Thursday 29 March 2012

Microsoft, Financial Groups Execute Takedown of Zeus Botnet Servers

Microsoft has gone after another botnet, this time targeting some of the command-and-control infrastructure behind the Zeus network with a takedown effort that included seizing two IP addresses used for C&C servers and filing suit against 39 unnamed defendants. The action against Zeus is the latest in a string of such moves by Microsoft and some of its partners against the operators of botnets such as Kelihos and Waledac.

Zeus is one of the more widespread and well-known pieces of malware to appear in the last five years and is among the new breed of tools that's sold in various forms to anyone who can pay the freight. The Zeus kit enables an attacker to monitor a user's actions on a compromised machine, steal credentials for online banking or other valuable sites and then rack up huge profits. Like other major botnets operating right now, the Zeus network is not one botnet but dozens and dozens of individual networks operated by various criminals around the world. 

Microsoft's anti-Zeus operation resulted in the takedown of two C&C servers that are used in the global Zeus network, but the company's officials say they have no illusions that this move will cripple the entire Zeus system. 

"We don’t expect this action to have wiped out every Zeus botnet operating in the world. However, together, we have proactively disrupted some of the most harmful botnets, and we expect this effort will significantly impact the cybercriminal underground for quite some time. Cybercriminals are in this for the money and this action was an unprecedented strike against the illicit infrastructure on which they rely. The operation will help further investigations against those responsible for the threat and help us better protect victims," Richard Domingues Boscovich, a senior attorney in Microsoft's Digital Crimes Unit, wrote in an analysis of the Zeus botnet takedown.
Last Monday, Microsoft filed suit in the Eastern District of New York against the unnamed defendants, saying that they, using various aliases and handles, had operated the Zeus botnet. The company, along with the National Automated Clearing House Association, asked the court for permission to cut off the C&C infrastructure of Zeus and also asked that the case be temporarily sealed in order to preserve the element of surprise against the suspects. The court granted both requests, and on Friday officials from Microsoft, NACHA and the Financial Services Information Sharing Analysis Center went with U.S. Marshals to execute the seizure of the servers.

"On March 23, Microsoft, FS-ISAC and NACHA – escorted by the U.S. Marshals – successfully executed a coordinated physical seizure of command and control servers in two hosting locations to seize and preserve valuable data and virtual evidence from the botnets for the case. We took down two IP addresses behind the Zeus ‘command and control’ structure. Microsoft also currently monitors 800 domains secured in the operation, which helps us to identify thousands of Zeus-infected computers," Boscovich said. 

The botnets affected by the Zeus takedown action include some running the Ice-IX and SpyEye variants of the malware. The Zeus codebase has forked and evolved over time and some features of the once-competitive SpyEye toolkit were included in some versions recently.

In an interesting twist to the takedown, Microsoft and the other plaintiffs in the case decided to use the civil section of the RICO statute to go after the group of defendants, allowing them to group the alleged botnet controllers under the umbrella of one organized criminal enterprise. The statute typically is used in organized crime prosecutions, but the nature of the Zeus operation lent itself to the same kind of action.

"Upon information and belief, John Does 1-39 constitute a group of persons associated together for a common purpose of engaging in a course of conduct, as part of an ongoing organization, with the various associates functioning as a continuing unit. The Defendants’ enterprise has a purpose, with relationships among those associated with the enterprise, and longevity sufficient to permit those associates to pursue the enterprise’s purpose. Upon information and belief, Defendants John Doe 1, John Doe 2, and John Doe 3 conspired to, and did, form an associated in fact enterprise (herein after the “Zeus Racketeering Enterprise”) with a common purpose of developing and operating a global credential stealing botnet operation as set forth in detail herein," the complaint filed against the botnet operators says. "Both the purpose of the Zeus Racketeering Enterprise and the relationship between the Defendants is proven by: (1) the consolidation of the original Zeus botnet and the SpyEye botnet; (2) the subsequent development and operation of the enhanced Ice-IX botnet; and (3) Defendants’ respective and interrelated roles in the sale, operation of, and profiting from the Zeus Botnets in furtherance of Defendants’ common financial interests."

Microsoft's Boscovich said the use of RICO was an important aspect of the case.
"In criminal court cases, the RICO Act is often associated with cases against organized crime; the same is true in applying the civil section of the law to this case against what we believe is an organization of people behind the Zeus family of botnets. By incorporating the use of the RICO Act, we were able to pursue a consolidated civil case against everyone associated with the Zeus criminal operation, even if those involved in the 'organization' were not necessarily part of the core enterprise," he said.

Courtesy Dennis Fisher

Wednesday 28 March 2012

IBM Report: Mobile Attacks, Phishing Attacks Mount in 2011

Spam volume is down, there are fewer unpatched software holes and oftware application developers did a better job of writing secure code over the last year. But IBM's X-Force Trend and Risk Report still found plenty to worry about in 2011, according to a copy of the report released this week.  

Despite some improvements over 2010, the annual report found a growing crop of mobile attacks, phishing attacks and automated web server hacks. 

First the good news. Spam was down 50 percent compared to 2010, only 36 percent of software flaws were left unpatched compared to 43 percent in 2010 and 30 percent fewer exploits were released overall.
But there was a 19 percent rise in mbobile exploits released publicly in 2011. IBM credits this largely to an increase in jail-breaking exploits, which in turn led to attackers launching attacks to gain elevated privileges on the phones.

Phishing levels reached their highest level since 2008 last year, thanks to the proliferation of bogus links on social networking sites like Twitter and Facebook and a bit of advertising click fraud, IBM found.

And, while there may have been a 46 percent decrease in SQL injection vulnerabilities in Web applications, that may have been due to attackers shifting to a different tactic: shell command injections, which more than doubled in 2011. In addition to the attacks, IBM noticed an increase in brute force password attacks near the year’s end in November and December.

The annual report culls research from the past year gathered from the company’s 4,000+ clients and 13 billion events monitored daily.

In 2010, IBM released a mid-year version of the report calling out Google as the vendor having the highest number of unpatched, critical holes in their products. Google cried foul and IBM actually issued a retraction, claiming it had gotten its numbers wrong.

For more on the report, you can find the 136-page document here. (PDF)

Courtesy  Christroper

Sunday 25 March 2012

Flash-Based Fake Antivirus Software: Windows Risk Minimizer

Fake antivirus software or "scareware" is nothing new, but these applications continue to get more sophisticated. We recently discovered a relatively new fake antivirus application called Windows Risk Minimizer.
The fake antivirus software was promoted through spam sent from a popular webmail service. This is slightly unusual as normally fake antivirus infections arrive through drive-by exploits. Spam messages promoting the fake antivirus software contained links to compromised domains, which then redirected users to the fake antivirus site. We witnessed over 300 compromised domains being used in just a few hours.

When opening the fake antivirus site, the user is greeted with a JavaScript alert message, whereby the fake antivirus (referred to here as "Windows Secure Kit 2012") claims that your machine is infected.



When OK is clicked, a fake scan is carried out.



The page uses Flash making it look more convincing with realistic icons, progress bars, and dialog boxes. Unsurprisingly, the fake antivirus detects plenty of viruses. Decompressing the Flash file and analyzing it shows a huge list of files contained within it. The Flash movie then simply picks some of these at random and claims they are infected (with equally random virus names).

Once the scan is complete, a Windows Security Alert dialog appears with a summary of the scan. This dialog can be moved around the screen and (for reasons unknown) the different infections can be selected and unselected.



Like many fake antivirus sites, when trying to close the window or tab, the user is greeted with an alarmist message warning of dire consequences unless the infection is removed.



When clicking Remove All in the Windows Security Alert window, the user is prompted to download a malicious executable file that contains Windows Risk Minimizer software. When opened, the following professional-looking screen is displayed:



Again, unsurprisingly, the fake antivirus software identifies several infections.



When this window is closed, the malware repeatedly harasses with pop-up warnings and balloon messages in the notification area. All of these messages are designed to convince the user an infection exists on the computer and they should purchase the (useless) software.

One message falsely claims the Google Chrome Web browser is infected. Clicking Prevent attack opens a payment window.



Another message claims illegal BitTorrent usage has been detected and refers to the controversial US SOPA (Stop Online Piracy Act) legislation. In this case, there is no Prevent attack button; instead there is a Get anonymous connection button, which also opens a payment window.



The final type of alarmist message observed when analyzing this fake antivirus software claimed that some kind of identity theft was in progress.



All of these different types of attack make it seem like there is a serious infection, so it is easy to understand why many users may be unwittingly tricked into purchasing what is useless software.

At $99.90, apparently including support (see below), this useless software is not cheap.



We also recently spotted some different fake antivirus software where JavaScript code on the page appeared to vent the author's rage against two makers of legitimate antivirus software, including an offensive message about a particular antivirus application. It is easy to understand why a malware author might be unhappy about antivirus software, but including offensive messages like this simply makes it easier to block their malware.

To avoid getting infected with fake antivirus software, ensure you keep your operating system, Web browser, and antivirus software up to date with all security patches.

Courtesy  Nick Johnston

Friday 23 March 2012

Life Says


Life Says…………..

                I am like a dream
                Dwelling in the eyes who see it,
                One who pursues it tactfully
                Is the real dreamer, Ultimately.

                I am like a game, you have to play
                One who comes out
                Through its difficult levels successfully
                Is the real winner, ultimately

                I am like a challenge, you have to face it.
                One who meets me at
                Every step firmly
                Is the real achiever, ultimately

                I am like a race, you have to run
                One who runs fast
                And vigorously
                Is the real runner, ultimately

                I am like a battle, you have to fight,
                One who combats
                It bravely,
                Is the real soldier, Ultimately

                I am like a drama, you have to act in
                One who understands
    This fact, spiritually
                Is the real actor, ultimately

                I am like a long path, full of ups and down
                You have to walk on..
                One who crosses all the hurdles courageously
                Is the strongest human, ultimately


               Courtesy   Shalini Jalali Koul