Thursday, August 30, 2007

Article: A walk on the dark side

Found interesting article on one of the world's worse company that caters crackers and spammers.
Article link from: economist.com
=============================================

A walk on the dark side

Aug 30th 2007
From Economist.com

These badhats may have bought your bank account

ACCORDING to VeriSign, one of the world’s largest internet security companies, RBN, an internet company based in Russia’s second city, St Petersburg, is “the baddest of the bad”. In a report seen by The Economist, VeriSign’s investigators unpick an extraordinary story of blatant cybercrime that implies high-level political backing.

In one sense, RBN (Russian Business Network) does not exist. It has no legal identity; it is not registered as a company; its senior figures are anonymous, known only by their nicknames. Its web sites are registered at anonymous addresses with dummy e-mails. It does not advertise for customers. Those who want to use its services contact it via internet messaging services and pay with anonymous electronic cash.


But the menace it poses certainly exists. “RBN is a for-hire service catering to large-scale criminal operations,” says the report. It hosts cybercriminals, ranging from spammers to phishers, bot-herders and all manner of other fraudsters and wrongdoers from the venal to the vicious. Just one big scam, called Rock Phish (where gullible internet users were tricked into entering personal financial information such as bank account details) made $150m last year, VeriSign estimates.

Plenty of other internet companies sail close to the wind—hosting unregulated online gambling for example. But according to a VeriSign investigator, “the difference is that RBN is solely criminal”. The pricing depends on the level of complaints. A discreet organisation pays little; one that attracts a lot of unwelcome attention, forcing RBN to take expensive countermeasures, has to pay more.

Despite the attention it is receiving from Western law enforcement agencies, RBN is not on the run. Its users are becoming more sophisticated, moving for example from simple phishing (using fake e-mails) to malware known as “trojans” that sit inside a victim’s computer collecting passwords and other sensitive information and sending them to their criminal masters.

A favourite trick is to by-pass the security settings of a victim's browser by means of an extra piece of content injected into a legitimate website. An unwary user enters his password or account number into what looks like the usual box on his log-in page, and within minutes a programme such as Corpse’s Nuclear Grabber, OrderGun and Haxdoor has passed it to a criminal who can empty his bank account. When VeriSign managed to hack into the RBN computer running the scam, it found accumulated data representing 30,000 such infections. “Every major trojan in the last year links to RBN” says a VeriSign sleuth.

RBN even fights back. In October 2006, the National Bank of Australia took active measures against Rock Phish, both directly and via a national anti-phishing group to which the bank’s security director belonged. RBN-based cybercriminals replied by crashing the bank’s home-page for three days.

What can be done? VeriSign has tracked down the physical location of RBN’s servers. But Western law enforcement officers have so far tried in vain to get their Russian counterparts to pursue the investigation vigorously. “RBN feel they are strongly politically protected. They pay a huge amount of people. They know they are being watched. They cover their tracks,” says VeriSign. The head of RBN goes under the internet alias “Flyman”; his uncle is thought to be a senior St Petersburg politician. Repeated e-mails to RBN’s purported contact addresses asking for comment have gone unanswered.

Companies can simply block access to any site registered at an RBN IP address. But that will not help most victims, such as those who receive infected e-mails. VeriSign says only strong political pressure on Russia will make the criminal justice system there deal with this glaring example of cyber-illegality.




Sunday, August 26, 2007

Top 5 malwares

Current HOT malwares:-
1. Virtumonde - This is well known mystery little sucker that gives users with Fake Alert and popups with rogue antispyware product advertisements like Winantispyware 2007, DriveCleaner etc.. informing users that their computer is not protected from bogus virus.
The big issue with this Virtumonde (aka; Vundo, FakeAlert, Conhooks) is very users have differnt sets of Virtumonde which means threats can change file names and it's content to avoid detection. I've heard Virtumonde can re-generates every hour into newer variants.

2. Adware.Agent variants - This is very similar to Virtumonde in behavior, this threat also causes popups informing users to buy some bogus programs to clean out computer problems.

3. Maxifies & PurityScan - Also causes popups, usually hijacks wedsite to some bogus sites like "Test your Internet Speed" or some "dating sites" - then when user clicks to continue to test speed of their Internet or to find cyber lovers - then user's computer will be hijacked and start downloading hips of malware on to their computers. I usually find them through many freebie sites such as downloading ringtone, screensavers, wallpapers, games and mp3s etc..

4. Trojan.Popuper - This threat disguise itself as video or audio codec, usually invites users to some porn or dating or free music/movie trailers sites then informing users that their Windows is missing some essential video codecs to display their videos, after user clicks to install codecs, their PC gets hijacked and displays hips of popups - some what similar to Virtumonde stuffs (and they usually are bundled with Adware.Agents as well).
[Myspace.com] had this ealier, which many hackers can setup bogus profile on myspace.com and invites users to be friend.

5. Free game trojan - This can be very risky as I have seen so many trojans that bundled with free games & screensaver, I had few MDT logs showing no sign of malware but had free Porn games or poker games. many users with repeat detection also suffers from their istalled programs that keeps re-inserting trojans on to user's computer after scan & fix. This sort of problem can't be fix completely without uninstalling risky games.

Thursday, July 19, 2007

Hackers Can Now Deliver Viruses via Web Ads

Want to know why you gets trojans by just visiting legitimate web sites? Well, this is how myspace.com, ebay.com, youtube.com, and many popular domain sites such as torrent sites are being hijacked to host tones of malwares.

Here is Wallstreet article on Tom's hardware case: Link

Monday, July 9, 2007

Antivirus firm gets graphical to fight malware

Have you guys wonder how malware looks like from inside your computer. Well, F-Secure have developed 3D animation work that shows how malware infection works.

It's great, this may be the next data forensic tool.

See the vid from F-Secure site or from ZDnet Vid

Tuesday, July 3, 2007

The evolution of self-defense technologies in malware - Report! from Kaspersky


Have you ever experience malware or trojans that won't get rid off or just simply don't even get detected by your Antivirus or Antispyware programs?
Here is good report on current & new emerging self-defence mechanisms in malware from Kaspersky explained in details.

Wednesday, June 20, 2007

Analyzing (malicious) SWF file actions

Here is interesting article about malicious SWF file (Flashplayer media file).
It's possible to create malicious SWF file and embedded into html code.

For info visit: Sans.org page

Top10 malware registry launchpoints

You guys want to know most common places where Trojans & other nasties loves to live on your Windows OS?

More info please visit below link from F-Secure.
Link: Here

Browser war is on the way - New Safari 3 Browser for Windows

Howdy, check out the new Safari Browser for Windows. This Apple's own browser were only available for mac users, now they have released beta version for Windows.

Link: http://www.apple.com/safari/

According to Apple, Safari 3 is faster than any browsers on Internet. Hmmm, I though K-Meleon browser was fastest & smallest browser.

K-Meleon browser can be download from: http://kmeleon.sourceforge.net/

Most popular browsers are: AOL, , Firefox, Internet Explorer, Opera, Netscape

Watch out for fake Winrar - they are Trojans

If you guys want to download popular zip utility like Winrar then you should visit eaither download.com or actual vendor site http://www.rarlab.com/

Do not visit fake Winrar site called http://www.winrar(dot)com/

For more info visit Trend Micro's article: http://blog.trendmicro.com/a-winrar-lose-situation/

Zango was denied by US court

Good news guys ! Zango was denied by US court early this month. I hope Zango learnt their lesson from this stupid lawsuite.

PC Tools wins fight against Zango
From: http://www.pctools.com/news/view/id/176/

Kaspersky wins fight against Zango
http://spamnotes.com/2007/06/06/zango-update--no-tro-against-kaspersky.aspx

Thursday, May 31, 2007

Good news ! - Hurray! Robert Alan Soloway is arrested

Good news for global Internet users, one of the worst email spammer is arrested.
Check out below articles:
http://www.solowaysucks.net/

More Info about him: Link

Wednesday, May 30, 2007

Watch this funny clips from Novel - PC, Mac... meet Linux

Both PC and Mac is meeting Linux.
Direct lnk: Here

Pirates of the Carribean Trojan - has anyone seen this??

Pirates Trojan keel-hauls surfers
Spam messages exploiting the publicity surrounding the release of the latest instalment of the Pirates of the Caribbean film franchise are being used to trick users into installing Trojan horse malware.
The junk mails feature a message that resembles promotional material for the film alongside links that supposedly point users towards trailers for Pirates of the Caribbean: At World’s End. Prospective marks are also offered the chance to win “free tickets”.
Users attempting to download this trailer are, in reality, only offered the Pirabbean-A (
Yar-A) Trojan.
The malware attempts to switch victims' dial-up connections onto a premium-rate number.
The Pirabbean-A Trojan uses a number of social engineering tricks in a bid to avoid detection.
When the Trojan is run, it shows an error message, claiming that the clip failed to load because a user's PC lacks the necessary codecs. Fans are pointed towards the film's official site. The tactic is an attempt to stop users from suspecting that something amiss may have happened to their machines, making it less likely that users will run an anti-virus check. To make doubly sure, the Trojan also attempts to disable anti-virus software.
The Trojan edits some Internet Explorer settings as well, adding two URLs to a user's Favorites. These maliciously constructed sites are designed to seed other forms of dialler software onto the PCs of prospective marks.
The attack is far from the first time that hackers have used interest in Hollywood's produce to punt their wares. Previous malware strains have posed as clips from Harry Potter movies or targeted fans of such favourites as Kill Bill and Star Wars.
Pirates of the Caribbean: At World’s End opened worldwide this weekend and is likely to do very well at the box office, despite the best efforts of critics such as the BBC Five Live's Mark Kermode. ®

Wednesday, May 23, 2007

New Windows problem with Windows Installer

Did you guys had any problem with Windows lately?
Check out this info on Microsoft Security Advisory KB927891 - fix for Windows Installer (MSI) problems

Analyzing an obfuscated ANI exploit

Check out this detailed work on ANI exploit from this link.

Adware.Zango sues PcTools's Spyware Doctor

This is very interesting developing lawsuit against major Antispyware company.
Check out the story:Link

How can this Zango be legitimate media company? After all they actually installs bunch of Trojans automatically.

Monday, May 14, 2007

Check out new graphical spam


I've received few spams today with graphical & refined spam.
Spams today are getting new looks.

Watch out for New threat! - USB Worm

This new threat targets Firefox/Orkut/Youtube.
Check out the full description from:

Sunday, May 6, 2007

Watch out for new variant of Trojan.PWSteal.BS or aka Trojan.Kardphisher


There is new trojan that appears Windows Activation asking for credit card details, it's fake.More detailed info can be found from Symantec blog page.

Or look at Trojan.Kardphisher [Symantec]
or Trojan.PWSteal.BS [PCTools]


Thursday, April 26, 2007

Found aternative tools for Antivirus protection.

There are many alternative protection tools are available to purchase or try for free.
Go ahead try test driving some of them.
They all claimed to be non signature type of Antivirus tools, but what happens when malware can bypass them?

o Signacert
o Robotgenius
o Cyberhawk

For home user visit Cyberhawk.

Custom Packer ! Article "Packers, Packers, Packers for sale !"


Has anyone noticed that some of the malware are packed with some weird packers?

For detailed information visit Websense link.


I wish I can obtain this packer.. ;)

Tale of 2 ANI attacks


Check out the two very different continental ANI exploit from Websense.

Detailed explaination can be locate here.


Also see the map provided by Google on the report.

New approaches to malware detection coming into view

The major AV vendors like Symantec, McAfee & TrendMicro is seeking new ways to detect Malware or viruses.
Detailed article can be found here.

JOKE! If Operating Systems Ran The Airlines...

Different operating systems. Different styles. But what if the quirks and styles of the different operating systems were applied to AIRLINES? What if airlines ran things the way operating systems do? This humorous analogy, applying operating system philosophies as if they were airlines, is a long-standing much-circulated amusing story, and we'd credit the author if we knew who wrote it!

If Operating Systems Ran The Airlines...

UNIX Airways
Everyone brings one piece of the plane along when they come to the airport. They all go out on the runway and put the plane together piece by piece, arguing non-stop about what kind of plane they are supposed to be building.

Air DOS
Everybody pushes the airplane until it glides, then they jump on and let the plane coast until it hits the ground again. Then they push again, jump on again, and so on...

Mac Airlines
All the stewards, captains, baggage handlers, and ticket agents look and act exactly the same. Every time you ask questions about details, you are gently but firmly told that you don't need to know, don't want to know, and everything will be done for you without your ever having to know, so just shut up.

Windows Air
The terminal is pretty and colourful, with friendly stewards, easy baggage check and boarding, and a smooth take-off. After about 10 minutes in the air, the plane explodes with no warning whatsoever.

Windows NT Air
Just like Windows Air, but costs more, uses much bigger planes, and takes out all the other aircraft within a 40-mile radius when it explodes.

Windows XP Air
You turn up at the airport,which is under contract to only allow XP Air planes. All the aircraft are identical, brightly coloured and three times as big as they need to be. The signs are huge and all point the same way. Whichever way you go, someone pops up dressed in a cloak and pointed hat insisting you follow him. Your luggage and clothes are taken off you and replaced with an XP Air suit and suitcase identical to everyone around you as this is included in the exorbitant ticket cost. The aircraft will not take off until you have signed a contract. The inflight entertainment promised turns out to be the same Mickey Mouse cartoon repeated over and over again. You have to phone your travel agent before you can have a meal or drink. You are searched regularly throughout the flight. If you go to the toilet twice or more you get charged for a new ticket. No matter what destination you booked you will always end up crash landing at Whistler in Canada.

OSX Air
You enter a white terminal, and all you can see is a woman sitting in the corner behind a white desk, you walk up to get your ticket. She smiles and says "Welcome to OS X Air, please allow us to take your picture", at which point a camera in the wall you didn't notice before takes your picture. "Thank you, here is your ticket" You are handed a minimalistic ticket with your picture at the top, it already has all of your information. A door opens to your right and you walk through. You enter a wide open space with one seat in the middle, you sit, listen to music and watch movies until the end of the flight. You never see any of the other passengers. You land, get off, and you say to yourself "wow, that was really nice, but I feel like something was missing"

Windows Vista Airlines
You enter a good looking terminal with the largest planes you have ever seen. Every 10 feet a security officer appears and asks you if you are "sure" you want to continue walking to your plane and if you would like to cancel. Not sure what cancel would do, you continue walking and ask the agent at the desk why the planes are so big. After the security officer making sure you want to ask the question and you want to hear the answer, the agent replies that they are bigger because it makes customers feel better, but the planes are designed to fly twice as slow. Adding the size helped achieve the slow fly goal.Once on the plane, every passenger has to be asked individually by the flight attendants if they are sure they want to take this flight. Then it is company policy that the captain asks the passengers collectively the same thing. After answering yes to so many questions, you are punched in the face by some stranger who when he asked "Are you sure you want me to punch you in the face? Cancel or Allow?" you instinctively say "Allow".After takeoff, the pilots realize that the landing gear driver wasn't updated to work with the new plane. Therefore it is always stuck in the down position. This forces the plane to fly even slower, but the pilots are used to it and continue to fly the planes, hoping that soon the landing gear manufacturer will give out a landing gear driver update.You arrive at your destination wishing you had used your reward miles with XP airlines rather than trying out this new carrier. A close friend, after hearing your story, mentions that Linux Air is a much better alternative and helps.

Linux Air
Disgruntled employees of all the other OS airlines decide to start their own airline. They build the planes, ticket counters, and pave the runways themselves. They charge a small fee to cover the cost of printing the ticket, but you can also download and print the ticket yourself.
When you board the plane, you are given a seat, four bolts, a wrench and a copy of the seat-HOWTO.html. Once settled, the fully adjustable seat is very comfortable, the plane leaves and arrives on time without a single problem, the in-flight meal is wonderful. You try to tell customers of the other airlines about the great trip, but all they can say is, "You had to do what with the seat?"

JOKE! Micro$oft & Unix joke qoutes

To err is human, but to really foul things up requires a computer.

Any sufficiently advanced bug is indistinguishable from a feature.
The UNIX philosophy basically involves giving you enough rope to hang yourself. And then a couple of feet more, just to be sure.

Those parts of the system that you can hit with a hammer (not advised) are called hardware; those program instructions that you can only curse at are called software.
The difference between Microsoft and Jurassic Park?In one, a mad businessman makes a lot of money with beasts that should be extinct.The other is a film.

The gates in my computer are AND, OR and NOT; they are not Bill.

Nobody will ever need more than 640k RAM!?Bill Gates, 1981Windows 95 needs at least 8 MB RAM.?Bill Gates, 1996Nobody will ever need Windows 95.?Logical conclusion

Those who can't write, write manuals.

You have moved the mouse. NT must be restarted for the changes to take effect.

A computer without any MS Windows is like a fish without a bicycle.
UNIX is user friendly. It's just selective about who its friends are.

If all else fails, read the documentation.

Unix, MS-DOS, and Windows NT (also known as the Good, the Bad, and the Ugly).
Those who don't understand Unix are doomed to reinvent it, poorly.

You may not understand what I'm installing, but that's not my job. I just need to click Next, Next, Finish here so I can walk to the next system and repeat the process?
Gates' Law: Every 18 months, the speed of software halves.

MCSE == Minesweeper Consultant / Solitaire Expert

Press any key to continue, or any other key to cancel.

The only place for 63,000 bugs is a rain forest?

Of course I use Microsoft. Setting up a stable unix network is no challenge ;p

If the ancients were right and to think is to exist, does Microsoft exist?

The BeOS takes the best features from the major operating systems. It's got the power and flexibility of Unix, the interface and ease of use of the MacOS, and Minesweeper from Windows.
Everyone has a photographic memory. Some don't have film.

A Law of Computer Programming:Make it possible for programmers to write in English and you will find that programmers cannot write in English.

Mosher's Law of Software Engineering:Don't worry if it doesn't work right.If everything did, you'll be out of a job

Real programmers don't write in BASIC. Actually, no programmers write in BASIC after reaching puberty.

Premature optimization is the root of all evil.
Voodoo Programming: Things programmers do that they know shouldn't work but they try anyway, and which sometimes actually work, such as recompiling everything.
Eagleson's Law:Any code of your own that you haven't looked at for six or moremonths, might as well have been written by someone else.

A programming language that is sort of like Pascal except more likeassembly except that it isn't very much like either one, or anything else. It is either the best language available to the art today, or it isn't.
If the code and the comments disagree, then both are probably wrong.?

/* Halley */(Halley's comment.)

Never attribute to malloc that which can be adequately explained by stupidity.
C is a language that combines all the elegance and power of assembly language with all the readability and maintainability of assembly language.

If it wasn't for C, we'll be using BASI, PASAL and OBOL

99 little bugs in the code, 99 bugs in the code,fix one bug, compile it again?101 little bugs in the code?

#define QUESTION ((bb) !(bb)) /* Shakespeare */

Give a man a computer program and you give him a headache, but teach him to program computers and you give him the power to create headaches for others for the rest of his life?
Bus error - driver executed.

Wednesday, April 25, 2007

0wning Vista from the boot

Read full article from here.
Federico Biancuzzi interviews Nitin and Vipin Kumar, authors of VBootkit, a rootkit that is able to load from Windows Vista boot-sectors. They discuss the "features" of their code, the support of the various versions of Vista, the possibility to place it inside the BIOS (it needs around 1500 bytes), and the chance to use it to bypass Vista's product activation or avoid DRM.

MicroSoft's own detailed threats listing site!

Checkout MS's threat listing, wow are they going to be full Antivirus company?
http://www.microsoft.com/security/portal/

Anatomy of Clickbot.A

Get PDF report from: http://www.usenix.org/events/hotbots07/tech/full_papers/daswani/daswani.pdf

JOKE! Some social mathematics for you

ROMANCE MATHEMATICS
Smart man + smart woman = romance
Smart man + dumb woman = affair
Dumb man + smart woman = marriage
Dumb man + dumb woman = pregnancy
`````````````````````````````````````
OFFICE ARITHMETIC
Smart boss + smart employee = profit
Smart boss + dumb employee = production
Dumb boss + smart employee = promotion
Dumb boss + dumb employee = overtime
```````````````````````````````````````
SHOPPING MATH
A man will pay $2 for a $1 item he needs.
A woman will pay $1 for a $2 item that she doesn't need.
``````````````````````````````````````````````````
GENERAL EQUATIONS & STATISTICS
A woman worries about the future until she gets a husband.
A man never worries about the future until he gets a wife.
A successful man is one who makes more money than his wife can spend.
A successful woman is one who can find such a man.
````````````````````````````````````````````````
HAPPINESS
To be happy with a man, you must understand him a lot and love him a little.
To be happy with a woman, you must love her a lot and not try to understand her at all.
`````````````````````````````````````````````````````````````````````````````
LONGEVITY
Married men live longer than single men do, but married men are a lot more willing to die.
``````````````````````````````````````````````````````````````````````````````
PROPENSITY TO CHANGE
woman marries a man expecting he will change, but he doesn't.A man marries a woman expecting that she won't change, and she does.
```````````````````````````````````````````````````````````````````````````````
DISCUSSION TECHNIQUE
A woman has the last word in any argument.Anything a man says after that is the beginning of a new argument.
````````````````````````````````````````````````````````````````````````````````
HOW TO STOP PEOPLE FROM BUGGING YOU ABOUT GETTING MARRIED
Old aunts used to come up to me at weddings, poking me in the ribs and cackling, telling me, "You're next." They stopped after I started doing the same thing to them at funerals.

Adware poses as ActiveX control

Article can be found here.

Security researchers have discovered samples of adware posing as ActiveX controls that allow voyeurs to watch online smut.
The ploy used by ImageAccesActiveXObject represents a new tactic in the battle to infect users' PCs, according to anti-virus firm Panda Software. The malware infects Windows PCs when users visit hacker-controlled websites posing as repositories of porn. When users visit these sites a window opens offering "erotic pictures". If the user agrees, another window informs that an ActiveX has to be installed. This control, however, is really the adware ImageAccesActiveXObject as demonstrated in a video produced by Panda on the threat.
document.write('\x3Cscript src="http://ad.uk.doubleclick.net/adj/reg.security.4159/antivirus;'+RegExCats+GetVCs()+'ptype='+RegPage+';maid='+maid+';pf='+RegPF+';dcove=d;test='+test+';sz=336x280;tile=3;ord=' + rand + '?" type="text/javascript">\x3C\/script>');
“Before now we had seen adware disguised as codecs to see videos, but never as ActiveX controls for viewing pictures. This is another strategy for tricking users. They think they are giving their consent to the installation of a legitimate tool when really they are allowing adware to be installed”, explained Luis Corrons, technical director of PandaLabs.
Once installed, the adware takes users to a page - which is currently unavailable - hosting smutty pictures. Meanwhile, malicious code is surreptitiously loaded onto compromised PCs. Among the sample of malware loaded onto PCs is SpyLocked, adware warning users that their computer is infected, and detectingImageAccesActiveXObject. The "scareware" posing as security software will not allow computers to be disinfected unless users register the product. ImageAccesActiveXObject also downloads the Securitytoolbar adware, which installs a toolbar and displays intrusive pop-up pages when users visit certain websites. ®

Webroot's disgrace action

Checkout the post messages as well!
http://sunbeltblog.blogspot.com/2007/04/this-is-just-weird.html

Cybercrooks who rig Web sites to break into PCs are getting better at hiding their malicious code, a security expert say

Article can be found here.

VANCOUVER, B.C.--Cybercrooks who rig Web sites to break into PCs are getting better at hiding their malicious code, a security expert said Wednesday.
Increasingly the actual code, often JavaScript, used to attack PCs is hidden in Flash animations or scrambled so that anyone who examines the source of a page can't easily identify it, said Jose Nazario, a senior software engineer at Arbor Networks, in a presentation at the CanSecWest security confab here.
"Their obfuscation tools are primitive but effective," Nazario said. "They use obfuscation to avoid simple signatures," he said, referring to security techniques based on signatures to detect malicious Web sites. Signatures are fingerprints of known attacks.
Web attacks have become commonplace. Tens of thousands of Web sites attempt to install malicious code, according to StopBadware.org. The sites, the bulk of which are compromised sites, often drop a Trojan horse or other pest onto a PC through a security hole in the Web browser.
Many attacks use JavaScript. Initially miscreants used plain JavaScript in their attacks, but that has changed, Nazario said. He has spotted an encoded script function called "makemelaugh" that downloads a Trojan horse that captures bank information and a Paris Hilton Flash animation that installs a tool that makes a PC part of a botnet.
Attackers also are trying to outsmart security pros by programming malicious sites to load their malicious code only once on the same PC, Nazario said. Furthermore, a new toolkit called NeoSploit identifies the browser and is packed with security exploits to launch the proper attack, he said.
There are things security professionals can do to investigate attacks, Nazario said. "Bad guys are limited by the fact that JavaScript has to be decoded to be used by the browser. As long as you can analyze it outside the browser, you can figure out what it is going to do," he said.
The scrambled code can be made legible since it typically uses simple Base64 encoding for obfuscation and not actual encryption, Nazario said. He suggested NJS, SpiderMonkey and Rhino as tools to investigate script code. Flash files can be analyzed using a program called Flasm, he said.
Malicious JavaScript can be embedded in a Web page and will typically run without warning when the page is viewed in any ordinary browser. Attackers could try to lure you to their own, rigged Web site. But an attack could also lurk on a trusted Web site by exploiting a common flaw known as cross-site scripting.
To shield against malicious JavaScript, Web surfers can disable JavaScript, but that can impact the functionality of many Web sites. An alternative is to use security tools that have blacklists of known bad sites such as McAfee's SiteAdvisor or Google's Toolbar or Desktop software.
Another alternative is Exploit Prevention Labs' LinkScanner, which monitors traffic going into a PC and blocks known exploits.

Check out the TrendMicro answer to McAfee's SiteAdvisor

TrendMicro is following footstep of McAfee's popular SiteAdvisor.

Want to see their newest tool "TrendProtect"?
Here: Link

Wednesday, April 11, 2007

Future Soldier - Robotcop look alike bodysuit



Check out cool Future Worrior's bodysuit, look just like from Robotcop movie.

Battlefiled 2025 style



Direct link: http://soldiermagazine.co.uk/mag/feature1.htm



* Super-strength soldiers
* Water-tight design
* Head start on the enemy
* Bullet-proof bootnecks
* Robo-Rangers

Monday, April 2, 2007

New threat - Windows's ANI exploit

Cnet security site is reporting Window's animated cursor exploit.
Direct link: http://reviews.cnet.com/4520-6600_7-6722377-1.html

If you happend to be received some spam emails with free Windows animated cursors attached, then do Not installs them! and run Windows update to obtain security patch from Microsoft.
Microsoft security pacth for animated cursor vulnerabilities Download link: here


From Cnet Security Center:-

Windows animated cursor attackThe way Microsoft Windows handles animated cursors on Web sites puts PCs at risk.By Robert Vamosi (March 30, 2007)(revised 4/2/07)
QUICK FACTS
Name: Windows animated cursor attack Date first reported: 03/29/07 CVE Number: CVE 2007-0038 Vulnerable software: Microsoft Windows 2000, SP1 through Windows Vista. What it does: Causes a denial of service attack (persistent reboot) or could allow remote access. Recommendations: Use an Internet browser other than Microsoft Internet Explorer, such as Firefox or Opera. Exploit code available: Yes Vendor patch available: Expected April 3, 2007.

8out of 10INTERNET THREAT RATINGHow we rate There's a new Microsoft Windows vulnerability being exploited across the Internet on over 100 Web sites, according to security vendor Websense. The vulnerability is caused by an unspecified error in the way Windows 2000, XP, and Vista handles animated cursors. Animated cursors allow a mouse pointer to appear animated on a Web site. The feature is often designated by the .ani suffix, but attacks for this vulnerability are not constrained by this file type so simply blocking .ani files won't necessarily protect a PC. Users need not do anything but visit a compromised site to become infected. Antivirus vendor F-Secure reports there's also a worm associated with this vulnerability.
Successful exploitation can result in memory corruption when processing cursors, animated cursors, and icons. According to Arbor Networks, the malicious code on compromised Web sites exploiting this flaw appears to be originating from the following sites, which you may want to block:
wsfgfdgrtyhgfd.net
85.255.113.4
uniq-soft.com
fdghewrtewrtyrew.biz
newasp.com.cn
To become infected, users must be using Internet Explorer 6 or 7; there is no need to click, just visiting an infected site is enough for an infection. The flaw does not affect Firefox or Opera Internet Browsers. Microsoft will release a patch on April 3, 2007. Until a patch is released, users should browse the Internet using a non-Internet Explorer browser. There is also a third-party (non-Microsoft) patch available here from the Zeroday Emergency Response Team (ZERT), however, this patch is offered "as is" and will need to be manually removed when Microsoft issues the official patch tomorrow.
Additional Resources
Microsoft: Advisory 935423
Zeroday Emergency Response Team (ZERT): Unofficial patch
NIST: CVE-2007-0038
Arbor Networks: Any Ani file could infect you
Websense: Alert
F-Secure: Blog post

Thursday, March 29, 2007

Fake Internet Explorer 7 beta discovered !!!

There are report of fake IE7 beta download via spammer.


Please do NOT install or download IE7 beta as Microsoft never sends emails out about their new release softwares.



The spam email looks like the one shown on this blog, it comes with legitimate looking IE7 logo.

This spam email contains illegal link to download trojan Virus.Win32.Grum.a

Monday, March 26, 2007

Detailed workout of Gozi the Russian Trojan

If you guys wants to read through very detailed work on Gozi, please click the below link.
It shows advanced research work done in detailed documental format.
This is sort of work I do as well.

Link: http://www.secureworks.com/research/threats/gozi/
Info on Gozi: http://blogs.zdnet.com/security/?p=133

Wednesday, March 21, 2007

F-Secure posted Youtube vid on Targeted Attacks.

Watch and learn about Targeted Attacks from F-Secure Youtube video.
Direct link: http://www.youtube.com/watch?v=nFw9ZHy0V3c

Anti-Spyware Coalition released reports

On March 15th, the Anti-Spyware Coalition released the finalized versions of two documents. One is titled Best Practices Suggestions and the other is on the topic of Conflicts Resolution.

Download reports from: http://www.antispywarecoalition.org/documents/

Microsoft's search excels in spreading malware

It seems Italian Gromozon is over taking MS live search site.
More reading from: http://www.theregister.co.uk/2007/03/20/windows_live_malware/

Thursday, March 15, 2007

Some Microsoft & GM joke

At a recent computer expo (COMDEX), Bill Gates reportedly compared the computer industry with the auto industry and stated, "'If GM had kept up with technology like the computer industry has, we would all be driving $25.00 cars that got 1,000 miles to the gallon.'

In response to Bill's comments, General Motors issued a press release stating:

If GM had developed technology like Microsoft, we would all be driving cars with the following
characteristics (and I just love this part):

1. For no reason whatsoever, your car would crash........ Twice a day.

2. Every time they repainted the lines in the road, you would have to buy a new car.

3. Occasionally your car would die on the freeway for no reason. You would have to
pull to the side of the road, close all of the windows, shut off the car, restart it, and
reopen the windows before you could continue. For some reason you would simply
accept this.

4. Occasionally, executing a maneuver such as a left turn would cause your car to shut
down and refuse to restart, in which case you would have to reinstall the engine.

5. Macintosh would make a car that was powered by the sun, was reliable, five times
as fast and twice as easy to drive - but would run on only five percent of the roads.

6. The oil, water temperature, and alternator warning lights would all be replaced by
a single 'This Car Has Performed An Illegal Operation' warning light.

7. The airbag system would ask 'Are you sure?' before deploying.

8. Occasionally, for no reason whatsoever, your car would lock you out and refuse to
let you in until you simultaneously lifted the door handle, turned the key and grabbed
hold of the radio antenna.

9. Every time a new car was introduced car buyers would have to learn how to drive all
over again because none of the controls would operate in the same manner as the old car.

10. You'd have to press the 'Start' button to turn the engine OFF.

Tuesday, March 13, 2007

Sunday, March 11, 2007

Watch Winfixer lawsuit video

Feb. 26, 2007 Special Report on a lawsuit involving Beatrice Ochoa, whose computer was infected by the notorious Winfixer

http://www.youtube.com/watch?v=zBUZHiKhsog

Monday, March 5, 2007

New threat arlert: Warezov email worm


F-Secure blog reported new Warezov email worm with attachment is going around, please be careful, the spam email looks like below:-

Do not reply to this message
Dear Customer, Our robot has fixed an abnormal activity from your IP address on sending e-mails. Probably it is connected with the last epidemic of a worm which does not have patches at the moment. We recommend you to install a firewall module and it will stop e-mail sending. Otherwise your account will be blocked until you do not eliminate malfunction. Customer support center robot

The attachment is a ZIP file which contains a static EXE file. The name varies, but it's always something like Update-KB[random numbers]-x86.exe.

Thursday, March 1, 2007

AV Comparative February 2007 is out now !

AV-comparatives.org is European based AV software certifier that test many popular & well known Antivirus software against to their extensive malware collection.

Obviously they are using European virus honey pod as result shows favourable to European based AV vendors.

You can view online result on ths link or download actualy report on PDF file from here.

Tuesday, February 27, 2007

New threat - Zlob variant or Trojan.popuper spreading via Myspace.com

Popups









F-secure reported that there is new variant of zlob spreading through Myspace.com forcing visitors to install MS viewer to read adult consent, instead they are actually installing zlob.
Article Link here.



Thursday, February 22, 2007

New threat ! - Malicious Website / Malicious Code: Trojan Crimeware using Google Maps

A fake breaking news report claiming that Australia's Prime Minister Mr. John Howard had a heart attack is being circulated by spammers in an attempt to hijack Australians' computers.

Article:- Link here

Cyberattacks Up 50% By 2010, VeriSign Says

VeriSign's unveiling Thursday of Project Titan, which seeks to expand the capacity of its global Internet infrastructure by 10 times by 2010, will be both a blessing and a bane to Internet users, creating a wider freeway for access to revolutionary new multimedia content while at the same time creating a greater number of targets for malicious attackers.
Cyberattacks will increase by 50% between now and Project Titan's completion, VeriSign CEO and chairman Stratton Sclavos said Thursday during his RSA Conference keynote. As long as cybercrime continues to grow as an industry, don't count on malicious attacks to abate on their own. "Where the money goes, so do the threats," he added.
While it's easy, not to mention good business, for security vendors to predict gloom and doom for the IT industry, Sclavos' point was punctuated by
Tuesday's massive denial-of-service attack against the 13 servers that help manage worldwide Internet traffic. This was a sophisticated attack consisting of "very, very large packets," Sclavos said. "Every request [made by those packets] was bogus, and every [packet] source was false."
Even worse, it was a sophisticated attack that "was very simple to deploy and scales phenomenally well," Sclavos said. "In fact, we're convinced that the perpetrators didn't even know how well it scales."
But the VeriSign CEO pointed the finger at himself and his colleagues in the security space, rather than dwelling on the attackers.
"Shame on all of us in this room who are security vendors," he said. "If we force our customers to choose between ease of use and better security, they will always choose simplicity. We have the security technology and have had it for years. Yet our consumers feel more vulnerable today than they've ever felt."
Still, it's not impossible for organizations to beat back the bad guys. Sclavos pointed to
PayPal, one of the companies most targeted by attackers, as a company that has had some security success because it's taken the threats seriously.
"They are using (
Extended Validation SSL Certificates) to be sure users don't make a phishing site for PayPal's site," he added.
Microsoft announced that it has enabled support for these certificates in Internet Explorer 7. When a user visits a site with a valid EV SSL Certificate, IE 7 alerts the user to the available identity information by turning the background of the address bar green and displaying identity information. Twelve certificate authorities, including VeriSign,
Cybertrust, and Entrust, issue EV SSL Certificates.
Certificate authorities won't issue EV SSL Certificates without first making the organization go through a stringent sign-up process, says Michael Barrett, PayPal's chief
information security officer. In addition, PayPal next week will begin offering certain clients, businesses, and possibly those who've been the victim of past fraud pass code-generating tokens for securely logging on to their PayPal accounts.
Barrett admits there's no easy way to keep bogus e-mailers (known as phishers) and other bad elements at bay, but that's no excuse for not trying, even if it means forcing cybercriminals to change their tactics. "There's no silver bullet," he says. "It's how much lead can you get in the air from a shotgun."

Wednesday, February 7, 2007

PC Tools Cracks Hacker Code in Seconds With New Secret Weapon -- Threat Expert(TM)

PC Tools claimed that they have new & better automatic malware analyzer.
This Threat Expert is similar to Norman's Sandbox & Sunbelt's CWSandbox.

By looking at their sample report I guess PC Tool's TM is better than Norman's Sandbox. I haven't tried Sunbelt's CWSandbox yet, but I guess they are also similar.

The PC Tool's TM report is a lot easy to follow but their tool is not free for everyone. You will need to talk to their marketing department in order to gain access to their utility that allows users to submit their sample file(s) [malware] to be analyze, which in return receives full detailed report about submitted file.

Which is great if you need to check the file to see if file is malicious or not.

Article Link: http://www.tmcnet.com/usubmit/2007/02/01/2303824.htm
PC Tool's TM Link: http://www.pctools.com/threat-expert/
Submit sample file: http://www.pctools.com/threat-expert/submit/

Other competitors sanbox links:-
http://sandbox.norman.no/
http://research.sunbelt-software.com/Submit.aspx (more info: http://www.cwsandbox.org/)

Free public Online scanners:- (No analyzer but just command line scanners)
http://virusscan.jotti.org/
http://www.virustotal.com/



Tuesday, February 6, 2007

The 16th annual RSA Conference is being held this week at the Moscone Center in San Francisco



I won't able to make it to this event, some day I will.
Here is direct link to RSA Conference:
http://www.rsaconference.com/2007/US/

Conference theme: "It is said that man can what he will. If you apply yourself with all your strengths and arts you will reach the foremost and supreme degree of perfection and fame in any effort."– Leon Battista Alberti

About him: http://en.wikipedia.org/wiki/Leon_Battista_Alberti

The first keynote of the day was delivered by Microsoft's Bill Gates and Craig Mundie, who naturally drew a big crowd. Throughout the day you could see lots of familiar names on stage, including crypto-legends Whitfield Diffie, Ron Rivest, Adi Shamir and Martin Hellman in the Cryptographers Panel.

Monday, February 5, 2007

Meeting the Swedish bank hacker - The author of Haxdoor

Another great article on interview with Haxdoor author.
Direct link: http://computersweden.idg.se/2.139/1.93344

For malware analyst like me, it's like having interview with vampire (me as vampire slayer).

Attack on Virtual machine

Here is good reading material for people interest in Virtual machine and malware.
It's pdf file, so you will need Adobe reader or free PDF reader.

Link: http://www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf

Sunday, February 4, 2007

Funny Mr. Bill Gate's saying about Steve Job's new marketing campaign

Ha ha, I personally never met Bill & Steve, but I think they are bunch of hypocrites, just want to make $$$ by selling second/third grade products. They never improve their previous product, just keep on selling NEW PRODUCT !

They don't really care about people or this planet earth. They use cheap advertising campaign to fool us.

The fact is over 90% of desktop computers & notebooks come with pre-loaded MS Windows and god know's how many mobile phones will come with standard Windows OS. :(

In other hand, Mac OS probadly only covers less than 2% of world computers, and rest are covered by other non MS or Mac OS such as Linux.

Apple's Mac targets consumer & specialists, MS's Windows targets commercial & dumb pc users and both targets entertainment market, but truth is their products are not so good or nor specialize compare it to other companies anyway. :)

Product Quality & features & prices & marketshare:
----------------------------
Apple's ipod vs iRiver's player (& other 3rd party players)->(3rd party players beats Apple)
MS's Xbox vs Sony's PS2/3 ->(PS3 beats xbox)
Ms's Windows vs Apple's iMac -> (Windows beats iMac)
MS's Zune player VS ipod -> (ipod beats Zune)
Sony's PSP vs Nintendo portable -> (nintendo beats Sony)
Nokia vs Blackberry -> (Nokia beats Blackberry)
Toyota VS Ford -> (Toyota beats Ford)
so on on on .. blah blah blah...


Link: http://blogs.siliconvalley.com/gmsv/2007/02/quoted_1.html

Found one coolest blog - very useful info & links for useful tools you can keep

Claus Valca posted a comprehensive list of online security scanners.

Link: http://grandstreamdreams.blogspot.com/2007/02/online-system-security-scanners.html

From his blog:-

Primarily virus/trojan related online scanners
Authentium - ThreatMatrix - (ActiveX required) - Free system virus scan
Arcabit Online Scanner - (ActiveX required) - Free system virus scan
BitDefender Free Online Virus Scan - (ActiveX required) - Free system virus scan of memory, files, folders, and drives' boot sectors with cleansing option.
Computer Associates eTrust Antivirus Web Scanner - (ActiveX required) - provides virus scanning, curing and deletion support.
Dr.WEB Anti-Virus - upload a file to scan for malicious software (look on page's sidebar)
F-secure Online Virus Scanner - (ActiveX required) - Free system virus scan
Freedom Online Scanner - Free system anti-virus scanner. I cannot tell if it will also remove identified files.
eTrust Antivirus Scanner (requires MS Internet Explorer)
HouseCall (Trend Micro) Online Scanner - (Java or ActiveX) - Checks for viruses, spyware or other malware/grayware. Also performs additional security checks and assists with detected item removal. (Windows, Linux, Solaris systems supported.)
Kaspersky On-line Scanner - (ActiveX required) - Does not remove threats, only alerts user to the presence of a malicious file.
McAfee Free Scan - (ActiveX required) - Free system virus scan
Microsoft: Windows Live OneCare Free Online Scanner - (ActiveX required) - scans for and removes viruses, spyware and other potentially unwanted software and vulnerabilities.
Panda Active Scan Online Scanner - (ActiveX required) - Scans for viruses, trojans, spyware, malware and provides support for removal of virus, worms and Trojans.
Panda SpyXposer - (ActiveX required) - Scans for malware presence. Does not offer removal support.
Symantec Security Check: Virus Detection - (ActiveX required) - "Virus Detection checks for known threats, including top threats identified by Symantec Security Response. Virus Detection provides an analysis of your results and offers suggestions for further action. It does not examine compressed files." -- from Symantec's service description.
Single-File Upload Scanners
avast! OnLine scanner - upload a single file to check.
CWSandbox - Laboratory for Dependable Distributed Systems University of Mannheim, upload a single file to check file behavior in a "sandboxed" system. Very cool behavior reporting. More information at the CWSandbox.org site. (added to list 02/07/2006)
FORTINET - Online virus center - submit a single file for review.
FRISK (f-prot) Software virus lab - submit a single file for review.
IKARUS Software Vienna - Upload sample file for analysis and response is via email.
Kaspersky File Scanner - upload a single file to check.
Norman SandBox Information Center - SandBox Live - Upload sample file for analysis and response is via email.
Sophos - Sample submission form - Upload sample file for analysis and response is via email.
Sunbelt CWSandbox - Sunbelt Software's free automated malware analysis. Upload a single file to check file behavior in a "sandboxed" system. From website description, "CWSandbox not only analyzes the given malware, but also all other processes that are started or infected by the malware." Note: at time of posting, reporting "service not available." (added to list 02/07/2006)
Virusbuster - submit file to VirusBuster labs for review and feedback.
Malware (spyware/adware/etc.) Online Scanners
a-squared Web Malware Scanner - (ActiveX required) - Free system scans for trojans, backdoors, worms, dialers, keyloggers, rootkits, hack-tools, riskware, tracking cookies.
eTrust (Computer Associates) PestScan - (ActiveX required) - Free system malware scan and removal tool.
ewdio (Grisoft) Anti-Spyware Scanner - (ActiveX required) - Free system malware scan and removal tool.
Tenebril - Free Spyware Scan - (ActiveX required) - Free system spyware scan
X-Cleaner Micro Edition - (ActiveX required) - FaceTime Security Labs malware scanner.
ZoneAlarm Security Scanner (Check Point) - (ActiveX required) - ZoneAlarm Labs malware scanner--will not remove any malicious files by itself.
Online "single-file" Multi-Scan Test Websites
Jotti's Malware Scan - Utilizing 15 different scan engines: AntiVir, ArcaVir, Avast, AVG Antivirus, BitDefender, ClamAV, Dr.Web, F-Prot Antivirus, F-Secure Anti-Virus, Fortinet, Kaspersky Anti-Virus, NOD32, Norman Virus Control, VirusBuster, VBA32.
Virus Total Scan - Utilizing 28 different scan engines: Aladdin (eSafe), ALWIL (Avast! Antivirus), Authentium (Command Antivirus), Avira (AntiVir), Cat Computer Services (Quick Heal), ClamAV (ClamWin), Computer Associates (Iris, Vet), Doctor Web, Ltd. (DrWeb), Eset Software (NOD32), ewido networks (ewido anti-malware), Fortinet (Fortinet), FRISK Software (F-Prot), Grisoft (AVG), Hacksoft (The Hacker), Ikarus Software (Ikarus), Kaspersky Lab (AVP), McAfee (VirusScan), Microsoft (Malware Protection), Norman (Norman Antivirus), Panda Software (Panda Platinum), Prevx (Prevx1), Softwin (BitDefender), Sophos (SAV), Sunbelt Software (Antivirus), Symantec (Norton Antivirus), UNA Corp (UNA), VirusBlokAda (VBA32), VirusBuster (VirusBuster)
Software or System Security Vulnerability Scanners
Dr. Web Link checkers service - plugin for Opera/Firefox/Internet Explorer. Scans file or web-page prior to opening to verify it is not malicious.
McAfee WiFiScan - "McAfee Wi-FiScan surveys your current Wi-Fi® connection, your wireless equipment, and local environment to assess security risks introduced by your wireless network." - from McAfee's service description.
Secunia's Software Inspector - "Detects insecure versions of applications installed, verifies that all Microsoft patches are applied, assists you in updating your system and applications, runs through your browser. No installation or download is required." - from Secunia's service description.
Symantec Security Check: Security Scan - (ActiveX required) - "Hacker Exposure Check - Checks whether your computer allows unknown or unauthorized Internet communications; Windows Vulnerability Check - Checks whether basic information about your computer, including your PC's network identity, is exposed to hackers; Trojan Horse Check - Checks whether your computer is safe from Trojan horses; Antivirus Product Check - Checks whether you're protected by a commonly-used virus protection product; Virus Protection Update Check - Checks whether you're safe from the latest viruses. Applicable if you have a virus protection product." -- from Symantec's service description.
Not Quite "Fully-Online" Based Software or System Security Vulnerability Scanners
A few of the products/services noted on other lists are included in their online scanner lists, but actually require download and execution of a exe (executable) based file on the local pc or download and running of exe (executable) based file from memory. While technically these might be considered "on-line" scanners, they are not so in the manner of the ones listed above.
I have chosen to include some of these products in this post, as they may be otherwise beneficial for interested parties to explore further;
Aluria Software (EarthLink) Spyware Scanner - scans and identifies malware on the local pc.
Computer Associates's Resource Center: (eTrust Pest Patrol, Optimization Scan, Privacy Scan) - download the appropriate tool and execute.
Microsoft: Malicious Software Removal Tool (for Windows XP and 2K) - targets only specific threats, included in Microsoft Critical Updates, so you may already have the file (MRT.exe) on your system: It is usually located in the C:\Windows\System32\ folder on XP systems or in the C:\WINNT\System32\ folder on Windows 2000 systems.
Webroot Enterprise Spy Audit - Generate a unique code, download the audit tool executable, find results.
Primary Sources:
I did quite a bit of work hunting these tools down, and then checking the links to get more information about the conditions they ran under and what category they would best be placed under. However, these links were the most helpful in providing me the services noted.
Computer Cleanup : Free Online Scanners
MikeAlao's Blog: Free Online Virus and Spyware Scanners (including updated links)
NIST IT Security: Free Online Antivirus, Spyware, and Firewall Scanners Review
VIRUSTOTAL - Hispasec Sistemas's list of participating companies
jotti - list of participating companies
Just another class of security tools to keep you safe!
--Claus
Post updated on 02/07/2007 where noted. Big Thanks to
Computer Defense blog for pointing out the additional scanner links!
Posted by Claus at
Sunday, February 04, 2007

Monday, January 29, 2007

Sunday, January 21, 2007

New technology of rootkits: Unreal

There is report of new Rootkit technology that can bypass all known Anti-Rootkit. This rootkit can be downloaded for testing.

Check out the forum site from Sysinternal:
http://forum.sysinternals.com/forum_posts.asp?TID=9630&PN=1&TPN=1

Thursday, January 18, 2007

Review on 6 Rootkit revealers from Informationweek

Check out full review from Informationweek.

They gives you some good background information that normal people can understand and reveals 6 well known Rootkit revealers. But they missed one more good program Sophos Anti-Rootkit (Which is best out of 6 rootkit revealers reviewed on below link).


Six reviewed anti-rootkit products:-
F-Secure BlackLightIceSwordRKDetectorRootkitBusterRootkitRevealerRootkit Unhooker

Sophos Anti-Rootkit can be download from http://www.sophos.com/products/free-tools/sophos-anti-rootkit.html

Full review from Informationweek:-
Link: http://www.informationweek.com/shared/printableArticle.jhtml?articleID=196901062

Spyware causing your PC to host porn materials

Here is the video for untrained people on how spyware can turn your PC into porn host.

Link: http://www.youtube.com/watch?v=gSMz2aEXj8M

Remember, once your PC is turned into Porn junk or zombie, you can't stop them until your totally disable all infected spyware or malware. Try using PC Tools's Spyware Doctor, Webroot's SpywareSweeper and combination of some rootkit revealer from Sophos and good Antivirus software like Kaspersky/McAfee/Symantec/TrendMicro.

Monday, January 15, 2007

Porno popups - Big deal?

You guys recall report of school teacher was busted for 40 years in prison because of some spyware caused porno popups during class session.

Big deal, we all know all popups are caused by adware & spyware or even cookies & scripts that cause automatic popups by just visiting legitimate web sites. And porno popups are no exception, they are just another popups with porno pictures.

Even I gets porn popups just visiting some blogs and webcasting sites.

Links:
Teacher get busted - http://www.computerworld.com/blogs/node/4346
Some examples of popups - http://www.benedelman.org/news/062206-1.html

Wednesday, January 10, 2007

Saddam malware

Have seen this Saddam's malware?, if you have copy of this virus file please send me a copy zip & encrypt it before you pasting to me directly or to http://www.pctools.com/mrc/submit/

More info on this w32/bandload virus:-
http://antivirus.about.com/b/a/257788.htm?nl=1
http://www.f-secure.com/weblog/archives/archive-012007.html#00001071

Macworld 2007: Steve Jobs keynote

Apple computer have launch new iPhone, check out Steve Jobs keynote
More links about iPhone & pics:-
From Apple:
http://www.apple.com/iphone/
From Blogger: http://appleiphone.blogspot.com/
From Gadget news: http://www.engadget.com/2007/01/09/the-apple-iphone/


New sophisticated phishing tool

Zdnet reported that there is new sophisticated phishing tool use by cybercrooks. Check out the link below.

From Zdnet January 10, 2007, 11:47 AM PT

Security experts at RSA have come across a new tool that automatically creates sophisticated phishing sites, a sign that cybercrooks are getting increasingly professional.
The tool, which RSA calls the "Universal Man-in-the-Middle Phishing Kit," is available on underground online marketplaces for about $1,000, Jens Hinrichsen, RSA's product marketing manager for fraud auction, said in an interview Wednesday.
"Unlike other phishing kits which have been in existence for quite some time, this kit is unique because with a very simple user interface you can choose whatever site you'd like to spoof," Hinrichsen said. "The arms race continues; we on the security side have to continue to escalate resources and invest in technology."
Phishing scams are a prevalent online threat that typically use fraudulent Web pages and spammed e-mail messages to trick people into giving up personal information such as user credentials or credit card data.
Using the new kit, a fraudster only has to enter variables such as which site should be spoofed and where the fraudulent page will be hosted. The tool then produces a dynamic Web page in the PHP (hypertext preprocessor) scripting language. The fraudster hosts this page somewhere on the Web, typically on a compromised Web server or a free Web host, and lures people to it with spammed e-mail messages or other links.
Unlike traditional phishing Web sites that have static Web pages designed to look like a real online bank or other trusted site, the dynamic page created by the phishing kit actually pulls in the current Web site of the target organization and displays it. However, any data entered is captured by the miscreants, Hinrichsen said.
"Once you enter your credentials, it would be intercepted by that server where the PHP file is hosted," he said. At the same time, the victim is actually logged in to the legitimate site and may never know he's been phished.
Shrewd phishers monitor the log-in process to validate that the data they capture is legitimate, Hinrichsen said. An incorrect username and password combination would be discarded. Also, the man-in-the-middle-style attack lets the miscreants continue to eavesdrop on the victim's interactions with the legitimate Web site, according to RSA.
The most popular phishing targets are banks and online payment services such as PayPal. Auctioneer eBay is also a common target. Fraudsters run phishing scams to collect personal information that can be used for identity fraud.

Link: http://news.zdnet.com/2100-1009_22-6149090.html

Thursday, January 4, 2007

Another Antivirus music band !

SecuriTeam blog reported another AV music band, it's from BitDefender, it's funny how Antivirus companies are trying to brain wash people with their music ;)

Check out their music from Youtube links;
http://www.youtube.com/results?search_query=bitdefender
And specifically:
http://www.youtube.com/watch?v=XLfNeYkgjpI
http://www.youtube.com/watch?v=NLHQknOP90c
http://www.youtube.com/watch?v=g-0IqmHiLRw
http://www.youtube.com/watch?v=-dhGZwinLrY

Now, go and watch the Symantec version: http://www.youtube.com/watch?v=x-UnYm6qfy8

Global Virus Map