Archives - January 2010

Two New White Papers

Two new papers have gone up on the ESET White Papers page at http://www.eset.com/download/whitepapers.php. (Strictly speaking, they’re not altogether new: they include some material that has previously been blogged here.) The Internet Book of the Dead is a bit different from other papers you’ll find on the ESET white papers page. (Technically, it’s not actually

Ten Ways to Dodge Cyber‑Bullets (Part 6)

[Part 6 of an occasional series, updating a blog series I ran in early 2009 to reflect changes in the threat landscape. This series will also be available shortly as a white paper.] Social Networks Can Be Very Anti-Social Don’t disclose sensitive information on websites like FaceBook or LinkedIn if you can’t be sure that you

Twitter and I

I just received another request to follow me on Twitter on a protected account, so perhaps it's time I clarified what all those accounts that are and aren't in my signature are for. @dharleyatESET is a protected account largely for work purposes.  I only accept requests to follow from people who really need to know

Can We Learn From Our Mistakes?

I've read with interest the recent developments regarding the "Aurora" exploit code. As you are probably aware this code exploits a vulnerability in Microsoft's Internet Explorer. Microsoft recently released an out-of-band patch to close off this vulnerability. Very soon after, we are seeing reports that the first widespread attacks that attempt to exploit this vulnerability

Anti‑Extortion 101

I read a story today called “Give me your money, or your computer gets it” at http://redtape.msnbc.com/2010/01/turning-hijacked-computers-into-cash-is-still-hard-work-for-most-computer-criminals-theyve-got-to-trick-the-infected-pc-into.html. While the story does offer some practical advice, it misses some critical points and gets one thing a bit wrong. The story actually talks about a couple of different “ransom” attacks. There is the case where your data

Not So Civic Minded

At least as of this writing if you paste the following line into a Google search you’ll find something interesting… "2004 Honda Accord EX-V6" $3000 site:craigslist.org An ad with the title and price shows up on almost every Craigslist site in the country and in virtually all cases the ad has been flagged for removal.

Unnamed App: it’s the SEO that matters, not the app

As more information and discussion has come in on this, it now merits an update in its own right. It seems that there is at least one other unnamed app around as well as the Boxes issue, and while I've no reason to assume that it's malicious, I'd hardly advise that you rush into installing

Attack Vector Recycling?

I received a fax today. Now, that may not be worthy of noting on here, apart from the fact that I hardly ever receive faxes these days. But the interesting fact is that it was sent to my US based fax number and offered me a great deal on a "New Health Plan" for only

Amazing WHAT???

An online friend of mine from China once told me they loved the song “Amazing Negro”.  It only took a moment to realize “Amazing Grace” http://www.sumo.tv/watch.php?video=3451832 was the song they were referring to. The song is best known as a “negro spiritual” and so I can understand the mental mix up, especially for one whose

Verified by Visa – Pushmi‑pullyu*

* http://en.wikipedia.org/wiki/Pushmi-pullyu#The_Pushmi-pullyu In an article in the Register with the eye-catching title of "Verified by Visa bitchslapped by Cambridge researchers", John Leyden comments on the argument by Cambridge researchers Ross Anderson and Steve Murdoch that the 3D Secure system, better known as Verified by Visa or Mastercard Securecode is better suited to shifting liability for

Unnamed App Facebook Scam

[Update: There's been quite a lot of discussion and extra information coming in on this. It seems to me that there is at least one unnamed app around as well as the Boxes issue, and while I've no reason to assume that it's malicious, I'd hardly advise that you rush into installing an application when

“Aurora” exploit code: from Targeted Attacks to Mass Infection.

Last Thursday, Microsoft released an out-of-band update to fix the latest vulnerability in Internet Explorer.  Since then, malware operators have been exploiting this vulnerability to install malware on thousands of PCs.  So far, we have detected more than 650 different versions of the exploit code which is detected as Trojan.JS/Exploit.CVE-2010-0249 by ESET antivirus.  We have

Generalist Anti‑Malware Product Testing

We have just come across a Buyer’s Guide published in the March 2010 issue of PC Pro Magazine, authored by Darien Graham-Smith, PC Pro’s Technical Editor. The author aims to give advice on which anti-malware product is the best for consumer users, and we  acknowledge that the article includes some good thoughts and advice, but

Ten Ways to Dodge Cyber‑Bullets (Part 5)

[Part 5 of an occasional series, updating a blog series I ran in early 2009 to reflect changes in the threat landscape. This series will also be available shortly as a white paper.] Trust People, Not Addresses Don’t trust unsolicited files or embedded links, even from friends. It’s easy to spoof email addresses, for instance,

Bleak News on the Password Front

In December 2009, due to miserable security practices, Rockyou.com suffered a data breach that exposed over 32 million user passwords which were then published on the internet. For a little background, if you use Face Book apps, like Superwall, Speedracing, Likeness, Hugme, or Birthday cards, MySpace apps like Glittertext, Slideshow, Photofx, and many others, as

We are not Zimused – a few updates

My colleague Juraj Malcho, head of lab in Bratislava, has clarified a point: what Zimuse actually does is fill the first 50Kb of a targeted disk with zeroes (actually the 0x00 character): This does indeed overwrite the MBR, but also overwrites anything else that occupies that area of the disk. The malware came to ESET's attention because

Bemused by Zimuse? (Dis is not one half)

Now here's a curiosity. Win32/Zimuse is a worm that exists in two variants, innovatively entitled Win32/Zimuse.A and Win32/Zimuse.B. In some ways it's a throwback to an earlier age, since it overwrites the Master Boot Record on drives attached to an infected system with its own data, so that data on the system becomes inaccessible without the

Haiti Scammer Tries to Scam ESET Blog Readers

A little over a week ago we received a comment in response to David Harley’s blog post that read as follows: InterNations – the Network for Expatriates and Global Minds!   The Internations Management has decided to donate 10 Eurocents to Haiti for each text message!   Text "Haiti" to: +xxxxxxxxxxxx    Spread the Word!  

Operation Aurora – History Repeats

There’s been a lot in the news about “Operation Aurora”. In a nutshell, hackers used a zero day IE exploit to gain access to computers and accounts they should not have access to. There are lots of fingers being pointed at the Chinese and implications the government may have been involved. The targets included Google

Nice Smartphone, Mr. Darcy: Fact, Fiction & the Internet

OK, I'll save the novel for another time. However, there's a rather less ambitious snippet of my recent writing at http://www.eurograduate.com/article.asp?id=3015&pid=1, an article called "Fact, Fiction and the Internet," and, further to some of my recent posts here, touches on the dangers of social networking. Though you might think that someone with as many twitter