Author Topic: SECURITY WARNINGS & Notices - Please post them here  (Read 2886064 times)

0 Members and 4 Guests are viewing this topic.

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 76037
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #570 on: July 19, 2010, 10:18:04 AM »
Backgrounds of the current Twitter Spam mails increase
http://www.emsisoft.com/en/kb/articles/tec100714/
asyn
W8.1 [x64] - Avast Free AV 23.3.8047.BC [UI.757] - Firefox ESR 102.9 [NS/uBO/PB] - Thunderbird 102.9.1
Avast-Tools: Secure Browser 109.0 - Cleanup 23.1 - SecureLine 5.18 - DriverUpdater 23.1 - CCleaner 6.01
Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0

Offline nmb

  • Avast Evangelist
  • Massive Poster
  • ***
  • Posts: 3054
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #571 on: July 19, 2010, 04:33:27 PM »
Week in review: New ZeuS version and multi-stage attacks cyber attacks



http://www.net-security.org/secworld.php?id=9594

nmb
« Last Edit: July 19, 2010, 04:35:07 PM by nmb »

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33897
  • malware fighter
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #572 on: July 19, 2010, 11:42:10 PM »
Hi folks,

New Ariad hole will hunt Windows XP SP2 forever, so get SP3 or use this tool, from here:
http://blog.didierstevens.com/programs/ariad/

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Hermite15

  • Guest
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #573 on: July 20, 2010, 10:07:05 AM »
MS confirms Windows shortcut zero-day flaw
http://www.theregister.co.uk/2010/07/19/win_shortcut_vuln/

Quote
Microsoft has confirmed the presence of a zero-day vulnerability in Windows, following reports of sophisticated malware-based hacking attacks on industrial control systems that take advantage of the security flaw.

Security shortcomings in the Windows shortcut (.lnk files) are being exploited by the Stuxnet rootlet, an information stealing threat that targets industrial and power plant control systems. The malware - which has been detected in the wild - executes automatically if an infected USB stick is accessed in Windows Explorer.

The attack features rootkit components designed to hide the presence of the information-stealing payload on compromised systems. The digital certificate, assigned to legitimate firm Realtek Semiconductor, used to sign the rootkit components in the malware was revoked by VeriSign last week following discovery of the attack.

sounds like Panda USB vaccine is implicitly advised ;D

see here too:
http://www.microsoft.com/technet/security/advisory/2286198.mspx

MS workaround:
Quote
Disable the displaying of icons for shortcuts

...I think I'll wait for the hotfix instead :D
« Last Edit: July 20, 2010, 10:15:57 AM by Logos »

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33897
  • malware fighter
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #574 on: July 20, 2010, 03:44:28 PM »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline PTRPRO

  • Full Member
  • ***
  • Posts: 150
Packard Motorcars said "Ask the man who owns one". They're not in business anymore.


Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33897
  • malware fighter
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #577 on: July 20, 2010, 10:58:52 PM »
Hi Logos,

This is demonstrating what an enormous threat is formed by the collective Zeus zombie army, because that is how the driver certificates to make the stuxnet malware were initially compromised and could be further abused to design the new malware. Zeus/kneber botnet collectives etc. goes under the radar of normal av initially (see my postings in the virus and worms, last detection zero detection rate), and just alone in the USA 3.6 million computers are not any longer owned by the folks that sit between their keyboards and chairs, but machines are owned by malcreant bot herders, that even got a cybercriminal licence key to operate this menace machine herd (lowsec\local.ds.). Here is a message from someone who is not aware of that particular fact:
http://seclists.org/honeypots/2010/q2/3
Quote
A clean system by default should not have any unique ID made by the malware, so if you run the following:

REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network" /v UID
-- or --
REG QUERY "HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network" /v UID

an infected machine would return the following data in the following format:

<computer name>_<string id> (for example, COMP1_00038EB9)
TN security info

The net has become more and more broken now and the situation is not getting any better soon, my friends, and this is a very realistic statement not for the users that know how to Safe hex and be well protected but to the poor unaware clicking-on-everything-that-moves user.... and all we can do is preaching to the choir or as the desolate in the desert that was never heard, specifically by parties that do not want to change the security situation as we have it,

polonus

Link to wake you all up: http://www.symantec.com/connect/blogs/spyeye-bot-versus-zeus-bot
http://www.securelist.com/en/blog/2128/Will_the_real_Zeus_botnet_please_stand_up
analysis on the malware's complexity: http://blog.threatexpert.com/2009_09_01_archive.html
« Last Edit: July 20, 2010, 11:16:45 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline nmb

  • Avast Evangelist
  • Massive Poster
  • ***
  • Posts: 3054
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #578 on: July 21, 2010, 05:42:30 AM »
Updated Microsoft advisory : http://blogs.technet.com/b/msrc/archive/2010/07/20/security-advisory.aspx

Fixit arrives : http://support.microsoft.com/kb/2286198

nmb

tags( ;)) : LNK exploit, Stuxnet.

Offline nmb

  • Avast Evangelist
  • Massive Poster
  • ***
  • Posts: 3054
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #579 on: July 21, 2010, 05:58:53 AM »
I don't know whether this was posted.

GUI for metasploit now available : http://pauldotcom.com/2010/07/metasploit-new-gui.html

Warning! Only for people who know what they are doing - (advanced users).

nmb
« Last Edit: July 21, 2010, 06:02:26 AM by nmb »

Offline nmb

  • Avast Evangelist
  • Massive Poster
  • ***
  • Posts: 3054
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #580 on: July 21, 2010, 04:19:26 PM »
Black DDoS
                     - Analysis by Kaspersky labs.

Quote
Cybercriminals use a variety of bots to conduct DDoS attacks on Internet servers. One of the most popular tools is called Black Energy. To date, Kaspersky Lab has identified and implemented detection for over 4,000 modifications of this malicious program. In mid-2008 malware writers made significant modifications to the original version, creating Black Energy 2 (which Kaspersky Lab detects as Backdoor.Win32.Blakken). This malicious program is the subject of this article.

http://www.securelist.com/en/analysis/204792126/Black_DDoS

nmb

Offline nmb

  • Avast Evangelist
  • Massive Poster
  • ***
  • Posts: 3054
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #581 on: July 21, 2010, 06:02:21 PM »
Hi forum friends,

Researchers at F-Secure have written articles on stuxnet rootkit (Which makes use of the LNK Flaw). Here are a few links to their weblog[Latest last]:

1. Espionage Attack Uses LNK Shortcut Files.
2. More Analysis of Case LNK Exploit.
3. Zero-Day Vulnerability in Windows Shell.
4. Code for Shortcut Zero-Day Exploit is Public.
5. Update on Security Advisory 2286198.
6. Another Signed Stuxnet Binary.
7. LNK Vulnerability: Embedded Shortcuts in Documents.

nmb

Hermite15

  • Guest
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #582 on: July 26, 2010, 01:22:07 PM »
Quote
vBulletin vuln gifts admin credentials to unwashed masses
http://www.theregister.co.uk/2010/07/23/vbulletin_vuln/

Quote
Websites using software from vBulletin have been stung by a critical vulnerability that makes it trivial to steal credentials needed to administer site panels.

The flaw in version 3.8.6 of vBulletin makes it possible for anyone with a web browser to infiltrate a forum's back end, where sensitive data about users is often stored. The forumware giant issued a patch on Wednesday, but a simple Google search on Friday revealed that scores of users have yet to apply it, meaning their administrative user names and passwords are wide open.

Exploiting the bug is as easy as entering “database” (minus quotes) in the search box of a forum's FAQ page. Vulnerable sites respond by returning everything that's needed to view sensitive user information or make administrative changes.

The patch updates users to version 3.8.6 PL1. Users who want to make sure the fix has worked should check for the string “database_ingo,” which is removed once the new version has correctly been installed.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33897
  • malware fighter
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #583 on: July 26, 2010, 07:28:43 PM »
Hi malware fighters,

Info found that the Stuxnet worm was specifically developed to be used as a spyware tool against Iran: http://www.cio.com.au/article/201801/designing_an_effective_web-based_analysis_tool_analyse_software_needs/

http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=37173&mode=thread&order=0&thold=0

To cleanse the infection the sysclean tool used here comes from TrendMicro: http://downloadcenter.trendmicro.com/index.php?pattern_file=1

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33897
  • malware fighter
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #584 on: July 27, 2010, 08:27:49 PM »
Hi malware fighters,

New LNK vulnerability using varieties of known malware: http://www.f-secure.com/weblog/archives/00001996.html

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!