Tag: Malware

  • Hacker Infects His Computer With Own Virus!

    Crackpots come in all hues!

    Cyber-security experts turned the tables on an alleged hacker by using his own malware to film him through his own laptop webcam.

    Specialists from Georgia’s Computer Emergency Response Team (CERT-Georgia) tricked a man they claim has been targeting their networks by hiding the virus inside a file titled ‘Georgian-Nato Agreement’.

    After the attacker stole that archive from an infected PC in their lab, they were able to seize control of his computer and capture video of him at work.

    The team also claim to have found out his home city, internet service provider and email addresses, as well as information that links him to Russian security agencies and other hackers in Germany.

    CERT-Georgia’s experts had been investigating a botnet which had infiltrated the computers of politicians, civil servants, banks and NGOs in Georgia, the U.S., Canada, Ukraine and several other countries.

    They found that the attackers had planted malicious links to install the malware on specific news-site webpages that would be of interest to the kinds of people they wanted to target.

    ‘[The] threat was highly encrypted and used contemporary stealthy techniques, so that none of security tools could identify it,’ the team said in a 27-page report into their investigation.

    Once installed, the virus seized control of the targeted computer, rifling its hard drives to search for Word and .pdf documents containing sensitive words like ‘USA‘, ‘NATO‘, ‘Russia’ and ‘CIA’.

    article-2225743-15C6C1E0000005DC-665_634x401.jpg
    The Hacker who Infected His Computer,

    _WHAT IS A BOTNET?

    A botnet is a collection of internet-connected computers over which a hacker has seized control.

    Each compromised machine – known as a ‘bot’ – is created when a computer is infected with malicious software (malware) which allows the hacker to direct its activities remotely.

    These infections can be accomplished by luring users into making a drive-by download, exploiting web browser vulnerabilities, or by tricking the user into running a Trojan horse program, which may come from via email.

    This malware will typically install modules that allow the computer to be commanded and controlled by the botnet’s operator.

    Depending on how it is written, a Trojan may then delete itself, or may remain present to update and maintain the modules.

    The malware also scanned the computer’s local network for find other hosts to infect, took screenshots, and took control of embedded webcams and microphones on machines to eavesdrop on targets.

    The investigation found the infiltration began as early as March 2011, with the virus undergoing a series of modifications as hackers tried to stay one step ahead of whatever security measures were used against it.

    CERT-Georgia’s experts found that whenever they were able to trace the botnet’s command and control servers, to which files were being uploaded, the hackers would switch the destination country and IP address.

    To fight the infections, the team blocked these IP addresses as soon as they were detected then cooperated with anti-virus software companies and foreign intelligence agencies to develop countermeasures.

    http://www.dailymail.co.uk/sciencetech/article-2225743/Alleged-hacker-caught-camera-cyber-security-experts-infect-HIS-OWN-virus.html#ixzz2AsramxIF 

     

    Enhanced by Zemanta
  • BE Careful Browsing At Hotels’ Internet

     

    The FBI sent an advisory on the fact that Professional Scammers are using Hotel Internet connection to infect your Laptops and Mobiles.

     

    Better to have your own portable connectivity.

     

    Story:

     

    Wi-Fi Alliance logo
    Wi-Fi Alliance logo (Photo credit: Wikipedia)

     

    Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while establishing an Internet connection in their hotel rooms.

     

    Recently, there have been instances of travelers’ laptops being infected with malicious software while using hotel Internet connections. In these instances, the traveler was attempting to setup the hotel room Internet connection and was presented with a pop-up window notifying the user to update a widely-used software product. If the user clicked to accept and install the update, malicious software was installed on the laptop. The pop-up window appeared to be offering a routine update to a legitimate software product for which updates are frequently available.

     

    The FBI recommends that all government, private industry, and academic personnel who travel abroad take extra caution before updating software products on their hotel Internet connection. Checking the author or digital certificate of any prompted update to see if it corresponds to the software vendor may reveal an attempted attack. The FBI also recommends that travelers perform software updates on laptops immediately before traveling, and that they download software updates directly from the software vendor’s Web site if updates are necessary while abroad.

     

    Anyone who believes they have been a target of this type of attack should immediately contact their local FBI office, and promptly report it to the IC3’s website atwww.IC3.gov. The IC3’s complaint database links complaints together to refer them to the appropriate law enforcement agency for case consideration. The complaint information is also used to identify emerging trends and patterns.

     

    http://www.ic3.gov/media/2012/120508.aspx

     

    What can travelers do about these potential hotel Wi-Fi drive-by attacks? Focus on these nine information security essentials:

     

    1. Update Before Leaving Despite the inevitable last-minute rush to get the bags packed, don’t forget to install the latest application and operating system security updates onto your laptop, smartphone, and tablet before heading out. Also ensure that antivirus software is running on the device, and is likewise fully updated.

     

    [ Everybody is worried about security. Read Security Top Concern Of Federal CIOs. ]

     

    2. Block Pop-Ups Never, ever click on a pop-up window. “No major, reputable site requires a pop-up to work or function,” said Kapil Raina, director of product marketing at Zscaler, via email. Preferably, configure your browser to block all pop-ups, so that no one using your computer–such as family members–can click on one.

     

    3. Handle Free Wi-Fi With Caution The FBI advisory highlights the need to treat all free hotspots with caution. The problem, however, is that people often throw caution to the wind when presented with free stuff, such as USB keys or wireless access, and even if they’re likely to be security-aware types attending a conference in the heart of Amsterdam filled with known hackers. That’s what Steve Lord, a director at information security consultancy Mandalorian, discovered at this year’s Black Hat Europe conference, when he installed a free Wi-Fi hotspot with the name “LEGITFREEWIFI.” Sounds trustworthy, right? At least some of the attendees, who should have known better, used the hotspot with abandon.

     

    4. Read Hotel Wi-Fi Directions Avoid connecting to fake hotspots by verifying which network actually belongs to the hotel. “If you must connect to a hotel Wi-Fi network, verify with the front desk the exact procedure (SSID name, process for payment, etc.),” said Zscaler’s Raina. “You do not want to connect to a fake access point. Some hotels have direct connections (physical cables) you may opt for. In some cases, consider using your phone via 3G/4G as the connection point rather than Wi-Fi.”

     

    5. VPN Tunneling Secures Free Wi-Fi But Mandalorian’s Lord, who deleted all data intercepted by his “weaponized hotspot,” emphasized that he could have given his hotspot the same name as the hotel’s hotspot, though didn’t do so because he feared it would break the law. Of course, criminals would likely have no such compunctions. On that note, the best way to easily block such attacks is to use VPN tunneling. In fact, it’s always a good idea–whether at home or abroad–to use a VPN whenever connecting to free Wi-Fi, since such hotspots, by their nature, aren’t secure. Indeed, anyone can easily sniff wireless non-SSL traffic, unless it’s routed via a VPN. Free, reputable VPN software is widely available for both PC and Mac (and in some cases, Linux), including Hotspot Shield from AnchorFree, the open source OpenVPN (Windows/Mac/Linux, Free), and Shrew Soft’s VPN Client, as well as built-in VPN tools in both Apple OS X and Windows.

     

    6. Download Software Updates Directly From Vendors While surfing the Web via hotel Wi-Fi, ignore all unsolicited software-update offers. “Download software updates directly from the software vendor’s Web site if updates are necessary while abroad,” according to the IC3 advisory. Anything else may be a scam. Also don’t be afraid to verify security warnings by using another computer.

     

    7. Beware Wired Hotel Connections Hotel hotspots aren’t the only types of connections that can be compromised. According to news reports, systems at iBAHN–one of the world’s largest providers of Internet services for hotels–were compromised last year. Although the company denied it had been hacked, any attacker who could successfully hack into that type of network would be able to serve up malware to anyone using a hotel network, even if they were connected via Ethernet cable.

     

    8. Consider Using A “Burner” Laptop When traveling, one of the best ways to stay secure is simply to stay off the grid. If that’s not an option, consider using a temporary, or “burner,” laptop, such as an old laptop (personal) or extra machine (work). “Some companies now have policies where employees who travel abroad travel with a disposable laptop to ensure that no [intellectual property] or secrets available on their machines are stolen,” said Rob Rachwald, director of security strategy at Imperva, in a blog post.

     

    9. Don’t Be Afraid To Hibernate Finally, if your computer has signs of infection, put it to sleep. “If you believe that you were hit, put your computer in hibernate or sleep mode until you can get expert help in repairing or restoring the system,” said Raina at Zscaler. “Taking the system offline as fast as possible can prevent further data [exfiltration] and damage.”

     

    http://www.informationweek.com/news/security/mobile/240000211

     

  • Beware of New Facebook Malware

     

    A new Malware doing the rounds with an email stating that some one has uploaded a photo.

    Avoid clicking and delete  the message.

    Be careful about opening emails that claim you have been tagged in a Facebook photo, because they may actually be malware, according to a security expert.

    Sophos’s NakedSecurity blog outlined the threat on Wednesday. The company’s SophosLabs intercepted a “spammed-out email campaign” which was designed to spread malware. Sophos provided the following example:

    Malware
    Malware in Facebook

     http://mashable.com/2012/07/18/facebook-photo-notifications-malware/

     

     

     

  • How to Control Your Internet Privacy-MI 5

    In its site MI 5 has pointed out the controls needed to prevent cyber attacks.

    English: A candidate icon for Portal:Computer ...
    English: A candidate icon for Portal:Computer security (Photo credit: Wikipedia)

    Follow link at the bottom.

    20 critical controls for effective cyber defence

    Article Summary

    The Top Twenty Critical Security Controls are a baseline of high-priority information security measures and controls that can be applied across an organisation in order to improve its cyber defence. The controls (and sub-controls) focus on various technical measures and activities, with the primary goal of helping organisations prioritise their efforts to defend against the current most common and damaging computer and network attacks.

    The Centre for the Protection of National Infrastructure is participating in an international government-industry effort to promote the top twenty critical controls for computer and network security. The development of these controls is being coordinated by the SANS Institute.

    The controls (and sub-controls) focus on various technical measures and activities, with the primary goal of helping organisations prioritise their efforts to defend against the current most common and damaging computer and network attacks. Outside of the technical realm, a comprehensive security program should also take into account many other areas of security, including overall policy, organisational structure, personnel issues and physical security. To help maintain focus, the twenty controls do not deal with these important but non-technical aspects of information security.

    The twenty controls and supporting advice are dynamic in order that they recognise changing technology and methods of attack. All twenty controls, together with a brief description, are given below. For further information, visit the SANS website.

    CONTROL 1 – INVENTORY OF AUTHORISED AND UNAUTHORISED DEVICES

    Reduce the ability of attackers to find and exploit unauthorised and unprotected systems. Use active monitoring and configuration management to maintain an up-to-date inventory of devices connected to the enterprise network, including servers, workstations, laptops, mobile, and remote devices.

    CONTROL 2 – INVENTORY OF AUTHORISED AND UNAUTHORISED SOFTWARE

    Identify vulnerable or malicious software to mitigate or root out attacks. Devise a list of authorised software for each type of system, and deploy tools to track software installed (including type, version, and patches) and monitor for unauthorised or unnecessary software.

    CONTROL 3 – SECURE CONFIGURATIONS FOR HARDWARE AND SOFTWARE ON LAPTOPS, WORKSTATIONS, AND SERVERS

    Prevent attackers from exploiting services and settings that allow easy access through networks and browsers. Build a secure image that is used for all new systems deployed to the enterprise, host these standard images on secure storage servers, regularly validate and update these configurations, and track system images in a configuration management system.

    CONTROL 4 – CONTINUOUS VULNERABILITY ASSESSMENT AND REMEDIATION

    Proactively identify and repair software vulnerabilities reported by security researchers or vendors. Regularly run automated vulnerability scanning tools against all systems and quickly remediate any vulnerabilities – with critical problems fixed within 48 hours.

    CONTROL 5 – MALWARE DEFENCES

    Block malicious code from tampering with system settings or contents, capturing sensitive data, or spreading. Use automated anti-virus and anti-spyware software to continuously monitor and protect workstations, servers, and mobile devices. Automatically update such anti-malware tools on all machines on a daily basis. Prevent systems from using auto-run programs to access removable media.

    CONTROL 6 – APPLICATION SOFTWARE SECURITY

    Scan for, discover, and remediate vulnerabilities in web-based and other application software. Carefully test internally developed and third-party application software for security flaws, including coding errors and malware. Deploy web application firewalls that inspect all traffic, and explicitly check for errors in all user input (including by size and data type).

    CONTROL 7 – WIRELESS DEVICE CONTROL

    Protect the security perimeter against unauthorised wireless access. Allow wireless devices to connect to the network only if they match an authorised configuration and security profile and have a documented owner and defined business need. Ensure that all wireless access points are manageable using enterprise management tools. Configure scanning tools to detect wireless access points.

    CONTROL 8 – DATA RECOVERY CAPABILITY

    Minimise the damage from an attack: Implement a trustworthy plan for removing all traces of an attack. Automatically back up all information required to fully restore each system, including the operating system, application software, and data. Back up all systems at least weekly; back up sensitive systems more often. Regularly test the restoration process.

    CONTROL 9 – SECURITY SKILLS ASSESSMENT AND APPROPRIATE TRAINING TO FILL GAPS

    Find knowledge gaps, and fill them with exercises and training. Develop a Security Skills Assessment program, map training against the skills required for each job, and use the results to allocate resources effectively to improve security practices.

    CONTROL 10 – SECURE CONFIGURATIONS FOR NETWORK DEVICES SUCH AS FIREWALLS, ROUTERS, AND SWITCHES

    Preclude electronic holes from forming at connection points with the Internet, other organisations, and internal network segments: Compare firewall, router, and switch configurations against standards for each type of network device. Ensure that any deviations from the standard configurations are documented and approved and that any temporary deviations are undone when the business need abates.

    CONTROL 11 – LIMITATION AND CONTROL OF NETWORK PORTS, PROTOCOLS, AND SERVICES

    Allow remote access only to legitimate users and services. Apply host-based firewalls and port-filtering and scanning tools to block traffic that is not explicitly allowed. Properly configure web servers, mail servers, file and print services, and domain name system (DNS) servers to limit remote access. Disable automatic installation of unnecessary software components. Move servers inside the firewall unless remote access is required for business purposes.

    CONTROL 12 – CONTROLLED USE OF ADMINISTRATIVE PRIVILEGES

    Protect and validate administrative accounts on desktops, laptops, and servers to prevent two common types of attack: (1) enticing users to open a malicious e-mail, attachment, or file, or to visit a malicious website; and (2) cracking an administrative password and thereby gaining access to a target machine. Use robust passwords that follow known standards.

    CONTROL 13 – BOUNDARY DEFENCE

    Control the flow of traffic through network borders, and police content by looking for attacks and evidence of compromised machines. Establish multilayered boundary defences by relying on firewalls, proxies, demilitarised zone (DMZ) perimeter networks, and other network-based tools. Filter inbound and outbound traffic, including through business partner networks (“extranets”).

    CONTROL 14 – MAINTENANCE, MONITORING, AND ANALYSIS OF SECURITY AUDIT LOGS

    Use detailed logs to identify and uncover the details of an attack, including the location, malicious software deployed, and activity on victim machines. Generate standardised logs for each hardware device and the software installed on it, including date, time stamp, source addresses, destination addresses, and other information about each packet and/or transaction. Store logs on dedicated servers, and run biweekly reports to identify and document anomalies.

    CONTROL 15 – CONTROLLED ACCESS BASED ON THE NEED TO KNOW

    Prevent attackers from gaining access to highly sensitive data. Carefully identify and separate critical data from information that is readily available to internal network users. Establish a multilevel data classification scheme based on the impact of any data exposure, and ensure that only authenticated users have access to non-public data and files.

    CONTROL 16 – ACCOUNT MONITORING AND CONTROL

    Prevent attackers from impersonating legitimate users. Review all system accounts and disable any that are not associated with a business process and owner. Immediately revoke system access for terminated employees or contractors. Disable dormant accounts and encrypt and isolate any files associated with such accounts. Use robust passwords that follow known standards.

    CONTROL 17 – DATA LOSS PREVENTION

    Stop unauthorised transfer of sensitive data through network attacks and physical theft. Scrutinise the movement of data across network boundaries, both electronically and physically, to minimise the exposure to attackers. Monitor people, processes, and systems, using a centralised management framework.

    CONTROL 18 – INCIDENT RESPONSE CAPABILITY

    Protect the organisation’s reputation, as well as its information. Develop an incident response plan with clearly delineated roles and responsibilities for quickly discovering an attack and then effectively containing the damage, eradicating the attacker’s presence, and restoring the integrity of the network and systems.

    CONTROL 19 – SECURE NETWORK ENGINEERING

    Keep poor network design from enabling attackers. Use a robust, secure network engineering process to prevent security controls from being circumvented. Deploy network architecture with at least three tiers: DMZ, middleware, private network. Allow rapid deployment of new access controls to quickly deflect attacks.

    CONTROL 20 – PENETRATION TESTS AND RED TEAM EXERCISES

    Use simulated attacks to improve organisational readiness. Conduct regular internal and external penetration tests that mimic an attack to identify vulnerabilities and gauge the potential damage. Use periodic red team exercises—all out attempts to gain access to critical data and systems— to test existing defences and response capabilities.

    Prioritisation of the critical controls:

    The twenty controls are a baseline of high-priority ‘technical’ information security measures and controls that can be applied across an organisation to improve its cyber defence. In order for a control to be a high priority, it must provide a direct defence against attacks. Controls that mitigate known attacks, or a wide variety of attacks, or attacks early in the compromise cycle, all have priority over other controls. Controls that mitigate the impact of a successful attack also have a high priority. Special consideration is given to controls that help mitigate attacks that have not yet been discovered.

  • Block Virus ,Trojan in Pendrives.-Free Software.

    USB Flash Drive SuperTalent Pico-C 8 GB. Stain...
    Image via Wikipedia

    Useful software.
    Viruses spread fastly through pendrives when we use in schools, colleges and office. In order to prevent your USB Drive from getting infected, you will need to create some files on your pen drive like Autorun.inf file(Check this if you face Autorun.inf problem) and some other files which will later prevent the virus infection as these files being already created and cannot be deleted, so that virus or trojan cannot copy files and folders or create them on your USB Drive when you connect your drive to virus infected PC.

    There some freeware to vaccinate your USB drives from virus infection. I have already discussed in detail about Panda USB Vaccine 1.0.1.4 .Today I came across a similar tool called USB Defender. Its really cool !!!

    http://www.techpraveen.com/2010/07/block-virus-or-trojans-being.html