Yes, this blog has been quiet for the past several weeks

If you’re wondering why this blog has been rather quiet for the last several weeks, it’s a combination of a heavy workload and travel schedule recently.  I went to DC to attend the ASC Workshop and then went to the RSA Conference in San Jose.

I’m not much into doing essays ala “what I did this summer”, but I hope to incorporate what I’ve learned and observed over the past two weeks into future postings.

At the Antispwyare Coalition workshop, an issue for me was the bifurcation of spyware downloads.  Illegal driveby downloads are down by the larger adware vendors (180solutions, Direct Revenue, etc.), whereas the nasty boys are getting nastier, using exploit after exploit to install software.   We’re seeing the standard “exploit trio” now, where an illegal driveby download is attempted first through an old CHM exploit, then a Javascript exploit, then the WMF exploit (example).

Other issues that I was concerned about while there:

-The legal difficulties of going after slimeballs overseas.

-The fact that certain ISPs continue to be friendly to spyware scum, whereas as Dave Methvin (PC Pitstop) pointed out, you hit these guys with a notice that a page is in violation of the DMCA, and they jump all over it.

-The third party ad networks, which help fund spyware (more on that later).

At the RSA conference, I was in business mode all the way.  We have a number of software development toolkits that we are marketing to other software and hardware vendors, and it was meeting after meeting after meeting, as well as meetings with the press.  It was a good show for us. 

We did spend a fair amount of time with the Microsoft security folks.  Microsoft seems to be doing a lot of outreach to the security community and there were a number of events, such as a function for the SecureIT Alliance (which we are part of), a reception with MS Security Vp Mike Nash and a really pleasant luncheon put on by MS security guru Stephen “Stepto” Toulouse for bloggers.  Two of our products were also finalists in the SC Mag Reader Trust awards and Carol, our biz dev VP, did the hard work of going to the awards banquet (it was a black tie event, which to me is ludicrous in laid-back California, requiring people flying in to pack a tux or a suit.  I managed to back out gracefully).

Both the ASC and RSA events were a LOT of fun.  It’s great to be with other people who are all in the security community.  Everyone is on the same page and there are lots of really smart people around. 

Anyway, I’m back now and thankful to be in my own bed. 

Alex Eckelberry

State of AV scanners

Virus.gr did a test of AV scanners from the 14th through the 22nd of December. They also included spyware scanners like CounterSpy (not surprisingly, none of the spyware scanners did well, because their focus is on spyware, not viruses).

It’s probably a test that will be argued by the AV companies, but it’s worth looking at.  Not surprisingly, Kaspersky came out on top (it is an outstanding engine).  

Here are top 10 rankings:

1. Kaspersky Personal Pro version 5.0.390- 99.46%
    Kaspersky 2006 beta version 6.0.15.222- 99.46%
2. F-Secure 2006 version 6.10.330 – 96.92%
3. CyberScrub version 1.0 – 96.62%
4. eScan Virus Control version 2.6.522.9 – 95.21%
5. McAfee version 10.0.27 – 94.80%
6. BitDefender version 9 – 90.75%
7. Nod32 version 2.50.41 – 88.79%
8. AntiVir Personal version 6.32.00.51 – 86.55%
9. MKS_VIR 2005 – 86.16%
10. Norton Professional version 2006 – 85.17%

Link here via Donna.

Alex Eckelberry

Seen in the wild: More fraudulent antispyware advertising

Imagine getting this scary message while surfing a site (in this case, a porn site):

Spywarefoundupsex

(upssex(dot)com/galls/amateur.html)

Clicking Ok takes you to a page which describes the so-called “virus” that you’re infected with:

Fakeavpage213424

(watchforall(dot)com/cgi-bin/search/go.fcgi)

In this case, the page directs you to a TopTenReviews page (yesterday, it referred to an antispyware application–so I guess it depends on what the state of the affiliate plans are out there…).

Toptenreviews12980123`

Clicking “Cancel” brings up various porn sites. 

tonsporn(dot) com//galls/amateur.html  also brings up the fake message.

Alex Eckelberry
(Thanks to Sunbelt researcher Patrick Jordan for this)

Secure Computing comes out swinging

Secure Computing LLC, (not to be confused with the publicly-traded web security company Secure Computing Corporation) was hit with a lawsuit in January that alleged that:

“…Secure Computer, its principals and associates advertised and distributed a product called Spyware Cleaner through spam, pop-up ads and deceptive hyperlinks,” McKenna explained. “However, not only did this product fail to detect and remove spyware on the consumer’s computer, it actually tampered with security settings to make the machine even more vulnerable.”

Secure, which made an alleged rogue antispyware application Spyware Cleaner, has filed an Answer which rigorously defends practices:

John W. Dozier, Jr., managing partner of Dozier Internet Law, P.C., legal counsel for Secure Computer, LLC, reports that, “Our extensive investigation revealed that many of the facts alleged by the Attorney General are wrong. The Answer filed on Tuesday goes through the factual and legal allegations in tremendous detail, and we believe the theories espoused by the State of Washington are patently wrong. In fact, we have provided extensive information that debunks many of the misunderstandings the Attorney General developed in the course of its joint investigation with Microsoft Corporation.”

Paul E. Burke, president of Secure Computer, LLC, feels the lawsuit is motivated by Microsoft’s interest in controlling the anti-spyware software market. Burke stated, “I was shocked when I found out about the lawsuits and was even more shocked to learn that the State of Washington and one of my competitors, Microsoft Corporation, could make these allegations without the facts or law to back them up. Now, as a result of these false allegations, the reputation of my company, and my company’s products, have been disparaged and destroyed.”

Link here.

I’m trying to get a hold of the Answer for all to see. 

This ought to be interesting.

Alex Eckelberry

Looking for some beta testers

We’re actively beta-testing our new antispam and antivirus solution for Microsoft Exchange, Sunbelt Messaging Ninja.  If you run Microsoft Exchange and would like to test it, send an email to beta(at)Sunbelt-software.com and put “Ninja Beta” in the subject.

This is a very cool product and if you’re interested in mail security, something you may want to look at. Specs here.

 

Alex Eckelberry

 

 

This you gotta read

Buildingbotnet210980

Brian Krebs at the Washington Post has been working for months on a story on botnets.  It’s finally hit the light of day.  This is solid reporting — Brian spent months researching and working on this piece. 

It’s starts with a story about a hacker, 0x80, who controls a large botnet at his pleasure.  Of course, these are machines that he can install spyware on to make affiliate commissions.

In the six hours between crashing into bed and rolling out of it, the 21-year-old hacker has broken into nearly 2,000 personal computers around the globe. He slept while software he wrote scoured the Internet for vulnerable computers and infected them with viruses that turned them into slaves.

Now, with the smoke of his day’s first Marlboro curling across the living room of his parents’ brick rambler, the hacker known online as “0x80” (pronounced X-eighty) plops his wiry frame into a tan, weathered couch, sets his new laptop on the coffee table and punches in a series of commands. At his behest, the commandeered PCs will begin downloading and installing software that will bombard their users with advertisements for pornographic Web sites. After the installation, 0x80 orders the machines to search the Internet for other potential victims.

You can read the whole article here.

Segues, plazma screens and beautiful people: Brian also went to out to 180Solutions while researching this story.  A lot of what he found when there was cut from the botnet story for space considerations.  So, he posted a separate article on his blog about his experiences out there.

 I notice that each of the company’s departments is fitted with large, wall-mounted plasma screen televisions that display graphs charting 180’s daily and weekly sales and revenue numbers. The display nearest the marketing department showed that 180 pulled in more than $1 million in the past week alone serving ads to people who have its adware installed on their computers. Today’s estimated revenue is slightly more than $100,000; the graph showing how much the company has actually earned so far today reads $2,966, but then again it is just after 10 a.m.

Link here.

There’s also a nifty graphic of how botnets are created that you can see here.

Well done Brian.  You have done a great service to the community. 

Alex Eckelberry

So what are the Highconvert folks up to?

Our Dear Friends at Highconvert(dot)com (you can see them loading spyware through an old exploit at Ben Edelman’s site here) have apparently set up a new IP range in the Russian Federation: 217.170.68.68. 

But going to that IP provides you with a wonderful graphical representation of a word best left unsaid.

Highconvertfubad

Tsk tsk.  What are these boys up to?  Something to watch…

Alex Eckelberry
(Thanks Patrick Jordan)

 

Eric Howes to talk about spyware in Houston on Feb 28

Our head of malware research, Eric Howes, will be in Houston at the Microsoft offices doing a presentation on spyware.  From our propoganda:

Spyware is a serious threat to your enterprise network, and the threat continues to grow. Awareness campaigns and user education are useful, but they’re not enough. Legislation may deter some “legit” adware distributors, but many criminal spyware writers will continue to create and release malware that threatens the stability, security, and performance of your network. Not to mention your users’ and organization’s confidential data. In many cases spyware can also compromise federally mandated security compliance.

Register for Sunbelt Software’s free seminar “Winning the War on the Spyware Battlefield” and learn how to better protect your organization from spyware on Tuesday, February 28, 2006 in Houston, TX.

This seminar will look at the current state of the spyware problem, addressing its effects on privacy, financial security, corporate responsibilities and productivity, as well as outline how CounterSpy Enterprise can help better protect your organization from spyware threats.

Join renowned spyware researcher and Sunbelt’s Director of Malware Research, Eric Howes, for an engaging discussion on the scope of the spyware problem. Widely regarded as one of the foremost experts on spyware and its malicious mechanisms, Howes has served as a panelist at the CNET Antispyware Workshop and is an active and well-known participant in many of the security forums dedicated to spyware research. The seminar will also include a live demonstration on how CounterSpy Enterprise can help you fight the battle against spyware.

Why should you attend?

Learn how spyware affects business productivity
Understand the impact of spyware on network stability, security, and performance
See how spyware can cause violations of federal regulations
Discover how to better protect your network and users from spyware
See CounterSpy Enterprise in action
And more

Click here to register.

Alex Eckelberry

 

Wireless security seminar on February 21st

If you’re involved in corporate wireless security, you might be interested in this event. We’ve arranged for Craig Mathias, a wireless security expert, to hold a seminar for our enterprise customers on wireless security.

This is not a Sunbelt or vendor sales pitch.  We’re paying for this as a complimentary service for any enterprise customers on a Sunbelt maintenance plan.  

The event is on Tuesday, February 21, 2006 at 2:00 PM – 3:00 PM EST.

If you’re a Sunbelt enterprise customer on a maintenance plan, the event is free; non-customers pay $99 for entry.

From our hype:

Expert Webcast: Strategies for Wireless Security.

With both local-area and wide-area wireless well on their way to becoming the default connectivity for both voice and data, it’s imperative that IT managers develop effective strategies and implementations for wireless security. As it turns out, wireless security is just one aspect of a complete security solution. Join us on Tuesday, February 21st at 2:00 pm Eastern Time, as we take an insightful look at wireless security. Featured speaker will be Craig J. Mathias, the Principal of Farpoint Group.

Widely regarded as one of the foremost experts on wireless security and its mechanisms, Craig has served as a Co-Chairman at the Wireless Security Conference, serves on the Advisory Boards of major industry conferences and is an active and well-known participant in many of the forums dedicated to wireless technologies and industry news such as wireless.itworld.com.

Craig will provide a rare look into the wireless security puzzle and examine wireless LANs, look at the challenges, requirements, tools, and solutions to wireless security. He’ll go beyond the ordinary to fully examine what’s really needed at Layers 2, 3, 4, and 7 of the famous OSI model to provide unique and valuable insight.

During this webcast, you’ll learn from Craig how to:

  • Understand the key elements of an overall security plan.
  • Examine the security facilities inherent in Wi-Fi
  • Explore higher-level security tools and techniques
  • See how upper-layer tools can be applied to wireless beyond
    Wi-Fi
  • Gain insights into the future of wireless security

To attend, click here (note—it may say on the page that it’s a Microsoft event, but it’s not.)

Alex Eckelberry

Botnet hits hospital

Christopher Maxwell, a 20–year old in California, had a ball running a botnet of over 10,000 PCs. In fact, he got really lucky: He was able to get into a hospital network, where according to the Seattle PI, he “allegedly impaired patient treatment, delayed processing lab tests and surgery scheduling, and shut down computers in intensive-care rooms”.

Of course, he installed a slew of adware programs.

I’m trying to get a hold of a copy of the indictment.

Alex Eckelberry
(Hat tip to Ferg)

Sunbelt OEM solutions

A number of people have been interested in using our technologies in their products.  Well, we actually have a dedicated effort here to provide often customized security solutions to other companies. 

The offerings range from Software Development Kits (SDKs), which allow OEMs to incorporate our technology into their products, to custom development of security solutions.  

Currently, we offer the following pre-packaged SDKs:

CounterSpy Client SDK: This allows OEMs to incorporate client-side antispyware scanning, remediation and active protection into their products.  The SDK is built on our new 2.0 platform, which is light years ahead of our current version (the 2.0 platform will be part of our client and enterprise antispyware products next quarter).

CounterSpy BorderPatrol SDK: BorderPatrol is a multi-platform, cross-compiled SDK specifically designed for appliance and proxy vendors.  Basically, it stops spyware at the perimeter of the network. You’ll see more and more boxes coming out with this technology.

Kerio Firewall SDK: This exposes quite a bit of the functionality of the Kerio Firewall to people who want to integrate firewall security into their products.  This is a rich endpoint security solution —more than just a firewall — it has a bunch of features, including intrusion prevention.  This SDK will be available over the coming months.

If you’re interested in these technologies, contact Carol Montgomery-Adams.

Alex Eckelberry

WinFixer pop-up spoofs Windows Live Safety Center

A while back, we received this pop-up advertisement after doing some research with the V-CODEC trojans.

Wfspoof

This pop-up looks very similar to the actual Windows Live Safety Center:

Safetycenter

However, clicking the “Full Service Scan” button on the pop-up takes you WinFixers website where you are prompted to install their software.

Wfspoof2

Adam Thomas
Spyware Research

Whenu

Front page of Adotas, an article about Bill Day of WhenU:

After talking to adware players, vendors and proponents, Day eventually hooked with New York-based WhenU in October 2004. In doing so, he immediately set about to change the company’s strategy, technology and policies. “When I came in, I made a lot of changes because I had a long-term vision that it’s about getting to a model where users receive excellent advertising, and go through an entirely above-board process for how the software gets on the computer. If you want to uninstall, you can uninstall. All our ads are branded heavily, and we actually offer an 800 number on the ad itself. These are things that most other people don’t do – I hope they do in the future – but they’re basically what I like to call the ground rules for properly competing in the space. We’re looking to continue to do things to generate user value.”

Link here.

Alex Eckelberry
(Thanks Amanda)

Are major ad networks promoting porn?

Fresh in from the Anti-spyware Coalition workshop, I hope to be writing a bit about third party ad networks.

But this headline just caught my eye:

Major AdNetworks Promote Porn?

Probably one the most disturbing things in the industry as of late: Last week a little problem popped up on one of the networks we buy from – and turns out that several of the networks have the same problem. Not looking to name anyone, but it seems that several of the top major networks were running banner ads on a website that many people would consider pornographic.

During a reload of this banner ads, we found several major advertisers being shown while a young woman stripped and seemingly have a more than cordial relationship with her cigarette. This site also had an advertisement for CapitalOne Savings show itself while two smurfs were engaging in things that smurfs normally don’t do. It seems that Netflix, the New York Times, Monster.com and even H&R Block among others, have no problem with their ads being shown on QUESTIONABLE  sites. Maybe NYTIMES thinks that people who like smurf sex are interested in subscribing to their newspaper? Who knows?

Link here.

This is on the heels of comments by FTC Commissioner Jon Leibowitz about “shaming” advertisers who advertise through adware. 

The problem is complex.  Advertisers don’t necessarily buy directly from CNN, the Washington Post and other sites.  They use ad networks to place ads on lots of websites.  Then, these ad networks may use other ad networks to place ads — in effect, making a chain of intermediaries.

According to conversations I had at the ASC conference yesterday, there are advertisers concerned about where their ads are distributed, and are (and will be) the driving force to get reforms done by the ad networks. 

I hope to write more on this subject later. 

Alex Eckelberry

New replacement for SpyAxe / SpywareStrike

A new rogue anti-spyware application has surfaced as a replacement for SpyAxe/SpywareStrike. Behold: SpyFalcon!

Sf

WHOIS information:

Domain Name: SPYFALCON.COM (195.225.176.79)

Registrant:
SunShine Ltd
David Taylor
U-12 Gamma Commercial Complex # 47
Rizal Highway cor. Manila Ave Subic Bay
Olongapo City
null,98101
PH
Tel. +206.9543154

Other domains at the same IP address:

Spyfalconupdate.com
Updateyourwindows.com

SpyFalcon, and its predecessors, are known to install through exploits as well as piggyback on to users machines via the video codec that we have talked about before. This application has just appeared today, so it might be a good idea to add the domains listed above to your block lists now.

Adam Thomas
Spyware Research

Sunbelt Messaging Ninja goes beta

It’s been a long time coming but Sunbelt’s Ninja product is finally seeing the light of day in the form of beta release 1. For those of you that don’t know, Sunbelt Message Ninja is the version 2.0 release of iHateSpam Server Edition, an anti-spam application for Exchange 2000 and 2003 servers. It started off just being a codename for v2 but as the feature set and functionality grew the product was re-written from the ground up.

The first release of Ninja is anti-spam, anti-virus, and attachment filtering. Because of the extensible architecture we’ll be adding disclaimers, content auditing, content filtering, message forking, advanced message reporting, and archival functions over the course of this year. You’ll end up with a single application to do pretty much everything you need on the Exchange server.

The web site is here:
http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm

The beta is being hosted here:
http://beta.sunbelt-software.com

Anyone that is interested in the beta can sign up on the beta forum by using the register button at the top and selecting a username with the prefix of “ninja-“, your information will be reviewed and you should be given access within 24 hours. If you have any questions about the beta or have problems getting signed up just drop a line to beta@sunbelt-software.com

Greg Kras
Sunbelt Software VP Product Management

Antispyware workshop and RSA

I am going with a number of Sunbelters to the Anti-spyware Coalition Public Workshop this week. And, Eric Howes, our director of malware research, will be speaking on a panel there.

I will also be going to RSA next week with a group of Sunbelters.  We don’t have a booth — we’ll be walking the floor and going to any good parties we can find.  

So blogging on my part will be a bit light…

Alex Eckelberry

Follow up to “Good news, Spyware may be decreasing”

Follow-up to my post about a study by the University of Washington that found spyware is decreasing:  The full research paper has been published.

It does include adult sites, which was a question earlier.  From Suzi Turner:

The PDF has several charts including one that shows the changed numbers in the types of spyware from May 2005 to October 2005.  Two categories decreased – dialers and adware.  Keyloggers increased from .04 to .15 %, trojan downloaders increased from 9.1 to 13% and browser hijackers increased from 60 to 85%. One note, all of the testing of spyware was done by scanning with Lavasoft’s AdAware, no other anti-spyware software was used to detect threats. It’s been well documented that no single anti-spyware or anti-virus app will detect every piece of spyware, so the numbers could have been different if several programs had been used. I have noticed in the last few weeks there’s been a considerable decline in the number of new users registering at my SpywareWarrior forum for help with spyware removal.  I hope that is a sign that spyware infections are decreasing.  Who knows, if spyware really declines maybe this blog will turn into Suzi on SuSE one of these days. 

Link here via Suzi.

 

Alex Eckelberry

The history of Firefox

From Ben Goodger:

The story of Mozilla is long and rich in detail. There are many perspectives. This is mine.

Getting Involved
I got involved with Mozilla because I loved the idea of working on something that had the potential to make an impact on millions of people. My friends and I lived in our browsers, so there was also a tangible payoff for contributions that made it into a shipping Netscape release. After switching gears on the layout engine, it looked like Netscape needed all the help it could get. In early 1999 only the most basic elements of the old Communicator suite were in place in the new browser; you could barely browse or read mail as Netscape’s engineers worked furiously to erect the framework of the application.

More here via Paul Thurrott.

Alex Eckelberry