Chinese government delays Green Dam requirement (maybe forever)

The Chinese government’s Ministry of Industry and Information Technology announced today through the Xinhua news agency that there would be an indefinite delay in the enforcement of a rule requiring the installation of Internet filtering software Green Dam-Youth Escort on all new computers sold in the country. The rule was to go into effect tomorrow.

Green Dam was officially described as an application to protect children from harmful content on the Internet. Researchers, however, discovered that two thirds of the “harmful” terms it filtered had political connotations.

The Chinese government will install Green Dam in school and Internet cafe computers after tomorrow. It also will provide free downloads for anyone who wants it, Xinhua said.

The filtering software has drawn fire from many quarters:

— China only notified PC makers of the regulation on May 19 and only made the edict public in June. Many manufacturers said they couldn’t comply with the July 1 deadline in such a short time.

— Solid Oak Software of Santa Barbara said that code from its CyberSitter software was used extensively in Green Dam-Youth Escort and sent cease-and-desist letters to U.S. PC manufacturers to stop them from installing Green Dam. Solid Oak said it would launch lawsuits in the U.S. and China July 1.

— Jinhui Computer System Engineering Co. of Zhengzhou, the company that won the Chinese government’s $6 million contract to write the application, has received more than a thousand harassing phone calls, including late-night death threats.

— Jinhui patched one vulnerability in Green Dam, but the application remained open to remote exploitation and a working exploit was published on the Internet.

— The U.S. protested that installation of the application would violate China’s agreement with the World Trade Organization.

— Leaders of 22 international business groups last week notified Chinese Prime Minister Wen Jiabao that Green Dam was a threat to privacy and free speech and hardly in keeping with China’s “professed goal of building an information–based society.”

— The European Union also protested to China, saying that the Internet filter was designed to limit free speech.

For news coverage, link here.

Tom Kelchner

You have no privacy: What you buy may affect your credit

Interesting article:

Have you used your credit card at merchants specializing in secondhand clothing, retread tires, bail bond services, massages, casino gambling or betting? Your credit card issuer may be taking note — and making decisions about your creditworthiness based on your purchasing behavior. The reason: Buying used clothing or retread tires may be an indication of financial distress and a preamble to missed credit card payments or defaults.
Link here.

Alex Eckelberry

StopBadware.org and Sunbelt Partner to Fight Badware

Sunbelt is excited to be working with StopBadware.org, the collaborative initiative to combat viruses, spyware, and other bad software. Sunbelt will participate in the effort as a data partner to provide information to support and encourage website owners and web hosting companies in cleaning up and protecting their sites.

This morning, StopBadware.org launched a new, richer report interface—integrating the new Sunbelt Software data—to its searchable Badware Website Clearinghouse. The new reports allow security researchers, law enforcement, site owners, and other interested parties to see a site’s current and past badware activity, along with basic information about the site. Sunbelt joins Google in contributing data to the project, which is based at Harvard University’s Berkman Center for Internet & Society.

Read the press release here.

Laurie Murrell

Michael Jackson spam loads zbot – don’t go there

The domain, complete with Matrix-like animation, is running “Unique Pack” exploit package version 2.

Subject: Who killed Michael Jackson?
Date: Tue, 30 Jun 2009 08:14:46 -0300
From: x-files
Reply-To: xxxxx@xxxx.com
To: xxxxx@xxxx.com

Michael Jackson Was Killed…

But Who Killed Michael Jackson?

Visit X-Files to see the answer:

hxxp://xxxx.xxxxx.com.mx/x-files


Thanks to Sunbelt Malware Researcher Adam Thomas

Tom Kelchner

Dangerous new spam run infects users through PDF exploit

Yesterday, our honeypots started detecting a dangerous new spam run, pushing a fake update for Outlook and Outlook Express.

Purporting to come from Microsoft, the spam pushes people to a web page which then redirects to a page serving a PDF exploit.

Msupdate12831238888p

Clicking the link takes one to a “Microsoft” update page. One of several examples is shown here:

Microsoftupdate128481234283488p_main

After a brief period of time, the user is redirected to an exploit page. The payload is Zbot.

This is an extremely dangerous spam run if you or your users are not fully updated on the latest versions of Adobe Acrobat. Get updated.

Alex Eckelberry

ByteHosting rogue firm settles with FTC for $117K

James Reno of Amelia, Ohio, the brains behind an elaborate series of rogue anti-malware companies, and his firm ByteHosting, have agreed to pay $117,000 — what’s left of $1.9 million of ill-gotten gains — to settle an action brought by the U.S. Federal Trade Commission.

The complaint, filed last December in the Maryland District of U.S. Federal Court, said the schemes used deceptive advertising to victimize one million Internet users since 2003. Each was duped into purchasing the rogues at $39.95.

The rogues included: WinFixer, WinAntivirus, DriveCleaner, WinAntispyware, ErrorProtector, ErrorSafe, SystemDoctor, AdvancedCleaner, Antivirus XP and XP Antivirus 2008.

When the FTC complaint was filed in December, it froze $116,697 of Reno’s assets. He will forfeit that. The FTC said he is unable to pay the remainder of the $1.9 million he made from the schemes and that amount of the fine will be suspended.

Other defendants still facing FTC charges are:
— Sam Jain, an officer of Innovative Marketing, Inc., San Francisco, Calif., USA
— Daniel Sundin of Vantage Software, Winsoftware, Ltd., and Innovative Marketing, London, UK
— Marc D’Souza of Web Integrated Net Solutions and Innovative Marketing, Inc, Toronto, Canada.
— Kristy Ross of Innovative Marketing, Inc., Walkersville, Md., USA.
— Maurice D’Souza, Thornhill, Ont., Canada

Other companies named in the action include:
— Billingnow,
— BillPlanet PTE Ltd.,
— Globedat, Innovative Marketing Ukraine,
— Revenue Response,
— Sunwell, Synergy Software BV,
— Winpayment Consultancy SPC,
— Winsecure Solutions,
— Winsolutions, Belize City, Belize,
— Setupahost.net

For more, see here.

For the FTC complaint, see here.

Tom Kelchner

Spear phishing attacks reported at U.S. company whose code was ripped off for China’s Green Dam spyware

Late last week someone began attacks on the California company whose code was illegally used in China’s Green Dam-Youth Escort spyware.

In May the Chinese Ministry of Industry and Information Technology announced that computers sold in the country after July 1 must have the Green Dam software installed to block “obscene” and “harmful” information. Researchers have found that the application is aimed at filtering Internet political content as well as pornographic material.

Solid Oak Software Inc. in Santa Barbara, Calif., makers of parental control software CyberSitter, reported attacks on Thursday that required the company to reboot servers.

Marketing manager Jenna DiPasquale said she received an email message with an attachment containing a custom-written spear phishing PowerPoint file. The phishing email also bore a spoofed originating address and carried the signature line that company president Brian Milburn used 15 years ago. Similar emails were caught by filters. They were all individualized in the same way.

DiPasquale said the company suspected the attacks were coming from China and the FBI has been notified.

Solid Oak Software said June 12 that code from its CyberSitter software was used extensively in Green Dam-Youth Escort and sent cease-and-desist letters to U.S. PC manufacturers. DiPasquale also said her company will launch lawsuits in the U.S. and China July 1.

Solid Oak Software has posted a document listing the extensive use of CyberSitter code and even file names in Green Dam (here).

Zhang Chenmin, general manager of Jinhui Computer System Engineering Com of Zhengzhou, China, claimed his company did not use Solid Oak’s code to write Green Dam. “That’s impossible. We didn’t steal their programming code,” he said in a press interview.

Jinhui employees have been receiving harassing phone calls, including death threats.

Sunbelt Software products filter Green Dam as spyware.

For details see:

“Who is attacking Solid Oak, whose code was stolen for Green Dam?”

“Confirmed: Developer of software stolen for Green Dam is under attack”

Tom Kelchner

Useful Gmail security feature

Your Gmail account could be hijacked or viewed by someone else.  So it’s nice to know from where it’s being accessed.

You can do this with a handy-dandy feature in Gmail, located at the bottom of the Gmail page:

01234gmail1238812388

 

Click “Details” and you get an overview of your accounts activity, including whether it’s from POP, a browser, or a mobile phone:

A01234gmail1238812388

Very useful. 

Alex Eckelberry
(Hat tip to Micheal Espinola)

Zango v. Kaspersky

Anti-malware providers got good news today from the U.S. Ninth Circuit Court of Appeals in Seattle, Wash.

Readers of this blog may remember the lawsuit that Zango filed against Kaspersky back in 2007 for blocking its software. As we reported, Zango’s case against Kaspersky suffered a severe setback when the Washington State Superior Court handling the case granted Kaspersky’s motion for summary judgment on the grounds that Kaspersky, as an “interactive computer service” provider, enjoyed immunity from such lawsuits under section 230 of the “Communications Decency Act” (CDA, 1996) (link here).

We hailed that decision and promptly signed on to the amicus brief filed by the Center for Democracy and Technology with the Ninth Circuit Court of Appeals in response to Zango’s appeal of the original decision (link here).

We are now pleased to report that the Ninth Circuit Court of Appeals has upheld that original decision, affirming that Kaspersky enjoys “good Samaritan” protection afforded by the CDA. In the court’s own words, a provider of “access tools that filter, screen, allow, or disallow content that the provider or users considers obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable is protected from liability [by the CDA] for any action taken to make available to others the technical means to restrict access to that material.” For the Court’s full opinion, see the PDF file (here), which also includes an interesting concurring opinion from one of the panel’s three judges.

Admittedly, this decision is not nearly as consequential for anti-malware providers as it would have been three or four years ago, when adware vendors such as Zango and Direct Revenue were regularly threatening anti-spyware providers with legal action and peppering them with cease-and-desist letters on a weekly basis. It’s a been a while since we received any serious legal threats, although we do still get the occasional protest from software developers whose apps we target as “low risk,” potentially unwanted programs or tools. Nonetheless, the decision is a welcome one, as it extends to Sunbelt and other anti-malware providers the kind of legal cover we need in order to provide our customers and users with strong protection against unwanted, malicious software.

It’s worth noting that Judge Fisher, in his concurring opinion, voiced concerns over the seemingly broad language of the statue in question, raising the possibility that “under the generous coverage of [the statute’s] immunity language, a blocking software provider might abuse that immunity to block content for anti-competitive purposes or merely at its malicious whim…”

In a similar vein, one adware vendor we dealt with recently complained that our targeting policies effectively made Sunbelt (and other anti-malware vendors) into a law-unto-itself that operated on the assumption that “users cannot decide for themselves what they want on their computer.”

We think these kinds of concerns are misplaced. While the language of the statute is somewhat broad (“…or otherwise objectionable”), users are always free to replace an overly restrictive blocking tool with one of the dozens (if not hundreds) of alternatives that exist in the market, as the Judge Rymer notes in the main opinion:

“If a Kaspersky user (who has bought and installed Kaspersky’s software to block malware) is unhappy with the Kaspersky software’s performance, he can uninstall Kaspersky and buy blocking software from another company that is less restrictive or more compatible with the user’s needs. Recourse to competition is consistent with the statute’s express policy of relying on the market for the development of interactive computer services.”

Or, as we explained to that adware vendor:

“We sell a service to customers who are willing to pay for it. If they think our protection ineffective, excessive, or misguided, we lose business.”

Judge Fischer raises the prospect that anti-competitive blocking by a covered blocking software provider could occur without the user’s knowledge, however, the example he offers (Zango’s own users) undermines the very point he is trying to make. In that case, users who actually did want to use Zango’s software (pop-ups and all) were most certainly aware that something wasn’t right and contacted Zango about it. Zango, in turn, presumably informed them about the blocking, if they weren’t already aware of it. The performance and detections of anti-malware software are simply under too much daily scrutiny from users, industry experts, testers, competitors, adware vendors, and, yes, malware developers and hackers themselves for unnoticed blocking to occur for any length of time.

The bottom line is that no anti-malware vendor can afford to promiscuously or arbitrarily block and remove content that their users actually want installed on their PCs. In this case, the market can work. What we need, however, is some measure of protection from entities who seek to deny consumers access to tools that can actually protect their PCs and networks against unwanted software that just happen to sport all the legal muscle that advertising revenue can buy.

Eric L. Howes

Your summer reading: a Month of Twitter Bugs

It might be a good idea to keep your ear to the ground in July and probably August for malicious exploits that take advantage of Twitter or third party services that use it.

Researcher Aviv Raff, FraudAction has announced that he will launch a “Month of Twitter Bugs” (MoTB) in which he will post a new vulnerability each day on his twitpwn.com site (Link here.)

His description of what he is doing is as follows: “I’m doing so in order to raise the awareness of the Twitter API issue I recently blogged about. MoTB could have been easily converted to any other ‘Month of Web2.0 service bugs’, and I hope that Twitter and other Web2.0 API providers will work closely with their API consumers to develop more secure products.

“Each day I will publish a new vulnerability in a 3rd party Twitter service on the twitpwn.com web site. As those vulnerabilities can be exploited to create a Twitter worm, I’m going to give the 3rd party service provider and Twitter at-least 24 hours heads-up before I publish the vulnerability.”

Raff said he got the idea from the “Month of Browser Bugs” that H.D. Moore ran in July of 2006.

There are two views of “Month of (your app/os here) Bugs” campaigns:

1) It’s the only way to light a fire under the companies that provide these services and software to fix their defective products.

2) It’s an irresponsible piece of grandstanding that is going to draw the attention of hackers and malcode writers and could result in a significant malware attack that will affect a lot of Internet users.

One June 16 comment on Raff’s blog represents the perspective of the poor overworked IT guys who are going to bear the brunt of this if it turns something loose from the dark side: “Giving 24 hours notice is just not responsible and if you ever find yourself working in the security field (as a job) this may come back to haunt you. I’d suggest telling them now and giving them some time to fix the issues, should be all clear then.”

It’s a “responsible disclosure” issue. There isn’t much agreement on the details of how to do responsible disclosure.

Tom Kelchner

Email logs can tell more than you might expect

Two researchers with the Florida Institute of Technology in Melbourne studied records of email messages sent by 150 top staff members at Enron in the company’s last year and a half and found some interesting clues about how people in an organization communicate during a crisis.

Ben Collingsworth and Ronaldo Menezes looked at the logs obtained by federal investigators of over 500,000 emails sent to 15,000 people before the 2001 collapse of Enron.

They studied key events, such as the August 2001 resignation of CEO Jeffrey Skilling by looking at the groups who exchanged email. They didn’t look at the email contents.

The researchers looked for changes in the communication system during crises, but discovered that the most significant changes happened about a month before. The number of groups in which every member has direct email contact with every other member (which the researchers called email cliques) increased from 100 to about 800 one month before Enron’s collapse.

They theorized that as stress builds in a company, employees start communicating with people with whom they feel comfortable and stop sharing information on a wider basis.

Collingsworth and Menezes presented their research at the International Workshop on Complex Networks in Catania Italy.

For the original article, see here.

Thanks to Juha-Matti Laurio for drawing this one to our attention.

Tom Kelchner

Using live.sysinternals.com as an ad-hoc analysis toolset

live.sysinternals.com is a great resource for ad-hoc use of Mark Russinovich‘s very useful set of tools.

For example, consider working on a system, and needing one of Mark’s tools, but simply not having them readably accessible.

In this case, all you have to do is remember the following URI:

live.sysinternals.com/tools

If the machine has internet connectivity, simply type that text into the address bar:

Sysinternalsweb

All of the tools you might want to use are right there.

But it gets better. Because this site is available directly from the command prompt, or Explorer.

For example, let’s say you wanted a list of all processes running on a system. Mark has a useful tool for that, pslist.exe (similar to the Unix ps command).

Open a command prompt, and type

live.sysinternals.comtoolspslist.exe

Pslistcommand

Or, if you want to open the contents of the site in Windows Explorer, you can just put the following text into Run:

Sysinternalsrun

And you get the contents in Windows Explorer:

Liveexplorerp

Now, if you’re working on a system that has a DNS Changer, or has a modified hosts file, either of which redirect sysinternals.com, you’ll obviously need to handle that problem first before getting to this site. While a hosts file redirect should be bypassed at the command line, that wouldn’t be the case with a DNS Changer. (Incidentally, the first thing I would recommend doing when you get on a badly infected machine is check the DNS entries and kill the hosts file — a lot of people don’t do that, and end up by spending hours hitting their heads against a wall.)

Update: Silly me, of course you could still access this site by IP, even if the hosts file or DNS server had been changed. Example: \207.46.140.150toolspslist.exe

With thanks to Randall, and the SANS Forensics blog.

Alex Eckelberry

Authoritarian states just aren’t what they use to be

Did those dictators in the 30’s really make the trains run on time?

The outside world’s view of the Chinese authoritarian state was frozen for decades in the images of the Cultural Revolution, when the slightest bit of dissent landed one in a “reeducation” camp, where Ph.D.s hoed vegetables to atone for the sin of questioning authority (or being Ph.Ds).

Then Mao died and things loosened up a bit. That period culminated in the image of the dude with the shopping bags standing in front of four dumbfounded tanks in Tiananmen Square. Then the authorities killed 2,500 protestors.

Now China has the Internet. The Green Dam Girl cartoons mocking censorship might be the image going forward.

Here are the latest twists in the saga of the Chinese government’s fiat that all new computers must be loaded with Green Dam-Youth Escort to “protect the young from pornography” {subliminal whisper: “…and 300 million Chinese Internet users from reading about Tiananmen Square protests.”}

— There have been about a thousand harassing phone calls to the software company that wrote, or plagiarized, Green Dam-Youth Escort, Jinhui Computer System Engineering Co. of Zhengzhou. They included late-night death threats. (More here.)

— Green Dam was patched for one vulnerability, though not well, and now vs. 3.17 is still open to remote exploitation. There has been a working exploit out there for a week.

The vulnerability was a buffer overflow that could result from overly-long URLs. They patched it but screwed up the math and the buffer is still too small. (More here. )

The Zinhui general manager Zhang Chenmin, was quoted as saying: “I never expected the software to have brought us so many troubles. Our aim is simply to protect children from Internet pornography.”

I wonder if they still have on staff at Zinhui the guy who said last year: “hey, we should look into doing government contract work.”

Oh, yea, and Sunbelt Software products detect Green Dam as spyware.

Tom Kelchner

Hiding from Spambots: “Munging” Your Email Address

Project Honeypot has posted a document with some great techniques for hiding your email address on web pages, blogs, etc. from spambots: “How to Avoid Being Harvested by Spambots.

Some techniques they suggest:

Munging your address:

Add “remove this” type text to the email address or write it in a way that requires human cognition to extract it correctly.

jsmith@REMOVETHISexample.com
jsmithDELETEBEFORESENDING@example.com
jsmith @example.Zom (replace Z with C)

jsmith -at-example.com
jsmith (at)example.com
jsmith AT example DOT com

Advanced munging

Replace letters with ASCII code. @ = “&#64”

Complete Obfuscation

#1: Post your email address in a GIF, png, JPEG or other standard web graphic file.

#2: Render you email address into Javascript. Their article includes an edit box where you can enter an address to demonstrate:

jsmith@yahoo.com would be rendered as:

There is the project’s description of what they do:

“Project Honey Pot is the first and only distributed system for identifying spammers and the spambots they use to scrape addresses from your website. Using the Project Honey Pot system you can install addresses that are custom-tagged to the time and IP address of a visitor to your site. If one of these addresses begins receiving email we not only can tell that the messages are spam, but also the exact moment when the address was harvested and the IP address that gathered it.”

It’s a great mission, plus ya gotta love any group that sells underwear with their logo/message as a fund raiser:

Tom Kelchner

Bing Vs. Google

Microsoft’s new Bing search engine, boosted by $100 million in marketing, quickly grabbed a 16 percent market share and is second to Google now (at 71 percent).

And the joke has started:

Q: “What does ‘Bing’ stand for?”
A: “But It’s Not Google.”

(We think that can be credited to the long-running blog (Jan. 2002) of author Seth Godin. http://sethgodin.typepad.com/seths_blog/2009/05/the-next-google.html).

Playing on the rivalry, somebody at a company that lists an address in Zagreb, Croatia, has put up an interesting site: Bing Vs. Google ( http://www.bing-vs-google.com/ )

The site offers an edit box for your search term, then shows the results of the two search engines side-by-side. Cute.


According to WHOIS, the domain was registered June 1:
Registrant:
Web-ideja d.o.o.
Sigetje 4
Zagreb, 10090
HR

Domain name: BING-VS-GOOGLE.COM

Tom Kelchner

Beginner’s Guide: Is that a real anti-malware product?

In all our discussion of Trojans, downloaders, malicious spam and more than 700 rogues, it’s easy to forget that a lot of folks out there using the Internet simply can’t tell the difference between a rogue and a legitimate anti-malware application. They become the victims of scareware. They pay $49.98 for software that doesn’t do anything but pop up frightening warnings. To boot, they may have their credit card information stolen.

To light a small candle in this vast darkness, Sunbelt Software has produced a guide to help non-technical Internet users recognize rogue anti-malware products.

“How to Tell If That Pop-Up Window Is Offering You a Rogue Anti-Malware Product” is available here.

At Sunbelt, we don’t just curse the darkness.

Tom Kelchner