Dangerous new spam run infects users through PDF exploit

Yesterday, our honeypots started detecting a dangerous new spam run, pushing a fake update for Outlook and Outlook Express.

Purporting to come from Microsoft, the spam pushes people to a web page which then redirects to a page serving a PDF exploit.

Msupdate12831238888p

Clicking the link takes one to a “Microsoft” update page. One of several examples is shown here:

Microsoftupdate128481234283488p_main

After a brief period of time, the user is redirected to an exploit page. The payload is Zbot.

This is an extremely dangerous spam run if you or your users are not fully updated on the latest versions of Adobe Acrobat. Get updated.

Alex Eckelberry

ByteHosting rogue firm settles with FTC for $117K

James Reno of Amelia, Ohio, the brains behind an elaborate series of rogue anti-malware companies, and his firm ByteHosting, have agreed to pay $117,000 — what’s left of $1.9 million of ill-gotten gains — to settle an action brought by the U.S. Federal Trade Commission.

The complaint, filed last December in the Maryland District of U.S. Federal Court, said the schemes used deceptive advertising to victimize one million Internet users since 2003. Each was duped into purchasing the rogues at $39.95.

The rogues included: WinFixer, WinAntivirus, DriveCleaner, WinAntispyware, ErrorProtector, ErrorSafe, SystemDoctor, AdvancedCleaner, Antivirus XP and XP Antivirus 2008.

When the FTC complaint was filed in December, it froze $116,697 of Reno’s assets. He will forfeit that. The FTC said he is unable to pay the remainder of the $1.9 million he made from the schemes and that amount of the fine will be suspended.

Other defendants still facing FTC charges are:
— Sam Jain, an officer of Innovative Marketing, Inc., San Francisco, Calif., USA
— Daniel Sundin of Vantage Software, Winsoftware, Ltd., and Innovative Marketing, London, UK
— Marc D’Souza of Web Integrated Net Solutions and Innovative Marketing, Inc, Toronto, Canada.
— Kristy Ross of Innovative Marketing, Inc., Walkersville, Md., USA.
— Maurice D’Souza, Thornhill, Ont., Canada

Other companies named in the action include:
— Billingnow,
— BillPlanet PTE Ltd.,
— Globedat, Innovative Marketing Ukraine,
— Revenue Response,
— Sunwell, Synergy Software BV,
— Winpayment Consultancy SPC,
— Winsecure Solutions,
— Winsolutions, Belize City, Belize,
— Setupahost.net

For more, see here.

For the FTC complaint, see here.

Tom Kelchner

Spear phishing attacks reported at U.S. company whose code was ripped off for China’s Green Dam spyware

Late last week someone began attacks on the California company whose code was illegally used in China’s Green Dam-Youth Escort spyware.

In May the Chinese Ministry of Industry and Information Technology announced that computers sold in the country after July 1 must have the Green Dam software installed to block “obscene” and “harmful” information. Researchers have found that the application is aimed at filtering Internet political content as well as pornographic material.

Solid Oak Software Inc. in Santa Barbara, Calif., makers of parental control software CyberSitter, reported attacks on Thursday that required the company to reboot servers.

Marketing manager Jenna DiPasquale said she received an email message with an attachment containing a custom-written spear phishing PowerPoint file. The phishing email also bore a spoofed originating address and carried the signature line that company president Brian Milburn used 15 years ago. Similar emails were caught by filters. They were all individualized in the same way.

DiPasquale said the company suspected the attacks were coming from China and the FBI has been notified.

Solid Oak Software said June 12 that code from its CyberSitter software was used extensively in Green Dam-Youth Escort and sent cease-and-desist letters to U.S. PC manufacturers. DiPasquale also said her company will launch lawsuits in the U.S. and China July 1.

Solid Oak Software has posted a document listing the extensive use of CyberSitter code and even file names in Green Dam (here).

Zhang Chenmin, general manager of Jinhui Computer System Engineering Com of Zhengzhou, China, claimed his company did not use Solid Oak’s code to write Green Dam. “That’s impossible. We didn’t steal their programming code,” he said in a press interview.

Jinhui employees have been receiving harassing phone calls, including death threats.

Sunbelt Software products filter Green Dam as spyware.

For details see:

“Who is attacking Solid Oak, whose code was stolen for Green Dam?”

“Confirmed: Developer of software stolen for Green Dam is under attack”

Tom Kelchner

Useful Gmail security feature

Your Gmail account could be hijacked or viewed by someone else.  So it’s nice to know from where it’s being accessed.

You can do this with a handy-dandy feature in Gmail, located at the bottom of the Gmail page:

01234gmail1238812388

 

Click “Details” and you get an overview of your accounts activity, including whether it’s from POP, a browser, or a mobile phone:

A01234gmail1238812388

Very useful. 

Alex Eckelberry
(Hat tip to Micheal Espinola)

Zango v. Kaspersky

Anti-malware providers got good news today from the U.S. Ninth Circuit Court of Appeals in Seattle, Wash.

Readers of this blog may remember the lawsuit that Zango filed against Kaspersky back in 2007 for blocking its software. As we reported, Zango’s case against Kaspersky suffered a severe setback when the Washington State Superior Court handling the case granted Kaspersky’s motion for summary judgment on the grounds that Kaspersky, as an “interactive computer service” provider, enjoyed immunity from such lawsuits under section 230 of the “Communications Decency Act” (CDA, 1996) (link here).

We hailed that decision and promptly signed on to the amicus brief filed by the Center for Democracy and Technology with the Ninth Circuit Court of Appeals in response to Zango’s appeal of the original decision (link here).

We are now pleased to report that the Ninth Circuit Court of Appeals has upheld that original decision, affirming that Kaspersky enjoys “good Samaritan” protection afforded by the CDA. In the court’s own words, a provider of “access tools that filter, screen, allow, or disallow content that the provider or users considers obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable is protected from liability [by the CDA] for any action taken to make available to others the technical means to restrict access to that material.” For the Court’s full opinion, see the PDF file (here), which also includes an interesting concurring opinion from one of the panel’s three judges.

Admittedly, this decision is not nearly as consequential for anti-malware providers as it would have been three or four years ago, when adware vendors such as Zango and Direct Revenue were regularly threatening anti-spyware providers with legal action and peppering them with cease-and-desist letters on a weekly basis. It’s a been a while since we received any serious legal threats, although we do still get the occasional protest from software developers whose apps we target as “low risk,” potentially unwanted programs or tools. Nonetheless, the decision is a welcome one, as it extends to Sunbelt and other anti-malware providers the kind of legal cover we need in order to provide our customers and users with strong protection against unwanted, malicious software.

It’s worth noting that Judge Fisher, in his concurring opinion, voiced concerns over the seemingly broad language of the statue in question, raising the possibility that “under the generous coverage of [the statute’s] immunity language, a blocking software provider might abuse that immunity to block content for anti-competitive purposes or merely at its malicious whim…”

In a similar vein, one adware vendor we dealt with recently complained that our targeting policies effectively made Sunbelt (and other anti-malware vendors) into a law-unto-itself that operated on the assumption that “users cannot decide for themselves what they want on their computer.”

We think these kinds of concerns are misplaced. While the language of the statute is somewhat broad (“…or otherwise objectionable”), users are always free to replace an overly restrictive blocking tool with one of the dozens (if not hundreds) of alternatives that exist in the market, as the Judge Rymer notes in the main opinion:

“If a Kaspersky user (who has bought and installed Kaspersky’s software to block malware) is unhappy with the Kaspersky software’s performance, he can uninstall Kaspersky and buy blocking software from another company that is less restrictive or more compatible with the user’s needs. Recourse to competition is consistent with the statute’s express policy of relying on the market for the development of interactive computer services.”

Or, as we explained to that adware vendor:

“We sell a service to customers who are willing to pay for it. If they think our protection ineffective, excessive, or misguided, we lose business.”

Judge Fischer raises the prospect that anti-competitive blocking by a covered blocking software provider could occur without the user’s knowledge, however, the example he offers (Zango’s own users) undermines the very point he is trying to make. In that case, users who actually did want to use Zango’s software (pop-ups and all) were most certainly aware that something wasn’t right and contacted Zango about it. Zango, in turn, presumably informed them about the blocking, if they weren’t already aware of it. The performance and detections of anti-malware software are simply under too much daily scrutiny from users, industry experts, testers, competitors, adware vendors, and, yes, malware developers and hackers themselves for unnoticed blocking to occur for any length of time.

The bottom line is that no anti-malware vendor can afford to promiscuously or arbitrarily block and remove content that their users actually want installed on their PCs. In this case, the market can work. What we need, however, is some measure of protection from entities who seek to deny consumers access to tools that can actually protect their PCs and networks against unwanted software that just happen to sport all the legal muscle that advertising revenue can buy.

Eric L. Howes

Your summer reading: a Month of Twitter Bugs

It might be a good idea to keep your ear to the ground in July and probably August for malicious exploits that take advantage of Twitter or third party services that use it.

Researcher Aviv Raff, FraudAction has announced that he will launch a “Month of Twitter Bugs” (MoTB) in which he will post a new vulnerability each day on his twitpwn.com site (Link here.)

His description of what he is doing is as follows: “I’m doing so in order to raise the awareness of the Twitter API issue I recently blogged about. MoTB could have been easily converted to any other ‘Month of Web2.0 service bugs’, and I hope that Twitter and other Web2.0 API providers will work closely with their API consumers to develop more secure products.

“Each day I will publish a new vulnerability in a 3rd party Twitter service on the twitpwn.com web site. As those vulnerabilities can be exploited to create a Twitter worm, I’m going to give the 3rd party service provider and Twitter at-least 24 hours heads-up before I publish the vulnerability.”

Raff said he got the idea from the “Month of Browser Bugs” that H.D. Moore ran in July of 2006.

There are two views of “Month of (your app/os here) Bugs” campaigns:

1) It’s the only way to light a fire under the companies that provide these services and software to fix their defective products.

2) It’s an irresponsible piece of grandstanding that is going to draw the attention of hackers and malcode writers and could result in a significant malware attack that will affect a lot of Internet users.

One June 16 comment on Raff’s blog represents the perspective of the poor overworked IT guys who are going to bear the brunt of this if it turns something loose from the dark side: “Giving 24 hours notice is just not responsible and if you ever find yourself working in the security field (as a job) this may come back to haunt you. I’d suggest telling them now and giving them some time to fix the issues, should be all clear then.”

It’s a “responsible disclosure” issue. There isn’t much agreement on the details of how to do responsible disclosure.

Tom Kelchner

Email logs can tell more than you might expect

Two researchers with the Florida Institute of Technology in Melbourne studied records of email messages sent by 150 top staff members at Enron in the company’s last year and a half and found some interesting clues about how people in an organization communicate during a crisis.

Ben Collingsworth and Ronaldo Menezes looked at the logs obtained by federal investigators of over 500,000 emails sent to 15,000 people before the 2001 collapse of Enron.

They studied key events, such as the August 2001 resignation of CEO Jeffrey Skilling by looking at the groups who exchanged email. They didn’t look at the email contents.

The researchers looked for changes in the communication system during crises, but discovered that the most significant changes happened about a month before. The number of groups in which every member has direct email contact with every other member (which the researchers called email cliques) increased from 100 to about 800 one month before Enron’s collapse.

They theorized that as stress builds in a company, employees start communicating with people with whom they feel comfortable and stop sharing information on a wider basis.

Collingsworth and Menezes presented their research at the International Workshop on Complex Networks in Catania Italy.

For the original article, see here.

Thanks to Juha-Matti Laurio for drawing this one to our attention.

Tom Kelchner

Using live.sysinternals.com as an ad-hoc analysis toolset

live.sysinternals.com is a great resource for ad-hoc use of Mark Russinovich‘s very useful set of tools.

For example, consider working on a system, and needing one of Mark’s tools, but simply not having them readably accessible.

In this case, all you have to do is remember the following URI:

live.sysinternals.com/tools

If the machine has internet connectivity, simply type that text into the address bar:

Sysinternalsweb

All of the tools you might want to use are right there.

But it gets better. Because this site is available directly from the command prompt, or Explorer.

For example, let’s say you wanted a list of all processes running on a system. Mark has a useful tool for that, pslist.exe (similar to the Unix ps command).

Open a command prompt, and type

live.sysinternals.comtoolspslist.exe

Pslistcommand

Or, if you want to open the contents of the site in Windows Explorer, you can just put the following text into Run:

Sysinternalsrun

And you get the contents in Windows Explorer:

Liveexplorerp

Now, if you’re working on a system that has a DNS Changer, or has a modified hosts file, either of which redirect sysinternals.com, you’ll obviously need to handle that problem first before getting to this site. While a hosts file redirect should be bypassed at the command line, that wouldn’t be the case with a DNS Changer. (Incidentally, the first thing I would recommend doing when you get on a badly infected machine is check the DNS entries and kill the hosts file — a lot of people don’t do that, and end up by spending hours hitting their heads against a wall.)

Update: Silly me, of course you could still access this site by IP, even if the hosts file or DNS server had been changed. Example: \207.46.140.150toolspslist.exe

With thanks to Randall, and the SANS Forensics blog.

Alex Eckelberry

Authoritarian states just aren’t what they use to be

Did those dictators in the 30’s really make the trains run on time?

The outside world’s view of the Chinese authoritarian state was frozen for decades in the images of the Cultural Revolution, when the slightest bit of dissent landed one in a “reeducation” camp, where Ph.D.s hoed vegetables to atone for the sin of questioning authority (or being Ph.Ds).

Then Mao died and things loosened up a bit. That period culminated in the image of the dude with the shopping bags standing in front of four dumbfounded tanks in Tiananmen Square. Then the authorities killed 2,500 protestors.

Now China has the Internet. The Green Dam Girl cartoons mocking censorship might be the image going forward.

Here are the latest twists in the saga of the Chinese government’s fiat that all new computers must be loaded with Green Dam-Youth Escort to “protect the young from pornography” {subliminal whisper: “…and 300 million Chinese Internet users from reading about Tiananmen Square protests.”}

— There have been about a thousand harassing phone calls to the software company that wrote, or plagiarized, Green Dam-Youth Escort, Jinhui Computer System Engineering Co. of Zhengzhou. They included late-night death threats. (More here.)

— Green Dam was patched for one vulnerability, though not well, and now vs. 3.17 is still open to remote exploitation. There has been a working exploit out there for a week.

The vulnerability was a buffer overflow that could result from overly-long URLs. They patched it but screwed up the math and the buffer is still too small. (More here. )

The Zinhui general manager Zhang Chenmin, was quoted as saying: “I never expected the software to have brought us so many troubles. Our aim is simply to protect children from Internet pornography.”

I wonder if they still have on staff at Zinhui the guy who said last year: “hey, we should look into doing government contract work.”

Oh, yea, and Sunbelt Software products detect Green Dam as spyware.

Tom Kelchner

Hiding from Spambots: “Munging” Your Email Address

Project Honeypot has posted a document with some great techniques for hiding your email address on web pages, blogs, etc. from spambots: “How to Avoid Being Harvested by Spambots.

Some techniques they suggest:

Munging your address:

Add “remove this” type text to the email address or write it in a way that requires human cognition to extract it correctly.

jsmith@REMOVETHISexample.com
jsmithDELETEBEFORESENDING@example.com
jsmith @example.Zom (replace Z with C)

jsmith -at-example.com
jsmith (at)example.com
jsmith AT example DOT com

Advanced munging

Replace letters with ASCII code. @ = “&#64”

Complete Obfuscation

#1: Post your email address in a GIF, png, JPEG or other standard web graphic file.

#2: Render you email address into Javascript. Their article includes an edit box where you can enter an address to demonstrate:

jsmith@yahoo.com would be rendered as:

There is the project’s description of what they do:

“Project Honey Pot is the first and only distributed system for identifying spammers and the spambots they use to scrape addresses from your website. Using the Project Honey Pot system you can install addresses that are custom-tagged to the time and IP address of a visitor to your site. If one of these addresses begins receiving email we not only can tell that the messages are spam, but also the exact moment when the address was harvested and the IP address that gathered it.”

It’s a great mission, plus ya gotta love any group that sells underwear with their logo/message as a fund raiser:

Tom Kelchner

Bing Vs. Google

Microsoft’s new Bing search engine, boosted by $100 million in marketing, quickly grabbed a 16 percent market share and is second to Google now (at 71 percent).

And the joke has started:

Q: “What does ‘Bing’ stand for?”
A: “But It’s Not Google.”

(We think that can be credited to the long-running blog (Jan. 2002) of author Seth Godin. http://sethgodin.typepad.com/seths_blog/2009/05/the-next-google.html).

Playing on the rivalry, somebody at a company that lists an address in Zagreb, Croatia, has put up an interesting site: Bing Vs. Google ( http://www.bing-vs-google.com/ )

The site offers an edit box for your search term, then shows the results of the two search engines side-by-side. Cute.


According to WHOIS, the domain was registered June 1:
Registrant:
Web-ideja d.o.o.
Sigetje 4
Zagreb, 10090
HR

Domain name: BING-VS-GOOGLE.COM

Tom Kelchner

Beginner’s Guide: Is that a real anti-malware product?

In all our discussion of Trojans, downloaders, malicious spam and more than 700 rogues, it’s easy to forget that a lot of folks out there using the Internet simply can’t tell the difference between a rogue and a legitimate anti-malware application. They become the victims of scareware. They pay $49.98 for software that doesn’t do anything but pop up frightening warnings. To boot, they may have their credit card information stolen.

To light a small candle in this vast darkness, Sunbelt Software has produced a guide to help non-technical Internet users recognize rogue anti-malware products.

“How to Tell If That Pop-Up Window Is Offering You a Rogue Anti-Malware Product” is available here.

At Sunbelt, we don’t just curse the darkness.

Tom Kelchner

The spam crisis in China

Good writeup by Gary Warner:

We are well past time for someone to declare a “Spam Crisis in China”.

There are three components to the Spam Crisis:

1) Certain Registrars in China who refuse to cooperate with abuse complaints and who let domains “live forever”, even when they are involved in criminal activity. We do not believe these companies are criminals. We believe that these companies have provided “reseller services” to criminals, and do not engage themselves proactively in stopping the criminal activities of their resellers. We look forward to helping in any way possible to identifying and stopping the criminals who are tarnishing the names of the companies listed below. I specifically name:

Sponsoring Registrar: 易名中国 ENAME Corporation, http://www.ename.cn/

Sponsoring Registrar: XIN NET TECHNOLOGY CORPORATION

2) Certain Network operators in China refuse to cooperate with abuse complaints and who let bad computers “live forever”, even when they are clearly involved in criminal activity. We invite the companies who are allowing criminals to continuously use their networks to take action so that they can be an International Success Story similar to our friends at HKDNR. We do not believe that these network companies are criminals. We believe that criminals use their network, and these companies have not yet found a way to effectively receive our complaints and remove these criminals from their networks. There are many companies, but I specifically name:

ASN 4837 CHINA169-BACKBONE CNCGROUP China 169 Backbone

ASN 4134 CHINANET-BACKBONE No.31, Jin-rong Street

ASN 9929 CNCNET-CN China Netcom Corp.

3) Law Enforcement activity. It is unacceptable in the International Community to allow one’s country to continue to serve as a haven for spammers of illegally counterfeited pills, illegally counterfeited software, and illegally counterfeited watches and handbags. It is also unacceptable to provide hosting services for numerous international criminals to place their servers on networks in your country. We invite Chinese Law Enforcement to become engaged in being part of the solution to this problem, and through dialogue with the International Community learn more about interacting with other countries about these issues.

More here.

Alex Eckelberry

50 ways to inject your SQL

Ok, musically, I’m not going to comment. Really.

But the content of the song isn’t that bad.

Lyrics:

I see your input’s not validated properly
You have to check it at all tiers: 1, 2 and 3
Give me a browser and quite soon you will agree. There must be
50 ways to inject your SQL

You see it really is my business to intrude
The CTO wants to see this web app broke into
Turn on my proxy and all doubt will be removed. There must be
50 ways to inject your SQL
50 ways to inject your SQL

Try a quick hack, Jack
Add a new row, Joe
Try an insert, Kurt
Change their SQL query

Evade the regex, Rex
Encode it all in hex
Unbalance the quotes, Vinod
And change the query

Break the syntax, Max
Use a backslash, Cash
Try command shell, Mel,
And change the query

Use “one equals one,” son,
Unhandled exception!
Read the stack trace, ace
and change the query

He said our application is secure against your kind
There are no simple vulnerabilities to find
I said your coders write their code like they are blind, there must be
50 ways to inject your SQL

He said our logs show unexpected funds were sent
Its probably time we started using Prepared-Statements
I said I’m glad you’re seeing what I meant, there were
50 ways to inject your SQL
50 ways to inject your SQL

Break the syntax, Max
Use a backslash, Cash
Try command shell, Mel,
And change the query

Use “one equals one,” son,
Unhandled exception!
Read the stack trace, ace
and change the query

Try a quick hack, Jack
Add a new row, Joe
Try an insert, Kurt
Change their SQL query

Evade the regex, Rex
Encode it all in hex
Unbalance the quotes, Vinod
And change the query

Alex Eckelberry (via Cedric)

Botnet owners Unite!

Opera has introduced a new feature called “Unite” that will allow users to turn their browsers into servers. It’s a concept that might be as well-thought-out as sending customers on a hike in a safari park with backpacks full of raw meat.

According to the Opera Unite Developer’s Primer, “Opera Unite features a Web server running inside the Opera browser, which allows you to do some amazing things.” We’re betting there are some other people who use the Internet who will be doing some amazing things with this too.

Unite is basically a group of extensions to the Opera Web browser widget system. They will make it possible for Opera users to set their machines up as servers to provide their friends with blogs or access to files. Opera’s servers will serve up pages for the “Turbo” feature and act as proxies (with firewall) for the communication between the users’ Unite-linked browsers. Opera staff will check for bugs and malcode. Adult material is not allowed.

The most significant question that arises is: Will users accidentally give unintended access to their file systems? Opera programs are really widgets. Shortcuts have been provided for configuring what they can access. Some shortcuts lead to system folders. There are warnings included in the documentation, but, ultimately what is exposed is left to the developer.

Widgets will be available from sources other than Opera. It could be possible for an intruder to create an Opera widget that appears to be just a local widget but really uses the Unite protocol for malicious purposes.

We’ll be watching for the first “Unite” botnet.

Read more here.

Opera’s primer for Unite developers here.

Tom Kelchner

Green Dam = Spyware

Sunbelt Software has added detections to its products to find and remove Green Dam-Youth Escort, the Internet filtering (and spyware) software that the Chinese government requires on all new computers sold in the country after July 1.

We classify it as a surveillance tool with a rating of “moderate risk” and we recommend that CounterSpy™ and VIPRE® users quarantine it.

We’re going to be reading a lot about Green Dam-Youth Escort in coming weeks (months? years?) The government of China mandated that it be installed on new machines to protect its citizens from obscene and harmful content. Computer users are allowed to uninstall it.

The Chinese Ministry of Industry and Information Technology bought the rights to the application for one year through a no-bid $6 million purchase from Jinhui Computer System Engineering Co. of Zhengzhou. Jinhui also stands to make a mountain of money after one year since users will be required to pay for updates. It was estimated recently that there are 253 million Internet users in China.

Most observers assume it also is to prevent Chinese Internet users from seeing content critical of the government. The Chinese government already operates a “Great Firewall” to filter Internet content (including politically sensitive sites) but it can be bypassed.

Politics aside, there are some serious problems with Green Dam:
— It has the capacity to monitor keystrokes.
— It logs the URLs of sites the user has attempted to reach.
— It uses unencrypted data transfer from clients to company servers.
OpenNet Initiative said Green Dam can monitor activities in addition to Web browsing and can shut down applications.
— The black-list update process is vulnerable to compromise
— Exploit code has been posted that compromises Internet Explorer on computers running Green Dam. It uses a stack overflow in the browser process triggered by an overly long URL. It works on Microsoft’s latest Vista operating system too.
— Solid Oak Software Inc. of Santa Barbara, Calif., is bringing a legal action in China, claiming that Jinhui used code from its CyberSitter filtering software. Jinhui denies the allegation.

There have been reports from testers that Green Dam slows browsers and doesn’t filter properly. It uses color-tone filtering to spot pornographic images, but there are reports that it misses images of dark-skinned people and mistakenly filters images of pigs.

The Green Dam black list

Bloggers familiar with China who have read through the Green Dam black list of words to be filtered found that it contains about 2,700 words related to pornography and about 6,500 “politically sensitive” words.

The political blacklist includes:

June 4th (Date of military attack on Tiananmen Square protestors that left 2,500 dead)
democracy
liberty
essence (?)
fallacies and heresies

The porn-related words include:

Cat-III (Hong Kong film industry “adult” rating)
Naked
Homosexuality

And, nobody-knows-what, maybe a typo or a new euphemism for a sex act:

Fanyu (originally a little known word found in a few Buddhist scriptures)

For more, see here.
Or here.

Exploit code here.

Tom Kelchner