Sunday, March 29, 2009
Thursday, March 26, 2009
XPAntiVirus2009 Morphs Into FileFix Professional 2009

There is some good new. There's a free service called the FileFix File Decrypter will decrypt the data for free. Score: Bad Guys 1/Good Guys 1.
Labels: vundo
Sunday, March 22, 2009
Video: Basic Nessus
Basic Nessus from John Strand on Vimeo.
Labels: how to, john strand, nessus
Saturday, March 21, 2009
Efforts to combat Conficker worm an arms race
Yesterday came word that Conflicker has evolved again, and continues to find ways to confound and frustrate security researchers. A new analysis of Conficker by SRI International reports: "In addition to the dual layers of packing and encryption used to protect A and B from reverse engineering, this latest variant also cloaks its newest code segments, along with its latest functionality, under a significant layer of code obfuscation to further hinder binary analysis."
Related Story: Conficker/Downadup Evolves
Labels: conflicker
Friday, March 20, 2009
Basic Wireshark Video
Basic Wireshark. from John Strand on Vimeo.
Labels: wireshark ethereal
Wednesday, March 18, 2009
New Fake AntiVirus warning screen
Click on the picture of a better view.
This is another example of how malware writers continue to excelerate the arms race in the battle of keeping users from clicking on things.
If you see a screen like this kill it from the process viewer. There has been reports clicking anywhere on this screen will cause infection. In this case the user was looking for NCAA brackets using a Google search. Thankfully he called to report the incident before taking any other action.
Related Story: NCAA March Madness Malicious Blog Links
Labels: Antivirus2009, fake antivirus, Malware
Sunday, March 15, 2009
Another video on wireless security
DojoSec Monthly Briefings - February 2009 - Jesse Varsalone from Marcus Carey on Vimeo.
Labels: dojosec, wep, wireless security
Basic Nmap Video
Basic Nmap part 2 from John Strand on Vimeo.
Labels: john strand, nmap, PaulDotCom
Friday, March 13, 2009
British Law Firms Increase Employee Surveillance
IT heads at the top 20 firms admit that they are particularly wary of confidential material being downloaded into a transportable form now that the credit crunch has begun to bite and is costing jobs both internally and among their top financial institution clients.
At magic circle giant Allen & Overy (A&O), which last month announced jobs cuts affecting 9% of its workforce, IT director Jason Haines said: “Most law firm employees are bound by a professional conduct code but we would be careless if we weren’t being a bit more vigilant.”
The pressure is arising not only out of concerns that disgruntled employees may download firm precedents and other closely guarded intellectual property, but out of the need to meet a higher security bar imposed by many clients in relation to confidential material.
Addleshaw Goddard’s head of IT Graham van Terhayden said: “Clients want to do extra audits and are asking more questions about our capability and redoubling their questions.
“The more clients ask the question, the more we will focus on it.”
While many of the top firms have long banned access to social networking sites such as Facebook, the majority allow lawyers to use mobile media such as USB keys.
But where some firms are still monitoring activity on an ad hoc basis, others have rolled out constant surveillance of all employees.
Malware is big money
Labels: computer crime, Malware
Conficker/Downadup Evolves
Dark Reading further reports:
The new variant, which Symantec calls W32.Downadup.C, appears to have defensive capabilities that weren't present in earlier versions. While it spreads in the same manner, "Conficker.C" can disable some of the tools used to detect and eradicate it, including antivirus and other antimalware detection tools.
W32.Downadup C also can switch domains at a much greater rate, Symantec said. "The Downadup authors have now moved from a 250-a-day domain-generation algorithm to a new 50,000-a-day domain generation algorithm," the researchers reported. "The new domain generation algorithm also uses one of a possible 116 domain suffixes."
A report from CA about Conficker.C confirms Symantec's findings, although the CA researchers said the jump from 500 to 50,000 domains will not occur until April 1.
The ability to quickly switch domains will make it difficult for Internet security organizations, such as ICANN and OpenDNS, to block the domains used by the worm, industry experts note.
The new variant emerges just as some vendors have come out with tools they say will eradicate the worm. today issued a new, free toolz that it says will remove Conficker.A and Conficker.B from infected machines. A spokesman says the company has begun work on the new variant. And BitDefender also is offering a free tool it says will remove all variants of the worm.
Perhaps the most disconcerting aspect of the worm is that although it has reportedly infected hundreds of thousands of machines, it does not, as yet, seem to have a purpose. Although it has been contacting domains and spreading itself through various means, security experts say it has yet to be given a task -- such as distributing spam or launching a DDoS attack -- and researchers are still uncertain as to what it might be used for.
And some experts say there may be other exploits that behave like Conficker/Downadup. "BitDefender Labs has been seeing an increase in worms, like Downadup, that have a built-in mathematical algorithm, generating strings based on the current date," says Vlad Valceanu, BitDefender's senior malware analyst. "The worms then produce a fixed number of domain names on a daily basis and check them for updates. This makes it easy for malware writers and cybercriminals to upgrade a worm or give it a new payload, as they only have to register one of the domains and then upload the files."
The AV vs virus writer arms race continues. The bad guys always seem to be one step ahead, but with a worm as big as Conficker/Downadup AV researchers are watching this situation closely.
Labels: downadup/conflicker, symantec
Wednesday, March 11, 2009
ARP spoofing attacks on web sites
This is exactly what happened in both incidents I was involved in. A server on a local subnet was compromised and the attacker installed ARP spoofing malware (together with keyloggers and other Trojans) on the machine. The ARP spoofing malware poisoned local subnet so the outgoing traffic was tunneled through it. The same malware then inserted malicious JavaScript into every HTML page served by any server on that subnet. You can see how this is fruitful for the attacker – with one compromised server they can effectively attack hundreds of web sites (if it’s a hoster indeed).
The ARP spoofing malware they used was relatively common, but still AV detection was miserable with major AV programs missing it (both compromised machines had up to date AV programs installed).
This is another example of how we cannot depend on antivirus programs to protect against all threats.
Sunday, March 08, 2009
Scary video: Cracking your WPA/WPA2 catchphrase no clients.
Thursday, March 05, 2009
No patch coming on Tuesday for Excel zero-day
Tuesday, March 03, 2009
WORM_KOOBFACE.AZ worm spreading via Facebook and other social networking sites
The TrendLabs Malware Blog has a very good description of what these fake messages look like and how this thing spreads.
Monday, March 02, 2009
Mass mailing worm delivers Trojan.Vundo payload
They have a nice graph of how the attack vector works.
Labels: symantec, Trojan.Vundo