Jump to content

chiawaikian

Experienced Members
  • Posts

    72
  • Joined

  • Last visited

Posts posted by chiawaikian

  1. An unpatched vulnerability in Internet Explorer could aid fraudsters in pulling off phishing scams, experts have warned.

     

    The error could be exploited to fake the address bar in a browser window, security monitoring company Secunia said in an advisory published on Tuesday. This tactic could be used in phishing scams that attempt to trick people into believing they are on a legitimate site, when in fact they are viewing a fraudulent Web page.

     

    Phishing is a prevalent type of online scam that seeks to pilfer personal information from unsuspecting Internet users. The scams typically combine spam e-mail with fraudulent Web sites that appear to come from a trusted source, such as a credit card company or a bank.

     

    The flaw exists because of an error in the way the Microsoft Web browser loads Web pages and Macromedia Flash animations, according to Secunia. The company rates the issue "moderately critical" and has created a special Web page where users can test their Web browser to see if they are affected.

     

    Secunia has confirmed that the vulnerability affects IE 6.0 on Windows XP with all current security patches. It also affects the latest IE 7 Beta release, Secunia said. Other versions may also be affected, it said.

     

    Microsoft is investigating the newly reported flaw, a representative said in an e-mailed statement late Wednesday. "Our initial investigation has revealed that customers who have set their Internet security settings to high, or who have disabled active scripting, are at reduced risk from attack as the attack vector requires scripting," the representative said.

     

    Additionally, Microsoft noted that it has not seen any active attacks that take advantage of this issue, which Secunia has dubbed the "Internet Explorer Window Loading Race Condition Address Bar Spoofing" flaw.

     

    This is the fourth unpatched vulnerability for IE that has become public in the last few weeks. Microsoft plans to release a security update for the Web browser on Tuesday. At least one of the disclosed bugs will be fixed in that update, the company has said. That flaw, related to how IE handles the "createTextRange()" tag in Web pages, has been exploited in attacks to install spyware, remote-control software and Trojan horses on vulnerable PCs.

     

     

     

    http://news.com.com/Another+security+hole+...ml?tag=nefd.top

  2. Briz Trojans, a "malware-creation-for-hire scam recently uncovered by security researchers" have affected hotels, airline and financial institutions. Spanish firm Panda Software analyzed the Trojan Briz-A, revealing the "existence of a complex system dedicated to creating and selling of ? la carte malware designed for stealing personal and confidential data." Panda Software and RSA Security identified and shut down several websites involved in the scam, and contacted affected businesses.

     

    http://www.theregister.co.uk/2006/04/05/tr...ork_dismantled/

  3. Employees who access their MySpace.com accounts from work are not just lowering their productivity, but may visit fake MySpace sites that could capture keystrokes, including corporate network passwords and other sensitive information. MySpace has 63 million users. One expert suggests that the most serious threat comes from the fact that many people use the same login information for their MySpace.com page for several other accounts, including banking and access to their employer's network.

     

     

    http://searchsecurity.techtarget.com/origi...1178653,00.html

  4. Here is an anti-spoof weapon that can also probably be used :

    http://crypto.stanford.edu/SpoofGuard/

     

    SpoofGuard is a browser plug in that is compatible with Microsoft Internet Explore. SpoofGuard places a traffic light in your browser toolbar that turns from green to yellow to red as you navigate to a spoof site. If you try to enter sensitive information into a form from a spoof site, SpoofGuard will save your data and warn you. SpoofGuard warnings occur when alarm indicators reach a level that depends on parameters that are set by the user.

  5. BBC news

     

    People are being warned about spam e-mails containing BBC News stories designed to trick them into visiting malicious websites.

     

    Cyber criminals are using the messages to exploit a recently discovered flaw in Microsoft's Internet Explorer.

     

    If users click on the link, they are taken to a fake website that installs a piece of software that can monitor online financial activity.

     

    People who receive the e-mails are advised to not follow the link.

     

    The alert, from security firm Websense, comes less than a week after security firms found three flaws in the popular browser.

  6. Zdnet.com

     

    An upcoming version of Firefox will include protection against phishing scams, using technology that might come from Google.

     

    The phishing shield is a key new security feature planned for Firefox 2, slated for release in the third quarter of this year, Mozilla's Mike Shaver said in an interview Tuesday.

     

    "Everybody understands that phishing is a significant problem on the Web," said Shaver, a technology strategist at the company, which oversees Firefox development. "We are putting antiphishing into Firefox, and Google is working with us on that."

     

    With the continued rise in online attacks, security tools have become something Web browser makers can use to try to stand out. Microsoft plans to include features to protect Web surfers against online scams in Internet Explorer 7, due later in 2006. Similar functionality is already in Netscape 8 and Opera 8, both released last year.

  7. Symantec has settled a lawsuit with Hotbar.com over the security firm's right to label the Hotbar application as low risk adware and remove it from users' systems.

     

    Under the terms of the settlement, Hotbar acknowledges that Symantec's security software will detect the application, brand it as 'low risk' and assist users in removing it.

     

    Symantec filed the lawsuit in June 2005 in response to a 'cease-and-desist' letter sent by the adware maker.

     

    "Through our risk evaluation process we classify various adware programs in three categories: low risk, medium risk and high risk," David Cole, a director with Symantec Security Response, said in a statement.

     

    http://www.vnunet.com/vnunet/news/2150984/...low-risk-adware

  8. Let's face facts. We knew this was coming for years, we just didn't want to admit it to ourselves. Virus programmers?the real kind, not the script kiddies?are far too competent at what they do to have remained noncommercialized forever. No longer merely an ugly toy for troublemakers, the 21st century virus is poised to climb the economic ladder and establish itself as a commercial tool of choice for identity thieves and financial fraudsters.

     

    Engineers at Panda Software, while in the process of researching a new trojan, uncovered evidence this week that led them to a web site touting custom-built viruses for sale. For the low, low price of only US$990, a user gets his or her own pet trojan horse, complete with tech support. If the file is discovered?as this current model was?the designer provides a guarantee to alter it so that it may continue to avoid detection in the face of updated antivirus software.

     

     

     

    Source: http://arstechnica.com/news.ars/post/20060225-6264.html

  9. As was widely predicted earlier in the week, exploits have already appeared for one of the vulnerabilities rated critical and patched by Microsoft on Tuesday 14th. Two ?proof of concept? pieces of code were posted on the Bugtraq list and, according to experts, are ?minutes or days away from being completed?.

     

    The vulnerability itself stems from a problem in the way many releases of the Microsoft Media Player (from version 7.1 up to 10) handle bitmap image files. This potentially allows an attacker to exploit arbitrary code on the victim machine and gain full control over it. The way in which this vulnerability can be exploited is very similar to the recent WMF issue. All that is needed from the user is to open a specially constructed bitmap file with the Media Player. Microsoft has claimed that it is quite unlikely that the Media Player would be configured to do that. However they also concede that many users will have Internet Explorer launch automatically in order to view different types of online media content. Attackers can exploit this configuration, and it appears that they are very close to unleashing malware based on this exploit on unpatched users.

     

    In recent weeks it has been highlighted that the speed with which attackers rustle up new exploits seems to be increasing in a race with software creators like Microsoft, who have also speeded up when releasing patches for new vulnerabilities. Attackers are so keen to use every opportunity that they even release exploits for flaws that are already patched, hoping to catch out users who have not heeded the advice to immediately install critical updates. This means that even though there is generally a lesser time gap between the publication of a vulnerability and a patch for it appearing, it is offset by the equally smaller time gap between publication and the appearance of exploits for the flaw.

     

    Any users who have not yet patched their systems for the Media Player bitmap vulnerability should do so immediately. The patch can be downloaded from Microsoft TechNet or via the automatic update facility.

     

     

     

    Source: http://www.viruslist.com/en/news?id=180268032

  10. Please be informed that the Microsoft Baseline Security Analyzer (MBSA) v1.2.1 will be discontinued on March 31, 2006. After this date, MBSA 1.2.1 will no longer be supported and the MSSecure.xml file that is automatically downloaded by MBSA 1.2 will no longer be updated to include new security bulletins. Microsoft encourage you to migrate to MBSA 2.0 before this date to guarantee continued security bulletin detection.

     

    More info in Microsoft KB895660 and in Microsoft Baseline Security Analyzer page.

  11. The first worm (mass mailer) to (ab)use the WMF 0day is now spreading in Australia.

     

    Our initial reports indicate the worm is not massive, however it steals financial information from users (Phishing Trojan from a known group) it infects and is causing quite a buzz in Australian media. We expect it to break as a full-blown media hype this morning, tops tomorrow morning.

     

    The worm *does* do the said damage, but as we said does not seem to be widely spread. No reports outside of Australia have been received as of yet.

     

    The emails themselves do not contain the payload, but rather a URL to sites that will infect users. Both the sites that did this are now down, I expect the next one to be up soon (or the bad guys will just get a new variant out in a few days). Abusing websites is mostly how WMF is exploited, but no much in the way of emails before today.

     

    (almost) All anti virus vendors do not detect this worm (it?s new), a couple detect it heuristically. (almost) All anti virus vendors detect the attachment regardless because of the WMF exploit detection routines.

     

    Hopefully, all AV companies will detect this soon. I know most will.

     

     

    Source: http://blogs.securiteam.com/index.php/archives/293

  12. Microsoft Corporation is expected to publicly unveil its OneCare Live security subscription suite this summer, offering it to the consumer market for $50, or as embedded software with newer versions of its other software solutions. While Microsoft is clearly the world's largest software solutions provider, over the years its software has experienced inefficiencies and bugs. BitDefender believes this has cost businesses and consumers millions - if not billions of dollars in lost productivity.

     

     

    Microsoft's current security solutions have recently detected antivirus software from vendors including Symantec and BitDefender as spyware (see: http://tinyurl.com/dhzzd).

     

    "Microsoft fixed this problem with us in about a week. It's part of Microsoft flexing its muscles and displaying its tactics in the lucrative security market," commented Mihai Radu, BitDefender's worldwide communications manager. "In the antivirus industry, the best reaction time is from two to 10 hours. Do you actually believe that Microsoft will succeed in updating its products in two hours?"

     

    "Consumers who really care about security will want more than what Microsoft will offer. BitDefender offers the possibility for consumers to choose their level of protection, and how they wish to be protected. We believe it's important to give users these options. BitDefender has already succeeded in taking market share from other industry-leading, monolithic, heavily entrenched companies and has become one of the preferred security brands in Europe. We don't have anything to lose from Microsoft," added Radu.

     

     

    Source: http://home.businesswire.com/portal/site/g...184&newsLang=en

  13. German DVDs of the movie 'Mr. and Mrs. Smith' carry a digital rights management (DRM) software with rootkit features, according to F-Secure. Settec Alpha-DISC copy protection hides its processes from the user, but unlike the Sony XCP rootkit it cannot hide other files and programs, making it less of a threat. Settec offers an uninstaller for its DRM, but F-Secure vice-president Antti Vihavainen argues that program should never hide themselves from users or the administrators responsible for the maintenance of a machine.

     

    Source: http://www.eweek.com/article2/0,1759,1926917,00.asp

  14. The policy statement titled the National Strategy to Secure Cyberspace has reached its third anniversary, and a panel of experts agreed that, while "progress has been made in the past three years", cyberattacks have also advanced during the same period. The policy "called for the government to work with private industry to create an emergency response system to cyberattacks and to reduce the nation's vulnerability to such threats". Information sharing between the private sector and the government accounts for much of the progress, with the international exercise "Cyber Storm" cited as an example. Many areas still require attention, and experts identified software security, anti-phishing initiatives, the need for new cybercrime laws, and industrial espionage as some of them.

     

    http://news.com.com/Panel+sees+progress+ma..._3-6039677.html

  15. Microsoft Chairman and Chief Software Architect Bill Gates used his RSA Security conference keynote Tuesday to outline a future where passwords have gone the way of the dinosaur, multi-factor authentication is the norm and cyberspace functions within a "trust ecosystem."

     

    Gates said trust ecosystems exist in the physical world, where those who break the trust can suffer a damaged reputation or be convicted of a crime. He said the concept must be extended to the Internet through more trustworthy code and devices, and outlined steps the software giant is taking to get there.

     

    "Passwords are the weak link," Gates told his audience. "We need to move in the direction of smart cards, and multi-factor authentication must be built into the system itself. We need the ability to track what goes on and have a built-in recovery system."

    .......

     

     

    Source: http://searchsecurity.techtarget.com/origi...1166552,00.html

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.