Protecting your brand from web shenanigans

When it comes to Two Point D’oh, do you want to be like this guy:

The right way
Click to Enlarge

Or do you want to be like this guy:

The wrong way

I think we can all agree that approach number one is the place to be. With that in mind, I recently gave some hints and tips at IRISSCON 2010 in relation to protecting your brand / company / employees from shenanigans. We have lots of business-centric sites such as Linkedin, Yammer, Present.ly, companies flocking to Facebook and employees doing their thing on Twitter. While you may not agree with all of the sentiments expressed here, I have to say that in my experience companies tend to focus on complaints, compliments and competitors in the 2.0 space while forgetting about our old pal “security”.

Here come the tips, feel free to add your own but I’ve found the below to be quite helpful in recent years…

What are we most worried about? For me, it’s malicious pages / profiles pushing badware in your name, unofficial pages from fans & well meaning employees, dodgy data gathering and compromised accounts. Additionally, geolocation services mean that it isn’t just employees throwing up a page connected to you being a problem anymore; depending on the service, any random individual can happily come along and stick you on a map, or a location service, or a ratings portal.

1) Think Facebook Places, Foursquare – do you have an official page there? Is there a page “in your honour” with comments filling it up?

Here’s one with people not only complaining about the quality of coffee on offer, but also slating rival firms. We all know how grumpy companies can be where random accusations of awfulness are concerned; better to engage, hit that “Do you manage this venue? Claim here” button and talk to people.

Location, location...
Click to Enlarge

Similarly, you should go check out Facebook and create a brand presence there before some scallywag starts pimping viagra and fake handbags from “Your Company INC”. Hit the “Create a page for my business” button at the bottom left side of any Facebook page, then start filling in the blanks.

Fill this lot in, quick
Click to Enlarge

Additionally, claiming your spot on Facebook places is easy – if you’re in the US, follow this handy guide. If you’re in the UK, I believe it is much the same procedure except they phone you up and you give them a PIN number along with the usual paperwork. Apart from the more obvious sites, be aware that plenty of other services exist and even Yelp is getting in on the act. Finally, here’s some advice in relation to setting up on Foursquare.

2) A common problem: how do you dig through all of those sites to see if anyone is up to Internet shenanigans with your good name? Easy, you load up this collection of websites and start digging:

Sites galore
Click to Enlarge

Two things to note: many “social discussion / conversation tracker” sites will claim to pull up results from across the web, but in my experience only ever give you pages of results from Twitter. Your mileage may vary with those, but the ones listed seemed to serve up information from a variety of sources. The forum trackers are particularly useful if you suspect individuals of performing random drive-by spam on sites with your name plastered all over them. I know one person whose company was targeted by such a campaign and the forum search portals were great for getting Admins to hose the spam quickly.

Knowem.com is a favourite of mine, as they they allow you to search for your name / brand on lots of social networking sites for free, which is extremely useful from a security perspective (they will also register you on those sites for a fee).

3) If your company has a Yammer account, put someone in charge of making sure the account isn’t left lying around with lots of data posted to it:

Four months ago...
Click to Enlarge

“Last post: four months ago”? Whoops. There’s always the danger that we might sign up to a hot new service only to get bored and abandon it completely a few months later. But what about the data posted – is someone ready to go in and hose the lot?

While you’re at it, consider coming up with a few basic policies in relation to how much personal info you really need in your account:

Nope...
Click to Enlarge

Just think: if “Employee A” falls for a phish mail like the one below, the phisher has access to all of the information posted to your internal wall AND any information posted about themselves in the profile. A lot of said information could easily be password reset clues to other services they’re registered with, which makes things worse.

Phish
Click to Enlarge

Finally, you should ensure ex-employees can no longer access your Yammer portal, especially if they’re one of those angry disgruntled chaps determined to grab a bunch of “secret” information six months down the line and paste it all over the internet.

4) If you’re hip and trendy – and we know you are – you might be tempted to stick a videogames console in the office recreation room along with the pool table nobody uses and the broken basketball hoop in the corner. We gave a survey to 200 senior IT decision makers in both public and private sector organisations around the globe. The results? 4 in 10 had no idea of the problems posed by consoles, 8 in 10 kept no record of who was using said consoles and 49% of them had a console in the workplace (with 44% of them connected to the net).

Just think, you’ve locked down your social networks in the workplace. You have granular controls to allow or deny individual applications on Facebook. You have an elegant compliance solution in place to ensure nobody is posting sensitive work information to Twitter.

Then I stick my console on with a bunch of Twitter / Facebook / Last.fm apps built in and OH NO IT’S ALL GONE WRONG SOMEHOW.

xbox dashboard
Click to Enlarge

XBox Twitter
Click to Enlarge

Hear that? It’s the sound of your carefully thought out network controls flying out the window. While links aren’t clickable on an XBox so there’s no danger of infections via Twitter, it’s worth noting that you may well find your boss walking in and wondering why the Last.fm application has a picture of a popstar with their “modesty” shaking all over the screen via a user uploaded photograph.

Do you have an XBox Live account bearing the company name? Keep in mind people record game sessions and upload them to Youtube – you might find your employee swearing loudly at the 14 year old Halo master that spent the last half hour shooting him in the face. Bit embarrassing, that one.

This is also a good reason why you should keep track of who is using the console, in preparation for “Sweargate” or other similar gaming kerfuffles. In fact, given the wide range of ways people want to mess with you in console land you might not want to put the thing online in the first place. As strange as it sounds, the many parental controls available on consoles may well be useful in terms of locking things down a bit. For example, if you want to be really watertight on the “Who used it?” issue, enable the XBox Live Passcode and change it after every use.

One final thought – the Playstation 3 has a built in web browser, which takes a decent stab at rendering websites. An interesting side issue? A Fake AV site which looks like this on your PC:

Fake AV
Click to Enlarge

…will look something like this on your Playstation:

PS3 Fake AV
Click to Enlarge

Note the “virus warning” down the right hand side. Yes, I know it says “computer remains infected” and not “games console”. But given that so many people don’t really think about these problems where consoles are concerned, it’s not surprising that I know of at least one case where a similar “warning” ensured an IT guy spent about three days messing around looking for a non existent network infection.

What’s written above certainly isn’t everything I covered at IRISSCON, but hopefully there’s a few things in there to get you thinking about some areas of day to day networking that need to be considered.

Christopher Boyd

Black Friday special, VIPRE for $10

On Black Friday, this year GFI Software will offer a single one-year subscription license to VIPRE for $9.95, 70 percent off the normal ($29.95) retail price. VIPRE Premium will be available for $19.95, 50 percent off the normal retail price.

This Black Friday special pricing is only available for purchase on Friday, November 26, 2010 until 11:59 pm EST. Please visit our Black Friday page for more information. Also, see our latest news release on the risks of cybercrime during the holiday season.

Tom Kelchner

An FTC warning about Internet romance

Love and money

The U.S. Federal Trade Commission has posted some advice for those seeking love in all the wrong places (like on the Internet).

In a sentence: “don’t send cash.”

“… scammers sometimes use online dating and social networking sites to try to convince people to send money in the name of love. In a typical scenario, the scam artist creates a fake profile, gains the trust of an online love interest, and then asks that person to wire money—usually to a location outside the United States,” the agency said.

Here is the FTC list of warning signs that your online paramour might have more of a financial than emotional interest you:

— Wanting to leave the dating site immediately and use personal e-mail or IM accounts.
— Claiming instant feelings of love.
— Claiming to be from the United States but currently overseas.
— Planning to visit, but being unable to do so because of a tragic event.
— Asking for money to pay for travel, visas or other travel documents, medication, a child or other relative’s hospital bills, recovery from a temporary financial setback, or expenses while a big business deal comes through.
— Making multiple requests for more money.

“FTC Warns Consumers About Online Dating Scams” here.

Ya know, I’ve been wondering why that woman with a really stunning Facebook picture and about 150 affluent-looking European men as “friends” contacted me out of the blue and wanted to be buddies.

I somehow suspected she wasn’t a pen pal type.

Tom Kelchner

GFI Malware Minute weekly video feature

The GFI Malware Minute video is available for your viewing pleasure on the GFI-Sunbelt Software YouTube channel (and below).

Malware Minutes are short videos (1-2 minutes) that provide a weekly roundup of top stories from the GFI-Sunbelt Software Blog, the GFI-Sunbelt Rogue Blog and anything else we think might be of interest.

This week’s video is the first to include our very state-of-the-art video intro and outro (if that’s a word) provided by our designers here at GFI. Nice work folks!

This week we have another Green Card Lottery scam, fake antivirus sites, Chris Boyd’s coverage of IRISSCON in Dublin, scam giveaway sites and a fake proxy service that claims to help kids evade parental controls and school Internet filters.

 

Tom Kelchner

A new lure: proxy service for avoiding school and parental controls

I can remember the delicious feeling of being completely free of adult supervision on rare afternoons when I was an adolescent. My friend David and I would sit by a cedar tree in a cemetery on sunny Sundays and smoke cigars.

I date myself.

Obviously it was a long-off time when a 14-year old could walk into a drug store and BUY a cigar.

A web site (myfatherisonline.com) that promises just such tasty independence for kids is being advertised via Facebook posts: it claims to be a proxy service that can get around school and parental controls.


(Click on graphic to enlarge)
The bad English in the initial advertisement alone is a hazard to children:

 

(Click on graphic to enlarge)

We counted 248 posts advertising the URL in a 45 minute sampling of Facebook posts. Many were from the same accounts, so, this is probably being spammed from “owned” accounts as well as being circulated by Facebook users who took the bait. So, it’s hard to say if it’s going viral or just the subject of a major spam run.

Not good, especially for kids

It didn’t appear to even be a proxy. It just pasted an iframe with advertising over the page content from the URL you type in the box.  It was an affiliate site loaded with malcode, links to cell phone subscription scams and other malicious or seedy stuff.

 
(Click on graphic to enlarge)

“Pac-Man play the original” took you to a RetroGamer site and an installation of MyWebSearch.”

 
(Click on graphic to enlarge)

Then there’s an IQ test scam that will cost you $9.99 per month on your cell phone bill if you want to see your results.


(Click on graphic to enlarge)

“You have (1) message !” leads to a “Free 3G iPhone” site:


(Click on graphic to enlarge)

There’s an  opportunity to sign up for spam:


(Click on graphic to enlarge)

And behind our browser window were three more with ads including “Get a $250 Amazon Gift Card FREE,” the “Womens (sic)  Forum” and a site that promises “My magic lamp can grant your wishes.”


 (Click on graphic to enlarge)

Although the Aladdin site promised some great magic lamp action on our behalf (“Health, Love, Money) it turned out to be a horoscope subscription service billed to your cell phone for the usual $9.99 per month.

 

(Click on graphic to enlarge)


(Click on graphic to enlarge)

What are they going to do next to lure kids: let them buy cigars in drug stores?

Tom Kelchner

Always look a gift horse in the mouth

Roll up, roll up for lots of freebies. That’s what the creators of the following sites are hoping you’ll do, anyway.

Com-prizes(dot)com seems to host numerous offers and deals which do their best to get the attention of Twitter / Myspace users.

For example, twiter(dot)com-prizes(dot)com (yes, they did spell “Twitter” like that).

prizes for all, possibly
Click to Enlarge

The end-user is asked to fill in a few generic questions about social networking, then “receive up to $2,741.88 in cash”. The next screen – located at 5staroutlet(dot)com – contains a “sort of” attempt at a cheque image, along with various items of merchandise listed under the cash amount. It’s worth noting that above the section where you fill in your card details is a sentence that reads: “To receive my items, I only pay a modest release fee of just US $31.95”.

Fill this in, please
Click to Enlarge

A quick check of the T&C’s is interesting:

terms
Click to Enlarge

“All items listed are not prizes or gifts as it is part of an intentional publicity program and therefore it is a merchandise offering and not a sweepstakes, prize draw or contest.”

Bold added by me. Also, this:

Hmm...
Click to Enlarge

Strange things are afoot at the Circle-K, methinks. They even call the items they send out “Awards” on the payment screen (look at the text in the circle, next to the VISA logo).

A similar page exists for Myspace users located at myspace(dot)com-prizes(dot)com, which also throws some random social networking questions at you before whipping out a “Free iPad” offer:

Freebies galore
Click to Enlarge

This one operates almost identically to the landing page written about by Tom back in October, and of course “free” actually means “sign up for lots of different offers before you get anything”.

Do eight of these...
Click to Enlarge

Sign me up. Or not, as the case may be.

Further reading here, there and everywhere.

Christopher Boyd

IRISSCON 2010

Yesterday I gave a talk at IRISSCON 2010 about how naughty internet people can do horrible things to your brand, and some of the stranger ways things can go spectacularly wrong for your company. A big “well done” to the organisers – I heard nothing but good things all day long in relation to how good the event was.

Typically, the sessions had so many people stuffed into the room they had to open the doors and bring in extra chairs:

Pretty awesome, eh?

I’m told this was the second IRISSCON, and there must have been around 130+ people listening to what the speakers had to say. Talks covered everything from social engineering & blagging your way past security (Peter Wood) to a look at the rather complicated rogue security software moneytrail courtesy of Robert McArdle.

There was also an address given by Howard Schmidt, albeit through the medium of “large talking head on a screen”.

Howard Schmidt

I must admit, I had flashbacks to this advert (there was no hammer throwing and he was very nice so that evens things out). Interestingly, Amazon were there and recruiting security people – engineers and database types, from the sound of it. So if you’re looking for work and available in either Seattle or Dublin you might want to drop them a line on their careers page. They also had this awesome cardboard robot on the stand which just sweetens the deal:

Amazon robot of doom.

You know you want one.

I know the conference organisers will be uploading pictures / video / presentations from the conference very soon, and I’ll link to said material when it arrives. I’ll also be posting up some handy hints and tips ripped from my own presentation. For now, here’s some badly taken photographs.

Christopher Boyd

Let the (AV) buyer beware

A blog piece in which we discuss one Web site selling subscriptions to information about non-existent security products and a number of others that use the names of legitimate AV products as lures of which the gentle reader might beware.

There have probably been as many scams involving sales of anti-virus security products on the World Wide Web as there have been sales of “prime” real estate (that turn out to be under two feet of swamp water) in Florida.

Alert reader Bharath drew our attention to these.

The site Anti-Virus Review, “The No.1 Anti-Virus Internet Network” claims that it has reviewed anti-virus products and presents its “gold”, “silver” and “bronze” award winners: ViraFix, Antivirus Download and Antivirus-Solution respectively.

These aren’t rogue products. These are AV products that apparently DO NOT EXIST.


(click on graphic to enlarge)

So what are they charging you money for?

Anti-Virus Review explains:

“This website has no affiliation whatsoever with the owner of this software program and does not re-sell or license software. Membership is for unlimited access to our site’s resources. We provide an organized website with freeware, links, software, technical support, tutorials and step by step guides. New computer users should find our services valuable and time saving. If you are an advanced computer user, you probably don’t need our services.”

So they’re saying:: “if you don’t know anything about this stuff, this is the site for you, SUCKAH!”

The main page and pages devoted to the non-existent products are professionally laid out, complete with tables, graphs and the seals of certification agencies such as Virus Bulletin (These guys are NOT listed on the VB site: http://www.virusbtn.com/vb100/archive/results?display=vendors).

ViraFix page


(click on graphic to enlarge)

Antivirus Download claims to have VB100 and other certifications

 
(click on graphic to enlarge)

Antivirus & Security package design has a striking resemblance to Kaspersky’s.

 
(click on graphic to enlarge)

One especially meaningless graphic shows up on the ViraFix site. We’re not even going to conjecture what this table is supposed to mean other than “we – good, they – not good.”

 

Another little bit of insanity/inanity lies in the FAQ. The writer uses the name “Antivirus 2010” (We blogged about a rogue by that name in October ) This leads one to conjecture that maybe this is material borrowed from another site out there.

So, to make this long story a bit shorter, these sites all lead to payment pages that look quite similar: “Membership Options and Features.”


(click on graphic to enlarge)

The site hasn’t been around long either, only since the end of September.

Registrant:
   Domains by Proxy, Inc.
   DomainsByProxy.com
   15111 N. Hayden Rd., Ste 160, PMB 353
   Scottsdale, Arizona 85260
   United States

   Domain Name: ONLINE-ANTIVIRUS-PROTECTION-REVIEWS.COM
      Created on: 29-Sep-10
      Expires on: 29-Sep-11
      Last Updated on: 29-Sep-10

Other sites with a twist: free legitimate AV products (and one not-so-effective one) used as lures

Our friend Bharath did more digging and found that this group, judging by similarities in page design, also have a load of sites that use the names of legitimate anti-malware products from big-name vendors as lures:

Avast
download-antivirus-now.com
antivirus-download-pro.com
antivirus-prodownload.com

Avira
antivirus-pro-suite.com

 Kaspersky
full-antivirus-solution.com

Malwarebytes Anti-Malware
antimalware-protect.com

SpyBot (not considered an effective product. VIPRE detects as: Backdoor.Spybot)
search-destroy-protection.com
searchdestroy-scan.com

Ad-Aware
aware-download.com

AVG
antivirus-2010pro.com
antiviruspro-download.com
free-anti-virus-software.com

So, if you’re fixed up with an antivirus solution now, maybe you’ll be interested in some land that’s for sale in a little development we know about over by Okeechobee. This one is going to be hot! These babies are selling like hotcakes! You can flip these and double your money FAST!

Thanks Bharath

Tom Kelchner

Green card lotteries still going strong

Did they get the idea for that graphic from the GFI blog?

We’re wondering if the actors behind this one got the idea for the graphic on their email from the title of our November blog piece “In America the streets are lined with gold”

We blogged about green card lottery scams before. The scammers sell something that is free from the U.S. state department. Basically, they are businesses that advertise a U.S. government lottery in which the “winners” get visas to live and work in the U.S.

The real U.S. State Department Diversity Immigrant Visa Program (page here. )

“. . .makes available 50,000 diversity visas (DV) annually, drawn from random selection among all entries to persons who meet strict eligibility requirements from countries with low rates of immigration to the United States.”

That page contains a fraud warning about green card lottery scammers.

Citizens from countries with low levels of immigration to the U.S. are eligible. The Philippines is NOT one of those, in spite of the email we received:


Countries that are ineligible are listed here: http://travel.state.gov/pdf/1318-DV2012Instructions-ENGL.pdf

(click on graphic to enlarge)

See our October blog piece for the rates these guys charge: “Phony green card lottery sites abound”

Tom Kelchner

GFI Malware Minute weekly video feature

The GFI Malware Minute video is available for your viewing pleasure on the Sunbelt Software YouTube channel (and below).  

Malware Minutes are short videos (1-2 minutes) that provide a weekly roundup of top stories from the GFI Sunbelt Software Blog, the GFI Sunbelt Rogue Blog and anything else we think might be of interest.
This week we have TDL4 rootkit analysis; four new rogues: ScanDisk, Internet Security Suite, Security Inspector 2010 and Ultra Defragger;  phony game cracks,  keygens and video tutorials and a “see who has deleted you on Facebook” app scam.

Tom Kelchner

A royal engagement announced! SEO poisoning arrives quickly

The British royal family announced today that Prince William will marry his long-time girlfriend Kate Middleton next year. Every news source on the planet is gushing and the dark side of the Internet is taking advantage of the news coverage. Surf with care.

A Google search for “Kate Middleton” results in a poisoned link on the second photo under “Images for Kate Middleton.”


(click on graphic to enlarge)

It leads to a photo, but that page then redirects to friefox.ddns.pl, where a Trojan is forced on to end users:


(click on graphic to enlarge)

VIPRE detects the download as: Trojan.Win32.Generic.pak!cobra

It helps to know the version of the browser you’re using. In this case, Firefox 3.6.12 IS the latest version.

If you’re in doubt about the latest version available, check getfirefox.com which shows this:

Thanks Adam.

Tom Kelchner

Rogue downloads look real: read the fine print


Our intrepid rogue investigator Patrick Jordan was checking the latest evolution of the ThinkPoint FakeRean rogue and passed this along.

The fake “you need to install flash player in order to watch movie” gimmick obviously is still out there. The malicious folks behind ThinkPoint.FakeRean are using it to trick victims into downloading their rogue.

 “They are making them look real, but if the URL doesn’t show adobe.com then it is a fake,” Patrick pointed out.

Just because the “name” is flash_player_installer.exe, that doesn’t mean it’s genuine. This lure is especially suspicious because the pop-up window shows that it is going to download from the site pics24.video.servepics.com and not Adobe.


 (click on graphic to enlarge)

Here is the real Adobe page to download Flash Player: http://www.adobe.com/products/flashplayer/

Rogue Blog entry for ThinkPoint.FakeRean: http://rogueantispyware.blogspot.com/2010/10/thinkpoint.html

Thanks Patrick

Tom Kelchner

How the TDL4 rootkit gets around driver signing policy on a 64-bit machine

(Analysis by Chandra Prakash, Technical Fellow, GFI Labs )

Microsoft’s Windows operating system, running on a 64-bit machine provides enhanced security with driver signing of system and low level drivers. This policy, called the kernel mode code signing policy, disallows any unauthorized or malicious driver to be loaded. [1.]

 The TDL4 rootkit bypasses driver signing policy on 64-bit machines by changing the boot options of Microsoft boot programs that will allow an unsigned driver to load.

Here’s how it’s done:

The boot option is changed in memory from the code executed by infected MBR. The boot option configures value of a config setting named ‘LoadIntegrityCheckPolicy’ that determines the level of validation on boot programs. The rootkit changes this config setting value to a low level of validation that effectively allows loading of an unsigned malicious rootkit dll file. The rootkit dll is kdcom.dll, which is an infected version normal kdcom.dll that ships with Windows.

The rootkit also disables debuggers by NOP’ing debugger activation functions as described below. This makes reverse engineering this rookit very difficult! The KdDebuggerInitialize1 (see below) function in infected kdcom.dll called during normal execution of the system installs the rootkit, which hooks the IRP dispatch functions of miniport driver below the disk to hide its malicious MBR.

On a normal machine an unsigned driver will show this message

*** Windows is unable to verify the signature of
    the file Windowssystem32kdcom.dll.

 By changing the boot option, display of the above message is also suppressed.

(This was researched on a 64-bit machine with Windows 7 installed)

 Infected Kdcom.dll with debugger functions NOP’ed out

.text: public KdDebuggerInitialize0
.text: mov cs:byte_1800019EC, 3
.text: xor eax, eax
.text: retn <– Debugger function NOP’ed out that prevents debugger attachment

.text: public KdSendPacket
.text: mov     cs:byte_1800019EC, 6
.text: retn <– Debugger function NOP’ed out

.text: KdDebuggerInitialize1
.text: lea     rcx, sub_18000190C <– This function installs the rootkit
.text: jmp     cs:PsSetLoadImageNotifyRoutine
.text: public KdDebuggerInitialize1 endp

Corresponding functions of clean Kdcom.dll

 .text:  public KdDebuggerInitialize0
.text: mov     [rsp+arg_0], rbx
.text: mov     [rsp+arg_8], rsi
.text: push    rdi
.text: sub     rsp, 20h

(snip)

.text: public KdDebuggerInitialize1
.text: sub     rsp, 28h
.text: cmp     cs:KdComAddressID, 0
.text: jnz     short loc_7FF7045112A

(snip)

.text: public KdSendPacket
.text: mov     [rsp+arg_0], rbx
.text: mov     [rsp+arg_8], rbp
.text: mov     [rsp+arg_10], rsi
.text: push    rdi
.text: push    r12

(snip)

[REFERENCES]

[1.] Kernel-Mode Code Signing Policy (Windows Vista and Later),  http://msdn.microsoft.com/en-us/library/ff548231%28VS.85%29.aspx

Thanks Chandra.

Tom Kelchner

Adobe: out-of-band patches for Reader and Acrobat tomorrow

 Adobe has announced that tomorrow it will release out-of-band patches for Reader 9.4 (and earlier 9.x versions) for Windows, Mac and UNIX, and Acrobat 9.4 (and earlier 9.x versions) for Windows and Mac to fix critical security issues.

The patch will fix the vulnerabilities CVE-2010-3654 and CVE-2010-4091.

Adobe issued a notification Oct. 28 that CVE-2010-3654 could cause Reader and Acrobat to crash and allow an intruder to take control of the affected system. Adobe said the flaw was being actively exploited. (Advisory here.)

The company said Nov. 4 that there had been public discussion of the CVE-2010-4091 vulnerability, which could cause a denial of service. (Advisory here.)

An update for UNIX is expected Nov. 30, 2010.

The next scheduled quarterly security updates for Reader and Acrobat are February 8, 2011.

Tom Kelchner

Fake journalist account asks for flood donations on Twitter

Scammers are attempting to cash in on a recent flood in Cagayan. Bernadette Sembrano, a well known journalist in the Phillipines, is being impersonated by individuals looking to make a little money out of the misfortune of others.

The fake:
give me money

The real thing:
the real thing
Interestingly, this isn’t the first time the fake account (located at @bsembrano) has asked for money. A quick snap from Google cache confirms this:

more money please

While the above smart money account could be theoretically genuine, there’s no information to confirm this from the Twitter page and one wonders why such an account is pretending to be a well known journalist in the first place. It goes without saying, but always check the legitimacy of an account randomly asking for money. The account has 191 followers, which is potentially a lot of victims eager to hand over their money. We’ve notified Twitter of the rogue account and hopefully they’ll look into it shortly.

Christopher Boyd

Check if a friend has deleted you on Facebook (sure)

Insecurity sells


 Internet scams seem to aim at our most primordial instincts. Some of the noteworthy lures have been:

— Sex. How many “sex videos” can all the celebrities in the world really make?
— Fear of losing one’s health: thus there are thousands of “Canadian” pharmacy sites (in China) pushing all kinds of questionable medications.
— Making fast wealth: which brought us those 419 scams that seem to contribute significantly to Nigeria’s annual gross domestic product.

And now there’s a new one: the fear that one of your friends on Facebook no longer likes you.

Above is the Facebook post that will take you to this app:


(Click on graphic to enlarge)

[Side note (see red box in graphic): How insecure do you have to be to sign up for Facebook just to find out if a friend has deleted you? If you don’t have a Facebook account you don’t HAVE any Facebook friends yet! OR, who besides Bernard Madoff is so unpopular that people unfriend them on Facebook before they set up an account?]

Unless you’ve been living deep in the forest with only a dial-up Internet connection for the last five years, you’ve probably seen this before. The app must “protect” its content, so it requires you to play a game or “Save $$$ on Auto Insurance.”  That isn’t exactly a computer security authentication scheme that’s on the test for Certified Information Systems Security Professionals.

 

To make this short: they collect your name, email address and cell-phone number then try to sell you  a subscription to get a quiz and two clues for $9.99 (billed to your cell phone) each month.

So if you’re really insecure about your Facebook friends, it’s going to cost you. And even if you don’t subscribe, just going this far results in your Facebook account being used to spread ads to all your friends about this loony service.

 

Which will give them more than ample grounds to unfriend you.

Tom Kelchner

Kirstie Allsopp’s Twitter account compromised, attacks Sir Alan Sugar

There were some very pecular goings on in Twitter land today, as the account of Kirsty Allsopp seemed to be taking potshots at Sir Alan Sugar:

whoops
Click to Enlarge

The only problem? She didn’t post that message, despite a bit of confusion and the fact that the pair of them had a very public argument recently.

not me

It seems like it might be an easy thing to work out: so far, the compromiser is apparently making all of their posts from an iPhone.

not again

Not so long ago, her account was hijacked and started sending out iPad spam. Methinks this time around she’ll be lucky not to get a “You’re fired” from Sir Alan…

Christopher Boyd

It’s time to get very serious about Java updates

“…an unprecedented wave of Java exploitation” – Holly Stewart, Microsoft.

Bottom line: many Java exploits go after vulnerabilities that have been patched. Since Java runs on a wide variety of platforms, this makes it a very serious vector. You should stay alert for the automatic Java updates. You also can check the Java site (see link below.)

 

The background hum of news about the increase in malware that uses Java vulnerabilities has now increased to a roar.

Today Daniel Wesemann wrote a very readable blog post on the SANS site about Java weaknesses.

Wesemann pointed to an October piece on Microsoft’s Malware Protection Center by Holly Stewart in which she writes: “What I discovered was that some of our exploit ‘malware’ families were telling a scary story – an unprecedented wave of Java exploitation.”

Wesemann described the method used by the recent “bpac” family of exploits. The Java vulnerability that it uses was patched in July he points out.

The infection usually happens as follows:

(1) User surfs to website that has been injected with the exploit
(2) Exploit pack triggers – it comes as an obfuscated JavaScript that downloads an
(Java) Applet and a PDF
(3) The applet contains an exploit, here for CVE-2010-0840
(4) The applet is invoked with a parameter that tells it where to find the EXE
(5) If the exploit is successful, the EXE is downloaded and run”

And what is downloaded can be anything, like a back door that can steal your bank login information or turn your machine into a spam-pumping bot.

For beginners: Java is a compiled programming language created by Sun Microsystems (now owned by Oracle)  that can be used to create applications that will run on a virtual operating system or in your browser. You may have heard of JavaScript. That is different. That is a scripting language that is put in the HTML code of web pages to run in your browser.

Here is Oracle’s description of the two:

What is JavaScript and how is it different from Java Technology?

The JavaScript programming language, developed by Netscape, Inc., is not part of the Java platform.

JavaScript, does not create applets or standalone applications. In its most common form today, JavaScript resides inside HTML documents, and can provide levels of interactivity to web pages that are not achievable with simple HTML.

Listed are key differences between the Java and JavaScript.

 * Java is an object oriented programming (OOP) language while Java Script is an OOP scripting language.
    * Java creates applications that run in a virtual machine or browser while JavaScript code is run on a browser only.
    * Java code needs to be compiled while JavaScript code is all in text.
    * They require different plug-ins.

How to check to see if your machine needs updates

To test your machine to see if the latest version of Java is installed, go to this test link with your browser: http://www.java.com/en/download/help/testvm.xml

If your Java installation is out of date, you will see something like this:

 

If you have the current version, you will see something like this:

Tom Kelchner

Patch Tuesday

On Patch Tuesday this month, Microsoft released three security bulletins:

MS10-087 — Vulnerabilities in Microsoft Office Could Allow Remote Code Execution ( critical — remote code execution)
   
MS10-088 — Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution  (important — remote code execution)
   
MS10-089 — Vulnerabilities in Forefront Unified Access Gateway Could Allow Elevation of Privilege (important — elevation of privilege)
   
Bulletins here.

Tom Kelchner

Modern crime: teen burglar left machine logged into Myspace

Break in, smoke some pot, play on Myspace

The South Florida Sun Sentinel (Miami and Dade County) is reporting that sheriffs in the Florida Keys arrested an 18-year-old man after they were called to the scene of a break-in and found a computer logged into the suspect’s Myspace account.

The Monroe County Sheriffs office said deputies arrested Robert Rupp, 18, of Big Coppitt Key, near the scene of the break-in and charged him with burglary, possession of burglary tools and theft.

The deputies said they were summoned by a caretaker who noticed someone inside the house on Sugarloaf key. They found an open window, empty food and beverage containers, marijuana and a bedroom computer turned on and logged into Rupp’s Myspace account.

Story here.

Tom Kelchner