Friday, April 10, 2009

Around The Horn vol.1,81

Microsoft Security Bulletin Advance Notification for April 2009

Revision Note: Advance Notification published.Summary: This advance notification lists security bulletins to be released for April 2009.

Conficker.E

By MSRCTEAM

We’ve seen some activity in the Conficker space in the past two days and this has caused some questions from customers. Specifically, there have been reports of two possible new variants of Conficker. Our colleagues over at the Microsoft Malware Protection Center (MMPC) have done a thorough analysis of both of these and have determined that there’s really only one new variant, which they’re calling Conficker.E. Most importantly, the signatures that protect against Conficker.A are also effective at protecting against Conficker.E. The other possible new variant is only a slightly modified version of Conficker.D and our Conficker.D signatures protect against it. Also, our virus encylopedia entry for Conficker.D has been updated to include information about this slightly modified version.

There’s more detailed information on Conficker.E on the MMPC blog and in the encyclopedia entry. But at a high level, this has similar propagation methods to Conficker.B (attempting to exploit MS08-067, attacking weak passwords on administrative shares and spreading via removable media like

drives). However, it also has instructions so that it will also delete itself on

The important thing is that our guidance for protecting yourself remains the same. If your systems and security software are fully updated, you don’t need to be concerned about Conficker.

As always, we’re continuing our work with the Conficker Working Group and will update you as we have new, important information.

Thanks.

Christopher

April 2009 Advanced Notification

By MSRCTEAM

Hello, Bill here.

I wanted to let you know that we just posted our Advance Notification for next week’s bulletin release, scheduled for Tuesday, April 14, 2009 around 10 a.m. Pacific Daylight Time. This should help you plan for your deployment process for next week and address these vulnerabilities to protect your computing environments.

As part of this month’s security bulletin release process, we will issue eightsecurity bulletins – five rated ‘Critical,’ two rated ‘Important,’ and one rated ‘Moderate.’ These bulletins address vulnerabilities in Microsoft Windows, Microsoft Excel, Internet Explorer, and Microsoft ISA Server. Depending on the bulletin, a restart may be required. The updates will be detectable using the Microsoft Baseline Security Analyzer.

As we do each month, the Microsoft Windows Malicious Software Removal Tool will be updated.

We are also planning to release high-priority, non-security updates on Windows Update and Windows Server Update Services (WSUS) as well as high-priority, non-security updates on Microsoft Update and Windows Server Update Services (WSUS). For additional information, please see the “Other Information” section of the Advanced Notification.

As always, we’ll be holding the April edition of the monthly security bulletin webcast on Wednesday, April 15, 2009 at 11 a.m., Pacific Daylight Time.  We will review this month’s release and take your questions live on-air with answers from our panel of experts. As a friendly reminder, if you can’t make the live webcast, you can listen to it on-demand, as well at the same URL: http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?EventID=1032395126&EventCategory=4&culture=en-US&CountryCode=US. Furthermore, we’ll also be posting the text of the questions and answers as well as a video synopsis on this page.

You can register for the webcast here: http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032395126&Culture=en-US

It is important to remember that while the information posted below is intended to help with your planning, because it is preliminary information, it is subject to change.

Instant knowledge, free of charge

By vmtn@vmware.com (VMTN) on Technical Information

Chad Sakac(EMC), aka Virtual Geek, published some excellent articles over the last couple of weeks. Chad's articles have a common theme, storage + VMware. Don't think it's a marketing blog for EMC, there is in-depth information to be found in...

A Guide to Encrypted Storage Incident Handling

Category: Incident Handling

Paper Added: April 9, 2009

Firefox 3 updates now in Seamonkey, (Fri, Apr 10th)

For those of you who use Seamonkey's all in one environment as a Web, Mail, newsgroup client, HTML e ...(more)...

Something for the holiday? Nessus 4 is out, (Fri, Apr 10th)

The people over at Tenable have released Nessus version 4 just in time to give us all something ...(more)...

Cisco security advisory , (Thu, Apr 9th)

Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA and PIX appliances. http://www ...(more)...

Conficker Working Group site down, (Thu, Apr 9th)

Yes, we've noticed it too. The Conficker Working Group website appears to be down at the momen ...(more)...

Wireshark 1.0.7 released, (Thu, Apr 9th)

In case you hadn't noticed yet, they've updated one of our favorite tools, Wireshark. The new ...(more)...

Conficker update with payload, (Thu, Apr 9th)

Various sources report that some conficker infected systems are receiving updates now. The update ma ...(more)...

China Denies Cyberattacks on U.S. Power Grid (PC World) (Yahoo Security)

Updated Conficker Ropes Victims into Rogue Antivirus Scam (E-Week Security)

Check Point Slashing ZoneAlarm Price for 24 Hours (PC Magazine) (Yahoo Security)

Electric Power Grid Hack Lights-Up Cyber Security Infrastructure Experts (E-Week Security)

Conficker, the Internet's No. 1 Threat, Gets an Update (PC World) (Yahoo Security)

Many Enterprises Still Don't Recognize Insider Threat, Studies Say

Many companies lag in deploying data leak protection technology to mitigate insider threats, studies say

Conficker Finally Awakes & Dumps Payload

By Darknet on worms

So it seems something big was brewing with Conficker, they just didn’t want to do what everyone expected and unleash it on April 1st when all eyes were on them. Smart move really, they kept quiet and waited a week or so after before dropping some fairly serious and complex payloads (encrypted rootkits). It seems like they [...]

Eight others also got training in wireless hacking: Peerbhoy

Posted by InfoSec News on Apr 10

http://timesofindia.indiatimes.com/India/Eight-others-also-got-training-in-wireless-hacking-Peerbhoy-/articleshow/4381802.cms

[Backround: http://www.infosecnews.org/hypermail/0903/16060.html - WK]

The Times of India
9 April 2009

MUMBAI: Mansoor Peerbhoy, the whiz kid of terror outfit Indian...

Re: Electrical grids operator tries to stay ahead of hackers

Posted by InfoSec News on Apr 10

Forwarded from: Richard Forno <rforno (at) infowarrior.org>

Jeebus. Everyone in the world needs to take a deep breath and calm the
hell down here. They're screaming bloody murder about hackers and the
power grids and ZMFGTHESKYISFALLING. How quickly they forget that this
kind of...

Taking a Lesson in Federal Compliance from the Chemical Industry

Posted by InfoSec News on Apr 10

http://www.csoonline.com/article/488249/Taking_a_Lesson_in_Federal_Compliance_from_the_Chemical_Industry

By Jon Harmon
Honeywell Process Solutions
CSO
April 09, 2009

In many ways, the role of the CSO is directly tied to business
profitability. By creating and enforcing policies that...

    Secunia Weekly Summary - Issue: 2009-15

    Posted by InfoSec News on Apr 10

    =============================================                   The Secunia Weekly Advisory Summary
    =============================================

    China denies cyberattacks on U.S. power grid

    Posted by InfoSec News on Apr 10

    http://www.networkworld.com/news/2009/041009-china-denies-cyberattacks-on-us.html

    By Owen Fletcher
    IDG News Service
    04/10/2009

    Malware attacks from China and Russia designed to shut down the U.S.
    electrical grid in a time of war did not occur, China said Thursday.

    "The incident of...

    USENIX EVTWOTE 09 CFP Submissions Deadline Approaching

    Posted by InfoSec News on Apr 10

    Forwarded from: Lionel Garth Jones <lgj (at) usenix.org>

    The submissions deadline for the 2009 Electronic Voting Technology
    Workshop/ Workshop on Trustworthy Elections (EVT/WOTE '09) is
    approaching.

    Please submit all papers by April 17, 2009:
    http://www.usenix.org/evtwote09/cfpb

    Sabotage attacks knock out phone service

    Posted by InfoSec News on Apr 10

    http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2009/04/10/MNP816VTE6.DTL

    By Nanette Asimov,
    Ryan Kim,
    Kevin Fagan
    Chronicle Staff Writers
    April 10, 2009

    Police are hunting for vandals who chopped fiber-optic cables and killed
    landlines, cell phones and Internet service for tens of...

    Company Caught in Texas Data Center Raid Loses Suit Against FBI

    Posted by InfoSec News on Apr 9

    http://blog.wired.com/27bstroke6/2009/04/company-caught.html

    By Kim Zetter
    Threat Level
    Wired.com
    April 08, 2009

    A company whose servers were seized in a recent FBI raid on Texas data
    centers applied for a temporary restraining order to force the bureau to
    return its servers, but was...

    Top U.K. Police Official Resigns After Security Gaffe

    Posted by InfoSec News on Apr 9

    http://online.wsj.com/article/SB123926842112704625.html

    By CARRICK MOLLENKAMP and ALISTAIR MACDONALD
    Wall Street Journal
    April 9, 2009

    A top British counterterrorism official resigned Thursday after an
    operation targeting a group with suspected ties to al Qaeda was
    accelerated following...

    International Hacking Competition Held in Korea

    Posted by InfoSec News on Apr 9

    http://english.chosun.com/w21data/html/news/200904/200904090035.html

    Arirang News
    April 9,2009

    Some of the world's top computer coders gathered in Korea this week for
    the Hacking Protection Competition as a part of Codegate 2009, an
    international hacking event. The hackers were given 24...

    Electrical grids operator tries to stay ahead of hackers

    Posted by InfoSec News on Apr 9

    http://www.chron.com/disp/story.mpl/business/6365514.html

    By TOM FOWLER
    Houston Chronicle
    April 8, 2009

    Texas̢۪ electric grid operator constantly upgrades its computer security
    to protect against intrusion by hackers, its chairman said Wednesday
    following published reports that foreign...

    Cyber Warfare Conference: Agenda Cooperative Cyber Defence Centre of Excellence Conference on Cyber Warfare June 17-19, 2009 Tallinn, Estonia www.ccdcoe.org

    Posted by InfoSec News on Apr 9

    Forwarded from: k g <kgconference (at) gmail.com>

    Jaak Aaviksoo, Estonian Defence Minister
    Opening Remarks

    KEYNOTE
    The Information Warfare Monitor
    Tracking GhostNet: Investigating a Cyber Espionage Network

    KEYNOTE
    Mikko Hypponen, Chief Research Officer, F-Secure
    Evolution of the...

    Power Grid Hack Highlights Where Government Cyber-security Efforts Fall Short

    Posted by InfoSec News on Apr 9

    http://www.eweek.com/c/a/Security/Power-Grid-Hack-Highlights-Where-Government-Cyber-Security-Efforts-Fall-Short218464/

    By Brian Prince
    eWEEK.com
    2009-04-08

    Reports that the U.S. electric grid was penetrated by foreign spies may
    on the surface seem shocking. But as Brightfly Managing...

    Conficker wakes up, updates via P2P, drops payload

    Posted by InfoSec News on Apr 9

    http://news.cnet.com/8301-1009_3-10215678-83.html

    By Elinor Mills
    Security
    CNews News
    April 8, 2009

    The Conficker worm is finally doing something--updating via peer-to-peer
    between infected computers and dropping a mystery payload on infected
    computers, Trend Micro said on Wednesday....

    UK police bust lottery scam centre in Somerset
    Scammers told: 'Get orf moi laaand!'

    Police have busted a bogus lottery winner scam, following a raid on a cheque processing and clearing house in Somerset.…

    UK.gov delays new data breach powers
    ICO still waiting for teeth

    The government has failed to meet its own deadlines to bring in new powers for the Information Commissioner's Office (ICO) to fine companies who lose personal data.…

    New e-crime units nabs nine banking Trojan suspects
    e-busted

    Nine suspects in a banking Trojan case have been arrested by specialist cybercops from the UK's new Police Central E-Crime Unit (PCeU).…

    Conficker botnet stirs to distribute update payload
    It's alive!

    The Conficker superworm is stirring, with the spread of a new variant that spreads across P2P and drops a payload. It is thought to update machines infected by earlier strains of the worm.…

    Tool: GreenSQL-FW 1.0.0 released

    By Romain Gaucher on Tools

    "GreenSQL team is ready to present new version of GreenSQL - SQL Database Firewall. GreenSQL intercept SQL commands being sent to MySQL, checks them, and then either halts the query or passes it on to MySQL proper. Then it returns the query results to the calling application. Currently only MySQL database...

    Improving Security with URL Rewriting

    By Robert A. on Research

    "Most web application security experts frown on the practice of passing session or authentication tokens in a URL through the use of URL rewriting. Usually these tokens are passed between the server and the browser through HTTP cookies, but in cases where users configure their browsers to not accept cookies, this...

    W32/Winemmem - Know Your Enemy

    By Vitaly Zaytsev on Malware Research

    Do you remember what the first goal of file infector distribution is? It is demand. Without demand, infected files may never be downloaded by end users. What is the second goal? To stay undetected by most AV products. A week ago we found a new file infector that fits the bill. Nowadays, instead of relying on mass mailing, malware [...]

    Windows Kernel Again Found Vulnerable

    By Xing Su on Zero-Day

    Recently, our APAC threat intelligence team discovered a couple of Windows kernel zero-day vulnerabilities in the field, which could be potentially used for malicious purposes.  These were discovered in some discussion forums in China. One of these issues exists in Windows NT/2000/XP according to the description provided. The issue arises due to insecure win32 syscalls, the [...]

    Drive-by-Download Du Jour

    By Karthik Raman on Web and Internet Safety

    LuckySploit is an exploit framework that’s been in the news recently. As drive-by-downloads go, it lurks behind iframes and foists malware upon unsuspecting users. One LuckySploit attack we analyzed downloaded the FakeAlert-BY Trojan. So if you visited a Web site today then saw this…   … then you are, unfortunately, infected with FakeAlert-BY, and possibly thanks to LuckySploit. We detect [...]

    Artemis in Action

    By Anil Ramabhatta on Malware Research

    “Artemis” is a McAfee’s new cloud-computing technology that is capable of detecting new malware threats in real time. In the last 48 hours our Artemis Technology detected some malware that it was targeted to certain regions of the world. In North America, one particular sample was queried by Artemis more than 80 times by more than [...]

    New Conficker Variant

    By Lokesh Kumar on Zero-Day

    McAfee Avert Labs has received a new variant of the infamous Conficker worm. Like the previous variants, this one also spreads using the MS08-067 vulnerability in Microsoft Windows Server Service. But unlike the previous variants, which arrived as a Windows DLL file, this variant seems to arrive as an .EXE file. Detection for this variant of [...]

    Brief: Conficker gang updates worm via peer-to-peer

    Conficker gang updates worm via peer-to-peer

    New Conficker variant has ties to Storm botnet

    By SearchSecurity.com staff

    Conficker.E drops the malicious Waledac worm giving it the ability to spread to other vulnerable machines, and ultimately send spam.

    Conficker, the Internet's No. 1 threat, gets an update

    Security researchers say a worm that has infected millions of computers worldwide has been reprogrammed to strengthen its defenses while also trying to attack more machines.

    Users warned of virtualization's 'dark side'

    Users are paying little attention to some of the downsides of virtualization in their haste to reap the benefits that the technology can bring.

    The state of spam 2009, Part 1

    Spam - not SPAM the luncheon meat (and you have GOT to visit the official SPAM Web site, which plays like a parody the Monty Python crew might have dreamed up) - is a dreadful nuisance, with estimates that 95% of all e-mail in the world now consists of rubbish. Periodically I look into the state of the spam to see how the war is going.

    What is a cloud?

    The term cloud comes from the old WAN diagrams that show the service provider's network as a puffy cloud that all the access lines run into. The point of the metaphor is that you plug into an entity whose inner workings are obscure, but you believe it will do what you want it to do. (The leap of faith for a transport service provider was scary enough, but with cloud computing, it's even scarier. Your data isn't just passing through, it lives there.)

    Microsoft loses anti-piracy patent case

    A jury in Rhode Island found Microsoft guilty of patent infringement, ordering it to pay US$38 million to Uniloc, the patent holder.

    Researcher: Power grid hackers likely got inside by attacking PCs

    The hackers who reportedly planted malware on key parts of the U.S. electrical grid, perhaps with the intent to cripple the country's power infrastructure, most likely gained access like any other cybercriminal -- by exploiting a bug in software such as Windows or Office, a security researcher said Wednesday.

    Malware Infections Lurk in US Electricity Grid, WSJ reports

    The U.S. electricity grid is infected with malware from China and Russia, according to a report from the Wall Street Journal.

    Why the channel should get into the DLP space

    During these tough economic times, it's essential that businesses secure their confidential information using data loss prevention (DLP) solutions to help prevent data loss or data ending up in the wrong hands, Symantec executives say. What this translates into on the channel side is a wealth of market and customer opportunities, adds one analyst.

    4 Steps Security Can Take to Prevent Kidnapping

    As the economic crisis continues to heat up, Chris Falkenberg believes the potential for kidnapping will, too.

    Cable Sabotage Cripples Internet for Parts of Silicon Valley

    By Kevin Poulsen

    Midnight cable cuts in two locations take out phone and internet service for thousands.

    Conficker Doomsday Worm Sells Out for $49.95

    By Kevin Poulsen

    Warning! Warning! The Conficker worm has revealed its deadly purpose: hawking a phony anti-virus product and sending spam.

    Conficker self-updates, launches false infection alert

    By jhruska@arstechnica.com (Joel Hruska) on Waledec

    April 1 may not have turned into the D-day that some feared Conficker might create, but the newest version of the worm (Conficker.C) is still out in the wild with mischief on its mind. The malware's creators released a new patch on April 7; the group obviously intends to continue its active war against security researchers. Such tenacity has been a trait of Conficker since the parasite first appeared on the 'Net near the end of 2008. Each version of Conficker has delivered new "features" or tricks intended to bypass security patches; the April 7 update is no exception.

    China Denies Cyberattacks on U.S. Power Grid

    A government spokeswoman denies reported attacks from China and Russia ever occurred.

    Fiber Cuts Slash Silicon Valley's Internet Arteries

    Apparent vandalism cut off wired and wireless service to thousands and shut two IBM facilities.

    Conficker Worm Reveals Its Business Model

    Newly downloaded Conficker files show how worm's handlers intend to profit from compromised computers.

    Conficker Causes Rise in Hoax Security Software

    Criminals capitalize on user fears about the much-hyped worm.

    How serious is threat to power grid? Depends who you ask.

    Expert opinion differs widely over a report that the U.S. electric power-grid has been compromised by cyberspies, perhaps from Russia and China, who have installed malware so they can disrupt industrial control systems for electricity distribution in the event of a conflict.

    A Lesson in Compliance from the Chemical Industry

    In many ways, the role of the CSO is directly tied to business profitability. By creating and enforcing policies that protect human, physical and intellectual assets, the CSO ensures the very integrity of the organization. This link to the bottom line, though, is about to become much stronger--and quite possibly much sooner than anticipated.

    After attacks, Excel update due from Microsoft

    Corporate IT staffers will get a double whammy next week, as both Microsoft and Oracle are set to release critical security updates on the same day, including a likely fix for an Excel bug that has been used by cybercriminals.

    What I'll be looking for in cybersecurity report

    The big talk in Washington's cybersecurity world is Melissa Hathaway's magical 60-day review, which is supposed to recommend how U.S. government cybersecurity efforts should be pursued. The technical press and lobbyists are all abuzz over whether or not there will be a cybersecurity coordinator who reports to the president. In certain circles, this is even more gossiped about than what Michelle Obama is wearing, but frankly the discussion is even less useful.

    Conficker cashes in, installs spam bots and scareware

    The makers of Conficker, the worm that has infected millions of PCs, have begun to do what all botnet owners do -- make money -- security researchers said Thursday as they started analyzing the malware's newest variant.

    No comments:

    Post a Comment

    My Blog List