<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-26689187</atom:id><lastBuildDate>Mon, 02 Sep 2024 08:04:45 +0000</lastBuildDate><category>innocent searches</category><category>alicia keys hack myspace</category><category>dangerous searches</category><category>exploit</category><category>storm botnet</category><category>webattacker mpack</category><category>0-day</category><category>0-day baofeng storm</category><category>Neosploit caListCtrl computer associates</category><category>aol hacked</category><category>arthur c clarke dies space.com hacked</category><category>bait and switch</category><category>bank of india exploit</category><category>bank of india hack</category><category>blount county neosploit</category><category>boise hacked</category><category>dangerous searchers</category><category>david tarloff fake codec</category><category>edus porn exploits</category><category>feta hacked neosploit bbc</category><category>funny support</category><category>g-pack</category><category>good spyware installs rootkit</category><category>google adwords driveby downloads</category><category>gpack</category><category>grisoft linkscanner</category><category>hacked .gov websites</category><category>hacked gov websites</category><category>iframers st petersburg rustock rootkit</category><category>k1 martial arts exploit</category><category>korean antivirus</category><category>lindsay Lohan exploit</category><category>lure</category><category>lures</category><category>malicious website exploit</category><category>malwarealarm avg social engineering</category><category>massive malware push</category><category>mlb.com nhl.com fake scans exploits</category><category>monster exploit</category><category>mpack webattacker</category><category>neosploit jukebox activevoice</category><category>rootkits</category><category>russian attack exploits</category><category>saints defamed st kilda</category><category>smarttrack bbb exploit</category><category>snoop dog beyonce</category><category>storm</category><category>storm gom</category><category>storm neosploit</category><category>storm superbuddy</category><category>transient web site hack linkscanner avg</category><category>two attack waves italy</category><category>uc0810 CA MDAC</category><category>warren county hacked</category><category>winzip exploit</category><category>zenturi exploit</category><title>Exploit Prevention Labs</title><description></description><link>http://explabs.blogspot.com/</link><managingEditor>noreply@blogger.com (tcsl)</managingEditor><generator>Blogger</generator><openSearch:totalResults>142</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-82569452527935326</guid><pubDate>Mon, 01 Sep 2008 13:45:00 +0000</pubDate><atom:updated>2008-09-01T06:49:42.684-07:00</atom:updated><title>New blog</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;please visit and bookmark my new blog at &lt;a href=&quot;http://thompson.blog.avg.com/&quot;&gt;http://thompson.blog.avg.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/09/new-blog.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-6923455960536396056</guid><pubDate>Tue, 27 May 2008 18:59:00 +0000</pubDate><atom:updated>2008-05-27T12:10:49.214-07:00</atom:updated><title>Riddle us this, Batman</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;Normally, we provide answers here, but today we have a question.&lt;br /&gt;&lt;br /&gt;If you whois xpantivirus2008.com, it shows that the registrar is ESTDOMAINS (the actual owner is hidden, as usual).&lt;br /&gt;&lt;br /&gt;If you look up the IP address of xpantivirus2008.com, it shows as 72.14.207.99.&lt;br /&gt;&lt;br /&gt;If you whois 72.14.207.99, _that_ shows as GOOGLE!&lt;br /&gt;&lt;br /&gt;The question is .... why? All we can think of is that they have a sense of humor.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/05/riddle-us-this-batman.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-773252425129881554</guid><pubDate>Fri, 16 May 2008 11:44:00 +0000</pubDate><atom:updated>2008-12-08T16:20:00.090-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aol hacked</category><title>Here&#39;s a whoopsie to start the day</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;One of the rolling headlines on AOL.com this morning is this ...&lt;br /&gt;&lt;br /&gt;&quot;Disgraced &#39;Oprah&#39; Author Is Back&quot;,&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRAPHjESeTw7Jjet8ZAt6DnL8krd-0W9VNsCj8SwysBqeo6s_Otr8Za7me2KFKTNzk0eB15EBBaWh9lzOplxDq-jNwQCLtl6rH_kLfCvgG-bO7tR7xoc7jpQfSJlqB0KXPM07y/s1600-h/AOL+main+page.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRAPHjESeTw7Jjet8ZAt6DnL8krd-0W9VNsCj8SwysBqeo6s_Otr8Za7me2KFKTNzk0eB15EBBaWh9lzOplxDq-jNwQCLtl6rH_kLfCvgG-bO7tR7xoc7jpQfSJlqB0KXPM07y/s400/AOL+main+page.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5200943893286439362&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt; and if you click on the link, you&#39;re taken to this page...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvLSajQB6SFy_8rY_wHZemM5XAgMHn6kjnLnBS54Dw3viIdzrD49IQSWi7l8UyS-QakSgYDpm3PSDoWsRo9mZJ4qWwTDA8euSLJHfrMctlkMJXEp97hrBxa_G3Pyi4I8MGKKYr/s1600-h/AOL+fake+codec.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvLSajQB6SFy_8rY_wHZemM5XAgMHn6kjnLnBS54Dw3viIdzrD49IQSWi7l8UyS-QakSgYDpm3PSDoWsRo9mZJ4qWwTDA8euSLJHfrMctlkMJXEp97hrBxa_G3Pyi4I8MGKKYr/s400/AOL+fake+codec.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5200944052200229330&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Attentive readers of this blog will immediately recognize that as being a probable fake codec, but not everyone is an attentive reader of this blog, and if you click the link, you&#39;re rewarded with this screen...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9EOTmHLuzAso5bPQdadhs248g7OtN1kM2sLI6FrlIzXiVtdkIPZIGGzJd3tKVmoEYuJFcGWchJlSkbk98k9lbyXB3Y1AD3NiXOSR7Yqk0LTgoInaYsb5792EdWiuh5EbRswjb/s1600-h/result.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9EOTmHLuzAso5bPQdadhs248g7OtN1kM2sLI6FrlIzXiVtdkIPZIGGzJd3tKVmoEYuJFcGWchJlSkbk98k9lbyXB3Y1AD3NiXOSR7Yqk0LTgoInaYsb5792EdWiuh5EbRswjb/s400/result.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5200945611273357794&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Folks, the rule is this ... if ever you have to install a codec to watch a vid, DON&#39;T!!!. It&#39;s just not worth the risk. Btw, these guys frequently target MAC users too. It&#39;s increasingly common for them to look at your OS platform and offer up a MAC binary instead of Windows.&lt;br /&gt;&lt;br /&gt;Btw, I know that AOL takes security &lt;em&gt;seriously&lt;/em&gt;, so if they can get caught, anyone can get caught with this trick. &lt;br /&gt;&lt;br /&gt;And shout-outs to Bruce for noticing this one.&lt;br /&gt;&lt;br /&gt;Keep safe folks!&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/05/heres-whoopsie-to-start-day.html</link><author>noreply@blogger.com (tcsl)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRAPHjESeTw7Jjet8ZAt6DnL8krd-0W9VNsCj8SwysBqeo6s_Otr8Za7me2KFKTNzk0eB15EBBaWh9lzOplxDq-jNwQCLtl6rH_kLfCvgG-bO7tR7xoc7jpQfSJlqB0KXPM07y/s72-c/AOL+main+page.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-5904207484429494409</guid><pubDate>Mon, 31 Mar 2008 19:32:00 +0000</pubDate><atom:updated>2008-12-08T16:20:00.679-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">boise hacked</category><title>Well, there goes the Montana option</title><description>or at least the Idaho variant. &lt;br /&gt;&lt;br /&gt;Hi folks,&lt;br /&gt;&lt;br /&gt;One of our in-house jokes is that the only real way to be safe on the Internet is to sell all your computers and move to Montana.&lt;br /&gt;&lt;br /&gt;Regretably, today we noticed that the innocent and bucolic sounding boise.com was showing up as carrying a link to a known exploit site.&lt;br /&gt;&lt;br /&gt;Thinking it couldn&#39;t possibly be so, we went to look at the website thusly...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdD8vYv5WZevjq6g_CaKZMG3EaK_0nfqHtuXYkjOOAxLX-am2AlXkSkPTl9dZEAEpAnfwpZxoVipk9f0Gpht_m-YbMVrdVke4li3ZorauVo9vdVrO8MwJq-7J9QMGbO7ZhMThl/s1600-h/boise+main+page.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdD8vYv5WZevjq6g_CaKZMG3EaK_0nfqHtuXYkjOOAxLX-am2AlXkSkPTl9dZEAEpAnfwpZxoVipk9f0Gpht_m-YbMVrdVke4li3ZorauVo9vdVrO8MwJq-7J9QMGbO7ZhMThl/s400/boise+main+page.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5183993574502599266&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Looks innocent enough, but a view of the source reveals a chunk of escaped javascript ...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgftRXSselKc8ZTftX6us2QZagEwA1SBjhMz3QruTVtPeKaPJtxVH6wzmRX0PtNnDG72sh7nfr9t6UXIGzvoGgbG4A9AReLY9hmhzHoWtV6FgNWF0EUsKoz8AaT6rNLsaQQ5Sw7/s1600-h/source.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgftRXSselKc8ZTftX6us2QZagEwA1SBjhMz3QruTVtPeKaPJtxVH6wzmRX0PtNnDG72sh7nfr9t6UXIGzvoGgbG4A9AReLY9hmhzHoWtV6FgNWF0EUsKoz8AaT6rNLsaQQ5Sw7/s400/source.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5183994931712264818&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Aha! That looks suspicious.... And a look at our debug tool shows a call out to a gpack exploit site...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuD9ZZKhH_kANGDULuZdNnDlj-FF0CGbmSQC7YhG0UOspEiFh8ml5gDPiWfTBMhoS5zcplcDSiOesZ_aS8oT2G29FwhDXKaEgdOKl0CS_8lJlf4xlIbh4i43534tnEl1sJme94/s1600-h/bho.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuD9ZZKhH_kANGDULuZdNnDlj-FF0CGbmSQC7YhG0UOspEiFh8ml5gDPiWfTBMhoS5zcplcDSiOesZ_aS8oT2G29FwhDXKaEgdOKl0CS_8lJlf4xlIbh4i43534tnEl1sJme94/s400/bho.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5183995292489517698&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The web cams are actually pretty interesting, but we can&#39;t find any way to contact the site owner to tell him, so we thought we&#39;d post it here.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/03/well-there-goes-montana-option.html</link><author>noreply@blogger.com (tcsl)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdD8vYv5WZevjq6g_CaKZMG3EaK_0nfqHtuXYkjOOAxLX-am2AlXkSkPTl9dZEAEpAnfwpZxoVipk9f0Gpht_m-YbMVrdVke4li3ZorauVo9vdVrO8MwJq-7J9QMGbO7ZhMThl/s72-c/boise+main+page.jpg" height="72" width="72"/><thr:total>10</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-3135865697745583173</guid><pubDate>Mon, 31 Mar 2008 01:30:00 +0000</pubDate><atom:updated>2008-12-08T16:20:01.398-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">good spyware installs rootkit</category><title>This might be the ultimate irony</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;Today we found what might be the ultimate irony... a spyware product where the home page has been hacked, and is installing someone else&#39;s rootkit!&lt;br /&gt;&lt;br /&gt;The product is one of those spy-on-your-spouse/kids/employees things that says it&#39;s stealthy (in other words, _it&#39;s_ supposed to be a rootkit itself), and the home page has a chunk of escaped javascript &lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8R71-HZpZNqf4m-_8OExHxWE2TNM05f-QkQyPnaqT5YCKpGgGSPZIvM5p5pPOp68f80y5B5vBNrJaq3xnnPL2vrwfpLBaKYExN4IYTIqgof0SeeAV43LpcmCbW5rtj5cFM0ZJ/s1600-h/escaped+code.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8R71-HZpZNqf4m-_8OExHxWE2TNM05f-QkQyPnaqT5YCKpGgGSPZIvM5p5pPOp68f80y5B5vBNrJaq3xnnPL2vrwfpLBaKYExN4IYTIqgof0SeeAV43LpcmCbW5rtj5cFM0ZJ/s400/escaped+code.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5183718602106374722&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;that calls out to a Neosploit site that&#39;s installing a rootkit. &lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghqd2PMAgPhDUzb7BkMIhAIYxsMk_wWg20VgSqe2Yow6tXVXo401OzYMFmDh0kJRPV9SbJ2XSqLYFzC-x3fZRPlMVpaIlKe-g-ce7dBfGaU5WyJoxi6lAqbSidudJzjggHdaVN/s1600-h/rootkit.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghqd2PMAgPhDUzb7BkMIhAIYxsMk_wWg20VgSqe2Yow6tXVXo401OzYMFmDh0kJRPV9SbJ2XSqLYFzC-x3fZRPlMVpaIlKe-g-ce7dBfGaU5WyJoxi6lAqbSidudJzjggHdaVN/s400/rootkit.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5183718129659972146&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;And it&#39;s the new Neosploit too.&lt;br /&gt;&lt;br /&gt;We&#39;re trying to contact the site owner to tell them, but the &quot;contact me&quot; page crashes.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhltLPoICvT7K6ZLf-sIMjj1Eku9YQ0GTFefZ-4ybvBzQk8TKtZ_6wpmRFGI6fmAWn-STt36IbFjH2ACN6-9DG0H21yqv4fSvCyU_njW7S43ojOqkl7Gm7bmVS7yEgzb09Gii6d/s1600-h/email+submit.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhltLPoICvT7K6ZLf-sIMjj1Eku9YQ0GTFefZ-4ybvBzQk8TKtZ_6wpmRFGI6fmAWn-STt36IbFjH2ACN6-9DG0H21yqv4fSvCyU_njW7S43ojOqkl7Gm7bmVS7yEgzb09Gii6d/s400/email+submit.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5183719108912515666&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Oh well... we&#39;ll keep trying.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/03/this-might-be-ultimate-irony.html</link><author>noreply@blogger.com (tcsl)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8R71-HZpZNqf4m-_8OExHxWE2TNM05f-QkQyPnaqT5YCKpGgGSPZIvM5p5pPOp68f80y5B5vBNrJaq3xnnPL2vrwfpLBaKYExN4IYTIqgof0SeeAV43LpcmCbW5rtj5cFM0ZJ/s72-c/escaped+code.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-5892325859292276694</guid><pubDate>Fri, 28 Mar 2008 22:25:00 +0000</pubDate><atom:updated>2008-03-28T17:50:26.872-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">exploit</category><category domain="http://www.blogger.com/atom/ns#">g-pack</category><category domain="http://www.blogger.com/atom/ns#">gpack</category><title>GPack</title><description>Correction: Sorry folks... there&#39;s so much happening at the moment, I&#39;ve merged a couple of kits in my mind. It&#39;s not a mix of vbscript and javascript. It&#39;s just javascript, and thus far, we&#39;ve only seen one exploit come out of it ... a mouldy, old MS06-014, although we expect there are more than that. The rest of the write-up is reasonably accurate, and we&#39;ll continue to correct things as we find more.&lt;br /&gt;&lt;br /&gt;Hi folks,&lt;br /&gt;&lt;br /&gt;A new exploit framework, called Gpack, has been popping up on our radar for a while now. We couldn&#39;t find much information on it, so we thought we&#39;d better write some.&lt;br /&gt;&lt;br /&gt;The first interesting thing about it is that the external, obfuscated wrapping script is a mix of vbscript and javascript. In other words, some of it is interpretted by the vbscript engine, and then the result of that is used to interpret the javascript portion. The idea here is to make it hard to decrypt and hard for av engines to follow it. To some extent they&#39;re successful with this, as the un-obfuscated code is seriously ugly and hard to follow.&lt;br /&gt;&lt;br /&gt;The second interesting point is that there is nothing new in it. They&#39;ve gone to a lot of trouble to obfuscate some really old and common exploits.&lt;br /&gt;&lt;br /&gt;The third interesting thing is the number of innocent websites that have been hacked by someone pointing back at this kit. There are lots and lots of them... mostly mom and pop shops, but _lots_. We haven&#39;t figured out what the common thread between them is so far, but there clearly is one, for so many to be hacked.&lt;br /&gt;&lt;br /&gt;The fourth interesting thing is that while there is clearly more than one set of Bad Guys involved, most of them seem to being hosted by the same ISP, because the exploit IPs are similar.&lt;br /&gt;&lt;br /&gt;By the way, the exploit set seems to be:&lt;br /&gt;&lt;br /&gt;MDAC/ MS06-014&lt;br /&gt;MDAC variant - MS06-042&lt;br /&gt;QuickTime&lt;br /&gt;SetSlice&lt;br /&gt;WinZip&lt;br /&gt;VML&lt;br /&gt;&lt;br /&gt;These are very common, and we can assume the author simply lifted them from the public domain, and put most of his effort into the obfuscation.&lt;br /&gt;&lt;br /&gt;Nothing new here folks, except that it&#39;s being quite widely adopted.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/03/gpack.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-954760105618177759</guid><pubDate>Fri, 28 Mar 2008 16:59:00 +0000</pubDate><atom:updated>2008-03-28T15:54:38.769-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Neosploit caListCtrl computer associates</category><title>New Exploit Targets Corporate Users of CA Apps</title><description>Update: We should note that CA has offered a patch for this vulnerability. What is not clear is how widely adopted that patch is.&lt;br /&gt;&lt;br /&gt;Hi folks,&lt;br /&gt;&lt;br /&gt;On about March 17, 2008, some folks, such as frsirt started talking about a vulnerability in dll/ ocx used in various CA products. See here http://www.frsirt.com/english/advisories/2008/0902 , for example. &lt;br /&gt;&lt;br /&gt;Today we found it in the wild, in none other than a new NeoSploit framework.&lt;br /&gt;&lt;br /&gt;This means several things...&lt;br /&gt;&lt;br /&gt;Firstly, the Neo developers are _very_ active.&lt;br /&gt;&lt;br /&gt;Secondly, the vulnerability is likely to be quite widespread, simply because of CA&#39;s size and spread within the corporate market.&lt;br /&gt;&lt;br /&gt;Thirdly, the exploit will likely soon also be quite widespread, simply because it is Neo, and Neo is quite popular as an exploit package.&lt;br /&gt;&lt;br /&gt;Fourthly, corporate clients should probably be pretty nervous, because their firewall is unlikely to protect them against this. Remember, web traffic is usually permitted to go right thru the firewall, because it _starts_ from a trusted place ... _inside_ the firewall. &lt;br /&gt;&lt;br /&gt;Another contributing factor to corporate nervousness is that they rarely allow automatic patching. This is an example where they probably should.&lt;br /&gt;&lt;br /&gt;The current list of exploits is therefore:-&lt;br /&gt;&lt;br /&gt;Mdac/ MS06-014&lt;br /&gt;SuperBuddy&lt;br /&gt;CaListCtrl&lt;br /&gt;NctAudio&lt;br /&gt;GomWebCtrl&lt;br /&gt;SetSlice&lt;br /&gt;DaxCtle&lt;br /&gt;&lt;br /&gt;In other words, they&#39;ve added the CaListCtrl exploit, and dropped the Yahoo Jukebox and Microsoft xVoice exploits, presuambly because they were not productive.&lt;br /&gt;&lt;br /&gt;Folks, this appears to be one for the corporates rather than consumers, but it highlights that the Bad Guys are still thinking hard and probing hard.&lt;br /&gt;&lt;br /&gt;Natuarally, LinkScanner and AVG 8 users have little to fear, as we detect it and block it just fine (which is how we noticed it in the first place)&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/03/oooo-that-was-pretty-quick.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-5226242406116742650</guid><pubDate>Mon, 24 Mar 2008 01:24:00 +0000</pubDate><atom:updated>2008-12-08T16:20:01.797-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">arthur c clarke dies space.com hacked</category><title>Arthur C Clark dies, and Space.com gets hacked!</title><description>Can&#39;t you see the pattern emerging??&lt;br /&gt;&lt;br /&gt;Seriously though, uplink.space.com (careful) has had an iframe injected into it, and it&#39;s reaching out to another seemingly hacked site (www.forvideo.at - careful), &lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZP_NZTa-tZDXWxbSc5wIiapebgDdec8Ulhnz1iNGWR0FRp4mHj2CVE9JdM2xij5q-MF9HP_lfZmKVqfcTAhiRKbrUdMCyElrUuQH6VovWkSBUQG7_k2ASTTPpeGlgZL6YSBGu/s1600-h/iframe.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZP_NZTa-tZDXWxbSc5wIiapebgDdec8Ulhnz1iNGWR0FRp4mHj2CVE9JdM2xij5q-MF9HP_lfZmKVqfcTAhiRKbrUdMCyElrUuQH6VovWkSBUQG7_k2ASTTPpeGlgZL6YSBGu/s400/iframe.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5181124450449525266&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;and launching a encrypted javascript &lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWgS-bu7UXWMMO1bFTWcf5D2hyphenhyphen6eKKT2RGuiJ7ISwXp9IEQTxnDcH8hPHD6fmXuzqvxsGvBWB4FTBZePDNWCGAAfuilauIQBHrUrreFKj366jkWzIs0xsfj50x06gKSrxlxYCE/s1600-h/exploit.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWgS-bu7UXWMMO1bFTWcf5D2hyphenhyphen6eKKT2RGuiJ7ISwXp9IEQTxnDcH8hPHD6fmXuzqvxsGvBWB4FTBZePDNWCGAAfuilauIQBHrUrreFKj366jkWzIs0xsfj50x06gKSrxlxYCE/s400/exploit.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5181125004500306466&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;that turns out to be a simple and venerable MS06-014 exploit. &lt;br /&gt;&lt;br /&gt;It&#39;s not an exploit pack, so it&#39;s just a single exploit, and it&#39;s tracking IPs, so it&#39;ll only come once, but it&#39;s there.&lt;br /&gt;&lt;br /&gt;And the exploit is only an MS06-014, but the point is that if the website is vulnerable enough to have a mouldie old exploit injected, it could have something much newer and fiercer. Space.com needs to fix their website, and we&#39;ve sent them an email about it. Hopefully they will, because they get an awful lot of visitors each month.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/03/arthur-c-clark-dies-and-spacecom-gets.html</link><author>noreply@blogger.com (tcsl)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZP_NZTa-tZDXWxbSc5wIiapebgDdec8Ulhnz1iNGWR0FRp4mHj2CVE9JdM2xij5q-MF9HP_lfZmKVqfcTAhiRKbrUdMCyElrUuQH6VovWkSBUQG7_k2ASTTPpeGlgZL6YSBGu/s72-c/iframe.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-5997007989437461307</guid><pubDate>Fri, 21 Mar 2008 00:17:00 +0000</pubDate><atom:updated>2008-03-20T19:00:35.516-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">zenturi exploit</category><title>Something new tonight</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;Tonight we found something new in an exploit pack coming from a site in China. Well, the exploit is actually from May 2007, but this is the first time we&#39;ve seen it in use. This indicates two things... the first is that the Bad Guys are apparently combing older exploit announcements looking for appropriate samples. When you think about it, any exploit that allows remote code execution, and for which there is no forced or automatic upgrade of the vulnerable program is useful to them. Remember, they don&#39;t _want_ to catch everybody. They couldn&#39;t manage 100k victims. They don&#39;t want to cut down the apple tree, but rather just shake it, and pick up the fruit that falls off. What this means is that old exploits are still valuable when there is no automatic patch mechanism.&lt;br /&gt;&lt;br /&gt;Btw, the exploit in question is a buffer overflow in something called Zenturi ProgramChecker, and is described nicely here ... http://www.kb.cert.org/vuls/id/603529.&lt;br /&gt;&lt;br /&gt;The second interesting thing is that it is obviously Yet Another Exploit Pack. It has all the common ones that we&#39;ve come to love and expect with Mpack/IcePack/Neosploit, and the obfuscation scheme is very similar to the one in use with Mpack/ IcePack, so this probably means that someone has bought or stolen a copy of Mpack/ IcePack, and has modified it with the addition of the Zenturi exploit, and is now selling it as their own work. &lt;br /&gt;&lt;br /&gt;GASP... no, there&#39;s no honor among thieves, and Copyright means when you copy it, it&#39;ll be right, and all that stuff.&lt;br /&gt;&lt;br /&gt;The full list of exploits is ...&lt;br /&gt;&lt;br /&gt;Zenturi ProgramChecker&lt;br /&gt;MDAC/MS06-014&lt;br /&gt;VML/MS07-004&lt;br /&gt;Yahoo Webcam Image Uploader&lt;br /&gt;Yahoo Webcam Viewer&lt;br /&gt;Winzip&lt;br /&gt;QuickTime&lt;br /&gt;and&lt;br /&gt;MSXML/MS06-067&lt;br /&gt;&lt;br /&gt;By the way, the exploit site is in China (no surprise there), but the lure site is in the USA, and is quite interesting. We might write about that tomorrow.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/03/something-new-tonight.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-5712025619155775635</guid><pubDate>Thu, 13 Mar 2008 20:50:00 +0000</pubDate><atom:updated>2008-12-08T16:20:02.166-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">blount county neosploit</category><title>Unfortunate hack at tax time</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;We noticed a couple of Alabama county websites have been hacked, with a Neosploit call out to a website in Germany.&lt;br /&gt;&lt;br /&gt;The two websites are...&lt;br /&gt;&lt;br /&gt;hxxp://www.co.blount.al.us/  and &lt;br /&gt;hxxp://www.blountrevenue.com/&lt;br /&gt;&lt;br /&gt;(The actual exploit server in Germany seems to be 404 at the moment, but you should still be careful)&lt;br /&gt;&lt;br /&gt;The second one is more interesting, particularly given the time of year. The front page looks like this ... &lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJBw70meOMdMsXFWLijZftQRZvlAC6MvEvPdtRr0j4s7uhVhG08rL4rjrjXAESvSm09ZCy1KGQwdzVE0LyTSwdtkslyjSUFAfM133V1AEk7olmw_latPj86pkvH5tUU7AMvaFm/s1600-h/Revenue_main.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJBw70meOMdMsXFWLijZftQRZvlAC6MvEvPdtRr0j4s7uhVhG08rL4rjrjXAESvSm09ZCy1KGQwdzVE0LyTSwdtkslyjSUFAfM133V1AEk7olmw_latPj86pkvH5tUU7AMvaFm/s400/Revenue_main.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5177339479901373650&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Looks pretty innocent, doesn&#39;t it? If you&#39;re good at html, and you make a point of looking at page source, you might notice something weird at the top of the page ...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-c1KzX3h814hshpEZSmb_76_L5GUKB6AsFUZ7adj-8rAyHUh4DgtgmK7EPdanhF-hNwTrtsq_lLGBQRV1Ht5L11epHbH1nD8RaKnmN7dkTdRFiAa8NcCOLHMVk39_qnkzSUAS/s1600-h/Revenue_sce.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-c1KzX3h814hshpEZSmb_76_L5GUKB6AsFUZ7adj-8rAyHUh4DgtgmK7EPdanhF-hNwTrtsq_lLGBQRV1Ht5L11epHbH1nD8RaKnmN7dkTdRFiAa8NcCOLHMVk39_qnkzSUAS/s400/Revenue_sce.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5177337933713147058&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;but you probably won&#39;t, because no one looks at source much anyway. ;-) &lt;br /&gt;&lt;br /&gt;If you have a Really Useful Tool (tm) like our Browser Helper Object, you&#39;ll probably notice that it&#39;s reaching out to a funny looking site ...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRZpK5CbTsnkzH8Xp1rmSbx4tQvCim18NeZQRY1EHwAsaj80pmkwM2J9YZsmjCjI44lTMmR98E2aqoe_MQQopRQTCcMv72TEXWJw1tZY7ZJX4czjNfA_aISOD9_ElRcwQB0SXD/s1600-h/Revenue_bho1.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRZpK5CbTsnkzH8Xp1rmSbx4tQvCim18NeZQRY1EHwAsaj80pmkwM2J9YZsmjCjI44lTMmR98E2aqoe_MQQopRQTCcMv72TEXWJw1tZY7ZJX4czjNfA_aISOD9_ElRcwQB0SXD/s400/Revenue_bho1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5177339157778826434&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;That&#39;s because the funny looking javascript s actually a Neosploit obfuscation that decrypts to a call to an attack script at 78.47.147.188. This site is currently 404, but it might come back to life at any time, so be careful.&lt;br /&gt;&lt;br /&gt;We&#39;ve told the very nice folks at the revenue website, so it should be cleaned up soon. It&#39;s just a particularly unfortunate website to be hacked at tax time.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/03/unfortunate-hack-at-tax-time.html</link><author>noreply@blogger.com (tcsl)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJBw70meOMdMsXFWLijZftQRZvlAC6MvEvPdtRr0j4s7uhVhG08rL4rjrjXAESvSm09ZCy1KGQwdzVE0LyTSwdtkslyjSUFAfM133V1AEk7olmw_latPj86pkvH5tUU7AMvaFm/s72-c/Revenue_main.jpg" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-1319911620982241268</guid><pubDate>Sun, 02 Mar 2008 19:20:00 +0000</pubDate><atom:updated>2008-03-02T11:23:45.456-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">korean antivirus</category><title>Something interesting</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;hat-tip to Ståle Fagerland of Norman for noticing this article...&lt;br /&gt;&lt;br /&gt;http://joongangdaily.joins.com/article/view.asp?aid=2886846&lt;br /&gt;&lt;br /&gt;To save you _having_ to read it, the story is about a CEO of a Korean software company being arrested for foisting fake anti-spy software on unsuspecting victims. (entering sarcasm mode) Gosh, who`d have thought it? (leaving sarcasm mode) Apparently, not only would the software lie about detecting problems on the system, and try really hard to get victims to pony up a payment to register the software, sometimes it made the victims re-buy the software every month!&lt;br /&gt;&lt;br /&gt;Now, arresting theses guys is not a bad idea in itself, but that`s not the most interesting aspect of the story. In fact,if the article is correct, there are two stunning revelations.  &lt;br /&gt;&lt;br /&gt;The first is that they made $10m doing this over two or three years!!! Another couple of years at that rate, and before you know it, you`re talking real money. No wonder we see so much of this stuff!&lt;br /&gt;&lt;br /&gt;The second astonishing thing is that, according to the article, there are over 200 anti virus companies in Korea! If that is correct, that is simply amazing for an industry that`s 20 years old!&lt;br /&gt;&lt;br /&gt;That would seem to indicate...&lt;br /&gt;&lt;br /&gt;(1) that the US and European companies have not dominated and rationalized the market there, and &lt;br /&gt;(2) none of the local companies have managed to dominate either.&lt;br /&gt;&lt;br /&gt;It must also mean that there`s an awful lot of av guys not making much money, so it`s not entirely surprising that people are tempted to initiate frauds like this.&lt;br /&gt;&lt;br /&gt;And if there are that many in Korea, how many must there be in China!?&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/03/something-interesting.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-4988349878844246349</guid><pubDate>Mon, 25 Feb 2008 22:09:00 +0000</pubDate><atom:updated>2008-12-08T16:20:02.306-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">saints defamed st kilda</category><title>google defames saints ... bolts of lightning fall</title><description>I&#39;m kidding, I&#39;m kidding!!!!!!!&lt;br /&gt;&lt;br /&gt;Update number 2: Feb 26, 2008, 6:30am est&lt;br /&gt;&lt;br /&gt;Dang, that was quick. Some of the sites, such as St Kilda, and the Geelong Cats sites, are now correctly marked as clean. They&#39;re not all correct though ... the Brisbane Lions site is still incorrectly marked as dangerous, for example, but that was still quick for the others, and we hope that all will shortly be corrected. Shout-outs to google for reacting quickly!&lt;br /&gt;&lt;br /&gt;Update number 1:&lt;br /&gt;&lt;br /&gt;Some of our team in the Australian office noticed that it wasn&#39;t just the Saints, but also the Victorian based clubs of North Melbourne Kangaroos, Carlton Blues, Geelong Cats, Hawthorn Hawks, Melbourne Demons and Richmond Tigers, plus Port Adelaide Power (South Australia), Sydney Swans (New South Wales) and Brisbane Lions (Queensland) all being blocked by Google the same way. Shout-outs to the guys down-unda!&lt;br /&gt;&lt;br /&gt;-----------------------------------------------------------------&lt;br /&gt;&lt;br /&gt;Hi folks,&lt;br /&gt;&lt;br /&gt;What I&#39;m really talking about is that if you search for &quot;saints football club&quot;, the number 3 organic search result is the famous (to Australians) St Kilda Football club. The &quot;defamation&quot; bit is that google has one of its &quot;This site may harm your computer&quot; messages against it.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHApr1mdFF1hqAXI2Loz67fDjUZVSyNSZC_ugrZ026Ilw3uIEZuQBC4Tj_y_EbxSmoMiXWB4UNa0aTFr5-s02mI4WqQuZYqaR3Md6oxh1SJOHN8OqnjKHdq9QQNMerWQs8S6Ds/s1600-h/google+search.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHApr1mdFF1hqAXI2Loz67fDjUZVSyNSZC_ugrZ026Ilw3uIEZuQBC4Tj_y_EbxSmoMiXWB4UNa0aTFr5-s02mI4WqQuZYqaR3Md6oxh1SJOHN8OqnjKHdq9QQNMerWQs8S6Ds/s400/google+search.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5171055079173551090&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;(If you look at the screen snapshot, you&#39;ll notice that LinkScanner assesses the site to be clean... the correct result)&lt;br /&gt;&lt;br /&gt;This means that it is not possible for anyone to click thru a google search and get to the St Kilda website... you have to deliberately cut and paste the url back into your browser bar.&lt;br /&gt;&lt;br /&gt;The reason that they&#39;re doing it is that, probably, at some point the website was hacked, and was infecting people, but ....GOOGLE-GUYS!!! IT&#39;S CLEAN NOW!!! TAKE THE BLOCK OFF, PLEASE!!! (I feel like saying &quot;Mr Google! Tear down this wall!&quot;, but I wouldn&#39;t be so bold.)&lt;br /&gt;&lt;br /&gt;What this really underscores is the concept that a centralized database is useless at detecting web issues... the problem is simply too transient.&lt;br /&gt;&lt;br /&gt;This happens quite a bit, and I must admit that I&#39;m surprised that no one has accused google of damaging their brand. I&#39;m sure regular readers of my blog will remember the case of k1-usa.net. They used to be the number one organic result when people searched for k1. They were hacked for about 10 days, and then cleaned, but in the mean time, they had earned the &quot;This site maye harm your computer label&quot;, and over the next 12 months, before the label was removed, their rating slipped, and slipped, until finally it was nowhere on the first three pages.&lt;br /&gt;&lt;br /&gt;I can&#39;t imagine St Kilda taking it lying down if their ratings start to slip, and I can&#39;t imagine google meaning that to happen. It just shows how difficult it is to keep up.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/02/google-defames-saints-bolts-of.html</link><author>noreply@blogger.com (tcsl)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHApr1mdFF1hqAXI2Loz67fDjUZVSyNSZC_ugrZ026Ilw3uIEZuQBC4Tj_y_EbxSmoMiXWB4UNa0aTFr5-s02mI4WqQuZYqaR3Md6oxh1SJOHN8OqnjKHdq9QQNMerWQs8S6Ds/s72-c/google+search.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-6585275566968176891</guid><pubDate>Fri, 22 Feb 2008 16:24:00 +0000</pubDate><atom:updated>2008-12-08T16:20:02.985-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">warren county hacked</category><title>Another gov site hacked</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;Who can see what&#39;s wrong with this picture?&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0VtUNc2ZaOOC6Hl0lVG-exk3w9z3oibiQcMqLKoza1X__du_jtMHdV5RTMq_hyQeq6MO2uEEhG9W5sV_HxWcmu9lHmW4HrmpWsfGwaBrhLE3GNKJ7hZV9nQ8RpqEcP577wJz0/s1600-h/mainpage.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0VtUNc2ZaOOC6Hl0lVG-exk3w9z3oibiQcMqLKoza1X__du_jtMHdV5RTMq_hyQeq6MO2uEEhG9W5sV_HxWcmu9lHmW4HrmpWsfGwaBrhLE3GNKJ7hZV9nQ8RpqEcP577wJz0/s400/mainpage.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5169841879761449906&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Looks pretty reasonable, doesn&#39;t it? Here&#39;s what you see if you have a suitable monitoring tool...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Hrxc4FzlrsG7cz6FQJgtuyemmcDGK4gLEa-QpwtH-6opy2L9wDAwU4xIzCQbMoMK35R7CMfhrEiV1R1GfyFGoUZlPUAHvZhmu56SZcibLIqnvmyfdXmVJmCH1BkTEOKAI7Gf/s1600-h/bho.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Hrxc4FzlrsG7cz6FQJgtuyemmcDGK4gLEa-QpwtH-6opy2L9wDAwU4xIzCQbMoMK35R7CMfhrEiV1R1GfyFGoUZlPUAHvZhmu56SZcibLIqnvmyfdXmVJmCH1BkTEOKAI7Gf/s400/bho.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5169842347912885186&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Enquiring Minds will wonder why a county government site is reaching out to pepato.org.&lt;br /&gt;&lt;br /&gt;And here&#39;s what you see on a vulnerable pc, _if_ you&#39;re running another suitable monitoring tool...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJihGJpUX9HPIe7dFye7L5hxmdM3sOdxEFQTnzV92327o44BloaOag8q0Qaqbov2s5tYDMHD55Co1Ja3DP_ID18nWnvc0a2AtLfhVcs7JbtMnTTobwJoKOe_BdT1ZSAKxVvm93/s1600-h/crit+files.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJihGJpUX9HPIe7dFye7L5hxmdM3sOdxEFQTnzV92327o44BloaOag8q0Qaqbov2s5tYDMHD55Co1Ja3DP_ID18nWnvc0a2AtLfhVcs7JbtMnTTobwJoKOe_BdT1ZSAKxVvm93/s400/crit+files.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5169843168251638738&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;And here&#39;s the offending code in the page source ...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHz6NLtVXqNxvWCsL1iW9s_0aVMTfyOOc4HyyZlx50zRQUUGTdz_98t_oTI9-WBGpfxguxxBIDoeZW4xU4An0bsWH9qsLlqNO7BpS3VT58NxSHx1p_oFttZP-el_l6AFLz86P7/s1600-h/dodgy+script.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHz6NLtVXqNxvWCsL1iW9s_0aVMTfyOOc4HyyZlx50zRQUUGTdz_98t_oTI9-WBGpfxguxxBIDoeZW4xU4An0bsWH9qsLlqNO7BpS3VT58NxSHx1p_oFttZP-el_l6AFLz86P7/s400/dodgy+script.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5169843486079218658&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Yes, it&#39;s hacked. Bit hard to tell without some tools, though, eh? We&#39;ve told the county, so we expect it&#39;ll get cleaned up very quickly, but be careful in the mean time.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/02/another-gov-site-hacked.html</link><author>noreply@blogger.com (tcsl)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0VtUNc2ZaOOC6Hl0lVG-exk3w9z3oibiQcMqLKoza1X__du_jtMHdV5RTMq_hyQeq6MO2uEEhG9W5sV_HxWcmu9lHmW4HrmpWsfGwaBrhLE3GNKJ7hZV9nQ8RpqEcP577wJz0/s72-c/mainpage.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-8707516482445163958</guid><pubDate>Fri, 22 Feb 2008 03:55:00 +0000</pubDate><atom:updated>2008-12-08T16:20:03.084-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">funny support</category><title>This is kind of funny</title><description>Hi folks, &lt;br /&gt;&lt;br /&gt;We&#39;ve been following up on the new Neosploit that we reported last night. This was actually a pretty high-profile site, so we wanted to notify them. We couldn&#39;t find a contact point on the hacked domain, but we found another subdomain that had an online support chat option, and we gave it a try. The conversation was sufficiently funny that we grabbed a screen capture (anonymized to protect the innocent). You might have to double-click it to read it, but it&#39;s worthwhile...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu4zeSt_GgEiACQkH3oAy-7L7V5va6hYohFI59O-KlnTe31f7ekO6qYs0KijX2SLweppPNec9H2znsw_m5cf3roBkoo88nzvwRmBHx-tQ4jd4HpZx5aJb_yMIxegBfkLxCEOBa/s1600-h/support_chat2_modified.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu4zeSt_GgEiACQkH3oAy-7L7V5va6hYohFI59O-KlnTe31f7ekO6qYs0KijX2SLweppPNec9H2znsw_m5cf3roBkoo88nzvwRmBHx-tQ4jd4HpZx5aJb_yMIxegBfkLxCEOBa/s400/support_chat2_modified.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5169806665324589986&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;:-)&lt;br /&gt;&lt;br /&gt;Fwiw, we eventually found someone who understood, and we got it cleaned up.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/02/this-is-kind-of-funny.html</link><author>noreply@blogger.com (tcsl)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu4zeSt_GgEiACQkH3oAy-7L7V5va6hYohFI59O-KlnTe31f7ekO6qYs0KijX2SLweppPNec9H2znsw_m5cf3roBkoo88nzvwRmBHx-tQ4jd4HpZx5aJb_yMIxegBfkLxCEOBa/s72-c/support_chat2_modified.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-3208430718998738320</guid><pubDate>Wed, 20 Feb 2008 16:46:00 +0000</pubDate><atom:updated>2008-02-20T15:03:33.104-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">neosploit jukebox activevoice</category><title>New Neo Now</title><description>(Sorry... the alliteration bug bit me)&lt;br /&gt;&lt;br /&gt;Hi folks,&lt;br /&gt;&lt;br /&gt;Last night, as the title suggests, we found a new version of Neosploit. It has two new exploits, one uses a clsid of EEE78591-FE22-11D0-8BEF-0060081841DE, which appears to be the ActiveVoice ActiveX dll from Microsoft, and the other clsid is 5F810AFC-BB5F-4416-BE63-E01DD117BD6C, which is the Music Jukebox control from Yahoo.&lt;br /&gt;&lt;br /&gt;The most recent ActiveVoice exploit seems to be from about June 2007, but the most recent JukeBox exploit is from Feb 2008, so that&#39;s kind of interesting.&lt;br /&gt;&lt;br /&gt;We&#39;ll try to figure out over the next couple of days if these are the ones that indeed match up, but the bottom line is that the Neosploit developers are very active.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/02/new-neo-now.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-900061939934862562</guid><pubDate>Sun, 17 Feb 2008 03:30:00 +0000</pubDate><atom:updated>2008-12-08T16:20:03.490-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">david tarloff fake codec</category><title>Wow... this was quick</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;I&#39;m sure most people know about the horrific attack on the poor NYC psych. In the news tonight, we noticed that the police had arrested someone named David Tarloff for allegedly being the perp. With the web being what it is, we often find that if you look quickly, you can find personal pages about these people, often before the police get them taken down. Ok, it&#39;s a little morbid, but it&#39;s interesting at the same time.&lt;br /&gt;&lt;br /&gt;So, when we googled for David Tarloff, here was the result...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6gaHi8ZIjL_jz3nCqR-7f09DAa_7vWS_6O70mSwJMi8mmMfLprsq-mZ7-jB-K843DHXMyG19Dcm8P44SZNpxlBEUA_NUlzLrmYG0o_mwx0g182-VM7-LWOUOdQDWP_y99iqZc/s1600-h/bait.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6gaHi8ZIjL_jz3nCqR-7f09DAa_7vWS_6O70mSwJMi8mmMfLprsq-mZ7-jB-K843DHXMyG19Dcm8P44SZNpxlBEUA_NUlzLrmYG0o_mwx0g182-VM7-LWOUOdQDWP_y99iqZc/s400/bait.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5167787781587366722&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Hmmm... an AOL journal account... that sounds plausible for a personal page... click...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWaPWnJu3T59_NXtSrSNPAJ9jWVnpeuOiTb8AJfzTLHrvrwGFyS8ZVW90I6xTZQoE6aHvKnLfigYZFYQuQXy-XaExSAPfeayX8e7dBtr2L8sEJFK84e1Nn1GF0Y9inMKabes34/s1600-h/and.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWaPWnJu3T59_NXtSrSNPAJ9jWVnpeuOiTb8AJfzTLHrvrwGFyS8ZVW90I6xTZQoE6aHvKnLfigYZFYQuQXy-XaExSAPfeayX8e7dBtr2L8sEJFK84e1Nn1GF0Y9inMKabes34/s400/and.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5167788400062657362&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Yep ... still looks plausible ... let&#39;s click the name ... click...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh95KDU5gaY8o9CJmFdZareXqKaW5iY_AWjfMTmCiikGOjEP6RehvZNVg0orhfCt1JOlUWYbNbsqWiIayzPNlMnO8onQcw5WnKHFdB0B1GggBZMkNHW91xuMA_gavH9tGKjKccI/s1600-h/switch.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh95KDU5gaY8o9CJmFdZareXqKaW5iY_AWjfMTmCiikGOjEP6RehvZNVg0orhfCt1JOlUWYbNbsqWiIayzPNlMnO8onQcw5WnKHFdB0B1GggBZMkNHW91xuMA_gavH9tGKjKccI/s400/switch.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5167788640580825954&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;WAAAAIT A MINUTE!!!!! That ain&#39;t no Hank William&#39;s song! (Pop culture reference to Bob, of Bob&#39;s Country Bunker in the Blues Brothers, where Bob suddenly realizes that that the boys aren&#39;t really a country and western band, and that he&#39;s been had.)&lt;br /&gt;&lt;br /&gt;Attentive readers will instantly notice that this is a Fake Codec, and will close the browser. Non-attentive readers will attempt to install the codec, and will be rewarded with a rootkit.&lt;br /&gt;&lt;br /&gt;But how quick was that? We only noticed that the guy had been arrested and named today, and yet they not only managed to get their lure in place on AOL, but they also managed to get their site the Number One organic result on Google if you search for David Tarloff! And on the weekend at that! These boys are on the ball. We&#39;re grudgingly impressed.&lt;br /&gt;&lt;br /&gt;Be careful folks, it&#39;s a tricky world out there.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/02/wow-this-was-quick.html</link><author>noreply@blogger.com (tcsl)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6gaHi8ZIjL_jz3nCqR-7f09DAa_7vWS_6O70mSwJMi8mmMfLprsq-mZ7-jB-K843DHXMyG19Dcm8P44SZNpxlBEUA_NUlzLrmYG0o_mwx0g182-VM7-LWOUOdQDWP_y99iqZc/s72-c/bait.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-286455227667747372</guid><pubDate>Thu, 07 Feb 2008 22:35:00 +0000</pubDate><atom:updated>2008-02-07T14:37:40.303-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">malwarealarm avg social engineering</category><title>MalwareAlarm</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;MalwareAlarm is so common now, we decided to give it it&#39;s own vid. Remember, it&#39;s not really scanning your pc, it&#39;s just pretending to, but it does a very good job of pretending. Enjoy...&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;425&quot; height=&quot;350&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/Zct4TwA3M8Y&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/Zct4TwA3M8Y&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;425&quot; height=&quot;350&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/02/malwarealarm.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-1769203558967700937</guid><pubDate>Wed, 06 Feb 2008 13:39:00 +0000</pubDate><atom:updated>2008-12-08T16:20:03.734-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">feta hacked neosploit bbc</category><title>UK .gov site hacked</title><description>Note: One of our users, John Thomson (no relation as far as I know :-) ) noticed this first and brought it to our attention. His blog entry is here ...&lt;br /&gt;http://www.roundtripsolutions.com/blog/2008/02/06/317/forth-road-bridge-website-hacked/&lt;br /&gt;&lt;br /&gt;Sorry John! :-) &lt;br /&gt;&lt;br /&gt;Hi folks,&lt;br /&gt;&lt;br /&gt;Sometime between the 1st Feb 2008, and the 3rd of Feb 2008, the official website for the Forth Estuary Transport Authority was hacked an obfuscated iframe, using Neosploit encoding, was injected.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw1-Ng2qq9RwCcxxq1G_CVE_d6rSKERJnLLnKYClRJXzoIqJ_H6-I4Y6RDPwIzvtRApCqNBe08zoCPjRytPYA5JmnPRYl2pP_iLSBApiIb6KKMve66mTtn1_en9WpX7GGLbFV1/s1600-h/neo+in+main.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw1-Ng2qq9RwCcxxq1G_CVE_d6rSKERJnLLnKYClRJXzoIqJ_H6-I4Y6RDPwIzvtRApCqNBe08zoCPjRytPYA5JmnPRYl2pP_iLSBApiIb6KKMve66mTtn1_en9WpX7GGLbFV1/s400/neo+in+main.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5163873747869296146&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This decoded to an iframe that called to 88.255.90.130 (careful about going there, folks)...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_5zsiz9QqgEy8voO9Gjuhu4uHiCRG9TOSeiLbwSztXeAShAX4S7IxPUrAnzDc_qvUjKyIC5IhzY5REDx-unn8cN7NcPUOs47Sh-wIeqCTJwWR-VEp5CJRd0PSCpuS3VmL6M3P/s1600-h/neo+decrypted.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_5zsiz9QqgEy8voO9Gjuhu4uHiCRG9TOSeiLbwSztXeAShAX4S7IxPUrAnzDc_qvUjKyIC5IhzY5REDx-unn8cN7NcPUOs47Sh-wIeqCTJwWR-VEp5CJRd0PSCpuS3VmL6M3P/s400/neo+decrypted.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5163874868855760418&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This, in turn, loaded one of the current Neosploit exploit package (we have a full write-up on Neo a little further down this blog). If you&#39;re patched, or running LinkScanner, you&#39;re ok, but if not, you probably got a rootkit, so if you visited that website in the last couple of days, you might like to run an anti-root and an anti virus over your system. AVG has a free one here ... http://free.grisoft.com .&lt;br /&gt;&lt;br /&gt;One of the most interesting aspects of this is that inside the full Neosploit download was an attempt to load bbc.com.uk , presuamably after the infection, presumably to hide what had happened a little bit. That&#39;s no big deal in itself, but a hacked uk gov website, pointing to the bbc afterwards makes us think it was not a random hack, but something more deliberate. Interesting times, folks.&lt;br /&gt;&lt;br /&gt;Looks like they cleaned the site this morning, although the google cache is still infective, so be careful.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/02/uk-gov-site-hacked.html</link><author>noreply@blogger.com (tcsl)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw1-Ng2qq9RwCcxxq1G_CVE_d6rSKERJnLLnKYClRJXzoIqJ_H6-I4Y6RDPwIzvtRApCqNBe08zoCPjRytPYA5JmnPRYl2pP_iLSBApiIb6KKMve66mTtn1_en9WpX7GGLbFV1/s72-c/neo+in+main.jpg" height="72" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-7264149536211561881</guid><pubDate>Sat, 02 Feb 2008 22:11:00 +0000</pubDate><atom:updated>2008-02-02T14:20:21.863-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">innocent searches</category><title>Return of Innocent Searches</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;I keep getting requests offline for more innocent searches, so here are some from the last couple of days. Enjoy...&lt;br /&gt;&lt;br /&gt;coal furnace with gas insert - fake codec&lt;br /&gt;road trip - neosploit&lt;br /&gt;pearl shop - neosploit&lt;br /&gt;high capacity battery pack - fake codec/ rootkit&lt;br /&gt;eyelashes + adhesive - fake codec&lt;br /&gt;camping turon gate - fake codec&lt;br /&gt;greenville gremlins - fake codec&lt;br /&gt;blueberry jam - mpack/ icepack&lt;br /&gt;school closings in illinois parents - search engine hijack&lt;br /&gt;las vegas wedding photographers - mdac &lt;br /&gt;carolina theater - mpack/ icepack&lt;br /&gt;&lt;br /&gt;Stay safe folks,&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/02/return-of-innocent-searches.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-4543397216003270919</guid><pubDate>Thu, 31 Jan 2008 03:06:00 +0000</pubDate><atom:updated>2008-01-30T19:39:32.387-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">transient web site hack linkscanner avg</category><title>A transient hack</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;A few days ago, we were looking at a website that was being blogged about (on Jan 21st) as being hacked, but when we looked (on Jan 21st) it was already clean. What we normally do in such cases is go to the google cache, and that usually gets us a copy of the exploit, but in this case, it was clean in the cache as well, so... what gives???&lt;br /&gt;&lt;br /&gt;The google bots went past three days earlier, so we wondered if there was a different result from the other search engine caches, and lo and behold, the yahoo cache was still infective. :-)&lt;br /&gt;&lt;br /&gt;Now, yahoo doesn&#39;t show the date that they went by, but a quick email exchange with the blog author confirmed that it was definitely infective on the 21st.&lt;br /&gt;&lt;br /&gt;What this means is that it was clean on the 18th, but hacked after that, and then cleaned on the 21st.&lt;br /&gt;&lt;br /&gt;Just for fun, we made this vid about it...&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;425&quot; height=&quot;350&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/UzVgQX7gvZw&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/UzVgQX7gvZw&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;425&quot; height=&quot;350&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;Keep safe folks&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/01/transient-hack.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-8300192593683624881</guid><pubDate>Mon, 14 Jan 2008 02:43:00 +0000</pubDate><atom:updated>2008-01-13T19:07:24.394-08:00</atom:updated><title>Pigs fly... oh, and another 0-day ... ho hum</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;In a previous entry I suggested that we&#39;d probably never know how the uc8010.com mass hack occurred unless one of the website victims told us, and that the chances of that were about the same as flying pigs. Guess what ... it turns out that some people do have the right combination of nerve, public spirit, and willingness to share about security matters... so... pigs _can_ fly, and now we know how it happened. I _did_ promise it was off the record, so we can&#39;t share it further, but at least we know. Bravo to that person!&lt;br /&gt;&lt;br /&gt;And why ho-hum about a 0-day? It only affects users of a product called QVOD Player, which seems to be a popular Chinese media player, but which is probably only on Chinese user&#39;s machines.&lt;br /&gt;&lt;br /&gt;The exploit code is coming from a Chinese website, so that makes sense, and it is obfuscated by flipping all the high-order bits in the javascript, to make it harder to read and notice.&lt;br /&gt;&lt;br /&gt;Fortunately, this appears unlikely to be taken up by the gangs targeting Western PCs and the kit developers, so it&#39;s probably not going to be a major problem.&lt;br /&gt;&lt;br /&gt;The real message, of course, is that the Bad Guys are still thinking.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/01/pigs-fly-oh-and-another-0-day-ho-hum.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-390795163150121139</guid><pubDate>Sun, 06 Jan 2008 02:09:00 +0000</pubDate><atom:updated>2008-01-05T18:50:31.998-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">uc0810 CA MDAC</category><title>So this is kind of interesting...</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;This domain uc8010(dot)com was registered just a few days ago (Dec 28), and yet, at one point Google showed script injections pointing to it were showing up on over 70k domains.&lt;br /&gt;&lt;br /&gt;So the first point is that this was a pretty good mass-hack, and it wasn&#39;t just that they got into a server farm, as the victims were quite diverse, with presumably the only common point being whatever vulnerability they all shared.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The second point is that some victims were pretty sophisticated in terms of security smarts, including, apparently, some Computer Associates pages. The exploit must have been pretty new. I wonder if any of the website operators will have the nerve to own up and tell us how they got nailed? Pigs might fly too.&lt;br /&gt;&lt;br /&gt;The third point is how fast the victims are being cleaned up. If you google for uc8010(dot)com, you still get about 50k hits, but if you are running something like LinkScanner (something that can check out each of those sites in real time by crawling to them), you will see that although the google snapshot still shows them infected, LinkScanner shows that the majority of them are already clean. (Btw, what this means is that the cached copy is probably still infective, so don&#39;t go testing it out yourself unless you know what you&#39;re doing)&lt;br /&gt;&lt;br /&gt;The fourth interesting point is that the only exploit we were able to coax out of them was the venerable MS06-014 (MDAC) patched in September 2006. What this means is that they went to the trouble of preparing a good website exploit, and a good mass-hack, but then used a mouldy old client exploit. It&#39;s almost a dichotomy.&lt;br /&gt;&lt;br /&gt;Stay safe folks!&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger&lt;br /&gt;Chief Research Officer&lt;br /&gt;AVG/ Grisoft</description><link>http://explabs.blogspot.com/2008/01/so-this-is-kind-of-interesting.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>8</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-7728117926971056714</guid><pubDate>Thu, 03 Jan 2008 23:25:00 +0000</pubDate><atom:updated>2008-01-03T17:41:17.435-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">storm neosploit</category><title>Neosploit January 2008</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;Welcome to 2008. Let&#39;s hope it&#39;s a safer year than last.&lt;br /&gt;&lt;br /&gt;Given that Neosploit seems to be gaining in popularity, and seems to be being modified fairly often, we thought it would be worthwhile to take a bit of a snapshot of it, for posterity&#39;s sake, if nothing else.&lt;br /&gt;&lt;br /&gt;Here&#39;s what we&#39;re seeing in January 2008: (Props to Glenn Jordan of AVG/ Grisoft, and Nick FitzGerald for their Most Excellent help with decryption and analysis)&lt;br /&gt;&lt;br /&gt;First there&#39;s a sort of pre-amble... typically there is a launcher script whose job it is to simply redirect to the exploit script. We say &quot;simply&quot; with our tongue firmly in our cheek because the launch scripts are typically encoded twice with Neosploit to make it hard for crawl-bots (but not a browser) to follow, and it appears that they might be encoded with the ip of victim, so that the exe is hard to get (except for a victim).&lt;br /&gt;&lt;br /&gt;Then the exploit script itself is also double encoded, again with the Neo-algorithm, and contains the following exploits...&lt;br /&gt;&lt;br /&gt;(1) first is the venerable MDAC (MS06-014). It&#39;s old, (worked up to Sep 2006), but it works like a charm if you&#39;re not patched.&lt;br /&gt;(2) second is one of the many QuickTime exploits. It&#39;s not easy to determine which version it is, but it&#39;s probably one of last years.&lt;br /&gt;(3) three is AOL&#39;s SuperBuddy, from April 2007&lt;br /&gt;(4) is an NCTAudioFile2 overflow from January 2007&lt;br /&gt;(5) is the GomWebCtrl from October 2007, and which has recently appeared in the Storm exploit pack as well (an idea that is Catching On (tm))&lt;br /&gt;(6) is SetSlice, patched in October 2006 and &lt;br /&gt;(7) is the ANI exploit from April 2007.&lt;br /&gt;&lt;br /&gt;Interestingly the previously-popular WinZip exploit has been dropped.&lt;br /&gt;&lt;br /&gt;The payload, or the exe that gets delivered, of course varies from website to website.&lt;br /&gt;&lt;br /&gt;It will be interesting to see how long it takes to update it with the current RealPlayer exploit.&lt;br /&gt;&lt;br /&gt;Keep safe folks!&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2008/01/neosploit-january-2008.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-7807874247977029758</guid><pubDate>Mon, 24 Dec 2007 19:25:00 +0000</pubDate><atom:updated>2007-12-24T11:42:02.418-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">storm gom</category><title>Storm is b-a-a-a-a-ack</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;As you&#39;ve probably noticed, Storm is back for Christmas. There are only two noteworthy points about it.&lt;br /&gt;&lt;br /&gt;The first is that they&#39;ve added another fairly new exploit to it, and that is for something called GomPlayer, or the Gretech Online Movie Player, which is apparently very popular in South Korea.&lt;br /&gt;&lt;br /&gt;The exploit is from October 2007, and is explained here, http://www.milw0rm.com/exploits/4579, but the key point is that if you&#39;re using GomPlayer, you&#39;re potentially vulnerable.&lt;br /&gt;&lt;br /&gt;The second point is that 3rd party dlls continue to provide the attack points for new exploits. This is kind of interesting, and either means that Microsoft is patching faster than the exploits are coming out, or 3rd parties are not patching fast enough, or perhaps both.&lt;br /&gt;&lt;br /&gt;Of course, this also highlights that the Bad Guys don&#39;t want or need a massive number of infections... they couldn&#39;t handle that... all they want is enough to make a profit. Folks, they&#39;re farming the Internet.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Rog</description><link>http://explabs.blogspot.com/2007/12/storm-is-b-a-a-ack.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-26689187.post-2431793291182002260</guid><pubDate>Thu, 20 Dec 2007 02:14:00 +0000</pubDate><atom:updated>2007-12-19T19:31:15.258-08:00</atom:updated><title>In the news today... December 19, 2007</title><description>Hi folks,&lt;br /&gt;&lt;br /&gt;Things have been quiet for a few weeks now, and we&#39;ve been patiently waiting for the other shoe to drop, especially given that it&#39;s the run-up to Christmas, but four fairly notable things have happened today...&lt;br /&gt;&lt;br /&gt;First is that the DollarRevenue guys have been fined $1m euros for dodgy practises, with the full story &lt;a href=&quot;http://www.opta.nl/asp/en/newsandpublications/pressreleases/document.asp?id=2459&quot;&gt;here.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Shout-outs to OPTA, although a bigger fine would have been even better.&lt;br /&gt;&lt;br /&gt;(Props: Larry @ Spamhaus)&lt;br /&gt;&lt;br /&gt;Second is that the authors of the popular Pinch trojan have been arrested in Russia, full story &lt;a href=&quot;http://www.viruslist.com/en/weblog?weblogid=208187472&quot;&gt;here.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;(Props: Kaspersky Labs and Ferg)&lt;br /&gt;&lt;br /&gt;Surely those two events will serve to make perpetrators think twice.&lt;br /&gt;&lt;br /&gt;Third is that, seemingly overnight, there was a web worm on Orkut, which seemingly lived, infected 400k computers, and died again overnight due to google being quick to react (shout-outs to google for that). Basic story is that any place where 3rd parties can post to a website, such as scrapbook entries on Orkut, represent an issue. If the 3rd party can post javascript, there&#39;s a good chance they can do something malicious, so all such inputs are supposed to be sanitized against that, but in this case the perp found a way to disguise the javascript enough to get past the validation/ sanitization process, and voila .... a webworm. It&#39;s a wonder we don&#39;t see more of them. Fuller story &lt;a href=&quot;http://ryanlrussell.blogspot.com/2007/12/more-on-orkut-worm.html&quot;&gt;here.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;(Props: Ryan)&lt;br /&gt;&lt;br /&gt;The fourth thing is that one of our goat machines we got a virus today from a website. A really, truly virus called Cekar! Cekar is not particularly new, having been around the early part of 2007, and its main function is to steal passwords from a Chinese chat program called QQ (according to McAfee ... http://vil.nai.com/vil/content/v_141463.htm), and this makes sense, because it came in from a Chinese exploit server. The exploit that delivered it was old too... an MDAC (MS06-014), but it was interesting to watch it infect the system. It was a fast infector too... instead of waiting for a program to execute before infecting, it hit the whole disk, and all visible network drives in one pass. Quite took us back to the Old Days of the early 90&#39;s when fast infectors were the problem du jour.&lt;br /&gt;&lt;br /&gt;This really underscores two points... (1) it&#39;s way better to keep these things off your disk in the first place, because a fast infector messes you big time, and (2) we are _always_ going to need good antiviruses, just for the times when they manage to get in.&lt;br /&gt;&lt;br /&gt;Cheers&lt;br /&gt;&lt;br /&gt;Roger</description><link>http://explabs.blogspot.com/2007/12/in-news-today-december-19-2007.html</link><author>noreply@blogger.com (tcsl)</author><thr:total>0</thr:total></item></channel></rss>