More tech tips

Sunbelt Tech Tips are a new feature of our blog.  We’ll going to start sharing with you technical tips on general Windows XP operation. 

Here are some to get you started for the weekend:

Add/Remove Programs displays installed programs incorrectly
If you find that your Add/Remove Programs applet in Control Panel is displaying the list of installed programs incorrectly, or showing no listed programs at all, it might be because an installer for some program removed some of the registry entries that are used by Windows. You may be able to fix the problem by editing the registry. There are step by step instructions in KB article 266668 here.

How to use the Pageheap.exe Tool
Pageheap.exe is a tool that can be used to detect leaks in programs running on Windows XP and 2000 systems and find heap-related corruption, which is a common problem in application development. Find out where to download the tool and how to use it from KB article 286470 here.

Administrator can’t unlock a locked computer
If you restart a Windows XP computer and you aren’t able to log on with a local or domain account, and you get a message that the computer has been locked and only an administrator can unlock it (but you aren’t able to unlock it with an administrative account), it may be because the screensaver is set to use a non-existent .scr program or you’re using a corrupted screensaver program that’s password protected. What to do? You can edit the registry or use one of the workarounds described in KB article 242917 here.  

Deb Shinder

Tech tip: How to Change the Listening Port for Remote Desktop

By default, the Remote Desktop service in Windows XP uses port 3389. Because this is a known port, hackers could try to intercept packets going to that port. You can make Remote Desktop more secure by changing the port it uses, but be aware that Remote Assistance may not work correctly if you do this. Also, you can’t use a different port to connect to Remote Desktop from a Macintosh computer, because the Macintosh RDC client only supports port 3389. If you do decide to change the port, here’s how:

  1. On the XP computer that you want to access via Remote Desktop, open your favorite registry editor.
  2. Navigate to the following key: HKEY_LOCAL_MACHINESystemCurrentControlSetControlTerminalServerWinStationsRDP-Tcp
  3. Double click the PortNumber subkey, click the Edit menu and select Modify.
  4. Click Decimal.
  5. In the value field, type the number of the port that you want to use instead of 3389.
  6. Click OK.
  7. Close the registry editor.

Now you’ll need to configure the RDC client to use the new port. Here’s how:

  1. On the client computer, click Start | All Programs | Accessories | Communications | Remote Desktop Connection.
  2. In the Computer field, type the name or IP address of the XP computer you configured above, then type a colon and the port number (for example, MyComputer:3390.
  3. Click Connect.

Good luck!

Deb Shinder

 

Free spyware seminar in DC

Spyware is a serious threat to your enterprise network, and the threat continues to grow. Awareness campaigns and user education are useful, but they’re not enough. Legislation may deter some “legit” adware distributors, but many criminal spyware writers will continue to create and release malware that threatens the stability, security, and performance of your network. Not to mention your users’ and organization’s confidential data. In many cases spyware can also compromise federally mandated security compliance.

Register for Sunbelt Software’s free seminar “Winning the War on the Spyware Battlefield” and learn how to better protect your organization from spyware on Tuesday, April 25, 2006 in Washington, DC.

This seminar will look at the current state of the spyware problem, addressing its effects on privacy, financial security, corporate responsibilities and productivity, as well as outline how CounterSpy Enterprise can help better protect your organization from spyware threats.

Join renowned spyware researcher and Sunbelt’s Director of Malware Research, Eric Howes, for an engaging discussion on the scope of the spyware problem. Widely regarded as one of the foremost experts on spyware and its malicious mechanisms, Howes has served as a panelist at the CNET Antispyware Workshop and is an active and well-known participant in many of the security forums dedicated to spyware research. The seminar will also include a live demonstration on how CounterSpy Enterprise can help you fight the battle against spyware.

Why should you attend?

  • Learn how spyware affects business productivity
  • Understand the impact of spyware on network stability, security, and performance
  • See how spyware can cause violations of federal regulations
  • Discover how to better protect your network and users from spyware
  • See CounterSpy Enterprise in action
  • And more
Date and Time:
Tuesday, April 25, 2006
9:00 AM – 12:00 PM

Location:
Microsoft Corporation
5335 Wisconsin Ave. NW
Suite 600
Washington, DC 20015

Driving Directions

Shop at Home Select: Our Report

The folks at Belarco Group recently approached Sunbelt about its handling of that company’s rebates program, Shop at Home Select (otherwise known as SelectRebates or GoldenRetriever). We performed our standard software review in response. You can read our full report on SAHS here.

SAHS has a bad history of non-consensual installs, including installations through security exploits. To the company’s credit, Belarco Group decided to end the use of third-party distributors in October 2005, not long after ShopAtHome was booted from Commission Junction. So far as we can tell, that commitment to end third-party installs has proven successful — we haven’t seen any unethical third-party installs nor have we received any reports of such installs since end the end of October.

That said, we still have a few complaints about the software, most importantly the failure to disclose the full range of potential privcy effects outside of the EULA.

Thus, we’ve decided to put SAHS on a probation period until May 1, at which point we will continue to detect the program but lower the program’s risk level to “Low risk” and change the default action presented to users to “Ignore.” If the company manages to address all of our remaining concerns, we will even consider de-listing the product. All of these potential changes are conditioned, of course, on the successful completion of the probation period — Belarco must continue its recent history of good behavior, and it must resolve the remaining problems that we have identified with the software.

Sunbelt welcomes feedback from the anti-spyware community and the internet user community more generally. If you know of on-going third-party installs of Shop at Home Select, esp. those that might be performed in a less than up-front manner, please don’t hesitate to let us know.

Eric L. Howes
Director of Malware Research
ehowes(at)sunbelt-software.com

Ah well, that $20 bill/RFID thing looks like a hoax

Darn.  And I was getting all excited.

Nothing about the composition of these strips renders them detectable by scanner or satellite. In 2004, the false belief attaching to this security feature was enhanced by the claim of these bands containing RFID tags. As technology advanced, so did the rumor, leading many to microwave their $20 bills into ashen submission by falling for the canard that nuking their currency would disable these transmitters.

Link here.

Alex Eckelberry

RFID in the new $20 bill?

Monemoneymoney

This hopefully (and very likely) goes into the category of entertainment — not reality.

Everybody loves a good conspiracy theory.  First, there was a crazy theory that the new $20 bill shows hidden pictures of the 9/11 attacks. Now, there’s speculation that the the new $20 bills have a little something extra besides the pretty colors. According to this site, they’re embedded with Radio Frequency Identification (RFID) chips that can set off those monitoring devices at store exits designed to alert personnel that you’re walking out with tagged merchandise.

The author claims that you can “fry” the RFID tag by putting your money in the microwave – but it may explode if you do (although apparently the results do vary depending on what microwave machine you’re using).   I would not test this at home — if there is an RFID tag in the money, microwaving an RFID tag will release some unpleasant chemicals that aren’t too healthy — and you’ll destroy your nice $20 bill in the process. 

If you don’t want your money tracked, don’t think you’ll avoid it by leaving the country. A link from this site takes you to a story written way back in 2001 about how the European Central Bank was planning to embed RFID chips in all their euro notes by 2005. True or not?

(US Treasury site on this new bill here.)

Alex Eckelberry and Deb Shinder

 

Boys in the ‘net hood

Street Gangs Online: We already knew terrorist groups like Al Quaida use the Internet to communicate with each other and plan their criminal activities. Now it looks like common street gangs are invading the ‘Net, too. These new “netbangers” are hanging out in chat rooms instead of (or in addition to) street corners, even creating their own professional quality web sites. And the cops aren’t far behind.

But it’s not just kids searching for vicarious thrills. Active gang members use the Web sites to communicate with each other and sometimes to pick online fights with rival gangs. What starts on the Internet can quickly spill onto the streets. Cops in Boston and Texas who broke up gang brawls in the past few years found that the altercations had been scheduled on gang Web sites.

Read more about it here.

Deb Shinder

Is Transferring your Applications to a New Computer Going to Get Easier?

There are a number of companies out there that provide solutions for transferring your PC data to a new system — like Apptimum AlohaBob and Laplink’s PC Mover.  The breadth of the solutions vary — one may only transfer raw information in bulk from one machine to another, and another might attempt to intelligently migrate your applications over as well.

Last week, we got the announcement that Microsoft has acquired Apptimum (aka Eisenworld/AlohaBob), a company that makes software designed to help you automatically transfer your applications to new computers. At this point it’s only speculation, but if such technology could be built into the operating system, it would make it far more convenient for home and business users to upgrade their hardware systems.

Read the announcement here.

Alex Eckelberry and Deb Shinder

Followup: Wireless Networking and the Law

Last week, we discussed some legal issues pertaining to wireless networking, including whether “hitching a ride” on an open wi-fi network is a crime and possible liability if someone else uses your wireless network to engage in illegal activity. Lots of you wrote to comment on the topic.

In emails directly to me, several of you said that you intentionally share your wireless network with your neighbors, or use a neighbor’s network with their permission. John V. asked “If your PC found 10 wireless hotspots, how would you know which ones are free and which ones were left open by error?” The answer, of course, is that you don’t – unless the network owner has advertised the availability of his network or named it in a way to make it obvious that outsiders are welcome to use it (for instance, an SSID of “FreeNet” or some such might indicate his intentions).

Steve R. recounted an experience where he left his car unlocked and his CD player was stolen, and the police officer who responded told him that by leaving the doors unlocked he “invited” the thief in. While I disagree with this “blame the victim” philosophy, I don’t think the analogy carries over completely to the wi-fi situation, primarily because there are many people who leave their wireless networks open because they actually want others to use them. I doubt anyone leaves his car unlocked with the intention of having his CD player taken.

James P. argued that “The argument of using someone else’s connection/bandwidth while not trying to access files is lame. That excuse is the same as throwing your trash into a neighbor’s unlocked refuse bin but not searching through the neighbor’s trash. The neighbor is paying for trash removal and that amounts to a “theft of service”- no ifs, ands, or buts about it!” Matt P. counters with “it’s up to the person who owns the network to take steps ie. encryption, mac filter, etc to ensure only computers they desire are connecting to their network. It also seems clear that anything beyond your personal property ie. sidewalk, street, etc. is public space and cannot be claimed as private. Therefore, if I can detect the wifi signal on public property or from my own property; then I have every right to use that signal IF it is left unsecure. If the signal is secured and I attempt to connect then I am hacking and that would be illegal.”

Bob G. said “attaching to [another person’s] network is less like trespassing on their property than it is like eating the apples that fell off their tree into your yard.” On the other hand, Douglas B. said “My demand, in my little realm of my life, is that you ask first and if permission given then usage is authorized.” Terrance K. took a balanced approach: “it should be a crime that is treated like speeding on the highway. The crime itself is minor [even though the penalty in some jurisdictions is disproportionately high in order to generate revenue] and often overlooked [e.g. when the highway is empty, or ALL the traffic is speeding & you’re just keeping up, or in an emergency], but it establishes responsibility for any consequences. Once responsibility is established, the miscreant can also be charged with any greater crimes, as appropriate.”

About half of those who wrote that they have wireless networks said they use WEP or other encryption methods. Slightly more than half said you should be allowed to share your connection if you want to, since the ISP doesn’t limit the number of internal devices that you can connect to your network.

Many of you asked for specific instructions on how to make a wireless network more secure. There are numerous resources out there that offer tips on different ways to do this. Tomorrow, I will post a step-by-step article covering different methods of securing wi-fi networks.

Deb Shinder

Turn Down that Web Site! And other New Web Annoyances

Remember the olden days of the Internet, back when Web pages consisted of mostly text and a few photos, and those who wanted to get really fancy might include an animated .gif or two? That was when we painstakingly wrote HTML code in Notepad and uploaded individual files to our Web servers with an FTP program. Those were the days – and we’ve come a long way, baby (to kill two clichés with one sentence).

Many of today’s Web sites are marvels of modern technology. With Java applets, Active X controls, Dynamic HTML (DHTML), cascading style sheets (CSS) and Web design and editing software that makes it twenty times quicker and easier to create a sophisticated page with audio, video and interactive elements, today’s Web is a tangled one indeed.

But just because we can add all these neat features to our pages doesn’t necessarily mean we should do it. I love an impressive Web page as much as the next guy – but only when all that flash serves a purpose. Lately I’ve begun to wish that Web designers, especially those putting up business or information oriented sites, would take a step back and simplify their lives (and mine, as a site visitor) just a little.

I suspect I’m not the only one who feels that way. One of the biggest pet peeves seems to be embedded audio, especially when it’s unexpected. I’ve recently received requests from several readers to give them a warning when one of the favorite links contains embedded sound. You tell me that you often read the newsletter at work, and a sudden blast of music or other audio from your computer disrupts others around you in the office. That’s why I’ve started including the “(sound)” notation after some of the links. That way you have a chance to turn the speakers down or off before you click.

If only all links contained such a warning. I often surf the Web while talking on the phone, so I tend to keep my speakers off by default, just turning them on when there’s something on a site that I actually want to hear.

By no means am I suggesting that all sites should be silent. Sometimes sound is necessary or at least adds value, such as when the site contains a tutorial on how to do something. And some sites are meant to be pure entertainment, and background music is appropriate. On my personal family web site at www.shinder.net, I have an embedded music file called Picard’s Flute, from one of my favorite Star Trek episodes. I’ve gotten tons of positive comments from visitors who recognized it. But on my business oriented sites, at www.debshinder.com and www.ms-security.org, I let the information speak for itself.

You know what they say: you can remain silent and let people think you’re a fool, or you can speak up and remove all doubt. More Web designers should think about that old adage. Probably the best (and certainly the safest) policy is to give site visitors the option to play sound or not, rather than starting it automatically when the page loads.

Of course, sound files aren’t the only elements that can make you want to flee from a page as quickly as possible. Here’s one I encountered for the first time last week: I went to a page and liked it so much that I wanted to make it a favorite. So I tried to right click and got a message saying “Sorry, you do not have permission to right click.” Now, I understand disabling right click for images so people can’t easily save/steal them, but to disable right click functionality for the page as a whole – that’s just an over controlling Web designer. Sure, I can always click the Favorites button in the toolbar and add the site that way – but I’m not sure it’s a favorite anymore after that. For more examples of bad Web design, see Web Pages That Suck 2005 here.

What do you think? Do you love fancy, flashing, dancing Web pages that sing to you? Or would you prefer that Web designers tone it down a notch? How about cascading navigation menus? Do they make the page look cleaner or drive you crazy (or both)? What are the latest ways Web designers annoy you? 

Deb Shinder

Poor security practices lead financial services company to host a phishing site

Update:  I have redacted the company’s name at their request.  I spoke with a partner at the company.  They are pulling the site down, which is hosted at an outside hosting company.  The hosting company was running an old version of Apache and the financial services company is a small outfit which doesn’t have in-house IT.   They are taking care of the error.

From the Great Irony department.  A financial services company is hosting a phishing site. As of this afternoon, Paul Laudanski at CastleCops “was told the folks are in a conference meeting, she cannot interrupt. I strongly urged [her] to interrupt as this is very bad PR for the company, but [she] would not sway.”  I called as well and got the same run-around.  Absolutely refused to help in the matter, short of taking my number, insisted that the person responsible is off site in a meeting and cannot be reached.  Sad state of affairs.

So because she won’t “interrupt a conference meeting”, the site is live right now.

Chasephishe3financial 

Why do I bother blogging this? I see sites constantly compromised for phishing scams and I guess I’m just going to start raising the volume a bit more on poor security practices that lead to these types of things. 

Alex Eckelberry

Direct Revenue settles class action lawsuit

Nothing major in this one.  No cash changd hands.

  • DirectRevenue will destroy any personally identifiable information about computer users including Social Security Numbers, bank account information, email addresses, etc. and must no longer collect such information.
  • DirectRevenue will force users to affirmatively accept installation of their software and disclose information about the functionality of the software separate from the EULA.
  • DirectRevenue is prohibited from installing software by Active X, security exploits or any other method that does not require users’ affirmative consent.
  • DirectRevenue will not distribute software at sights targeted to children.

Link here with settlement docs.

Alex Eckelberry

Behold the power of botnets

(Adam Piggott of Proactive Services originally found this mess, contacted Suzi Turner at SpywareWarrior who got him in touch with one of our spyware researchers, Adam Thomas.)

Discussions about botnets in the security community are quite active these days. And there’s a reason: They’re out there and they’re very nasty. Here’s one in action that’s live today.

Take this innocent piece of spam (it looks better normally, but the website they are pulling the pictures from is down).

Fakemssecuritymsg

A spam like this will take you to a fake Windows update site:

Fakewindowsupsdatesite29342342348

If you visit the site, they will attempt to run a WMF exploit (video of a related site by Suzi Turner here). If you are patched with the January 5 security update from Microsoft (or have decent AV protection) but still fall for clicking on the “Start” link, you will download a trojan installer, wusetup.exe, which sets up the machine to be controlled in a botnet (virustotal.com results for this trojan here).

The wusetup.exe loads files that turn your machine into a proxy server – you are becoming a member of a bot-net. It brings down these files:

ieschedule.exe ib7.dll smss.exe harvest.exe ieserver.exe loader.exe

There’s also remote control and keylogging involved. You get a copy of Famatech’s Remote Server (part of Famatech Radmin) — r_server.exe. And last night, Adam Piggott tipped us off about an affiliate site which installs, through an old Windows help file exploit, a variant of the Winldra keylogger. And the site shown above is directly implicated.

What happens after this is all installed?

It all comes down to a botnet controller, which probably looks similiar to this one (this controller I’ve pictured is actually live right now so I’ve obscured sensitive information):

Botnetcontroller19880

In this controller, you can access a person’s hard drive and perform other tasks.

Hddbyhttp298084

And since apparently most, if not all, of these machines have Remote Server on them, you can access them through Radmin, which I tested just now against one of the infected systems. The “password” dialog box below means the system is running Remote Server.

Radmin21342088

Famatech Remote Administrator (Famatech Radmin) is also sold as an OEM version by Sunbelt as Sunbelt Remote Administrator (Sunbelt Radmin). It is a normal remote control program but used in the wrong hands can be quite nasty, because it has the unique property of being able to operate in “stealth” mode — the tray icon can be hidden. It’s one reason why we detect Radmin ourselves in CounterSpy as a potential risk.

Alex Eckelberry (Thanks to Sunbelt spyware researcher Adam Thomas and Adam Piggott for his diligent work and for providing us a copy of the spam message you see above)

Diary of a BraveSentry install

A fellow blogger by the name of Netsato dropped a comment on my blog about BraveSentry.  Curious, I checked out his blog and there’s a detailed writeup about an illegal BraveSentry force-install that probably occurred through the use of the infamous WMF exploit. Apparently his system was not updated with the latest MS security patches, but it was on a test system where nothing important was stored. 

Bravesentry is a malicious anti-spyware software that entered my computer via Trojan horse applications manifested in the files “t.inx” and/or “kernels8.exe”. My theory is that i.inx was passed to my computer by visiting a rouge website designed to exploit a pre service pack 2 Windows XP computer. Once inside, my software firewall detected t.inx was requesting access to the Internet which I promptly attempted to block. Apparently to no avail, “kernels8.exe” somehow slipped in to the computer which I also tried to block via my software firewall. After running a full virus scan (which found nothing), I rebooted the computer to be greeted by Bravesentry upon start up notifying me that my computer is infected by spyware and that it will proceed to scan my computer. Needless to say, Bravesentry was uninvited, and also not easy to uninstall. Rather than trying to “fix” this computer, I decided to document the problem as best as I could, and to simply wipe out the hard drive and rebuild the computer.

Link here.

Alex Eckelberry