April 2006 brought news of e-mail trying to lure recipients into calling toll-free phone numbers. Automated voice systems on the other end of the numbers were used to request personal info, supposedly for Chase Bank. (Credit Card #, PIN, Etc.)
Bait has been taking other forms as phishers have been testing VoIP systems. VoIP bots are calling individuals directly with "account requests". And it works, people have been conditioned to recognize such scams via e-mail, but their guard is down when they receive a request on their phone.
In a fairly related matter, there was a recent endeavor to use SMS messages to lure recipients into visiting a website to "unregister" from a sham dating service, or else be charged $2USD. The process was an effort to install a Backdoor Trojan. The SMS numbers were spammed in bulk to numbers in the UK and Iceland. (The Irreal Dating site is still currently online.)
We could predict that it's only a matter of time before phishers try SMS as a vector. It seems likely that someone could be tempted into clicking on a phone/web link within an SMS, only to be directed to an automated phishing net. We could predict, but in fact - it's reportedly already happened in China last October.
Bottom line: When it comes to requesting your personal data, don't trust ANY source.
Security Bulletin FSC-2006-4 was released today in regard to several F-Secure Anti-Virus products. The bulletin and issued hotfixes address two separate scenarios that can both lead to malware bypass.
Home users of our products will receive hotfixes automatically and will not need to take individual action. System administrators will want to read the bulletin to determine if any of the patches are necessary, and then apply them to their systems.
Our guidance here is the same as for patches from any other vendor: Patch now before there is an exploit for the vulnerabilities.
Precedent Events: On February 1, 2006 we blogged about a variant of the Breplibot worm (Breplibot.AE) that was being distributed via mass amounts of spam. That spam was using the name of "David Adams" and spoofed the F-Secure domain name.
Current Events: Police in the UK and in Finland have recently taken suspects into custody for computer related criminal activity. Additional details can be found here (YLE) and here (BBC).
We'd like to offer our thanks to the UK and Finnish investigators for their efforts.
It's midyear and time for our semiannual data security summary. Mikko's video (13min) was shot on our office roof for this occasion. It was a very fair, sunny day in Helsinki.
The wrap-up is available here, and includes a variety of video formats as well as audio. Download it for your iPod or other media device.
The video's topics include: Twenty Years of Viruses, WMF Exploit, Nyxem, Macintosh Viruses, Rootkits, Mobile Viruses, and Spear Phishing. Mikko looks very earnest in the video, but don't panic, that's probably due to the brightness of the sun.
Many of our readers have probably heard of Alternate Data Streams (ADS) on NTFS. They're not that well documented and there are only a few tools that can actually handle them. Lately we've been looking at variants of the Mailbot family that use hidden streams to hide themselves.
Let's take Mailbot.AZ (aka Rustock.A) as an example. There's only a single component lying on the disk, and that is a kernel-mode driver. It's stored as hidden data stream attached to the system32 folder (yes, folders can have data streams as well)! Saving your data into Alternate Data Streams is usually enough to hide from many tools. However, in this case, the stream is further hidden using rootkit techniques, which makes detection and removal quite challenging. Because Mailbot.AZ is hiding something that's not readily visible, it's very likely that many security products will have a tough time dealing with this one.
We've just released a new version of our BlackLight rootkit scanner (Build 2.2.1041) that can detect current variants of Mailbot.
As you can see from the strings inside the malware, Mailbot.AZ also attempts to detect and avoid some of the more popular rootkit detectors:
What about removal? Removing a hidden data stream, especially one attached to a Windows system directory, is quite tricky. Since the rootkit is also active in Safe Mode, the easiest solution is to reboot to Windows Recovery Console and write out the data stream from there. You can do this by copying a suitable file on top of the stream ("copy c:\windows\SomeNonExecutableFile c:\windows\system32:18467"). The copy operation won't succeed, but it will clear out the stream.
Microsoft June Updates - MS06-025 has a known issue with dial-up connections that use a terminal window, or dial-up scripting. It's an "older technology that is rarely used".
Our World Cup Poll - The greatest number of votes (18.9%) was for Brazil. It seems that our readers agree with the rest of the IT community.
Our New Banner - If you use an RSS reader, you may not have noticed that the weblog banner photo has been updated. If you want a closer view, there may be an Easter egg on the site somewhere�
Yahoo Phishing - Yahoo-Members.com has been offline for at least a week.
T2'06 Reverse Engineering Challenge - There is a winner, so the prize is claimed, but the challenge is still available here. Several of our researchers discovered a new evening hobby and lost time for playing WoW.
The Da Vinci Code Mobile Virus - We never acquired a sample so its existence remains a mystery. It may have been just a local infection that failed to replicate further. That crazy monk that followed us around insisted that we should leave it alone�
Since the FIFA World Cup is in progress, it's not such a surprise that another Soccer themed worm, Delf.V, has been discovered. The worm sends itself in e-mails that look like they come from news at CNN, Hotmail or Yahoo! domains, and uses various subjects such as "Soccer fans killed five teens", "Crazy soccer fans", etc. This worm is not widely spread; it doesn't even show among the first 50 in our virus statistics.
FSAV has detection with update version 2006-06-20_01.
Hypothetical One: There's a wallet lying on the ground outside of your office building. It almost certainly contains confidential information. Would you pick it up, open it, determine to whom it belongs, and take steps to return it to them? Many/most people would probably try to be helpful in such a situation.
Hypothetical Two: There's an open box of chocolates lying on the ground outside of your office building. It appears to contain delicious treats. Do you put a piece in your mouth and taste? Most people would probably either ignore the box or put it in a nearby trashcan.
So why did people pick up a USB stick and then insert it into their computer during a security audit as was written about here? Perhaps because USB sticks are so cool�
Or perhaps training often only includes what not to do (a list too long to ever be complete) rather than how to think about the computers within a secure environment. To the non-security minded (regular people), inserting a USB stick is more likely akin to opening a wallet and examining the contents. There is little danger of physical harm. But if training included an analogy that such an action was more like inserting a potentially bacteria covered and unknown flavor of candy into your mouth, well then, you'd probably think twice. You never know what you're going to get. Training needs to put people in the place of the computer, not just teach them what to do with it.
Social engineering, the bypassing of security systems via the manipulation of its human users, is a challenge for any security service provider. Documented examples of failures aren't difficult to find. If you, our weblog readers have any success stories that you'd like to share with the rest, please submit them to the e-mail address listed at the top of our web page. Cheers.
We received several new variants of the Breplibot backdoor a short time ago. This backdoor is capable of downloading and running files on an infected computer. Detection of these Breplibot variants with F-Secure Anti-Virus is available in the 2006-06-16_03 update.
The June security update has something for nearly everyone. Microsoft released twelve updates addressing various issues yesterday. There are several for different flavors of Windows and IE, and others for Word (MS06-027), PowerPoint (MS06-028), and Media Player 10 (MS06-024).
The patch for Word fixes an issue that was blogged about in May. The PowerPoint includes versions for Windows and Mac - though the vulnerability is not likely to exploit either OS. Additional analysis is available here.
Edited to add: Here's some more information on the patches available and what they fix. Several of them have exploits. Update your systems soon.
The operations of the iframecash.biz gang has been covered in our blog before. Basically, they've been buying traffic from anybody who's been willing to sell it to them - then they use exploits to take over innocent surfer's computers and install trojans and spyware on them.
Now, the good news is that at least for the present, their main site www.iframecash.biz is offline. Hopefully it stays that way.
The Yamanner worm does not send itself as an attachment, it resides inside the e-mail body. The worm activates automatically by just opening an infected e-mail message with Internet Explorer. It uses a 0-day vulnerability in Yahoo! webmail system.
The infected e-mail sent to Yahoo! users look as follows:
Subject: New Graphic Site Body: Note: forwarded message attached.
This type of worm is not a surprise - it has been theorized since at least 2001. Yamanner is however the first worm to be realized in the wild.
Yeah, the football World Cup starts *today* in Germany.
It will be interesting to see if there will be any virus-related incidents during the games. Over the last months we've already seen a couple of e-mail viruses and phishing scams trying to cash in with the popularity of the games.
We will also be monitoring what's happening at the stadiums themselves. You might remember that during the World Championships in Athletics last year there were bluetooth virus problems at the stadium. This happens easily when you gather tens of thousands of people from all over to world to a very small area - and everybody has a phone in their pocket.
While we're on the topic, lets see who's going to win the games. Here's our poll:
Click here if your RSS reader doesn't display the poll.
PS. It seems that if you search for the words "world cup" in Google, it will show you the match schedules...
There was a short period of time today in which F-Secure Anti-Virus detected "Trojan-Downloader.Win32.Zlob.obfuscated" in several different files. This was a false alarm.
The problematic update was 2006-06-07_01, and the issue was resolved with the next update number 2006-06-07_02. We are sorry for any inconvenience that this false alarm might have caused to our customers.
Right-click on the Desktop Create a new Shortcut Point the location of the item to any executable... such as: c:\windows\system32\calc.exe Name the shortcut, for example, www.microsoft.com Start Internet Explorer (IE5 and IE6 work best) Type "www.microsoft.com" into the address bar Enjoy.
Cheers to Per Hellqvist. More info can be found from here.
Our team is growing. And consequently our weblog photo is becoming more and more out-of-date. Three faces have moved on and many additional ones need to be added. We get e-mail asking about this from time to time� So due to popular demand, coming soon, a new weblog banner photo!
This has been the photo for the last two and half years:
On March 17th we took some photos on the Baltic Sea - To be more precise, on the frozen canal outside of our Helsinki office. Time passed and we ended up not using those photos.
Now, with some recently hired employees, we have a still larger and even more international team. The preview photo below includes persons from: Finland, Philippines, USA, Bulgaria, Russia, Poland, Italy, India, Hungary, and Sweden.
We should have the banner updated before the end of the year.
The mails do not contain an attachment. There aren't any scripts in them either. The numbers keep changing though? So what are they? We're not sure, but it might be that some botnet herder is checking the quality of his email lists: finding out which messages bounce and which don't.
One of our researchers, Sami Rautiainen, produced a paper for the Virus Bulletin Conference in September of 2003 on the topic of OpenOffice Security. The conclusions that he reached: The macro language and the API of OpenOffice are very powerful, but unfortunately the power can be abused for malicious purposes. The security settings in the default installation of OpenOffice much resembles older versions of Microsoft Office. You can download the paper in PDF format here.
That was then, and now� we have a proof-of-concept sample for OpenOffice.org named Stardust.A. This thing is very buggy and is not something in the wild, it's classified as intended, but it's interesting to note that the waters are indeed being tested.
Updated to Add: Terms used in this post were updated on June 6, 2006.
LISTSERV was the first e-mail list management software available. It was originally developed by Eirc Thomas in June of 1986. That means that this month is the product's 20th Birthday! That's quite a grown-up software app. As millions of L-Soft's messages are protected by our product each day, we'd like to congratulate our partner on their two decades old product. Here's to many more.
We've today released security bulletin FSC-2006-3 which covers a buffer overflow vulnerability in the web console of two of our products: F-Secure Anti-Virus for Microsoft Exchange 6.40 and F-Secure Internet Gatekeeper 6.50, 6.42, 6.41, 6.40.
If you're running these products, please read our bulletin and apply the patch. Do note that by default the web console does not allow connections from other hosts, limiting the scope of this vulnerability.
We're not aware of any known exploit code that would exploit this vulnerability. But patch anyway.