The cost of security: 7 years of spending by the DHS

There’s an Dhsstats112388interesting paper out by Veronique De Rugy of George Mason University, with some disturbing statistics as to how much money we’re spending right now as a nation on security. This does not included DOD spending — just the Department of Homeland Security:

TSA will receive $7.1 billion this year, most of which it will spend on screeners at all US airports. However, the probability of attacks in the style of 9/11 dropped close to zero in the few months after the attacks when airlines installed—at relatively low cost—simple cockpit barricades. In theory then, another 9/11 type of attack cannot happen. Since September 2001, however, screening every bag of every airline passenger to prevent another 9/11 type of attack will cost taxpayers over $34 billion by the end of FY2009. Furthermore, screening checked bags does not necessarily reduce the probability of the destruction of airplanes since screeners do not systematically check carry-on bags, air freight, or people for explosives.

This year CBP officers processed over 422.9 million individuals at the ports and found 209,000 aliens to be inadmissible. As this number represents 0.05 percent of all the people being processed, it means that the cost of stopping one person at the border is enormous. While the cost might be worth it, DHS makes no attempt to measure the performance of this program and determine whether it is giving Americans an efficient use of their homeland security dollars.

and

…The absence of any furtherattacks on American soil does not necessarily mean that the country’s security has significantly improved. It could just mean that we have not been attacked. Unfortunately, many studies have shown that the government is using a substantial portion of new homeland security spending for politically motivated items that are unlikely to have any effect on terrorism. Six years after the 9/11 attacks, homeland security contains as much pork barrel spending as any program in Congress. Both Congress and the states spend homeland security grants on pet projects that have nothing to do with homeland security. As state officials fight over who will get the biggest share of the money and Congress fights yesterday’s battles, who is planning for tomorrow?

It is extraordinary to me that Jack Welch, a revered and supremely accomplished business executives, worked very hard to effectively run a conglomerate with 50,000 employees (and it took him years to get it right). Michael Chertoff, whose management claims prior to running DHS was largely as a lawyer, is expected to run an organization with over 100,000 employees. How this can even possibly run efficiently is beyond me. Furthermore, with constant fear-mongering, Congress is happy to continue to fund so much waste that it would make even ill even the most wanton and dissolute spendthrift.

This is just a disaster waiting to happen.

Link here (pdf).

Alex Eckelberry
(Hat tip to beSpacific)

March test results of Antivirus programs in

Andreas Marx has published a new set of tests of antivirus products.

From Andreas:

The number of unique malware samples received by AV-Test.org increased from 333,000 in 2005 to 972,000 in 2006 and reached 5,490,000 in 2007. During January and February 2008 alone we found more than 1.1 million samples spreading in the internet.

Therefore, we thought it is a good idea to start a new test of anti-malware software in order to see how well the tools are currently performing, given the masses of malware “in the wild”. All products were tested in the best available 2008 security suite editions in English language (this includes AVG Internet Security 8.0 and ESET Smart Security). The tools were last updated on March 1, 2008 and tested on Windows XP SP2 (English).

A comprehensive review should not only concentrate on detection scores of the on-demand scanner, as this would give a user only a very misleading and limited view of the product’s capabilities. When comparing the security of cars, we would not only focus on the safety belts, but also check the ABS system (anti-lock braking system), one or more airbags, crush zones, the ESP (electronic stabilization program) as well as constructional changes and many other features which make a car secure. The different detection types have to be taken together to make a valid statement about the whole detection mechanisms: neither static nor proactive detection mechanisms alone can catch all malware.

It is important to have good heuristics, generic signatures and dynamic detection and prevention in place to be able to handle new unknown malware without any updates. It is crucial to have good response times, to be able to react to new malware, when proactive mechanisms fail to detect them. It is essential to have good static detection rates, to be able to handle already known malware, even before it is executed on a system. So comparing single features makes less sense, as we should think about the fact that a user has not bought an AV product to find some viruses and report them, but he has actually bought a service to keep his system malware-free.

You also do not need to shop for a new product even if the tool you are currently using has some limitation in certain categories. For example, if you have a very fast PC, the slow-down caused by a multi-engine product might be less noticeable. If the proactive detection is not so good, you have to update your scanner more frequently and you may want to use a behavior-based product such as Norton Antibot. If your scanner is not good in catching ad- and spyware used in our test, you might consider using a dedicated anti-spyware application. If the detection of active rootkits is worse, you might want to use specialized anti-rootkit detection and removal tools like GMER. However, not all stand-alone products can work properly together, so an integrated security suite from one vendor might fit best for the users which are currently not running an anti-virus tool or want to buy a new one, as the license for the current one will expire soon.

In case of the actual testing, we first checked the signature-based on-demand detection of all products against more than 1.1 million inactive samples we’ve found spreading or which were distributed during the last two months which means, we have not used any “historic” samples. We included all malware categories in the test: Trojan Horses, backdoors, bots, worms and viruses. Instead of just presenting the results, we categorized the products this time, from “very good” (++) if the scanner detected more than 98% of the samples to “poor” (–) when less than 85% of the malware was detected. (Ed: For the US version, I have changed this to letter grades — A, B, C, etc.)

Not only malware (intentionally malicious software) poses a threat to the user, also possibly unwanted applications like ad- and spyware has to be detected. A collection of more than 80,000 inactive samples was used for this test. We used the same ranking criteria as for the malware detection rates. While we have tested security suites, we want to emphasis that free (personal) editions of AntiVir and AVG exist which offer only very limited ad- and spyware detection rates (less than 15%).

Besides, we checked the number of false positives the products generated during a scan of 100,000 known clean files. This includes common files from different Microsoft Windows and Office versions as well as other well-known products and drivers. Only suites with no false positives received a “very good” (++) rating.

All products require quite some resources (this includes, but is not limited to memory and CPU power) on the installed system. It is important that the slow-down caused by the security suites is not too heavy, because in this case, an annoyed user might simply deactivate the virus guard and leave his system in an unprotected state.
Especially products with more than one scanning engine are usually performing slower than the tools with just one engine. A good trade-off between the required scanning time and the detection rates is therefore important.

In case of the proactive detection category, we have not only focused on signature- and heuristic-based proactive detection (based on a retrospective test approach with a one week old scanner). In addition to this, we also checked the quality of the included behavior based guard (e.g. Deepguard in case of F-Secure, Sonar in case of Norton/Symantec products and TruPrevent in case of Panda). We used 3,500 samples for the retrospective test as well as 20 active samples for the test of the “Dynamic Detection” (and blocking) of malware.

Furthermore, we checked how long AV companies usually need to react in case of new, widespread malware (read: outbreaks), based on 55 different samples from the entire year 2007 and 3 samples seen in 2008. “Very good” (++) AV product developers should be able to react within less than two hours and we found a reaction time of more than 8 hours unacceptable and thus, “Very poor” (–).

Another interesting test was the detection of active rootkit samples. While it is trivial for a scanner to detect inactive rootkits using a signature, it can be really tricky to detect such nasty malware when they are active and hidden. We checked the scanners detection against 12 active rootkits.

Detection is only one point, removal and remediation is extremely important, too. It is usually not desirable to reinstall and setup a system after an infection has been detected, since this costs time which in turn costs money. Therefore, we checked if the security software was able to scan for and remove 20 active malware samples from the system, cleaning all files (or deleting the components), repair the registry traces and undo the ‘hosts’ files changes.

In order to get a more comprehensive impression of the products, one should not only look at this test, but also compare the results of various tests and the products’ performance over time and their on-going development. We have not reviewed more “subjective” criteria like the usability, support, (online) backup features and the like.
Therefore, we would suggest trying these features with a trial version which is usually available as web download from vendor’s website before buying a security suite.

I have put these on my site, in a number of different ways:

My version, which I believe is simpler for American readers, as it uses a letter grading system. Grades here, spyware/adware tests here, malware detections here (HTML). Excel spreadsheet here.

Andreas’ original spreadsheet is here.

Alex Eckelberry

Oops: Macvirus.org hosting porno malware fest

Just a bit of irony that I got today from my colleague Juha Kauppinen. Macvirus.org, a website dedicated to “keeping an eye on Mac viruses”, has had their discussion forums seeded with vast amounts of forum spam pushing various junk and lots of hardcore porn, including a number pushing malware (fake codecs).

Amacvirus123888

Amacvirus123888a

Here’s one pushing fake codecs for both Mac and Windows platforms (the site serving the fake codec simply detects your user agent and delivers the appropriate malware). I picked up a couple of samples: Mac Virustotal report here, Windows Virustotal report here.

Macvirus123888c

Hmm… a Mac virus being pushed on a Mac forum.

In fairness, the site looks like it hasn’t been updated in a long time. Still, rather embarrassing for these folks…

Alex Eckelberry

Dangerous Loads.cc malware gang re-emerges

Hi all, Adam Thomas here from Sunbelt’s malware research team. I wanted to post a brief follow up to Alex’s earlier blog post re: the wave of “3D Screensaver” spam that we have been seeing.

Further investigation into this malware points back to the infamous malware loading group “Loads.cc”. Interestingly, the Loads.cc web site was taken off-line in late January after suffering a DDoS attack from a rival malware gang which utilized a Barracuda bot-net to perform its task.

While the “Loads.cc” domain (which is used by affiliates to sign up to have their malware installed by the botnet and monitor statistics) is no longer working (it resolves to 127.0.0.1), we were able to easily discover a new domain in use thus proving that Loads.cc is back in operation:

Loads.cc_main

This malware gang is responsible for the distribution and installation of massive amounts of malware: Spambots, keyloggers, DDoS bots, adware and rootkits. The the whole kitten kaboodle. So, it cannot be stressed enough that this is very dangerous malware and to stay away from these Trojaned screensavers.

After installing the “screen saver”, the malware announces it’s presense by using an HTTP GET request for a PHP script. This PHP script (manda.php) may or may not return a URL of additional malware to for the bot to retrieve and install – malware that other authors have paid loads.cc to install.

GET http: //[removed].info/admin/manda.php?id=[user_id]&v=scr

The malware is then copied to the following location where it silently sits awaiting commands from the C&C server:

%HOMEDRIVE%Documents and SettingsLocalServiceLocal SettingsApplication Datacftmon.exe

Traversing to the “admin” directory reveals this slick looking login page:

Loads.cc_admin_snake

Also hiding out on the same domain is (potentially) another pay-per-install affiliate program:

Goldencash_same

The fun never ends . . .

Rash of new spam pushes malware disguised as screensavers

Over the past 24 hours, we’ve have seen a rash of malicious spam pushing screensavers that are, in reality, backdoor trojans (VirustTotal report here, with very poor detection by most engines). It is unknown how widespread these spams are.

Screensaver123812388

Screensaver123812388a

Screensaver123812388b

Screensaver123812388c

Both of the sites that we have observed hosting these screensavers appear compromised. One is already down, and we are in the process of attempting to get the other one taken down.

Clicking on the link brings the user to a very realistic “3d screensaver” page:

Screensaver-56597

Screensaver-56597a

Of course, installing one of these screensavers will not actually avail oneself to the ostensible benefits of watching Santa’s Home or the Matrix. Instead, one may get a rather nasty surprise.

Alex Eckelberry

VIPRE in public beta

Viprenewimage21348

Earlier this week, I blogged about VIPRE, our new antivirus and antispyware product going into beta this week. You can read about it here.

It is now in public beta. To register for the beta, go to beta.sunbeltsoftware.com and create a user name. After email confirmation, you will be able to go to the forum and download the beta.

We recommend that you disable your existing antivirus product while running VIPRE (although it’s technically possible to run both VIPRE and another antivirus product at the same time, it does create the possibility of performance issues). If you have CounterSpy on your system, you should uninstall CounterSpy first. You do not need CounterSpy with VIPRE running, as VIPRE already includes complete antispyware functionality.

And please, run it through its paces. I’d like as many people as possible pounding on this thing to find bugs 😉

And below are some screen shots:

S_vipre234888

S_vipre234888c

S_vipre234888b

Alex Eckelberry

Hacking a scam

Hilarious little story:

After a bit more back-and-forth about how he could “just answer any questions I had right now”, the sales rep pointed me to their sample ads, a 7mb PDF with sixteen pages of seemingly real companies, all with the same phone number (555-555-5555) and the same website (00000000000.com). Somehow, that didn’t convince me to “invest” several hundred dollars, so the salesman faxed over some more information with a single, real ad.

As I eagerly waited for the follow-up call later that day, I thought I’d take a minute or two to check out their website. Almost immediately, I came across their Federal Procurement Officers Only page. Out of curiosity, I entered a username and password, and then clicked the Login button. Instantly, a JavaScript dialog popped-up…

Link here (via Xavier).

Incidentally, I have a neighbor who is in a similar business — selling “guides” or “special publications” that are basically vehicles to sell ads, and rarely see the light of day or get read. I get calls routinely from these sorts of outfits (there is a very active bunch of companies over in the UK that do this, where a lot of this scam got started).

Caveat emptor: Don’t blow hard-earned marketing money on stupid, bogus publications (no matter how impressive they sound), special technology television shows, inflight technology specials, etc. If you’re going to blow money on marketing, you’re better of going to Vegas. Stick with the core basics that work.

Alex Eckelberry

More excess by Klik Revenue

At the end of 2006, Klik Revenue (allegedly involved in or condoning all kinds of activities, including rogue antispyware products, fake codec trojans through their Nelroy Ltd. alias, and blackhat SEO) held a party in Prague that could be described as, err, excessive. We blogged about it, with pictures, here.

They recently had another party, this time in Montenegro, at the Bianca Resort Hotel & SPA (more pictures of the spa here).

Borat-style translation of some of the text here:

In the first half of February this year, a meeting of partners and friends group of companies KLIK Team. As expected, the conference has been very vocal and successful. For some people, these were all 3-saturated days, and for those who came to us early in the hotel – a first-week rest. Just this year, we went to 95 men, while planning to travel almost 2 times more participants. This manifested itself in many ways a leap year year, which amended the plans of many wish to come. Nonetheless, 95 people – this is a very large number of participants for this event. Many other crowd and conferences for webmasters, including those that take place in Russia, do not collect and the number of participants. Even despite that, as a rule, their format wider than one team meeting partners.

KLIK Team Party – it is party, which is mostly entertaining and informal. Reports and roundtables – is, of course, interesting, but, in our view, this is the means and the Internet. We love and know how to relax and share it with our friends. Our participants, we have proposed a three-day work and forget about other concerns. Tusovok our program – a full and interesting, and each has its own taste in entertainment, bringing new contacts and expanding business ties. The diverse vacation, especially sports, contests and competitions, banquets and enjoyable communication – that’s what KLIK Team Party. And our tusovkah we meet not only with the webmaster and partners, we have come to our competitors on different fronts. This is a very good trend – we are happy to maintain healthy relationships including those with teams whose interests intersect with ours.
The pictures, as can be expected, show a bacchanalian event filled with typical Klik Revenue excess — cash, cars and, of all things, inflatable love dolls.

It’s good to see that these nice, upstanding boys are having so much fun with their honest, hard-earned money.

Link here to pictures, and another link with more pictures and videos.
And this YouTube video:

Alex Eckelberry
(Thanks Anthony, Francesco, Adam and Patrick)

Thank you sir, may I have another: Google Groups invasion continues unabated

There is another Google Groups invasion, with a different twist than the porn angle: spam blogs. In this case, we see splogs set up for everything from “female celebrity smoking” to air conditioners. These push searches to MCtop10.info.

Ac1238888

Ac1238888bAc1238888aa

Ac1238888e

Ac1238888f

A list of sites tracked so far is here (pdf).

Alex Eckelberry
(Thanks to Sunbelt’s Adam Thomas)

Later this week, VIPRE goes to beta

Vipreantivirus12388

VIPRE, our new combined antivirus and antispyware product, is currently in a private beta. We’re taking it into broad public beta later this week, so stay tuned.

To say that I’m excited about this release is an understatement 😉 I’m not sure when the last new antivirus engine came out, but it’s probably been a decade or so.

I talked about some of the philosophy behind VIPRE in a blog post early last year. But to recap:

  • VIPRE is a completely new, built-from-scratch antivirus and antispyware product. The antivirus engine is our own creation, not licensed from another company. It has been a major undertaking, consuming millions of dollars in R&D costs and thousands of man-hours.
  • The technology itself is next-generation, incorporating a completely new architecture that combines antispyware, antivirus, antirootkit and other technologies into a seamless, tightly-integrated product.
  • It’s very fast and very tight on resources. One of the reasons we decided to “build our own” was because of the enormous performance penalty of cobbling together an antivirus and antispyware engine together. It is one of the fastest products of its class (I suspect it’s actually the fastest, but we haven’t done the final benchmark tests). The definition database structure is also completely different than what we have in the current version of CounterSpy. It is considerably smaller and more efficient.
  • VIPRE is not a “suite” per se — the first release is a combined antivirus and antispyware product. Personally, I’m not a big fan of suites, because it seems you get some good, some bad, all thrown together, and what the user gets is an experience that is less than satisfying (system slowdowns, tons of popups, more potential for system instabilities, etc.). However, we do plan on tightly incorporating our Sunbelt Personal Firewall code into a future release, providing complete firewall, intrusion detection and intrusion prevention capabilities, in addition to antivirus and antispyware.
  • There will be a new version of CounterSpy as well (version 3.0), which will be a subset of VIPRE (VIPRE is technically a superset of CounterSpy, so you do not need CounterSpy running on your system if you have VIPRE.)
  • Enterprise versions of CounterSpy and VIPRE will be following several weeks after the release of the consumer products.
  • VIPRE will be inexpensively priced. We’re currently planning on $29.95 for single user, $39.95 for 3 user. CounterSpy customers will be able to upgrade to VIPRE for a nominal cost.

I’ll be posting something here for you to download later this week. If you can, please join the beta — I’d like as many people as possible beating on this thing before we release it.

In the meantime, here is a chart that explains the differences between VIPRE and CounterSpy:

Imageviprecomp

As always, feel free to drop a question or comment and I’ll answer them as I can.

Alex Eckelberry
(Oh, and in case you’re curious, VIPRE is an acronym for for Virus Intrusion Prevention and Remediation Engine.)

The Google Groups porn invasion continues

Well, there’s more.  It’s like cockroaches. 

Groups123888818a

Groups123888818an

Groups123888818anb

And even for Italian SEO:

Groups123888818

Pattern is the same as the other bunch I blogged about earlier today — these pages push other porn pages for profit. While not all of the redirects go to malware sites, we did observe redirects to a site which ultimately pushes a fake codec trojan, which if installed, results in a VirusHeat infection.

Alex Eckelberry
(Thanks Francesco Benedini)

Hard core porn invasion on Google Groups

We’ve just started seeing a hard-core porn invasion on Google Groups. So far, we have identified approximately 270 Google Groups pages with this porn. List here  (pdf).

images below, offensive content has been obfuscated.

Groups1238888a

Groups1238888ab

 

Groups1239888

These pages push other porn pages for profit.  While not all of the redirects go to malware sites, we did observe some redirects to a site which ultimately pushes a fake codec trojan, which if installed, results in a VirusHeat infection.

Groups1238888ff

We have alerted Google to the presence of these pages.

Alex Eckelberry
(Thanks, Adam Thomas)

More toolbar fun

There’s some discussion going on on various boards alleging that AVG might be including the Yahoo Toolbar with their new suite (Temerc, DSLR. and Calendar of Updates).

Perplexing was this response to a discussion, apparently (but not confirmed as such) from an AVG employee:

reply to TeMerc
To TeMerc>
Well lets admit people who know “something” about computer dont need it. However there are dozens of BFU in the world and they like it. If you would sell some software product and would like to earn some money, would you focus on few ppl who “know something” or to million other ones?

(BFU is not the most polite term to use in referencing one’s own users.)

At any rate, I took a brief look and it appears that the toolbar is legitimate and is designed by AVG — it’s not the Yahoo Toolbar per se. It incorporates the LinkScanner product they acquired recently. However, it does offer a search functionality, using Yahoo search (meaning, Yahoo pays AVG for search traffic). In other words, it’s not nearly the worst I’ve seen.

Your thoughts?

Alex Eckelberry
(thanks, Bill)

New paper on the RBN

Interesting read by the folks at Shadowserver:

In the last few months, there has been a significant amount of press coverage given to insidious cyber activity associated with the segment of the Internet known as the “Russian Business Network,” or RBN. Previous studies have suggested that the RBN has ties to nearly every area of cybercrime, including: phishing, malware, DDOS activity, pornography, botnets, and anonymization.

In November 2007, media reporting indicated that a large portion of the RBN “went dark.” Since that time, the Shadowserver Foundation has been more closely analyzing outlying networks implicated as being associated with RBN. One of these suspected outliers is AS9121, known as TurkTelekom. SecurityZone.org reported in early December 2007 that while not everything in TurkTelekom appears to be malicious, there are some ranges that are “particularly bad” and analysis of Shadowserver Foundation data agrees. Several subranges quickly stand out as being deeply involved in malicious cyber activity: 88.255.90.0/24 and 88.255.94.0/24. IP registration indicates these ranges are listed under the name “ABDALLAH INTERNET HIZMETLERI” (AIH).

Link here (pdf).

Alex Eckelberry

More on FamilyGuyx turning down Zango…

Earlier today, we blogged that Familyguyx.net had self-righteously turned down Zango. To quote them:

Lot of updates coming up in March. – 2/20/2008
It looks like we are tagged as harmful website by Google. 70% of our traffic comes from direct visits and not from Google. Hopefully things clear up in the coming week.

Another news is that Zango wanted to pay us $500/day to run their software ads (we make a lot running their affiliate program $1/install), but we refused because we know it will degrade our website’s experience. We can be making $8000/day just from Zango but we refuse to do so! We are not joking, FGX receives 80,000 unique visitors a day and each install is $1. At 10% conversion, we can make $8000/day. We have even disabled all Zango ads from displaying from our ads providers. In one month, we can be making $xxx,xxx, but money is not everything. We hate to see people’s computers infested with spywares and adwares.

We are doing a complete redesign of the website. The new layout will promise to be kickass and the comment system will be upgraded to prevent people from spamming. There will also be a member system where everyone can contribute their family guy arts, reviews, writings, etc… Also the video system will also be changed to something more appropriate.

Well, upon some further research, it turns out that they are actually advertising Zango RIGHT NOW.

So I do hope they deliver on that promise to stop advertising Zango in March…

Zangoad123888

Zangoad12388823

Sheesh.

Alex Eckelberry
(Thanks Adam)

Publisher says no to Zango

familyguyx.net:

Another news is that Zango wanted to pay us $500/day to run their software ads (we make a lot running their affiliate program $1/install), but we refused because we know it will degrade our website’s experience. We can be making $8000/day just from Zango but we refuse to do so! We are not joking, FGX receives 80,000 unique visitors a day and each install is $1. At 10% conversion, we can make $8000/day. We have even disabled all Zango ads from displaying from our ads providers. In one month, we can be making $xxx,xxx, but money is not everything. We hate to see people’s computers infested with spywares and adwares.

Link here.

Alex Eckelberry
(Thanks Chris)

Red Hat legal argument on tenuous ground?

Readwriteweb has a story today on Red Hat sending a cease and desist letter to DataPortability.org over their use of an “infinity” logo.

Here’s the DataPortability logo:

Dataportability

And here’s the Fedora logo:

Fedora123

Except I suspect they’re all on weak ground, because Dataproducts, a company that has been around for a long time, has been using a similar logo for years:

Dataproducts128318238

(Dataproducts was actually a customer of mine back in the mid-eighties, and the lead engineer on our Ninja product used to work for them. While they are not widely known, they made printers for mainframes, and apparently now they’re in the business of ink refills.)

Alex Eckelberry