reported lost or stolen, or somebody knows a Pin, then the victim could have to pay the first £50 that is lost.

from UK.BBC

Njoy … fingerscrossed

Wednesday, March 25, 2009

Chrome … the safest browser … ( for now )

· 0 comments

 

Browser vendors often make strong claims about their responsiveness to vulnerability reports and their ability to preemptively prevent exploits. Security is becoming one of the most significant fronts in the new round of browser wars, but it's also arguably one of the hardest aspects of software to measure or quantify.

A recent contest at CanSecWest, an event that brings together some of the most skilled experts in the security community, has demonstrated that the three most popular browser are susceptible to security bugs despite the vigilance and engineering prowess of their creators. Firefox, Safari, and Internet Explorer were all exploited during thePwn2Own competition that took place at the conferbrowsers-logosence. Google's Chrome browser, however, was the only one left standing—a victory that security researchers attribute to its innovative sandbox feature.

The contest awards security researchers with hardware and cash prizes for finding efficient ways to trick browsers into executing arbitrary code. During the first day of the competition, the contestants are required to do this in default browser installations without plugins such as Flash or Java, which are commonly used as vectors for attacks. Researchers typically prepare for the event far in advance by finding zero-day exploits ahead of time.

Early this month, prior champion Charlie Miller told reporters that he would be attempting to exploit a Safari vulnerability on Mac OS X. Safari, he said, would be the first to succumb to the contestants. As he promised, Safari went down first: he was able to execute his prepared hack in only a matter of seconds. Another security expert known only as Nils took longer, but was able to successfully exploit all three of the most popular browsers.

These contests contribute to the growing culture of commercialism that surrounds the art of exploitation. In an interview with ZDNet, Miller said that the vulnerability he used in the contest was one that he had originally found while preparing for the contest last year. Instead of disclosing it at that time, he decided to save it for the contest this year, because the contest only pays for one bug per year. This is part of his new philosophy, he says, which is that bugs shouldn't be disclosed to vendors for free.

"I never give up free bugs. I have a new campaign. It's called NO MORE FREE BUGS. Vulnerabilities have a market value so it makes no sense to work hard to find a bug, write an exploit and then give it away," Miller told ZDNet. "Apple pays people to do the same job so we know there's value to this work."

Miller also told reporters that he targeted Safari on Mac OS X because he believes that it is the easiest to exploit. Windows, on the other hand, he claims is tougher because of its address randomization feature and other security measures. As for Chrome, he says that he has identified a security bug in Google's browser but has been unable to exploit it because the browser's sandboxing feature and the operating system's security measures together pose a formidable challenge.

The game isn't over yet. During the second day of the event, the focus will turn towards Chrome. Nils, who demonstrated impressive skill during the first day by conquering the three most popular browsers, might have a few more tricks up his sleeve. According to the official rules, the participants will be permitted to use plugins during the second day.

from arstechnica

Njoy … fingerscrossed

Sunday, March 15, 2009

Tax Time Is a Feast for Identity Thieves !!!

· 0 comments

 

tax-file-online

The ease of filing income tax returns via the Internet or other electronic means is lulling consumers into a false sense of personal security , identity-protection experts warn.

A common misconception is that important files with sensitive information such as Social Security numbers stored on a home computer are risk-free, according to Todd Feinman, an identity-theft-prevention expert.

"Hackers may access your computer in various ways at any time via viruses, trojans and botnets," said Feinman, chief executive of Identity Finder software. "Confidential information on PDFs is not safe."

Many viruses are transmitted via e-mail attachments, though some data-stealing programs disguise themselves as trusted Web sites.

The explosion of online tax filing, coupled with residential broadband and wireless Internet connections, has created an abundance of opportunities for hackers to invade home computers that lack proper firewall protection.

Nationally, nearly 89.9 million taxpayers -- about 58 percent -- filed their 2007 returns electronically.

In 2008, a record 9.9 million adult Americans -- roughly one in 23 -- fell victim to identity theft, according to Javelin Strategy & Research.

Consumers have come to believe in several myths, including that electronic transmissions of confidential data to seemingly safe recipients such as the IRS are secure, Feinman said.

The best fix is to be sure your computer's firewall is working.

"Your personal information is at the greatest risk when it is en route from one location to another," he said.

Even paper copies of tax information are accessible to identity thieves. A common mistake is to leave tax filings in home mailboxes for collection.

Another identity-theft trick is to hack into public photocopiers at tax time, particularly those that store the image in memory.

"Identity thieves are incredibly creative," Feinman said.

from … enterprisesecurity..

Njoy … fingerscrossed

Friday, March 13, 2009

Rigged Podcasts can leak your iTunes username/password !!!

· 0 comments

 

podcast

Hackers can create malicious podcasts to hijack usernames and passwords from Apple’s iTunes software.

According to a warning from Apple, a “design issue” in the iTunes podcast feature can be abused via rigged audio files to cause an authentication dialog to be presented to the user.  From that dialog, a hacker can hijack iTunes credentials and upload it to the podcast server.

From Apple’s advisory:

  • A design issue exists in the iTunes podcast feature. A subscription to a malicious podcast may cause an authentication dialog to be presented to the user. This dialog may entice the user to send iTunes credentials to the podcast server.

Apple has shipped a patch in iTunes 8.1 to clarify the origin of the authentication request in the dialog box.

The iTunes update also corrects a denial-of-service flaw that can be caused via maliciously crafted DAAP messages.

  • An infinite loop exists in the handling of iTunes Digital Audio Access Protocol (DAAP) messages. Sending a message containing a maliciously crafted Content-Length parameter in the DAAP header may lead to a denial of service. This update addresses the issue by performing additional validation of DAAP messages.

The denial -of-service bug does not affect Mac OS X systems.

Njoy … fingerscrossed

Wednesday, February 25, 2009

New Excel 0-day being exploited in the wild

· 0 comments

 

Zero-day malware/virus is something like , a fresh candidate from graduate school !!! It’s just some virus for which antivirus software has not information or in “technical” term … no known virus signature !!!

Symantec is reporting that a new remote vulnerability has been discovered in Microsoft Excel 2007, and that this vulnerability is being exploited in the wild.
Details are sparse, but it looks like Symantec has discovered a code-execution vulnerability in Excel 2007 and Excel 2007 SP1. The issue is beingactively exploited in the wild by a variant of the Mdropper trojan.

There is no patch for the vulnerability yet, so until one arrives, don’t open anything that looks like an Excel document from sources you cannot completely trust and verify !!!

part from Znet

 

Njoy … fingerscrossed

Tuesday, February 3, 2009

How do they make all that malware !!!

· 0 comments

 

It is hard to believe that a man is telling the truth when you know that you would lie if you were in his place.

-H. L. Mencken

Anti-virus vendors are getting more than 50,000 submissions of new malware per day now. How can the malware business be so productive? It turns out the numbers aren't really as big as all that.

Welcome to the malware generation business model. So you want to be a malware star? Well listen now to what I say. Unfortunately, I will be somewhat vague, but the fact is that anyone who's technically competent and has the will to do so can find the missing pieces of the puzzle I'll lay out.

First, very little malware is lovingly hand-crafted from scratch these days. The name of the game in defeating anti-virus software is volume. You generate huge numbers of slight variants of a malicious program, do things like use different packers on the executable, and some end up different enough that the anti-malware products can't detect them.

So you write or get someone else's malcode generator. These are programs that generate malicious code variants. (No, I won't tell you where to find them.) You can get source to lots of popular malware, make your own changes and make zillions of variants. But the overwhelming majority of these variants will be detected by any decent anti-malware program, and you can't distribute all of then, so how are you to know which are the undetectable ones?

The answer is to use one of the public malware scanning services. The first and most famous one is VirusTotal, but there are several others. You upload a file to these services, and they scan it with a collection of scanners. Here's the list of VirusTotal's scanners, ripped straight off of their site:

You get a report back saying what scanners found the malware, what they detected it as, and which didn't find it. With new malware, the detections will be overwhelmingly generic/heuristic.

The good news is you can see which variants are undetected enough to be useful. The bad news is that when a product does not detect your sample, VirusTotal and the other scanners submit it to the AV companies so that they can add a signature or adjust their heuristics. You won't go undetected for long. And of those 50,000 submissions, probably no more than a few hundred, perhaps much less than that, are ever seen in the wild. Even fewer do real damage.

This arrangement is what makes it worthwhile for the anti-malware companies to cooperate with VirusTotal. It gets them early access to new malware. It's also how the AV companies are getting 50,000 submissions a day: The malware authors are, in effect, sending the new malware directly to the companies. That they will only have a limited window of opportunity to attack protected users with the new malware is just a cost of doing business.

If you want to spend some money to avoid having to inform the industry about your new code, start your own multiproduct scanning lab. You'll need current subscriptions for as many products as you can get, but I'm not sure it would buy you much time. These companies talk to each other, and if a new, undetectable variant came out from the wild, word would spread pretty quickly; soon someone would feed it through VirusTotal or one of the other services, and the jig would be up.

None of this is news and shouldn't be surprising. The moral of it all, and this too should not be news to you, is that anti-malware should not be your only line of defense. Many people call it useless because some attacks get through, and now you know how, but no line of defense is perfect. Anti-malware needs to be combined with other forms of defense, like a firewall, an intrusion prevention product, running your system with least privileged access and not clicking on links in e-mails (or at least being very careful about doing so).

 

from eWeek.com

Njoy …

Tuesday, January 27, 2009

Macs hit with BitTorrent-embedded malware attack

· 0 comments

 

 

Not so Safe !!!

 

For years, Mac users have long been rightfully smug about their platform's relative immunity to virus and malware attacks, but it's inevitable that those days will eventually come to an end. (As the Mac gains in popularity, it also earns more attention from malware developers, and it's this lack of malware being actively developed, not some special, inherent security, that have really kept the Mac a "safe" platform for the time being.)

Now we're seeing one of the first moderately-sized exploits to take advantage of Mac users. The iServices.A Trojan horse is an attack being distributed via BitTorrent, where it's disguised as a bootleg copy of the new iWork 09. Once installed, the malware takes administrator access and connects to remote servers over the Internet, where it can be given additional instructions as the author commands, from installing additional malware to stealing information off the Mac in question. The malware creator can also take complete remote control of any compromised machine.

Security firm Intego said that just 20,000 machines had been infected as of January 21 but that the risk of ongoing infection was "serious, and users may face extremely serious consequences" if they are stricken with the malware.

Mac users are suggested to use common sense -- that is, don't try to download and installed pirated software -- and to update any antivirus definitions immediately. If you're a Mac user and aren't using security software, well, this might be a good time to start.

As well, if you've been hit by this piece of malware, a removal tool is available here. (Please note: I have not tested it.)

from yahoo news

Njoy …

Wednesday, January 7, 2009

Malicious Tune ???

· 0 comments

We already know that malwares can be spread via , PDF files or by rouge flash player .. right ?? .. but the new most recent way to infect computer is using WMA ... windows media audio format music file ?? ... its hard to imagine right ?? , but if you have ever noticed ... sometimes media player asks user to download codecs or to agree some sort of licences ... and its quite common ....

But in October this year, for example, the biggest threat found by Kaspersky Lab was a Trojan Downloader named WMA Wimad.n - a Trojan masquerading as a WMA file. The Kaspersky advice is if you open a music file and your media player asks you to download a codec or read a licence agreement, don't.

So if in future you get any music file ... better make sure that its playing correct tune ...

Njoy ...

Tuesday, December 23, 2008

IE 7 Emergency ??

· 0 comments

Its been not a new thing that we get time to time updates for various softwares that we use and even for our operating systems from their makes , microsoft or apple for example ... and being good computer user we keep automatic update feature "ON" so our operating system gets updated automatically ... right ?? ...

Well , its about a patch for internet explorer 7 that microsoft released just in an overnight !!! the IE7 vulnerability was such a critical that they had to act fast .. according to microsoft , the systems with OS, XP, Vista , server 2003 , server 2008 were effected.

Once exploited the IE , it downloads trojan that modify files and steals personal informations , it also downloads melicious files that infect user's PC.

So if you still haven't downloaded the patch , then its time ....

Njoy ....


Tuesday, October 28, 2008

Beware of What you Type ???

· 0 comments

" Keyboard Sniffing " .... a very new kind of sniffing method which can be used to sniff keys pressed by target user on keyboard !!!

Actually it was just an experiment by swiss students to show a new way of cyber attack ... Doctoral students Martin Vuagnoux and Sylvain Pasini from the Security and Cryptography Laboratory at the Swiss Ecole Polytechnique Federale de Lausanne have revealed that the electromagnetic signals produced by every keystroke can be tracked by hackers.

The students claimed that by analyzing the signals produced by keystrokes, they can reproduce what the target typed. Results led the students to claim that keyboards were not safe to transmit sensitive information.

 

They tested the technology on 11 keyboard models that were connected either by a USB or a PS/2 socket and every keyboard tested was vulnerable to at least one of the four attacks the researchers used. One attack was shown to work over a distance of 20 meters.

 

The students used a radio antenna in their research to fully or partially recover keystrokes by spotting the electromagnetic radiation emitted when keys were pressed.



Njoy ...




Blogged with the Flock Browser

Monday, October 27, 2008

Some routers are susceptible to SNMP injection !!!

· 0 comments

   

yesterday , i was like always wondering here n there on internet found one article on one of my " source of information " ... that ... not all but some routers from popular vendors are vulnerable to SNMP injection ....

But first , what is SNMP , its Simple Network Management Protocol , which is basically used to monitor network attached devices for conditions that warrant administrative attention. Don't mislead from its name , implementation of this protocol is way too difficult...

Penetration Testing Co. .... ProCheckUp surveyed devices from vendors such as Cisco, Proxim, 3Com and ZyXEL which were all found to be vulnerable.

 

Identified in ProCheckUp's ‘ZyXEL Gateways Vulnerability Research' paper, it

allows hackers to cause a persistent HTML injection condition on the web management console of several ZyXEL Prestige router models. Provided that an attacker has guessed or cracked the write SNMP community string of a device, they would be able to inject malicious code into the administrative web interface by changing the values of OIDs (SNMP MIB objects) that are printed on HTML pages.

The purpose behind injecting malicious code into the web console via SNMP is to fully compromise the device once the page containing the payload is viewed by the administrator.

The company initially suspected that such an attack was possible on a large number of embedded devices in use in the market, and although the SNMP write community string must be guessed or cracked for this attack to work, some devices come with SNMP read/write access enabled by default using common community strings such as ‘public', ‘private', ‘write' and ‘cable-docsis'.

 

ProCheckUp also claimed that the use of customised but weak SNMP write community strings, and other weaknesses within the devices SNMP stack implementation should be taken into account when evaluating the feasibility of this attack.



Njoy ....

Supporting the Cause

Creative Commons

Translate into your Language

New Day New Giveaway

Powered By Blogger