BoingBoing’s site stats

BoingBoing has its web stats available for public viewing. Some mildly interesting information, including the fact that Firefox readers account for over 50% of their readership (my blog, on the other hand, has about 35% of its readers using Firefox).

BoingBoing is a publication catering to a demographic that biases toward urban zeitgeist/web 2.0 technically literate, more liberal readers, so their stats are not representative of the broad population. However, the stat pages themselves are interesting to browse through as a picture of what a major site experiences.

You can see keyword stats here, other stats here.

Alex Eckelberry

Antispyware domain sells for $550k

Got this tidbit from Larry Seltzer: SpywareBot just bought the domain “antispyware.com” for $550,000.

According to a post today in DomainNameWire:

Afternic has sold AntiSpyware.com for $550,000, making it one of the biggest domain name sales of 2006. The seller of the domain was SpyForce.com, LLC out of Connecticut. The domain’s whois record is now protected by a privacy service so the buyer of the domain is not clear. The domain name is currently resolving to a page offering spyware and adware software.

Link here.

Wow.

Incidentally, while SpywareBot (also marketed under the name AdwareAlert) is not a rogue scam program or trojan in the class of SpySheriff, etc., it is listed on the SpywareWarrior Rogue/Suspect antispyware applications page.

Alex Eckelberry

RSS madness?

Apparently my move to the new blogger may have caused a number of old and new posts to get pushed out. So ignore these if you get them. Sorry for the hassles!

This Blogger upgrade hasn’t been the best experience. Biggest problem is my favorite blogging programs, BlogJet, doesn’t support the new Blogger APIs… so I can’t post from it.

Frustrating.

Alex

Two new rogue antispyware apps

Two new ones…

Spyware Knight
spywareknight(dot)com

SpySoldier
spysoldier(dot)com

Both domains registered through EST Domains.

Complaint about aggressive, deceptive pop-up advertising for both programs here.

Web page advertising both here.

Both have been entered into the CounterSpy database, and both are now listed on the SpywareWarrior Rogue/Suspect Anti-Spyware page here.

These seem related to another rogue, SpywareSheriff— and even the testimonial pages are ripped-off from download.com:

You can more screenshots of both programs here.

Obviously, please stay clear of these rogue sites and the malware they spawn. If you are infected, the free trial versions of CounterSpy (or the CounterSpy 2.0 beta) should remove them just fine.

Alex Eckelberry
(Credit to Sunbelters Eric Howes and Adam Thomas)

Blogger upgraded

I’ve upgraded to the new Blogger platform. It only took about 8 hours!

Feeds seemed to get a bit funky, I noticed a feed from a year ago got blasted out (why, I have no idea). No, I did not blog about the antispyware coalition today — that was a long time ago.

Now I have to figure out a way to get rid of the Blogger Navbar at the top, which just got dumped in with the upgrade.

Pardon the dust…

Alex Eckelberry

New scam sites

New sites that use fake codecs. These are dnschanger trojans.

DNSChanger Codec Sites
216.255.181.155 dvds-access(dot)com
216.255.181.155 site-ticket(dot)net
216.255.186.5 siteticket(dot)net

56887999987777765444

5654687321598732469618995464a

2139809808df1998818231231231231

The following porn sites are foisting off these fake codecs.
216.255.186.5 adultan(dot)com
216.255.186.5 adultfilmsite(dot)com
216.255.186.5 adultmovieplus(dot)com
216.255.186.5 adultsper(dot)com
216.255.186.5 clubxxxvideo(dot)com
216.255.186.5 contentlocker(dot)net
216.255.186.5 cutadult(dot)com
216.255.186.5 galleryclick(dot)net
216.255.186.5 gallerypictures(dot)net
216.255.186.5 greatadultvideo(dot)com
216.255.186.5 hardcorevideosite(dot)com
216.255.186.5 loweradult(dot)com
216.255.186.5 mega-adult(dot)com
216.255.186.5 siteticket(dot)net
216.255.186.5 sureadult(dot)com
216.255.186.5 xxxallvideo(dot)com
216.255.186.5 xxxmovietour(dot)com
216.255.186.5 xxxteenfilm(dot)com
216.255.186.5 xxxzonevideo(dot)com
216.255.177.54 dontgetporn(dot)com
216.255.177.54 funxxxporn(dot)com
216.255.177.54 playhardmovie(dot)com
216.255.177.54 playxvideo(dot)com
216.255.177.54 playxxxvideo(dot)net
216.255.177.54 superadultfriend(dot)com
216.255.177.54 superporncity(dot)com
216.255.177.54 theadulteye(dot)com
216.255.177.52 adultzoneworld(dot)com
216.255.177.52 ispfiltersporn(dot)com
216.255.177.52 pornissex(dot)com
216.255.177.52 pornxxxfilm(dot)com
216.255.177.52 stephieporn(dot)com
216.255.177.52 worldbestadult(dot)com

Obviously, stay clear of these rogue sites and the malware they spawn. If you are infected, the latest version of CounterSpy (or the CounterSpy 2.0 beta) should remove them just fine.

Patrick Jordan and Alex Eckelberry

Vista cost analysis

Well, quite a read here by  Peter Gutmann:

As a user, there is simply no escape.  Whether you use Windows Vista, Windows XP, Windows 95, Linux, FreeBSD, OS X, Solaris (on x86), or almost any other OS, Windows content protection will make your hardware more expensive, less reliable, more difficult to program for, more difficult to support, more vulnerable to hostile code, and with more compatibility problems.  Because Windows dominates the market and device vendors are unlikely to design and manufacture two different versions of their products, non-Windows users will be paying for Windows Vista content-protection measures in products even if they never run Windows on them.

Link here.  Schneier also weighs in.

Alex Eckelberry
(Thanks Francesco)

Scam sites update 12/26/06

Zlob trojans (fake codecs)  install a program called pmsngr.exe, which is a fake alert generator.

 Fakealert009123

We found pmsngr.exe calling to the following sites:


protectgates(dot)com
 

protectgates(dot)com/gatevc.php?id=dw04          Opens to virusblast(dot)com/?aid=7

protectgates(dot)com/gatevc.php?id=dw03          Opens to antivirusgolden(dot)com/?aid=1338

protectgates(dot)com/gatevc.php?id=dw02          Opens to malwarewiped(dot)com/?aid=247

protectgates(dot)com/gatevc.php?id=dw01          Opens to pestcapture(dot)com/?advid=177

protectgates(dot)com/gatevc.php                          Opens to checkssecurity(dot)com/soft/

 

acegates(dot)com

acegates(dot)com/gatevc.php?pn=srch0p23total7s2  Opens to allsecuritylinks(dot)com/vc/as/sec1-adls/

acegates(dot)com/gatevc.php?pn=srch0p22total7s2  Opens to popup ads errorsafe(dot)com

acegates(dot)com/gatevc.php?pn=srch0p21total7s2  Opens to winantivirus(dot)com

acegates(dot)com/gatevc.php?pn=srch0p20total7s2  Opens to drivecleaner(dot)com

acegates(dot)com/gatevc.php                                    Opens to allsecuritylinks(dot)com/vc/as/sec-14jdklss/

 

So here’s an updated list of scam sites.

Security scammers:

IP: 85.255.116.214 
protectionssoft(dot)com       

IP: 85.255.116.214 
asafetypage(dot)com          

IP: 85.255.116.211 
iesecuritytool(dot)com         

IP: 85.255.118.212 
acegates(dot)com   

IP: 85.255.118.212 
protectgates(dot)com          

798654215sdfasf2fjkuklkkjf

5468798436216549843216579

55546666666666687979d

5666666657897772224da

9879888888888888888846546ad23

Zlob fake codec site:

IP: 85.255.116.251 
mediaactivexpage(dot)com  

Patrick Jordan and Alex Eckelberry

Hacked version of Dr. Web antivirus used in spam bots… developing…

Not too long ago, we saw a pirated version of Kaspersky Anti-virus being downloaded onto infected machines and used in conjunction with what became known to some as “SpamThru“.  

Joe Stewart published a great analysis on this operation:

Anti-Virus Scanning
Like many viruses and trojans, SpamThru attempts to prevent installed anti-virus software from downloading updates by adding entries into the %sysdir%driversetchosts file pointing the AV update sites to the localhost address. In the past, we’ve also seen malware which tries to uproot other competing malware on an infected system by killing its processes, removing its registry keys, or setting up mutexes which fool the other malware into thinking it is already running and then exiting at start.

SpamThru takes the game to a new level, actually using an antivirus engine against potential rivals. At startup, SpamThru requests and loads a DLL from the control server. This DLL in turn downloads a pirated copy of Kaspersky AntiVirus for WinGate from the control server into a concealed directory on the infected system. It patches the license signature check in-memory in the Kaspersky DLL in order to avoid having Kaspersky refuse to run due to an invalid or expired license. Ten minutes after the download of the DLL, it begins to scan the system for malware, skipping files which it detects are part of its own installation. Any other malware found on the system is then set up to be deleted by Windows at the next reboot.

In other words:

1. The machine is infected with the SpamThru trojan.

2. Antivirus programs are disabled from downloading updates.

3. The SpamThru trojan runs a hacked version of Kaspersky AV to kill off any compettiive malware (while making sure to that Kaspersky’s product leaves SpamThru alone).  

4. SpamThru has a field day using the infected machine to send out spam.

Now, it might appear that a rival group to SpamThru might be striking back (though we have no proof to that claim, but we are not seeing SpamThru associated with this new piece of malware). Only these guys are using Dr. Web antivirus instead of Kaspersky.

Some pictures . . . Scanner working:

1spamtrojan199888123

2spamtrojan199888123

Key File. Registered to Pupkin Petr?

3spamtrojan199888123

Rar.exe unpacking the av.rar archive

4spamtrojan199888123

Scanner in action . . . In “real life”, it runs silently in the background:

5spamtrojan199888123

6spamtrojan199888123

 

Adam Thomas and Alex Eckelberry

Not-so-funny “Funny Christmas Video” spam

One of our malware researchers, Francesco, just wrote about a spam email requesting a download of a nasty fake codec. 

A new “Italian only” targeted attack targets users posing as new codecs.  These were spammed via e-mail as “funny Christmas videos” that required the user to download a fake codec.

Once downloaded and installed, it displays some popup saying “sorry, compatible only with Windows Vista”, but unfortunately the trojan is installed already.  Propagation is automatic, meaning an infected person automatically sends the same spam to people in his contacts list (who might in turn think it’s authentic since a “friend” sent it).

While the scripted pages prevent being reached outside Italy (displaying a custom 500 internal server error), the files can be downloaded for analysis.

hxxp://www.newcodecscentral(dot)biz/codec_install.exe

hxxp://www.videocardcodecs(dot)biz/install.exe

hxxp://www.videocodecs(dot)biz/codec_installer.exe

Obviously, stay clear of these dangerous trojans. 

Antivirus coverage is very weak on this new trojan, as can be seen here, here and here.

Codec2_99981888333

Alex Eckelberry

Aviv responds

Aviv Raff and I have been going back and forth a bit on my blog post on the “non-exploit exploit”.   You’ll recall I was skeptical about his post about a new Internet Explorer “exploit”, feeling that it really wasn’t a major issue. He’s a good guy and I respect him and I’m going to try and give him a fair shake here. 

His response, with my comments:

1) Nowhere in my post I write that this vulnerability alone may allow a full remote code execution with no user interaction (like the WMF vuln).

That’s true, but you did start all this off with an alarming post entitled “Internet Explorer 7 – Still Spyware Writers Heaven”. 

2) The post headline is just the name of the vulnerability with a mention that I’m going to provide a proof-of-concept exploit.. Nothing scary in that 🙂

Ok, Aviv, you have a point.  I didn’t make it clear in my first blog post (since corrected) that my comment about your “scaring people” had to do with the naming of your first post (see above).

3) There are some ways of a file to get on the user’s system which will not require full write access. For example: http://www.symantec.com/avcenter/attack_sigs/s21235.html . Now, save this file on the user’s desktop as one of the DLL files, and you have made a remote code execution.

I would argue that this is more of a social engineering issue than an exploit. It’s a design bug, but still requires user interaction

Aviv made a valid follow-up comment — “I think we have a semantic problem here. You refer to “exploit” as any “remote code execution without user interaction exploit”. What I refer to as an “exploit” is (according to Wikipedia): ‘In computer security, an exploit is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability’. I agree that this vulnerability is not critical, but the code I published is still an exploit. 

Yes, I agree with that definition, but it’s all about context here.  So he continues to say “Microsoft usually refers to vulnerabilities as critical only if they may allow remote code execution. I still this is critical enough for them to fix this issue on the Windows XP version.”

Right, I agree with Microsoft in this case — a critical vulnerability is one which allows remote code execution.

In other words, something like WMF, SetSlice and the daxctle exploit — all of which we have seen as ways for crackers to gain access to a system without any user acceptance, are critical exploits.  The “exploit” that Aviv writes about requires a user to proactively acknowledge and accept (and run) a download.  It may be bad, but it’s not nearly as critical as one might be led to believe.  

4) Many spywares are using the startup folders/reg keys as way of loading themselves again when the victim restart the machine. Security products (like yours) looks for changes in those folders/reg keys. This vulnerability is another way for an attacker to load his malicious code and bypass this detection.

Not entirely, if there is a signature generated for the rogue DLL (just like any other piece of malware), we’ll catch it, as will many other security products, regardless of where it loads.  Aviv responds by saying “I agree, but then why do you have a generic startup folder/reg key changes detection mechanism? All I’m saying is that if this issue is not going to be fixed in XP by Microsoft, the security vendors should consider adding a detection for this kind of threat.” He went on to add that AV signatures are used to detect known threats. Behavioral heuristic engines (e.g. startup folders/reg keys changes detection) are usually used  to detect unknown threats.”

He also points out that Microsoft has said they’ll fix this on future OS releases, and that he’s tested IE7 on Windows Vista RTM, and it does not have this vulnerability. 

I think Aviv was right to write about this issue and it should be fixed.  My problem has been with attaching any sense of alarmism to something which is really not a major issue  — there are other bigger fish to fry out there. It goes back to the fundamental illogic:  In order for this vulnerability to be exploited, the remote attacker will have to get something (by permission) on a person’s machine in the first place.   Apparently, I’m not the only one who has this opinion.

Alex Eckelberry

A plethora of porn — and fake codecs

Our good friend Chris Boyd (aka Paperghost) found a site with massive amounts of porn videos, foisting off fake codecs which are actually zlob trojans coming from objectactivex(dot)com .  It also tries to make itself look like YouTube, calling itself AdultTuba.

Check out the screenshots that Chris was kind enough to share with us (with the nasty stuff blacked-out):

 

Adulttubaedit1-775684

Dreamy1999883899000s12323

So just what is this site?  It’s called dreamsexy(dot)info.

As Patrick discovered after a little digging around, these guys have been spamming forums with bestpornvideosonline(dot)info which redirects to dreamsexy(dot)info.  You can see this from this google search (don’t click on the links inside the search, please).  

It goes without saying that you should stay clear of this site and the malware it spawns. 

And mad props to PaperGhost.

Alex Eckelberry and Patrick Jordan

The non-exploit exploit

Aviv Raff is a smart guy and I respect his work.  But he does seem to be making a mountain out of a wee molehill.  

Back in November, he wrote an alarming blog post entitled “Internet Explorer 7 – Still Spyware Writers Heaven”, which made the argument that there’s an “exploit” in IE 7 because when IE loads DLLs, it does not provide the full path to some.  When IE can’t find the DLL, Windows will search for a DLL with the same name.  Hence, a malware author could replace a legitimate DLL with a naughty DLL.  

His blog post elicited some light discussion on various security lists, but that was about all I saw about it.  However, today he came out again on this subject, with proof of concept code for this “exploit”. 

Now, I wouldn’t have paid much attention to this, except that in his original post, Avi used a really scary headline, which I really don’t think was warranted. I’ve seen my fair share of crap-in-your pants exploits. This is not one of them.

Remember that in order for a rogue DLL to get on a system, the malware author would need to have full write access to the system. It’s also not trivial to write such a DLL.

Now, the following argument could be made:  “Alex, you moron: a trojan could get installed on a person’s machine, which would have as its payload this rogue DLL”.  Yes, that’s true.  But how is that different than any other malware?  How the hell did the trojan get on the person’s machine in the first place?  The user had to allow it to get in.  Heck, if the malware author can get a trojan on a machine, why not have that be the nasty bugger which ruins your life? Do you see the illogic here?  

In other words, this is not like the infamous WMF exploit, which blasted a hole right into a user’s system by simply visiting a website.

I’ve been exchanging emails with Rob Franco (a good guy btw) on the IE team, who said “the reason that this behavior isn’t a “security vulnerability”, is that the Aviv [Raff] needs to already have write access to your system to get his code to run the way that he describes…I doubt that this will ever become a spyware writer’s “weapon of choice” because frankly, coding a rogue system DLL from scratch is probably one of the harder ways I can imagine for a badguy to get their code running.”

Rob agrees with Raff that security vendors need to keep a lookout for these types of threats, adding that “at the same time, spyware-scanners should probably keep a look out for suspicious DLLs as there’s no end to the creativity of attackers.”

I’m sure this minor bug will be fixed in an update in the near future.  In the meantime, as always, continue to practice good basic security habits.

Alex Eckelberry

I hate bullies

Keep in mind that the RIAA is still up to its jackboot bullying tactics.   Here’s the story:  A mother of 5 pushes back against the RIAA, so they drop the suit, only to turn around and go after the kids.

The five companies suing Santangelo, of Wappingers Falls, filed a motion Tuesday in federal court in White Plains asking Judge Colleen McMahon to dismiss the case. Their lead counsel, Richard Gabriel, wrote in court papers that the record companies still believe they could win damages against Santangelo but their preference was to “pursue defendant’s children.”

Santangelo’s lawyer, Jordan Glass, said the dismissal bid “shows defendants can stand up to powerful plaintiffs.” He noted, however, that the companies were seeking a dismissal “without prejudice,” meaning they could bring the action again, “so I’m not sure what that’s worth.”

Link here (via boingboing).

I’m all for protecting IP (heck, I make my living off of IP), but can’t the RIAA figure out how this stupid and vicious campaign is hurting them?  What a PR fiasco.  And what a bunch of idiots.

Alex Eckelberry 

More scam sites — 12/20/2006

New Zlob trojan fake codec sites

IP: 85.255.116.254 
objectactivex(dot)com         

IP: 85.255.116.253 
imagemediaobject(dot)com  

IP: 69.50.188.105   
activexsource(dot)com        

Secscam1239980812312312312

Secscam1239980812312312312123123

1108098123lldl6549876313

Bonus! Another sleazy security scammer:

IP: 85.255.116.212 
topsecuritypage(dot)com     

9901230981ldfkjsiweru123

Obviously, please stay clear of these rogue sites and the malware they spawn. If you are infected, the latest version of CounterSpy (or the CounterSpy 2.0 beta) should remove them just fine.

Patrick Jordan and Alex Eckelberry

A techie Charlie Brown Christmas tree

Here’s what to get your boss for Christmas:  A Charlie Brown Christmas Tree.  In this case, a techie Charlie Brown Christmas Tree. A gift to one of our VPs from some folks in his department.

Cb_tree

Cb_tree2

Yes, we have entirely too much fun here. 

Alex Eckelberry
* a “Charlie Brown Christmas Tree” is a reference to the pathetic tree that Charlie Brown had in the old TV show back in the 60s.

Big happy scam party

More fun scam sites touting fake codecs and the like.

New Zlob trojan fake codec sites

IP: 217.107.218.241           
vaxcodec(dot)com  

IP: 85.255.116.252 
mediaobjectguide(dot)com   

IP: 85.255.118.212 
allsecuritylinks(dot)com      

IP: 85.255.118.212 
alltruesoftware(dot)com       

New Trojan.DNSChanger (rootkit) sites: 

IP: 69.50.170.102   
accessvid(dot)net   

IP: 69.50.170.102   
siteentrances(dot)com        

IP: 69.50.170.101   
vids-access(dot) com            

IP: 69.50.170.101   
sites-entrance(dot)net         

IP: 69.50.170.100   
sites-entrance(dot)com       

IP: 69.50.170.100   
vidaccess(dot)net   

IP: 69.50.170.99    
playcodecs(dot)com           

IP: 69.50.170.99    
sitesentrance(dot)com        

IP: 69.50.170.98    
playerscodec(dot)com         

IP: 69.50.170.98    
site-entrance(dot)net

As you can see from our “chiclets” style graphics layout below, a number of these sites are virtually identical, except for a different name.            

1231299982434823488123410980980980981230987098709870987asdfws234827304987098sadlfasdfh1230987098asdfasdf123123898912398709asdfasdfhjkh12379871238080980afs9df8091823123kjksdjf12308098llllllllllllasdf12318999912399999123098sdfasdfklkjlkj1231230986546879879879876543546532132130098888888fdsdfsdf321657987dwfs635432165sdf1254654asdfsadf654879werwer3654328123198798asdf879182387dfscvsdf89

Obviously, please stay clear of these rogue sites and the malware they spawn. If you are infected, the latest version of CounterSpy (or the CounterSpy 2.0 beta) should remove them just fine.

Patrick Jordan and Alex Eckelberry
(With an additional hat tip to Suzi Turner)