Monday, March 30, 2009

Around The Horn vol.1,73

Intrusion Detection & Response - Leveraging Next Generation Firewall Technology

Category: Firewalls & Perimeter Protection

Paper Added: March 30, 2009

Watch your Internet routers!, (Mon, Mar 30th)

ISC reader Nick contacted us to share information about an Internet router at his workplace that got ...(more)...

Locate Conficker infected hosts with a network scan!, (Mon, Mar 30th)

The Honeynet Project has discovered an anomaly in Conficker that makes it possible to detect infecte ...(more)...

April 1st - What Will Really Happen?, (Sun, Mar 29th)

As reports and the belief of impending problems from the April 1st changes to Conficker contine to g ...(more)...

GhostNet, (Sun, Mar 29th)

We've had several readers write in with links to news articles about a cyber-espionage network ...(more)...

Is 'Conficker' Solved? Researchers Develop Scan Tool (PC Magazine) (Yahoo Security)

Security Sleuths Work Overtime to Confound Conficker (TechNewsWorld.com) (Yahoo News)

Security Researchers Score Win Against Conficker Worm (E-Week Security)

Massive Chinese Espionage Network (Schneier blog)

GhostNet Highlights Evolving Threat Environment (PC World) (Yahoo Security)

Adobe Reader, IE 7 Holes Under Attack (IT World) (Yahoo News)

Vexing computer worm to evolve on April Fool's Day (AFP) (Yahoo Security)

gh0stly Chinese Whispers.

By Rik Ferguson on government

  Information Warfare Monitor this weekend published a very interesting paper detailing their research into “a suspected cyber espionage network”. This research complements Trend Micro’s own ongoing research, since we first noted that the Tibetan Government in Exile’s own web site was compromised back in April of last year to serve malware through maliciously crafted image files.   The paper [...]

Britain could be shut down by hackers from China, intelligence experts warn

Posted by InfoSec News on Mar 30

http://www.telegraph.co.uk/news/worldnews/asia/china/5072204/Britain-could-be-shut-down-by-hackers-from-China-intelligence-experts-warn.html

By Alastair Jamieson
Telegraph.co.uk
29 March 2009

Ministers have been warned that a new £10bn communications network being
developed by BT is...

Vast Spy System Loots Computers in 103 Countries

Posted by InfoSec News on Mar 30

http://www.nytimes.com/2009/03/29/technology/29spy.html

By JOHN MARKOFF
The New York Times
March 28, 2009

TORONTO -- A vast electronic spying operation has infiltrated computers
and has stolen documents from hundreds of government and private offices
around the world, including those of...

Rogue spies hack Joel Fitzgibbons personal laptop

Posted by InfoSec News on Mar 30

http://www.news.com.au/dailytelegraph/story/0,22049,25248019-5001021,00.htm

By Ian McPhedran
The Daily Telegraph
March 27, 2009

ROGUE Defence spies have been accused of hacking into Defence Minister
Joel Fitzgibbon's personal laptop computer to steal bank details of his
Chinese-born...

Arlington Heights man charged with economic espionage

Posted by InfoSec News on Mar 30

http://www.dailyherald.com/story/?id=282101

By Rob Olmstead
Daily Herald
3/27/2009

At 11 a.m. Friday, David Yen Lee of Arlington Heights was supposed to be
in the air on a plane to China, authorities said.

Instead, he was sitting in a courtroom awaiting a hearing, wearing the
...

Cybercrime exceeds drug trade myth exploded

Posted by InfoSec News on Mar 30

http://www.theregister.co.uk/2009/03/27/cybercrime_mythbusters/

By John Leyden
The Register
27th March 2009

A leading security researcher has unpicked the origins of the myth that
revenues from cybercrime exceeds those from the global drug trade,
regurgitated by a senior security officer...

Linux Advisory Watch - March 27th 2009

Posted by InfoSec News on Mar 30

+----------------------------------------------------------------------+
| LinuxSecurity.com Weekly Newsletter |
| March 27th, 2009 Volume 10, Number 13 |

+----------------------------------------------------------------------+

How Much Is Conficker Really Impacting Enterprises?

Posted by InfoSec News on Mar 30

http://www.eweek.com/c/a/Security/How-Much-is-Conficker-Really-Impacting-Enterprises-718842/

By Brian Prince
eWEEK.com
2009-03-27

Given that Microsoft issued a patch for the flaw targeted by the
Conficker worm and the use of strong passwords can prevent much of the
spread, it seems odd...

Busted! Conficker's tell-tale heart uncovered

Researchers find Conficker cure, just in time

Security experts have made a breakthrough in their five-month battle against the Conficker worm, with the discovery that the malware leaves a fingerprint on infected machines which is easy to detect using a variety of off-the-shelf network scanners.…

BT network 'vulnerable to Chinese attack'

Spy chiefs warn over Huawei gear in 21CN

Spy chiefs have reportedly briefed ministers that Huawei hardware bought by BT could be hijacked by China to cripple the UK's communications infrastructure.…

China rubbishes cyber-espionage claims

Spooky Ghostnet revives malware spying accusations

China has been accused of using malware to spy against the Tibetan government-in-exile and the private office of the Dalai Lama, as well as numerous foreign embassies.…

Paper: "Tracking GhostNet: Investigating a Cyber Espionage Network"

By Robert A. on IndustryNews

There's been a bunch of news regarding a new report published indicating a wide spread Chinese espionage network dubbed 'ghostnet'. From the paper "This report documents the GhostNet - a suspected cyber espionage network of over 1,295 infected computers in 103 countries, 30% of which are high-value targets, including ministries of...

What you see is NOT what you get

By Abhishek Karnik and Vitaly Zaytsev on General Computer Security

We’ve all read of social engineering tactics before and how gullible users fall prey to many tactics used by virus authors. As researchers we often give recommendations to family and friends on how not to fall prey to such tricks, but once in a while we need to remind ourselves too that we are included in [...]

Brief: Researchers find way to detect Conficker

Researchers find way to detect Conficker

NSM vs The Cloud

By Richard Bejtlich

A blog reader posted the following comment to my post Network Security Monitoring Lives:
How do you use NSM to monitor the growing population of remote, intermittently connect mobile computing devices? What happens when those same computers access corporate resource hosted by a 3rd party such as corporate SaaS applications or storage in the cloud?
This is a great question. The good news is we are already facing this problem today. The answer to the question can be found in a few old principles I will describe below.

  • Something is better than nothing. I've written about this elsewhere: computer professionals tend to think in binary terms, i.e., all or nothing. A large number of people I encounter think 'if I can't get it all, I don't want anything." That thinking flies in the face of reality. There are no absolutes in digital security, or analog security for that matter. I already own multiple assets that do not strictly reside on any single network that I control. In my office I see my laptop and Blackberry as two examples.
    Each could indeed have severe problems that started when they were connected to some foreign network, like a hotel or elsewhere. However, when the obtain Internet access in my office, I can watch them. Sure, a really clever intruder could program his malware to be dormant on my systems when I am connected to "home." How often will that be the case? It depends on my adversary, and his deployment model. (Consider malware that never executes on VMs. Hello, malware-proof hosts that only operate on VMs!)
    The point is that my devices spend enough time on a sufficiently monitored network for me to have some sense that I could observe indicators of problems. Of course I may not know what those indicators could be a priori; cue retrospective security analysis.
  • What is the purpose of monitoring? Don't just monitor for the sake of monitoring. What is the goal? If you are trying to identify suspicious or malicious activity to high priority servers, does it make sense to try to watch clients? Perhaps you would be better off monitoring closer to the servers? This is where adversary simulation plays a role. Devise scenarios that emulate activity you expect an opponent to perform. Execute the mission, then see if you caught the red team. If you did not, or if your coverage was less than what you think you need, devise a new resistance and detection strategy.
  • Build visibility in. When you are planning how to use cloud services, build visibility in the requirements. This will not make you popular with the server and network teams that want to migrate to VMs in the sky or MPLS circuits that evade your NSM platforms. However, if you have an enterprise visibility architect, you can build requirements for the sort of data you need from your third parties and cloud providers. This can be a real differentiator for those vendors. Visibility is really a prerequisite for "security," anyway. If you can't tell what's happening to your data in the cloud via visibility, how are you supposed to validate that it is "secure"?

I will say that I am worried about attack and command and control channels that might reside within encrypted, "expected" mechanisms, like updates from the Blackberry server and the like. I deal with that issue by not handling the most sensitive data on my Blackberry. There's nothing novel about that.

Response to 60 Minutes Story "The Internet Is Infected"

By Richard Bejtlich

I just watched the 60 Minutes story The Internet Is Infected. I have mixed feelings about this story, but I think you can still encourage others to watch and/or read it. Overall I think the effect will be positive, because it often takes a story from a major and fairly respected news source to grab the attention of those who do not operationally defend networks.
I'd like to outline the negative and positive aspects of the story, in my humble point of view.
The negative aspects are as follows:

  1. I detest the term "infected." Computers in 2009 are not "infected." They are compromised by malware operated by a human with an objective. The malware is a tool; it is not the end goal. In the late 1990s I enjoyed defending networks because the activity I monitored was caused by a human, live on the Internet, whose very keystrokes I could watch. At the beginning of this decade I despaired as human action was drowned in a sea of malware that basically propagated but did little otherwise. Since the middle of the decade we have had the worst of both worlds; when I see malware I know there is a human acting through it for malicious purposes. I detest "infection" because the term implies we can apply some antiseptic to the wound to "clean it." In reality the malware's operator will fight back, resist "cleaning," and maintain persistence.
  2. Cue the "teenage hacker." I thought we were collectively making progress away from the pasty-faced teenager in the parental basement. It seems the popular consciousness has now moved to the pasty-faced teenager in Russia, courtesy of 14-year-old "Tempest" in the 60 Minutes video. Never mind the organized crime, foreign intelligence, and economic espionage angles. Two other groups are definitely going to be upset by this: Chinese hackers and insider threats. Actually, not hearing a word about the latter makes me feel happy inside.
  3. "I thought I had a good enough firewall." GROAN. Hearing people talk about their firewalls and anti-virus was disheartening. I almost thought Vint Cerf was going to spill the beans on the easiest way to avoid Conficker when he said the following:
    I’ve been on the Net ever since the Net started, and I haven’t had any of the bad problems that you’ve described," Cerf replied...
    Because I don't use Windows! Say it Vint! Oh well.

The positive aspects are as follows:
  1. Hello security awareness. Stories like this wake people up to the problems we face every day. Sure Conficker is just the latest piece of malware, definitely not "one of the most dangerous threats ever," as said on TV. At the very least this story should enable a conversation between management and security operations.
  2. Client-side exploitation via socially-engineered and social network attacks were demonstrated. Good for Symantec to show that Morley Safer owns Leslie Stahl via Facebook. Better yet, 60 Minutes even used the term "owned"!
  3. Real consequences were demonstrated. I am very glad that Symantec showed just what an intruder can do to an owned computer. Keystroke logging, screen scraping, sensitive informatiomn retrieval, the works. They didn't even mention opening and closing the CD tray or activating the Webcam. That would have been cool, though.

Expect a few questions about this tomorrow at work!

3 Ways Pen Testing Helps DLP (and 2 Ways It Doesn't)

Penetration testing's future has been caught in heated debate recently, sparked by Fortify Co-Founder and Chief Scientist Brian Chess' prediction that the practice would die off this year. [See: Penetration Testing: Dead in 2009]

Smart grid, other environmental control systems not smart about security

If lengthy requirements were a measure of success, then smart grid technology is well on its way to being an anomaly in the environmental controls space. But I'm not going to try to hold my breath for that to happen.

EC to probe online profiling by Web sites and ISPs

The European Commission is about to launch an investigation into how consumers' online data is being used by search companies, social networking Web sites and ISPs, a spokeswoman said Monday.

GhostNet highlights evolving threat environment

The high-profile disclosure over the weekend of the GhostNet cyberespionage ring that targeted 1,295 computers in more than 100 countries underscores how highly targeted and sophisticated attacks, often run by criminals, are changing the security landscape, according to a security researcher at Symantec.

Mozilla patches Firefox's critical Pwn2Own bug

Mozilla Corp. patched two critical Firefox bugs on Friday, including one used the week before by a German student to win $15,000 for hacking three different browsers at the Pwn2Own contest.

The Experts Community

I missed The Experts Conference last week (formerly the Directory Experts Conference), the first time in a number of years. And, as this was the first edition of the event since Quest assimilated NetPro last fall, I was quite interested in how it went.

New security standard MashSSL builds application trust

Application mashups are gaining traction in the enterprise. There's no doubt that productivity can be enhanced when new functionality can be delivered quickly and conveniently by combining information from multiple sources. However, there's a trade-off in application security. Mashups hold the potential to introduce a new network attack vector. A proposed new standard called MashSSL could eliminate the security concerns, making enterprise mashups as secure as any SSL transaction.

Top 10 technology skills

Amidst the worst job market in 25 years, IT is holding steady. Most CIOs are maintaining their current staffing levels; while a few are hiring specialists who have in-demand IT skills.

Latest cloud storage hiccups prompts data security questions

The pitch from providers of hosted storage services sounds enticing. Instead of what these provider call the inherent risks in using hard drives or DVDs to store data, users are better off paying pay a small fee and backing up data in the cloud. Cloud storage providers pledge that putting valuable data into their hands is like keeping money in a bank.

Deep computer-spying network touched 103 countries

A 10-month cyberespionage investigation has found that 1,295 computers in 103 countries and belonging to international institutions have been spied on, with some circumstantial evidence suggesting China may be to blame.

Chinese cyberespionage network runs across 103 nations

By jhruska@arstechnica.com (Joel Hruska) on Tibet

companion photo for Chinese cyberespionage network runs across 103 nations

The existence and operation of massive, coordinated, government-affiliated online espionage networks is typically the province of television or the silver screen, rather than the subject of  research. In the real world, even a direct link between online and offline action (Russia's invasion of Georgia and the simultaneous online attacks against that country are a good example) is not enough to automatically prove that the government behind the one is automatically behind the other. We've covered the rise of hacktivism previously on Ars; as more citizens come online, we'll undoubtedly see more of this type of crowdsourced aggression in the future.

Researchers in Toronto, however, may have actually discovered and tracked a hacking effort that can be traced back to a foreign intelligence network—China's, in this case—over the past ten months. The team, which is affiliated with the Munk Centre for International Studies, has published an extensive report on the activities of what they dub GhostNet. Their investigation took place from June 2008 through March of 2009, and focused on allegations that the Chinese had engaged in systemic online espionage activities against the Tibetan community. GhostNet was spread through the use of a wide variety of Trojans, many of which were controlled through a program nicknamed gh0st RAT (Remote Access Tool).

MyID.is takes logical step, links Web ID with real world

By david@arstechnica.com (David Chartier) on OpenID

The notion of online verification is certainly nothing new, though it is also not for everyone. Many users prefer the anonymity of the Web for any number of (sometimes nefarious) reasons. For others, a centralized login and identity management resource is an ideal solution for the modern times, and these kinds of systems are blossoming. OpenID itself is experiencing broad adoption by the largest players in technology and the Web, though consumers have not been as quick to hop on board. Facebook Connect has taken off as both a single sign-on launchpad and activity syndication mechanism, but the newly launched, London-based MyID.is may be the first to tackle the challenge of tying our Web personas with our real world identities.

MyID.is' approach is simple, though it takes some time to get set up. The company is an OpenID provider, and it adds a key element of real world ID verification by charging a small, random setup fee (between €2 and €5) to your credit card, then mailing a code to your home address. Much like PayPal's account creation process, you must enter the fee amount and snail mail code on MyID.is' website, and the name on your card must match the name you registered with. After you successfully enter all this information, you'll have a MyID.is-provided OpenID URL and identity with which to badge your blog (pictured above), forum comments, Facebook profile, and just about any other online activity to prove that the content you generate is really coming from you.

GhostNet Highlights Evolving Threat Environment

Attacks are increasingly sophisticated and targeted, making them difficult to defend against.

Deep Computer-spying Network Touched 103 Countries

UPDATE: Analysts find spyware installed on servers belonging to foreign ministries, embassies and private companies.

Concern about Secure Disposal Hampers Green Efforts

A study finds that security worries, not environmental issues, drive e-waste disposal habits by businesses.

Cybersecurity Office Fate Uncertain

Federal cybersecurity duties may go to a new White House office or be handled by an existing agency, such as Homeland Security.

Search for 'Conficker' Could Lure Virus

Symantec warns

Firefox Patches Zero-day, Hacking Contest Bugs

The update fixes a bug used to win the Pwn2Own hacking contest.

Security Analyst Spots Three Flaws in Google Docs

Google denies problems, but finds could raise more questions over the safety of storing data in the cloud.

Google caches payment card details for 19,000 brits

Stolen information wants to be free, too

More evidence of Google's success in organizing the world's information and making it universally accessible: Payment card details for 19,000 Brits were recently found hosted in the search engine's web cache.…

Romanian phisher gets 50 month prison term

No credit for good grammar

A Romanian man has been sentenced to serve more than four years in US prison for taking part in a sophisticated phishing scam that cost financial institutions at least $150,000.…

Delivering sustainable security

Audio + Slides

Regcast In the third in our series of Regcasts assessing the state of the IT security market, the experts look at the mechanisms required to ensure security solutions evolve to match the ever changing threat landscape.…

Firefox update fixes pwn2own vuln

Early arrival

Mozilla responded to reports of vulnerabilities by pushing out a new version of Firefox on Friday.…

Conficker flaw yields new tool for detection

By Robert Westervelt

A flaw in the way Conficker infects machines has given security experts the ability to design a new tool to remotely detect infections over the network.

Firefox update blocks proof-of-concept code

By SearchSecurity.com Staff

Mozilla updated Firefox to repair several flaws, including a critical zero-day flaw.

Microsoft calls next Conficker variant 'manageable'

By Robert Westervelt

The next version of Conficker expected April 1, should be treated like any other malware attack, Microsoft said in a message to customers.

Saturday, March 28, 2009

Around The Horn vol.1,72

Microsoft security updates for March 2009

Learn about and download the latest computer security updates for March 2009. Read tips on protecting your computer by using anti-spyware and anti-spam programs.

Update on Conficker.D

By MSRCTEAM

We’ve received a lot of questions from customers about April 1, 2009 and the latest Conficker variant discovered earlier this month, Worm:Win32/Conficker.D (also known as Conficker.C or Downadup.C by some other companies). I wanted to let you know that we’ve put some new information up about Conficker.D today from our work with our partners in the Conficker Working Group.

We hope this new information helps you better understand the current situation. While any malware attack is cause for concern, customers who continue to follow the guidance we’ve always given, such as: apply security updates, update security software signatures and clean infected systems, should look at the latest version of Conficker like other malware attacks: a manageable cause for concern.

Since we announced our work with the Conficker Working Group and the $250,000 reward, a new version of Conficker was released, Conficker.D. Systems infected with Conficker.D are systems that were once infected with Worm:Win32/Conficker.B. This new version, Conficker.D, does not spread by attacking new systems.

The April 1, 2009 date that has been talked about recently refers to the date when these systems infected with Conficker.D will start trying to contact domains on the Internet, presumably for new instructions. This is identical behavior to what these systems did when they were infected with Conficker.B. What’s different between Conficker.B and Conficker.D is that the domain generation algorithm that I talked about in my February 12, 2009 posting has been changed. The new algorithm generates a larger pool of possible domains than the original one. You can get more details on this over at the Microsoft Malware Protection Center (MMPC) weblog.

While Conficker.D will start trying to contact a new pool of possible domains on April 1, 2009, we at Microsoft and our colleagues in the Conficker Working Group will continue doing what we’ve been doing throughout: working together on a daily basis to share information and take coordinated actions to help disrupt Conficker. In fact, we’ve already been taking actions against Conficker.D like we have against Conficker.B.

Just like we’re staying constant and focused in our actions against Conficker, all of us encourage customers to stay constant and focused in their actions: ensure your systems are updated with MS08-067, keep your security software signatures updated, and clean any systems you identify that are infected with any version of Conficker.

My colleagues over in the Microsoft Malware Protection Center (MMPC) have more detailed information on Conficker.D on their weblog. Also, some of our partners in the Conficker Working Group have posted some information about Conficker.D and the importance of staying constant and focused in combating it. A sampling of some of the information our partners have posted includes:

· F-Secure

· Secureworks

We’ll all be here working to protect customers from Conficker and other threats on April 1, 2009, just like we are today, and we will continue to be here after April 1, 2009. And of course, we’ll update our weblog as we have new information and our partners will do the same.

Thanks.

Christopher

*This posting is provided "AS IS" with no warranties, and confers no rights.*

UK Parliament Conficked!

By Rik Ferguson on worm_downad

  According to blogger Dizzy Thinks, the UK Parliament has become the latest institution to fall victim to the spread of Downad/Conficker. In an internal memo, which was subsequently leaked, network users were advised the following:   To: All users connecting directly to the Parliamentary Network The Parliamentary Network has been affected by a virus known as conficker. This [...]

Downad/Conficker, who’s the April Fool?

By Rik Ferguson on worm_downad

A brief outline of the story so far with WORM_DOWNAD and some thoughts about the April 1st “activation date”.     “This could well be very big, but it will also be very quiet.” I’m beginning to get a little exercised by many of the verbs I am seeing attached to this malware in recent commentary; words like “virus set to explode”, [...]

HackersBlog Call It a Day (invoke Jim Morrison)

By Rik Ferguson on Hacking

The Romanian “white-hat” hacker group known as HackersBlog have posted a notice on their site, explaining that they are disbanding the collective.   The group, responsible for many high profile intrusions over the past few months, are calling an end to their team activity for reasons of boredom! In their own words: “we’ve gotten to that point where most [...]

Cybercriminal Call Centres?

By Rik Ferguson on telephone

As the cybercrime economy matures so does the range of services being offered.   We are familiar with seeing cybercriminals offering the resources at their disposal to carry out Distributed Denial of Service attacks (DDoS) against IP addresses. Imagine though, how much more effective an attack against your fiercest competitor could be if you could take out their [...]

Dial 0308-PHISH

By Rik Ferguson on telephone

I’m working from home today and I just received a phone call on my land line. Not in itself unusual, but the call was…   The number that was calling me was 030811111110 , when I answered the call it immediately connected to an outbound ringback service, so I heard the ringing tone as if I had initiated [...]

Pwn2Own 2009 Result…

By Rik Ferguson on compromise

A quick note.   This just in, reports are coming in from CanSecWest that the Mac was the first to fall again, with a Safari zero-day vulnerability being succesfully exploited by Charlie Miller (again) just seconds after the contest opened, claiming the $10,000.00 prize money and the MacBook.   The sponsors, TippingPoint will work with Apple to make sure [...]

Government Party Like It’s 1984

By Rik Ferguson on snooping

It occurs to me that the British Government  must have been singularly unimpressed with the lack of fuss that their implementation of the EU Data Retention Directive caused among internet users in the UK.   I covered the implementation of the directive in a blog post on Monday, but in a nutshell it obliges ISPs to keep records [...]

TweetFollow your way to infection

By Rik Ferguson on malware

TweetFollow is an iPhone application available from http://www.b1te.com/tweetfollow/   Unfortunately for the application vendors though, tweetfollow.com (DON’T GO THERE) is also a domain that is hosting malicious JavaScripts that redirect the visitor to download malware.   In a textbook example of cybersquatting and trend surfing, these cybercriminals are banking on the popularity of both Twitter and the iPhone to maximise [...]

Waledac: Reuters Video News Social Engineering

By Rik Ferguson on waledac

This attack is covered in detail over on the TrendLabs Malware Blog   Coupons & Barack Obama in January, Valentines in February and now video news in March. Waledac has once again reinvented itself. The creators have moved on from their coupon related campaign and are now using fake big news events with associated video content to fool [...]

Every Breath You Take

By Rik Ferguson on snooping

When you send an email, it feels like such an ethereal thing, effective, cheap, convenient and relatively instant, yes, but it has none of the permanence of physical postal mail does it? Does it?   From today Internet Service Providers in the UK, and soon enough throughout Europe will be obliged to keep a log of every [...]

An interview with HackersBlog

By Rik Ferguson on SQL Injection

UPDATE: A couple of days after this interview, HackersBlog released the details of their latest succesful compromise, Tiscali UK. Once again, access to user data, including username, firstname, surname, company, telephone, regdate, lastlogin, email and hashed password.       After many high profile compromises over the past few months, the Romanian hacking project HackersBlog United is rapidly gaining visibility [...]

New Rootkit Attack Hard To Kill

Researchers demonstrate BIOS-based rootkit injection that evades antivirus software

Notorious Conficker Worm Still Alive And Infecting Unpatched PCs

Wily worm stays alive despite bounty on its creators

Deblaze - Remote Method Enumeration Tool For Flex Servers

By Darknet on web-application-security

Through the use of the Flex programming model and the ActionScript language, Flash Remoting was born. Flash applications can make request to a remote server to call server side functions, such as looking up accounts, retrieving additional data and graphics, and performing complex business operations. However, the ability to call remote methods...
Read the full post at darknet.org.uk

Senators Raise Questions About Former CIA Chief Accused of Security Breach

Posted by InfoSec News on Mar 27

http://www.cqpolitics.com/wmspage.cfm?docID=news-000003084854

By Tim Starks
CQ Politics
March 25, 2009

The head of the Senate Intelligence Committee signed on to a letter late
last week questioning whether a former CIA director appointed by the
nation’s spy chief should be allowed to...

Tapping, hacking and leaking

Posted by InfoSec News on Mar 27

http://www.brisbanetimes.com.au/national/tapping-hacking-and-leaking-20090326-9ceo.html

By Jacob Saulwick
Brisbane Times
March 26, 2009

THE mission statement says a lot: "Reveal their secrets … Protect our
own".

And the nature of its work means that when the Defence Signals
...

White House cyber adviser -- more questions than answers

Posted by InfoSec News on Mar 27

http://news.cnet.com/8301-13578_3-10203622-38.html

By Stephanie Condon
Politics and Law
CNET News
March 26, 2009

The comprehensive cybersecurity legislation currently in development in
the Senate aims to bring high-level government attention to the serious
problem of cybersecurity by...

Firefox exploit sends Mozilla into high-priority fire drill mode

Posted by InfoSec News on Mar 27

http://www.theregister.co.uk/2009/03/26/new_firefox_exploit/

By Dan Goodin in San Francisco
The Register
26th March 2009

Mozilla's security team is rushing out a fix for its flagship Mozilla
browser following the public release of attack code that targets a
previously unknown...

Indian Army fears China attack by 2017

Posted by InfoSec News on Mar 27

http://www.dailytimes.com.pk/default.asp?page=2009\03\27\story_27-3-2009_pg7_45

Daily Times
March 27, 2009

LAHORE: The Indian military fears a ‘Chinese aggression’ in less than a
decade, the Hindustan Times has reported, and claimed that a secret
exercise – called ‘Divine Matrix’...

ACU says computer server hacked

Posted by InfoSec News on Mar 27

http://www.reporternews.com/news/2009/mar/26/acu-says-computer-server-hacked/

By Brian Bethel
Abilene Reporter-News
March 26, 2009

An Abilene Christian University computer server was hacked near the end
of February, but university officials do not at this point believe any
personal...

Researchers poke holes in super duper SSL

Spoofing the unspoofable

Websites that use an enhanced form of digital authentication remain just as vulnerable to a common form of spoofing attack as those that use less costly certificates, two researchers have found.…

Interweb Chuck Norris infiltrates Netflix, Tivo

CSRF has two speeds: Hack and Kill

Researcher Lance James has been busy devising ways to play tricks on some of the world's bigger websites using an exotic attack known as CSRF, or cross site request forgery. While his exploits amount to little more than pranks, they point to the very sobering realization that the net isn't a very secure place.…

'Cybercrime exceeds drug trade' myth exploded

AT&T feeds Congress trillion-dollar FUD

A leading security researcher has unpicked the origins of the myth that revenues from cybercrime exceeds those from the global drug trade, regurgitated by a senior security officer at AT&T before Congress last week.…

Leaked memo says Conficker pwns Parliament
House of Commons systems borked

Updated The House of Commons IT systems has reportedly been infected by the infamous Conficker superworm, which has previously infected millions of Windows PCs and affected the operation of hospitals, military and large corporate systems.…

Cisco patch bundle lances multiple DoS flaws

Updates tackle router crash risks

Cisco has released a bundle of security updates, designed to fix a variety of flaws in its core IOS networking software.…

Tool: XSS Rays

By Robert A. on XSS

"I’ve developed a new XSS scanner tool that’s written in Javascript called XSS Rays for Microsoft. They have given me permission to release the tool as open source which is awesome because it can be used for other open source applications. I recommend you use it as part of the web...

Watcher: a free web-app security testing and compliance auditing tool

By Robert A. on Tools

"Watcher is designed as a Fiddler plugin that passively monitors HTTP/S traffic for vulnerabilities. It gives pen-testers hot-spot detection for user-controlled inputs, open redirects, and other issues, and it gives auditors an easy way to find PCI compliance and other organizational issues. Here’s some of the issues Watcher has checks for...

More companies seek third-party Web app code review, survey finds

By Robert A. on Metrics

"The OWASP Security Spending Benchmark Report surveyed about 50 organizations to determine their spending on secure coding; OWASP found that 61% of those surveyed had an independent third-party security review of software code to find flaws before Web applications are used live. The percentage surprised Boaz Gelbord, executive director of information...

Another day hunting malware…

By Pedro Bueno on Malware Research

Don’t you like when legit obfuscated javascript is mixed with the malicious one? Also, don’t you like when the malicious one is linked with several redirection, referrals, exploits and other malwares? So, here is the story… Once upon a time a user was checking for a service on google and found one that fits the need… The site is [...]

More Comments Regarding Conficker

By Kevin Beets and Karthik Raman on Vulnerability Research

A lot has been published about Conficker already–this blog is an addendum to our previously published “W32/Conficker: Much Ado About Nothing.” Here we offer some Conficker snippets, if you will. First off, you may be confused by the differences between the a, b, and c variants. Let’s clear this up a bit. The Conficker.worm.a and Conficker.worm.b [...]

W32/Conficker: Much Ado About Nothing?

By Vinoo Thomas on Stinger

In the run-up to April 1, the media spotlight around the latest Conficker worm variant has reached a morbid frenzy. From being touted as an “April Fool’s joke” to outrageous headlines such as “Millions of computers expected to be destroyed”–no other worm in recent history has generated this much media attention. But what have we [...]

Brief: Conficker's capabilities worry researchers

Conficker's capabilities worry researchers

Economy fuels malware, spam

By Robert Westervelt

Dave Marcus of McAfee's Avert Labs, breaks down the threat landscape and explains why spam numbers are rising and malware writers are taking advantage of the down economy.

Adobe Reader, IE 7 Holes Under Attack

If you were an Internet crook, the following item would be music to your ears: A zero-day flaw--a security hole with no fix available before attacks could be launched--exists in Adobe Reader and Acrobat, and can be exploited by a poisoned PDF file in an attempt to take over a vulnerable computer.

Will Tracker Tools for Your Cell Phone Give You Away?

Cell phone apps like Loopt and the new Google Latitude allow you to track your friends' physical locations, and be tracked in return. That can be a huge boon for meeting up on a Friday night-and a real nightmare for privacy if proper safeguards aren't in place. (Read more on cell phone privacy.)

Firefox patches zero-day, hacking contest bugs

Just days after a hacker released code that could be used to attack the Firefox browser, Mozilla developers have a fix.

Google plays down security concerns over Docs

Google Docs users shouldn't lose sleep over the security concerns a security analyst has raised about the hosted suite of office productivity applications, Google said late Friday.

Fears of a Conficker meltdown greatly exaggerated

Worries that the notorious Conficker worm will somehow rise up and devastate the Internet on April 1 are misplaced, security experts said Friday.

Users spurn latest Adobe PDF patches, says researcher

Although Adobe spent much of March releasing fixes for a PDF bug that hackers have been exploiting for more than three months, users are in no hurry to patch, a security company said Friday.

Creation of White House cybersecurity office still uncertain

It's unclear whether a report being prepared for President Barack Obama on federal information security preparedness will support recent calls for the creation of a new cybersecurity office within the White House, two lawmakers said Thursday.

Hack contest sponsor confirms IE8 bug in final code

The final version of Microsoft's Internet Explorer 8 (IE8) does contain the vulnerability used to hack a preview of the browser at last week's Pwn2Own, the contest's sponsor confirmed Friday.

Firefox likely to win race to fix PWN2OWN contest bug

Unless its two biggest rivals take extraordinary steps, Mozilla will be the first browser maker to patch a critical vulnerability used a week ago to win $5,000 in a hacking contest.

Study: Security, Not Environment, Drives E-waste Disposal

IT managers are concerned about where their electronic equipment is going after disposal because they are worried about sensitive data loss, not the environment, according to a new survey.

Mafiaboy to headline IT 360

As a 15-year-old, he brought down some of the highest profile sites on the Web. Eight months of detention and eight years of silence later, Michael Calce discusses what the good guys can learn from the black hats.

Facebook glitch hands off control of corporate Pages

Facebook inadvertently handed over administrative control for about 17 Facebook Pages on Wednesday, including pages for Microsoft and several airlines.

Use OpenDNS To Protect Your Business Network

If you aren't using OpenDNS to protect your small business network, now is the time to take the few minutes to set it up. It is well worth the investment, it is free, and it will protect you from any number of issues in the future. And you might get better browsing performance as a result that your users will thank you for.

New Zealand telco denies hiring botnet operator

One of New Zealand's largest telecommunications companies is downplaying reports that it hired as a security consultant a teenager who was arrested in 2007 after an FBI-led investigation fingered him as the operator of a massive international botnet operation.

Researchers can ID anonymous Twitterers

Web sites that strip personally identifiable information about their users and then share that data may be compromising their users' privacy, according to researchers at the University of Texas at Austin.

Jeffrey Carr: Act Locally, Pwn Globally

Act Locally, Pwn Globally

Network Security Monitoring Lives

By Richard Bejtlich

Every once in a while I will post examples of why Network Security Monitoring works in a world where Webbed, Virtual, Fluffy Clouds abound and people who pay attention to network traffic are considered stupid network security geeks.
One of the best posts I've seen on the worm-of-the-week, Conficker, is Risk, Group Think and the Conficker Worm by the Verizon Security Blog. The post says:


With the exception of new customers who have engaged our Incident Response team specifically in response to a Conficker infection, Verizon Business customers have reported only isolated or anecdotal Conficker infections with little or no broad impact on operations. A very large proportion of systems we have studied, which were infected with Conficker in enterprises, were “unknown or unmanaged” devices. Infected systems were not part of those enterprise’s configuration, maintenance, or patch processes.
In one study a large proportion of infected machines were simply discarded because a current user of the machines did not exist. This corroborates data from our DBIR which showed that a significant majority of large impact data breaches also involved “unknown, unknown” network, systems, or data.

This my friends is the reality for anyone who defends a live network, rather than those who break them, dream up new applications for them, or simply talks about them. If a "very large proportion of systems" that are compromised are beyond the reach of the IT team to even know about them, what can be done? The answer is fairly straightforward: watch the network for them. How can you do that? Use NSM.
Generate and collect alert, statistical, session, and full content data. I've also started using the term transaction data to mean data which is application-specific but captured from the network, like DNS requests and replies, HTTP requests and replies, and so on. These five forms of data can tell you what systems live on the network and what they are doing. It is low-cost compared to the variety of alternatives (manual, physical asset control; network access control; scanning; etc.). Once a sensor is deployed in the proper place you can perform self-reliant (i.e., without the interference of other groups) NSM, on a persistent and consistent basis.
Where should you monitor? Watch at your trust boundaries. The best place to start is where you connect to the Internet. Make sure you can see the true source IP (e.g., a desktop's real IP address) and the true destination IP (e.g., a botnet C&C server). If that requires tapping two locations, do it. If you can approximate one or the other location using logs (proxy, NAT, firewall, whatever), consider that, but don't rely only on logs.
NSM lives, and it is working right now

Langevin Speaks in Support of White House-based Cyber Security Leadership (March 24, 2009)

US Representative Jim Langevin (D-R...

A Federal CIO Perspective On NIST 800-53 and the Twenty Most Important Security Controls (CAG) (March 26, 2009)

Dan Mintz just retired from the CIO position at the US Department of Transportation...

China's Defense Spending is Way Up (March 26 & 27, 2009)

According to the Pentagon's annual report, "Military Power of the People's Republic of China (PRC) 2009," China's defense spending is significantly higher than that of other countries in the same region...

High Court of England Allows Data to be Transferred to US for Madoff Investigation (March 26, 2009)

The High Court of England and Wales has ruled that data pertinent to the Bernard Madoff investigation may be transferred to the US...

Man Involved in AOL Card Fraud Sentenced (March 24 & 25, 2009)

Charlie Blount Jr...

Senator Seeks Details About Support for DHS National Cyber Security Center (March 25, 2009)

Senator Susan Collins (R-Maine), ranking member of the Senate Committee of Homeland Security and Governmental Affairs, has sent a letter to DHS Secretary Janet Napolitano asking for details on how US $6 million allocated for the DHS National Cyber Security Center (NCSC) was spent...

Overflow Flaws in Sun Java Runtime Environment Unpacking Utility (March 26, 2009)

Integer and buffer overflow vulnerabilities in Sun Microsystems' Java Runtime Environment (JRE) "unpack200" JAR unpacking utility could be exploited to gain elevated privileges on vulnerable systems and to inject and execute arbitrary code...

Firefox Update Slated for Next Week (March 26, 2009)

Mozilla plans to release Firefox version 3...

Cisco Updates Address 11 Vulnerabilities in IOS (March 25 & 26, 2009)

Cisco has released eight updates to address 11 security flaws in its Internet Operating System (IOS) software...

Adobe Updates Fix Code Injection Flaw in Linux Versions of Reader and Acrobat (March 25, 2009)

Adobe has released updates to address a critical security flaw in Adobe Reader and Acrobat for UNIX and Linux...

Conficker Update Slated for April 1 (March 23, 25 & 26, 2009)

April 1, 2009 marks a significant shift for the Conficker botnet, but researchers are at a loss to determine what is going to happen...

Ransomware Scheme Incorporates Phony Antivirus Program (March 25, 2009)

A sophisticated form of ransomware is spreading on the Internet...

Penetration Testing Summit

Where else can you find the best speakers from other hacker conferences all at one program: HD Moore on the future of Metasploit; Joshua Wright on evolving wireless attacks; Jeremiah Grossman on the Top Ten Web Hacking Techniques; Robert "rSnake" Hansen on web app vulnerabilities; Paul Asadoorian on late-breaking pen test techniques; Larry Pesce on using document metadata in pen tests; Jason Ostrum on VoIP pen testing; Ed Skoudis on secrets of pen testing?
The Summit is June 1 and 2 in Las Vegas...

Application Security Summit - April 9 - Washington DC.

Learn from actual users which application security tools and processes work best and participate in establishing requirements that may be used for large scale procurement of these tools across government...

New Beta release of Nmap, (Sat, Mar 28th)

It appears Fyodor and company are getting close to the first major release of nmap since 4.76 over 6 ...(more)...

Firefox 3.0.8 Released, (Fri, Mar 27th)

Gilbert wrote in to let us know that Mozilla has released Firefox 3.0 ...(more)...

Bad Symantec Virus Defintions Update, (Fri, Mar 27th)

We had a report earlier today about problems with non-malicious PDF files getting flagged by the Sym ...(more)...

Firefox and Seamonkey Vulnerabilities, (Fri, Mar 27th)

In addition to the pwn2own vulnerability used at CanSecWest last week in order to compro ...(more)...

There is some SMiShing going on in the EU, (Fri, Mar 27th)

We've had a few reports so far where people receive an SMS which asks them to check out a part ...(more)...

Help File: Combating Conficker; Relighting a Dim Laptop Screen (Washington Post) (Yahoo News)

Giant Internet worm set to change tactics April 1 (AP) (Yahoo Security)

How Much is Conficker Really Impacting Enterprises? (E-Week Security)

Conficker Unlikely To Trigger Doomsday on April 1 (NewsFactor) (Yahoo Security)

Conficker: Doomsday, or the World's Longest Rickroll? (SecurityFix Blog)
Hackers Deface Aussie Censorship Board's Website

By David Kravets

Hackers deface an Australian government website to protest the nation's move to censor thousands of pages from the internet. A message decrying the Classification Board's mission was both chilling and humorous, saying "opposers" of censorship must be killed with "large melons."

Australian classification board website gets hacked

By segphault@arstechnica.com (Ryan Paul) on Porn

The Australian government agency charged with classifying movies and video games has reportedly been hacked in protest of the nation's controversial ISP-level Internet filtering scheme. The culprits replaced the website's introductory text with a comical message which characterizes the government's censorship program as an attempt to "control and sheepify the nation."

In the all-important war against pictures of boobies on the Internet, the government of Australia has spared no expense. In 2006, after conducting a study which determined that ISP-level filtering was not feasible, the nation spent $116 million to develop Internet filtering software that parents could install on computers. When this software was easily circumvented by children, the government decided to try again with an $89 million ISP-level filtering scheme based on a blacklist devised by the Australian Communication and Media Authority (ACMA).

Report: IT not scrimping on security during recession

By jhruska@arstechnica.com (Joel Hruska) on server

IT news might be bad in almost every corner of the industry, but one industry segment seems better fit to ride out the recession than most. Sales of security appliances to various business sectors in Western Europe grew revenue a total of 14.4 percent in 2008 as compared to 2007, but that growth slacked off a bit in the fourth quarter; sales rose only 10.1 percent. Those are solid numbers in any economic climate, and particularly in this one.

The increase in total revenue was not spread evenly across the top five vendors. Fortinet reported 29.5 percent revenue growth from 2007-2008, followed by Cisco (20.5 percent) and "other" (18.7 percent). Nokia and Secure Computing eked out smaller gains of 6.6 percent and 2.3 percent, respectively, while Juniper fell off a cliff. Company revenue dropped 17 percent year-on-year, which helps explain why everyone else grew at such a high rate.

Google Plays Down Security Concerns Over Docs

It says the issues raised by a security analyst aren't 'significant'

Firefox Patches Zero-day, Hacking Contest Bugs

The update fixes a bug used to win the Pwn2Own hacking contest

Fears of a Conficker Meltdown Greatly Exaggerated

With 60 Minutes airing a report on Sunday, some people are panicking, but researchers don't expect anything dramatic

Chrome Skunks Hackers in Vulnerability Contest

Analysis: Firefox, Internet Explorer, and Safari browsers don't fare as well.

April Fool's Conficker Threat is Likely Hype

Despite warnings of digital Armageddon come April 1, experts say you can probably breathe easy.

Security Analyst Spots Three Flaws in Google Docs

Google denies problems, but finds could raise more questions over the safety of storing data in the cloud

Thursday, March 26, 2009

Around The Horn vol.1,71

EventSentry - Voted WindowSecurity.com Readers' Choice Award Winner - Event Log Monitoring solution

By info@WindowSecurity.com (The Editor)

EventSentry was selected the winner in the Event Log Monitoring category of the WindowSecurity.com Readers' Choice Awards. AdventNet EventLog Analyzer was first runner-up while Enterprise Security Analyzer (ESA) and GFI EventsManager were second runners-up.

Secure Data Disposal

By rickym@trencor.net (Ricky M. Magalhaes)

Secure data disposal methods; how organisations that reuse media may employ countermeasures to prevent exposure.

Cisco IOS cTCP Denial of Service Vulnerability

In Cisco Security Advisory

A series of TCP packets may cause a denial of service (DoS) condition on Cisco IOS devices that are configured as Easy VPN servers with the Cisco Tunneling Control Protocol (cTCP) encapsulation feature. Cisco has released free software updates that address this vulnerability. No workarounds are available; however, the IPSec NAT traversal (NAT-T) feature can be used as an alternative.

Cisco IOS Software Multiple Features IP Sockets Vulnerability

In Cisco Security Advisory

A vulnerability in the handling of IP sockets can cause devices to be vulnerable to a denial of service attack when any of several features of Cisco IOS? Software are enabled.

Cisco IOS Software WebVPN and SSLVPN Vulnerabilities

In Cisco Security Advisory

Cisco IOS software contains two vulnerabilities within the Cisco IOS WebVPN or Cisco IOS SSLVPN feature (SSLVPN) that can be remotely exploited without authentication to cause a denial of service condition.

Cisco IOS Software Multiple Features Crafted UDP Packet Vulnerability

In Cisco Security Advisory

Several features within Cisco IOS Software are affected by a crafted UDP packet vulnerability. If any of the affected features are enabled, a successful attack will result in a blocked input queue on the inbound interface. Only crafted UDP packets destined for the device could result in the interface being blocked, transit traffic will not block the interface.

Cisco IOS Software Multiple Features Crafted TCP Sequence Vulnerability

In Cisco Security Advisory

Cisco IOS? Software contains a vulnerability in multiple features that could allow an attacker to cause a denial of service (DoS) condition on the affected device. A sequence of specially crafted TCP packets can cause the vulnerable device to reload.

Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities

In Cisco Security Advisory

Devices that are running Cisco IOS Software and configured for Mobile IP Network Address Translation (NAT) Traversal feature or Mobile IPv6 are vulnerable to a denial of service (DoS) attack that may result in a blocked interface.

Cisco IOS Software Secure Copy Privilege Escalation Vulnerability

In Cisco Security Advisory

The server side of the Secure Copy (SCP) implementation in Cisco IOS software contains a vulnerability that could allow authenticated users with an attached command-line interface (CLI) view to transfer files to and from a Cisco IOS device that is configured to be an SCP server, regardless of what users are authorized to do, per the CLI view configuration. This vulnerability could allow valid users to retrieve or write to any file on the device's file system, including the device's saved configuration and Cisco IOS image files, even if the CLI view attached to the user does not allow it. This configuration file may include passwords or other sensitive information.

Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability

In Cisco Security Advisory

A vulnerability exists in the Session Initiation Protocol (SIP) implementation in Cisco IOS Software that can be exploited remotely to cause a reload of the Cisco IOS device

US Smart Grid Spending Opens American Homes and Businesses To Mass Blackouts (March 21, 2009)

The US's high technology, digitally based electricity distribution and transmission system known as the "Smart Grid" is slated to get $4...

Draft Legislation Calls for White House-Level Cyber Security Position (March 20, 2009)

Senate Commerce Committee Chairman John D...

Diebold Admits Voting Machine Audit Log Flaw (March 22 & 23, 2009)

In a hearing in California last week, Premier Election Solutions, formerly known as Diebold, admitted that a flaw in its voting machines software can lose votes and fail to log the loss...

Alleged DoD Hacker Arrested in Romania (March 20, 2009)

Romanian police have arrested a man who allegedly broke into and damaged US Department of Defense computer systems...

Stimulus Package Includes Changes to HIPAA Privacy Rules (March 18, 2009)

The federal stimulus package includes amended rules regarding the Health Insurance Portability and Accountability Act (HIPAA)...

Proof-of-Concept Code Released for Twitter Cross-Site Scripting Flaw (March 21, 2009)

A cross-site scripting vulnerability in Twitter could be exploited to spread malware virally through the microblogging service...

Cached Data Exposes Credit Card Info (March 23, 2009)

Cached data from a server that is no longer in use has exposed 22,000 credit card numbers including CVVs, expiration dates, names and addresses; 19,000 of the cards could still be active...

psyb0t Worm Targets Home Users' Routers (March 23 & 24, 2009)

The psyb0t worm recruits home networking devices into powerful botnets...

Senator Says Cyber Intrusions are on the Rise (March 20, 2009)

Cyber intruders broke into computers in the office of Senator Bill Nelson (D-Fla...

Symantec Study Shows Most Companies Have Experienced Loss - From Cyber Attacks (March 23, 2009)

Research from Symantec shows that 98 percent of the 1,000 IT managers from companies in the US and Europe said their companies experienced tangible loss from a cyber attack of some sort over the last two years...

Heightened Demand Downs Wikileaks (March 23, 2009)

The Wikileaks website is down just days after it published a list of websites allegedly banned by the Australian Communications and Media Authority (ACMA)...

Intrusion Detection & Response Leveraging Next Generation Firewall Technology

Category: Firewalls & Perimeter Protection

Paper Added: March 26, 2009

Techniques and Tools for Recovering and Analyzing Data from Volatile Memory

Category: Forensics

Paper Added: March 26, 2009

Sanitising media, (Thu, Mar 26th)

Pat asked an interesting question. He, like many of us, has the requirement to make sure that ...(more)...

Webhoneypot fun, (Thu, Mar 26th)

37 days ago the DShield webhoneypot project released the first Alpha of the code. I hadn't rea ...(more)...

Java Runtime Environment 6.0 Update 13 Released, (Wed, Mar 25th)

JRE 6.0 Update 13 has been released and addresses a couple of security issues ...(more)...

Cisco Releases IOS Bundle of Vulnerabilities, (Wed, Mar 25th)

Cisco has officially released a bundle of vulnerability notices for their IOS software. ...(more)...

Safari hacker talks security (Macworld.com) (Yahoo Security)

Symantec Data Leak Remains Under Investigation (E-Week Security)

Conficker: The Windows Worm That Won't Go Away (E-Week Security)

Nasty New Worm Targets Home Routers, Cable Modems (PC World) (Yahoo Security)

With Limited Resources, UK Vows to Battle E-crime (PC World) (Yahoo Security)

Don't Let Microsoft SharePoint Become a Security Blind Spot (E-Week Security)

Scareware Morphs Into Ransomware

Malware changes from scareware to ransomware, encrypting users' files and then charging a fee to decrypt them

Israeli Hacker ‘The Analyzer’ Steals Over $10 Million USD

By Darknet on us bank security

It’s seems like a new hacker is in the sights of the US Government, this time it’s Ehud Tenenbaum AKA ‘The Analyzer’. He seems to have been quite sloppy about covering his tracks and remaining under the radar, he acts as if no-one can get him. Perhaps he knows something we don’t? Anyway he’s firmly under...
Read the full post at darknet.org.uk

Canadian cops cry for BlackBerry wiretap

Posted by InfoSec News on Mar 26

http://www.theregister.co.uk/2009/03/25/making_blackberry_wiretappable/

By Dan Goodin in San Francisco
The Register
25th March 2009

Comment - It has recently dawned on Canadian officials that
communications sent with the BlackBerry are among the hardest mobile
messages to eavesdrop on...

Senate committee demands DHS explain alleged lack of support for cybersecurity office

Posted by InfoSec News on Mar 26

http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9130519

By Jaikumar Vijayan
March 25, 2009
Computerworld

The Senate Homeland Security Committee's senior-most Republican is
asking DHS Secretary Janet Napolitano to explain why...

Conficker: The Windows Worm That Wont Go Away

Posted by InfoSec News on Mar 26

http://www.eweek.com/c/a/Security/Conficker-The-Windows-Worm-That-Wont-Go-Away-529249/

By Brian Prince
eWEEK.com
2009-03-25

The Conficker worm continues to slither its way across the Internet, and
a major update for the malware is looming on April 1. Just what will
happen is anyone's...

Space storm alert: 90 seconds from catastrophe

Posted by InfoSec News on Mar 26

http://www.newscientist.com/article/mg20127001.300-space-storm-alert-90-seconds-from-catastrophe.html

By Michael Brooks
The New Scientist
23 March 2009

IT IS midnight on 22 September 2012 and the skies above Manhattan are
filled with a flickering curtain of colourful light. Few New Yorkers...

The Analyzer Hack Probe Widens 10 Million Allegedly Stolen From U.S. Banks

Posted by InfoSec News on Mar 25

http://blog.wired.com/27bstroke6/2009/03/the-analyzer-ha.html

By Kim Zetter
Threat Level
Wired.com
March 24, 2009

Ehud Tenenbaum, an Israeli hacker arrested in Canada last year for
allegedly stealing about $1.5 million from Canadian banks, also
allegedly hacked two U.S. banks, a credit...

Hacking The Router Patching Conundrum

Posted by InfoSec News on Mar 25

http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID=216200419

By Kelly Jackson Higgins
DarkReading
March 24, 2009

The dirty little secret about patching routers is that many enterprises
don't bother for fear of the fallout any changes to their Cisco router
software...

All five smartphones survive PWN2OWN hacker contest

Posted by InfoSec News on Mar 25

http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9130346

By Gregg Keizer
March 24, 2009
Computerworld

None of the five smartphones slated for attack at last week's PWN2OWN
hacking contest was compromised, a sign that security researchers have
yet to...

Newfangled rootkits survive hard disk wiping

Posted by InfoSec News on Mar 25

http://www.theregister.co.uk/2009/03/24/persistent_bios_rootkits/

By Dan Goodin in San Francisco
The Register
24th March 2009

Researchers have demonstrated how to create rootkits that survive
hard-disk reformatting by injecting malware into the low-level system
instructions of a target...

Telco hires Kiwi hacker

Posted by InfoSec News on Mar 25

http://www.stuff.co.nz/waikato-times/news/2287438/Telco-hires-Kiwi-hacker

Waikato Times
24/03/2009

The Whitianga teenager who brought a US university to its knees with his
hacking antics has been hired by a telecommunications company.

Owen Thor Walker, 19, offending under the name Akill...

Standards body investigates C4I security tagging

Posted by InfoSec News on Mar 25

http://gcn.com/articles/2009/03/23/c4i-data-tagging.aspx

By Joab Jackson
GCN.com
Mar 23, 2009

The Object Management Group 's (OMG) working group for Command, Control,
Communications, Computers and Intelligence (C4I) has begun investigating
the possibility of either developing or adopting...

The Youngest Ethical Hacker in India

Posted by InfoSec News on Mar 25

http://www.islamonline.net/servlet/Satellite?c=Article_C&cid=1237705512621&pagename=Zone-English-HealthScience%2FHSELayout

By Syed Sujeel Ahmed
Software Engineer - India
IslamOnline.net
March 24, 2009

Anyone who surfs the internet or chats over a messenger program has
probably...

Firefox exploit sends Mozilla into 'high-priority fire drill' mode

Two weeks, two exploits

Mozilla's security team is rushing out a fix for its flagship Mozilla browser following the public release of attack code that targets a previously unknown vulnerability.…

Webmail bug puts 40m accounts in jeopardy

One attack pwns all

A web-borne vulnerability lurking in a popular email application seriously compromised the security of 40 million accounts until it was fixed early last month, independent researchers said.…

Melissa anniversary marks birth of email-aware malware

Supermodel of computer virus world turns 10, still spreading

Thursday (26 March) marks the 10th anniversary of the notorious Melissa virus, the first successful email-aware virus.…

Aussie classification site hacked in censorship protest

Conroy speaks out on 'technical errors'

Hackers broke into the Australian government's film and videogame classification website yesterday and posted a message opposing comms minister Stephen Conroy's trial of internet filtering.…

Final countdown to Conficker 'activation' begins

T-minus six

Security watchers are counting down to a change in how the infamous Conficker (Downadup) worm updates malicious code, due to kick in on Wednesday 1 April.…

Top e-crime cop to plead for more cash

Home Office unmoved

The woman in charge of policing online fraud in the UK plans to use the first operational year of the new Police Central e-crime Unit (PCeU) to make the case for more funding.…

Pink Floyd's Gilmour backs McKinnon protest gig

UFO hacker gets support from Dark Side of the Moon

Updated Legendary Pink Floyd guitarist David Gilmour has agreed to participate in a musical protest against attempts to extradite UFO enthusiast turned hacker Gary McKinnon to the US.…

Canadian cops cry for BlackBerry wiretap

How to eat a golden egg

Comment It has recently dawned on Canadian officials that communications sent with the BlackBerry are among the hardest mobile messages to eavesdrop on. But rather than congratulate the Waterloo, Ontario-based Research in Motion on a job well done, they're calling for laws that would force service providers to use only technology that can be tapped.…

Profs design AK47-locating 'smart dust' helmets

Satnav network node-lids backtrack bullets, ID weapons

Acoustic gunshot detectors have become common in the past few years, and some have been reduced in size to where a single soldier can wear one on his uniform and be cued-in to an enemy's location as soon as he fires.…

Pentagon hacker Analyzer suspected of $10m cyberheist

Credit card scam exposed

Charges against notorious hacker-turned-suspected-cyber-fraudster Ehud Tenenbaum have expanded to include alleged fraud involving banks and credit card firms in both Canada and the US.…

Security in the clouds - or clouds in security?

Supplementary benefits

‘Cloud Computing’ is the marketing term of the moment, despite lacking a formal definition (this is what we came up with),…

Scareware package incorporates file ransom trickery

Double dipping

Cybercrooks have combined two threats with a fake anti-virus package that holds files for ransom.…

Mimecast and file server destruction

Online mail services lead to filer destruction - maybe

Analysis Mimecast is a UK-based supplier of unified email management services. Around the end of 2002 it started to build an appliance function that would unify the many daisy-chained email functions, (anti-spam, anti-virus, data leak prevention, signaturing) that were all implemented as separate boxes through which emails had to flow before ending up in peoples' inboxes. How it has done this and what it means leads logically through cloud file storage (CFS) to a deadly problem for filer suppliers.…

Sound Fake? Finding a Malicious Driver

By Di Tian on Web and Internet Safety

You already know that malware changes registry keys to take advantage of the autorun capability when systems and applications start. The registry keys we often see for this purpose include: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\Current Version\Windows\AppInit_DLLs HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\[Legit_program]\Debugger HKEY_CLASSES_ROOT\CLSID\[CLSID]\InprocServer32 Recently, we noticed that the Lando Trojan uses a different registry to load its malicious code into Internet [...]

Should I Care About server.exe?

By Karthik Raman on Malware Research

Computer users know that they shouldn’t touch system files. If they did, they could damage their computers. A well-known ploy of malware authors is to name their files after system files. Users can be tricked into ignoring malicious files on their systems by this social-engineering method. Let’s look at what the Backdoor-CEP.gen Trojan does, for example. [...]

Brief: Security projects aim for Summer of Code

Security projects aim for Summer of Code

Firms improve secure coding practices, OWASP survey finds

By Robert Westervelt

Boaz Gelbord, OWASP Security Spending Benchmarks Project Leader, explains the survey results. Also, Ivan Arce of Core Security talks about smartphone threats and penetration testing.

Security policies need simplifying, expert says

By Robert Westervelt

Companies need to spend more time refining security policies to align them with business objectives.

Microsoft IE 8 security only benefits educated users

By Eric Ogren

New productivity and security features of Internet Explorer (IE) 8 might require end users get a lesson from IT staff before companies can fully benefit.

Survey gauges Web application security spending

A new survey shows that despite the dismal economic conditions, more than a quarter of the companies polled expect to spend more on Web application security this year.

New ransomware holds Windows files hostage, demands $50

Cybercrooks have hit on a new twist to their aggressive marketing of fake security software, and are duping users into downloading a file utility that holds users' data for ransom, security researchers warned Wednesday.

Bucking a trend, security appliance market grows

The security appliance market in Western Europe grew 14.4 percent in 2008 and is expected to continue to expend this year, albeit at a slower rate, according to the latest figures from analyst firm IDC.

Google lawyers seek transfer of Milan privacy trial

Lawyers for Google Wednesday challenged the jurisdiction of a Milan court over a privacy case that sees four Google executives accused of defamation.

Firefox fix due next week after attack is published

Online attack code has been released targeting a critical, unpatched flaw in the Firefox browser.

A hidden chore of deploying NAC

One of the great hidden chores of deploying NAC is finding all the devices that are attached to the network, even those that can't authenticate.

Cold-boot attacks: The 'frozen cache' approach

Part one of this pair of columns described "cold boot attacks" and their security implications, in particular for software-implemented full-disk encryption. Security expert Jurgen Pabel continues with part two.

With limited resources, UK vows to battle e-crime

A new U.K. police force dedicated to tracking down cybercriminals is gearing up to make the most of what one senior police official acknowledges is limited funding.

Expert cites "major problem" with security policy compliance

Attendees at this week's SecureWorld Boston conference got a stern talking-to Wednesday morning: Keynoter Charles Cresson Wood said organizations need to get their information security policies in order or risk going down the tubes

Hospital loses patient data again in less than a year

United Christian Hospital lost patient data stored in USB thumb drive again in less than a year.

Nasty New Worm Targets Home Routers, Cable Modems

A computer worm has been discovered that can infect 55 different home-based routers and DSL/cable modems including common brands like Linksys and Netgear.

Adobe details secret PDF patches

Adobe Systems Inc. revealed Tuesday that it patched five critical vulnerabilities behind the scenes when it updated its Reader and Acrobat applications earlier this month to fix a bug already under attack.

Panda Releases Free Security Tool for Autorun

Panda, an antivirus software company, has a new free Panda USB Vaccine available for download that can disable the Windows Autorun feature for an entire PC or a particular USB drive.

Cisco security updates squash router bugs

Cisco has released eight security updates for the Internetwork Operating System (IOS) software used to power its routers.

Cisco helps avoid security scrimping in cash-tight times

Many Wi-Fi vendors have integrated dedicated wireless intrusion prevention systems (WIPS) directly into their 802.11n systems. Cisco, for example, recently released an application called Adaptive Wireless IPS integrated with a multifaceted attack correlation system in its Wireless Control System (WCS) network management and security policy platform.

Identity management delivery methods

Differentiation among the various offerings from various vendors is what makes choosing an identity management "solution" interesting. So we see different "bells and whistles," different suite modules and different delivery methods. It's this latter that's the topic today.

Sipera gear protects Microsoft OCS when used in unified communications

At VoiceCon Orlando next week, Sipera will announce that its unified communications security gear supports Microsoft Office Communications Server, enabling businesses to safely extend OCS to telecommuters and business partners.

Secure Your Data in Parcels With Silver Key

It's always interesting to view a technology from a new perspective, and that's what Silver Key allowed me to do. And believe me, it's all in the perspective--Silver Key (US$30, 30-day free trial) creates password-protected "parcels," which are pretty much the same type of thing as a password-protected zip, rar, 7zip or other archives The biggest difference is that Silver Key allows you to attach large binary keys to your archives as text files. The program steps you through the parcel creation process, never letting you forget that you're creating an archive that's secure.

China becoming the world's malware factory

With China's economy cooling down, some of the country's IT professionals are turning to cybercrime, according to a Beijing-based security expert.

Privacy group: Facebook principles still lacking

Facebook's recent decision to back off proposed changes in its terms of service still leaves the social-media site with a "huge loophole" in privacy protections, a privacy group said Tuesday.

Facebook holds the line against spammers, scammers

Facebook is shoring up its security protection procedures as the social-networking site increasingly comes under attacks from spammers, data thieves and other tricksters, according to the company's chief privacy officer.

Is Apple Safari Safe?

When security researcher Charlie Miller hacked the Mac through the Safari browser in under 10 seconds last week, the question raised was deafening: Is Apple Safari secure? The answer, of course, is a bit more complicated.

Prevent USB Drives from Spreading Viruses

The alarming Conficker/Downadup worm is one of many threats that can spread by infecting those portable USB thumb drives on which so many of us rely.

Critical Flaws Found in HP OpenView

First patch didn't cut it.

Cisco Security Updates Squash Router Bugs

The networking company has released its twice-yearly IOS patches, posting eight updates

Every Smartphone OS Endures Pwn2Own Unhacked [Haxx]

By matt buchanan on Windows Mobile

After Safari was busted in 10 seconds at the Pwn2Own hacking competition, you'd think puny smartphones wouldn't stand a chance. But you'd be wrong!

Every smartphone OS up for total destruction—iPhone, Windows Mobile, Symbian, Android and BlackBerry—made it through the competition unscathed. Not because they're inherently more secure. It's just because their puny processing power and memory make things like the 10-second Safari hack harder to do, even though the exploit is totally there.

Another reason is that every phone has a unique carrier and OS version situation, which made it harder for researchers to come with exploits—for instance, one crafted for the Storm, which wasn't in the competition, actually didn't work on the Bold. So the multiplicity of phones out there is actually a good thing security-wise, though it makes more monolithic platforms, like the iPhone a more attractive target—kinda like Windows' juggernaut-size makes it a bigger target for exploits than Mac or Linux. That said, I don't think the survival rate will be so great next year. [Computerworld via Slashdot]

My Blog List