<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-14777922</atom:id><lastBuildDate>Sun, 28 Jan 2024 09:01:51 +0000</lastBuildDate><category>NewMediaCodec</category><category>TDSServ rootkit removal</category><category>Zlob rootkit</category><category>Autohotkey</category><category>C++</category><category>OAuth</category><category>Orkut hating virus</category><category>Privacy Protector</category><category>SysProt AntiRootkit</category><category>Udefender</category><category>Ultimate Cleaner</category><category>Zlob</category><category>a.exe</category><category>fake mp3 downloads</category><category>gop.exe</category><category>rootkit</category><category>twitCurl</category><category>twitter</category><category>vdo_</category><title>Swatkat&#39;s rants</title><description>on general computing, programming, Windows security and more!</description><link>http://swatrant.blogspot.com/</link><managingEditor>noreply@blogger.com (swatkat)</managingEditor><generator>Blogger</generator><openSearch:totalResults>137</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-2490239471192038402</guid><pubDate>Sat, 22 Jun 2013 18:01:00 +0000</pubDate><atom:updated>2013-06-22T23:36:19.995+05:30</atom:updated><title>How to build cURL static library with SSL support on Windows</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
This is a short note about building cURL with SSL support on Windows.&lt;br /&gt;
&lt;br /&gt;
Tools required:&lt;br /&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;cURL source: Download latest cURL source from &lt;a href=&quot;http://curl.haxx.se/download.html&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Microsoft Visual C++ 2008 or 2010 Express Edition: It looks like 2008 Express Edition is no longer available, but 2010 Express Edition can be downloaded from &lt;a href=&quot;http://www.microsoft.com/visualstudio/eng/downloads#d-2010-express&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Win32 OpenSSL:&lt;/li&gt;
&lt;ol&gt;
&lt;li&gt;Download Win32 OpenSSL installer and Visual Studio redistributable from &lt;a href=&quot;http://slproweb.com/products/Win32OpenSSL.html&quot;&gt;here&lt;/a&gt; - these are &lt;i&gt;Win32 OpenSSL v1.0.1e&lt;/i&gt; and &lt;i&gt;Visual C++ 2008 Redistributables&lt;/i&gt; at the time of this writing.&lt;/li&gt;
&lt;li&gt;Install Win32 OpenSSL; by default it installs to &lt;code&gt;&lt;i&gt;C:\OpenSSL-Win32&lt;/i&gt;&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Install Visual C++ 2008 redistributable.&lt;/li&gt;
&lt;/ol&gt;
&lt;/ol&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Building cURL:&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Run &lt;code&gt;&lt;b&gt;&lt;i&gt;Visual Studio 2008 Command Prompt&lt;/i&gt;&lt;/b&gt;&lt;/code&gt; from Start Menu &amp;gt; All Programs &amp;gt; Microsoft Visual C++ 2008 Express Edition &amp;gt; Visual Studio Tools. Or, Visual Studio 2010 Command Prompt if you&#39;re using Visual C++ 2010.&lt;/li&gt;
&lt;li&gt;Navigate to &lt;code&gt;&lt;b&gt;&lt;i&gt;winbuild&lt;/i&gt;&lt;/b&gt;&lt;/code&gt;&amp;nbsp;sub-directory in cURL source directory, and issue following command:&lt;/li&gt;
&lt;/ol&gt;
&lt;code&gt;nmake /f Makefile.vc mode=static WITH_SSL=static WITH_DEVEL=C:\OpenSSL-Win32 &lt;b&gt;&lt;i&gt;VC=X&lt;/i&gt;&lt;/b&gt; ENABLE_SSPI=no ENABLE_IDN=no ENABLE_WINSSL=no DEBUG=no MACHINE=x86 GEN_PDB=no ENABLE_IPV6=yes&lt;/code&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Note: In &lt;b&gt;&lt;i&gt;VC=X&lt;/i&gt;&lt;/b&gt;, replace &lt;b&gt;&lt;i&gt;X&lt;/i&gt;&lt;/b&gt; with 9 for Visual C++ 2008 or 10 for Visual C++ 2010.&lt;br /&gt;
&lt;br /&gt;
Once build is complete, cURL static libraries would be copied to &lt;code&gt;&lt;b&gt;&lt;i&gt;builds&lt;/i&gt;&lt;/b&gt;&lt;/code&gt; sub-directory in cURL source directory.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2013/06/how-to-build-curl-static-library-with.html</link><author>noreply@blogger.com (swatkat)</author><thr:total>53</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-7123383924523297295</guid><pubDate>Sun, 31 Oct 2010 08:26:00 +0000</pubDate><atom:updated>2010-10-31T15:45:15.462+05:30</atom:updated><title>FLVTube - rogue video player</title><description>&lt;div&gt;&lt;div&gt;FLVTube is supposedly a video player that downloads and plays YouTube videos. Only a few anti-viruses categorize FLVTube as an adware, and most of the antivirus software do not have any detection for it. FLVTube uses the &lt;a href=&quot;http://threatinfo.trendmicro.com/vinfo/secadvisories/default6.asp?vname=THE%20ZLOB%20SHOW:%20TROJAN%20POSES%20AS%20FAKE%20VIDEO%20CODEC,%20LOADS%20MORE%20THREATS&quot;&gt;familiar fake codec download techniques&lt;/a&gt; to trick PC users in downloading their software: You chance upon a video clip on a random website and to view it you need to download FLVTube! If FLVTube is really a genuine video player, then I wonder why they are using such misleading installation strategies.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/TM0olaXnShI/AAAAAAAAA4E/cIU1qAsn6R4/s1600/FLVTube.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 230px;&quot; src=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/TM0olaXnShI/AAAAAAAAA4E/cIU1qAsn6R4/s320/FLVTube.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5534124140306844178&quot; /&gt;&lt;/a&gt;&lt;div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/TM0olaXnShI/AAAAAAAAA4E/cIU1qAsn6R4/s1600/FLVTube.jpg&quot;&gt;&lt;/a&gt;&lt;div&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/TM0olaXnShI/AAAAAAAAA4E/cIU1qAsn6R4/s1600/FLVTube.jpg&quot;&gt;&lt;/a&gt;&lt;div&gt;&lt;div&gt;During installation, FLVTube gives options to install following affiliate products of questionable reputation:&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;Emoticons Toolbar by SweetIM&lt;/li&gt;&lt;li&gt;WhiteSmoke Grammar software&lt;/li&gt;&lt;li&gt;Uniblue RegistryBooster&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/TM0olhKI0bI/AAAAAAAAA4M/MZvX9e7mCFI/s1600/FLVTube_installer_1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 234px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/TM0olhKI0bI/AAAAAAAAA4M/MZvX9e7mCFI/s320/FLVTube_installer_1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5534124142129369522&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/TM0olruEhUI/AAAAAAAAA4U/JxIbBQA8GW4/s1600/FLVTube_installer_2.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 234px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/TM0olruEhUI/AAAAAAAAA4U/JxIbBQA8GW4/s320/FLVTube_installer_2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5534124144964437314&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/TM0ol5-lg9I/AAAAAAAAA4c/PH773n_g2C4/s1600/FLVTube_installer_3.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 234px;&quot; src=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/TM0ol5-lg9I/AAAAAAAAA4c/PH773n_g2C4/s320/FLVTube_installer_3.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5534124148791804882&quot; /&gt;&lt;/a&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;And, it installs following mandatory components:&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;FLVTube Player&lt;/li&gt;&lt;li&gt;FLVTube Toolbar&lt;/li&gt;&lt;li&gt;QueryBrowser Search Assistant&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/TM0omPMQkCI/AAAAAAAAA4k/sFXabvYvcnU/s1600/FLVTube_installer_4.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 234px;&quot; src=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/TM0omPMQkCI/AAAAAAAAA4k/sFXabvYvcnU/s320/FLVTube_installer_4.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5534124154486296610&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;FLVTube Toolbar and QueryBrowser Search Assistant hijack browser homepage and search provider to &lt;code&gt;http://flvtubesearch.co&lt;/code&gt; and &lt;code&gt;www.querybrowser.com&lt;/code&gt; (however, this is mentioned in terms and conditions during installation).&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/TM0q-WC5RKI/AAAAAAAAA5U/EpW7IlxEcpQ/s1600/FLV_Browser_Hijack.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 230px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/TM0q-WC5RKI/AAAAAAAAA5U/EpW7IlxEcpQ/s320/FLV_Browser_Hijack.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5534126767666185378&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;VirusTotal scan results of installer and browser plugins can be found &lt;a href=&quot;http://www.virustotal.com/file-scan/report.html?id=41af94c409094ce910cb7b574fb730dcc00bdb0a63b589318e6e3575ac714c74-1288510715&quot;&gt;here&lt;/a&gt;, &lt;a href=&quot;http://www.virustotal.com/file-scan/report.html?id=921bd62554c12dd87d4f9ee162bed990eb345073c43b167343c752847ebaab24-1288512515&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;http://www.virustotal.com/file-scan/report.html?id=eb6b2c7bdd4e918174b059bd4c79e1d38014aa10babc4b9ebd6e2ce46c50bfe4-1288512725&quot;&gt;here&lt;/a&gt;. Stay clear of this rogue video player! &lt;a href=&quot;http://www.malwarebytes.org/mbam.php&quot;&gt;Malwarebytes Anti-Malware&lt;/a&gt; can be used to remove FLVTube Player.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2010/10/flvtube-rogue-video-player.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_g2qoDleHSYA/TM0olaXnShI/AAAAAAAAA4E/cIU1qAsn6R4/s72-c/FLVTube.jpg" height="72" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-4622890411575517824</guid><pubDate>Sat, 23 Oct 2010 15:56:00 +0000</pubDate><atom:updated>2010-10-23T21:45:50.950+05:30</atom:updated><title>ThinkPoint rogue antivirus</title><description>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;ThinkPoint &lt;/b&gt;is a new addition to the long list of rogue antivirus programs. ThinkPoint uses fake codec download tricks for its distribution. Once installed, it shows a fake&lt;i&gt; &quot;Microsoft Security Essentials Alert&quot;&lt;/i&gt; popup box showing a non-existent threat.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;img src=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/TMMGrQGd57I/AAAAAAAAA24/Rgxv9iVsXLE/s320/ThinkPoint_FakeAV.jpg&quot; style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 214px;&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5531272107467335602&quot; /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;ThinkPoint adds a &lt;a href=&quot;http://msdn.microsoft.com/en-us/library/ms838576(WinEmbedded.5).aspx&quot;&gt;Winlogon Shell&lt;/a&gt; registry entry, so that ThinkPoint starts up instead of Windows Explorer during Windows startup. ThinkPoint hijacks the startup/login screen.&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;img src=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/TMMHXgvXuBI/AAAAAAAAA3I/zswCqvVtMVg/s320/ThinkPoint_FakeAV_StartupHijack.jpg&quot; style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 238px;&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5531272867848108050&quot; /&gt;&lt;div&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;At this point, follow these steps to get back the standard Windows desktop:&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;Start Task Manager by pressing CTRL+ALT+DEL and kill the process named &lt;b&gt;&lt;i&gt;hotfix.exe.&lt;/i&gt;&lt;/b&gt;&lt;/li&gt;&lt;li&gt;Go to &lt;i&gt;File Menu &gt; New Task (Run) &lt;/i&gt;in Task Manager&lt;i&gt; &lt;/i&gt;and type &lt;b&gt;&lt;i&gt;explorer.exe&lt;/i&gt;&lt;/b&gt; to spawn Windows Explorer.&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;In case you don&#39;t find &lt;i&gt;hotfix.exe&lt;/i&gt; process in Task Manager, it could mean that the rogue program is using a different filename. Interestingly, there&#39;s a workaround built into this rogue program to get to desktop:&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;Click &lt;i&gt;&quot;Safe Startup&quot;&lt;/i&gt; button and allow it to finish its fake scanning (duh!). After it completes scanning and shows scan results, click &lt;i&gt;&quot;Continue Unprotected&quot;.&lt;/i&gt;&lt;/li&gt;&lt;li&gt;Now, click &lt;i&gt;&quot;Settings&quot;&lt;/i&gt; and select the option &lt;i&gt;&quot;Allow unprotected startup&quot;.&lt;/i&gt;&lt;/li&gt;&lt;/ul&gt;&lt;img src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/TMMHuQvTTuI/AAAAAAAAA3Q/ohAk9CiD7js/s320/ThinkPoint_FakeAV_StartupHijack4.jpg&quot; style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 218px;&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5531273258689842914&quot; /&gt;&lt;ul&gt;&lt;li&gt;Close ThinkPoint rogue program&#39;s window by clicking the close button on top-right corner. This should take you to the standard Windows desktop.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;VirusTotal scan results for ThinkPoint installer can be found &lt;a href=&quot;http://www.virustotal.com/file-scan/report.html?id=456b890f3ce5039e76b02878b4cff7ca4eda10ba8e1e76c37ce82f30166b73da-1287846406&quot;&gt;here&lt;/a&gt;. &lt;a href=&quot;http://www.malwarebytes.org/mbam.php&quot;&gt;Malwarebytes&#39; Anti-Malware&lt;/a&gt; can be used to remove ThinkPoint rogue antivirus program completely.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2010/10/thinkpoint-rogue-antivirus.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_g2qoDleHSYA/TMMGrQGd57I/AAAAAAAAA24/Rgxv9iVsXLE/s72-c/ThinkPoint_FakeAV.jpg" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-3998470439133910773</guid><pubDate>Sun, 12 Sep 2010 19:30:00 +0000</pubDate><atom:updated>2010-09-13T01:04:16.411+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">C++</category><category domain="http://www.blogger.com/atom/ns#">OAuth</category><category domain="http://www.blogger.com/atom/ns#">twitCurl</category><category domain="http://www.blogger.com/atom/ns#">twitter</category><title>OAuth support for twitCurl</title><description>The &lt;b&gt;&lt;a href=&quot;http://code.google.com/p/twitcurl/&quot;&gt;twitCurl&lt;/a&gt;&lt;/b&gt; twitter API library now supports OAuth authorization methods for twitter! Check out project wiki page for more information on twitCurl OAuth flow:&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;http://code.google.com/p/twitcurl/wiki/TwitcurlOAuthFlow&quot;&gt;http://code.google.com/p/twitcurl/wiki/TwitcurlOAuthFlow&lt;/a&gt;&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2010/09/oauth-support-for-twitcurl.html</link><author>noreply@blogger.com (swatkat)</author><thr:total>10</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-9112567054719593635</guid><pubDate>Wed, 01 Sep 2010 08:45:00 +0000</pubDate><atom:updated>2010-09-01T15:25:44.185+05:30</atom:updated><title>ARKit updates</title><description>&lt;div&gt;Few updates on ARKit library! Following functionalities have been added to the library:&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;VAD tree traversal to find images loaded by a process&lt;/li&gt;&lt;li&gt;SSDT hook restoration&lt;/li&gt;&lt;li&gt;Kernel inline hook restoration&lt;/li&gt;&lt;li&gt;Process detection by scanning Handle Table&lt;/li&gt;&lt;li&gt;Process termination using NtTerminateProcess and NtTerminateThread&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;Get the source code &lt;a href=&quot;http://code.google.com/p/arkitlib/&quot;&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.</description><link>http://swatrant.blogspot.com/2010/09/arkit-updates.html</link><author>noreply@blogger.com (swatkat)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-6498783967474600582</guid><pubDate>Sun, 25 Jul 2010 15:18:00 +0000</pubDate><atom:updated>2010-07-25T20:52:57.848+05:30</atom:updated><title>ARKit - An open-source rootkit detection library for Windows</title><description>&lt;div&gt;&lt;b&gt;ARKit &lt;/b&gt;is an open-source rootkit detection library for Microsoft Windows. ARKit has two components:&lt;/div&gt;&lt;div&gt;&lt;ol&gt;&lt;li&gt;&lt;b&gt;&lt;i&gt;ARKitLib &lt;/i&gt;&lt;/b&gt;- A Win32/C++ static library that exposes various methods to scan system and detect rootkits&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;i&gt;ARKitDrv &lt;/i&gt;&lt;/b&gt;- A device driver that actually implements methods to scan and detect rootkits&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div&gt;Currently, ARKit has following features:&lt;/div&gt;&lt;div&gt;&lt;ol&gt;&lt;li&gt;Process scanning – Detect all running processes (hidden and visible)&lt;/li&gt;&lt;li&gt;DLL scanning – Detect DLLs loaded in a process&lt;/li&gt;&lt;li&gt;Driver scanning – Detect all loaded drivers (hidden and visible)&lt;/li&gt;&lt;li&gt;SSDT hook detection&lt;/li&gt;&lt;li&gt;Sysenter hook detection&lt;/li&gt;&lt;li&gt;Kernel inline hook detection&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div&gt;ARKit works on 32-bit flavors of Windows 2000, XP, 2003 and Vista. It has not been tested on Windows 2008 and Windows 7 yet.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;For more information on ARKit project, please visit:&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;http://code.google.com/p/arkitlib/&quot;&gt;http://code.google.com/p/arkitlib/&lt;/a&gt;&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2010/07/arkit-open-source-rootkit-detection.html</link><author>noreply@blogger.com (swatkat)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-5995269588351460723</guid><pubDate>Tue, 06 Apr 2010 16:08:00 +0000</pubDate><atom:updated>2010-04-06T21:41:06.704+05:30</atom:updated><title>yelpcurl - C++ Yelp API library</title><description>&lt;div&gt;yelpcurl is an open-source, pure C++ wrapper for &lt;a href=&quot;http://www.yelp.com/developers/documentation/faq&quot;&gt;Yelp&#39;s RESTful APIs&lt;/a&gt;. The library currently supports all the APIs provided by Yelp. yelpcurl uses &lt;a href=&quot;http://curl.haxx.se/&quot;&gt;cURL&lt;/a&gt; and is written in a similar way as that of &lt;a href=&quot;http://code.google.com/p/twitcurl/&quot;&gt;twitcurl&lt;/a&gt;. Building applications using yelpcurl is quite easy:&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;Compile yelpcurl source files (yelpcurl.h and yelpcurl.cpp) and link with cURL library (libcurl.lib) to build static library yelpcurl.lib.&lt;/li&gt;&lt;li&gt;Include yelpcurl.h and cURL headers (present in /include/curl/ directory in cURL source) in your Yelp based application and link to yelpcurl.lib and also libcurl.lib/libcurl.dll.&lt;/li&gt;&lt;li&gt;Instantiate an object of yelpCurl class and use the Yelp API wrappers that are exposed as public methods.&lt;/li&gt;&lt;/ul&gt;yelpcurl works on all OS (Windows, Linux, Mac etc.) as it is written completely in C++ and the only dependency is cURL (which works on all OSes mentioned earlier).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;More info about the yelpcurl library can be found here:&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;http://code.google.com/p/yelpcurl/&quot;&gt;http://code.google.com/p/yelpcurl/&lt;/a&gt;&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2010/04/yelpcurl-c-yelp-api-library.html</link><author>noreply@blogger.com (swatkat)</author><thr:total>20</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-1692625681030995172</guid><pubDate>Wed, 02 Sep 2009 03:46:00 +0000</pubDate><atom:updated>2009-09-02T09:21:35.054+05:30</atom:updated><title>twitcurl - C++ twitter API library</title><description>&lt;b&gt;twitcurl &lt;/b&gt;is an open-source pure C++ library for twitter REST APIs. Currently, it has support for most of the twitter APIs and it will be updated to support all the APIs. twitcurl uses &lt;a href=&quot;http://curl.haxx.se/&quot;&gt;cURL&lt;/a&gt; library for handling HTTP requests and responses. Building applications using twitcurl is quite easy:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Compile twitcurl source files (twitcurl.h and twitcurl.cpp) and link with cURL library (libcurl.lib) to build twitcurl.lib&lt;/li&gt;&lt;li&gt;Include twitcurl.h in your twitter based application and link to twitcurl.lib and libcurl.lib/libcurl.dll.&lt;/li&gt;&lt;li&gt;Instantiate an object of twitCurl class and use the twitter API wrappers that are exposed as public methods.&lt;/li&gt;&lt;/ol&gt;twitcurl works on all OS (Windows, Linux, Mac etc.) as it is written completely in C++ and the only dependency is cURL (which works on all OSes mentioned earlier). More info about the twitcurl library along with an example program is available here:&lt;br /&gt;&lt;a href=&quot;http://code.google.com/p/twitcurl/&quot;&gt;http://code.google.com/p/twitcurl/&lt;/a&gt;</description><link>http://swatrant.blogspot.com/2009/09/twitcurl-c-twitter-api-library.html</link><author>noreply@blogger.com (swatkat)</author><thr:total>14</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-1364039525206443910</guid><pubDate>Sat, 16 May 2009 16:00:00 +0000</pubDate><atom:updated>2009-05-16T22:23:24.328+05:30</atom:updated><title>Wolfram|Alpha launches</title><description>&lt;div&gt;&lt;a href=&quot;http://www.wolframalpha.com/&quot;&gt;&lt;b&gt;Wolfram|Alpha&lt;/b&gt;&lt;/a&gt; is finally launched! Wolfram|Alpha is a &lt;i&gt;computational knowledge engine&lt;/i&gt; that to interpret the questions/queries and tries to formulate answers. It is not a search engine, it is a combination of encyclopedia and real-time data mining. Wolfram|Alpha tries to structure the information scattered in world wide web. It could be great for scientific (physics, mathematics etc.) queries as it uses &lt;a href=&quot;http://www.wolfram.com/mathematica/&quot;&gt;Wolfram Mathematica&lt;/a&gt; to compute answers. It is still in alpha stage and has a long way to go. Try it out!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;By the way, Wolfram|Alpha has &lt;i&gt;answer to life, the universe, and everything&lt;/i&gt;. It&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/Phrases_from_The_Hitchhiker&#39;s_Guide_to_the_Galaxy#Answer_to_Life.2C_the_Universe.2C_and_Everything_.2842.29&quot;&gt;42&lt;/a&gt; ;)&lt;/div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/Sg7lP6mILNI/AAAAAAAAAjU/ouOBE2imm38/s1600-h/42.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 194px;&quot; src=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/Sg7lP6mILNI/AAAAAAAAAjU/ouOBE2imm38/s320/42.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5336454670070590674&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;And, you will see this when Wolfram|Alpha website traffic exceeds its bandwidth limit:&lt;/div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/Sg7u2Eae2PI/AAAAAAAAAjc/PuDD8zIW-tY/s1600-h/HAL.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 213px;&quot; src=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/Sg7u2Eae2PI/AAAAAAAAAjc/PuDD8zIW-tY/s320/HAL.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5336465221145778418&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;Google is working on a similar tool called &lt;a href=&quot;http://education.zdnet.com/?p=2543&quot;&gt;Google Squared&lt;/a&gt;, which aims to structure the unstructured information.&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2009/05/wolframalpha-launches.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_g2qoDleHSYA/Sg7lP6mILNI/AAAAAAAAAjU/ouOBE2imm38/s72-c/42.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-5970871622157641017</guid><pubDate>Sat, 18 Apr 2009 16:21:00 +0000</pubDate><atom:updated>2009-04-18T21:55:33.287+05:30</atom:updated><title>New rogue: AV Antispyware</title><description>&lt;b&gt;AV Antispyware&lt;/b&gt; is new rogue software that belongs to &lt;a href=&quot;http://www.ca.com/securityadvisor/pest/pest.aspx?id=453146855&quot;&gt;MS Antispyware 2009&lt;/a&gt; family. The AV Antispyware installer is dropped by a fake codec hosted at &lt;code&gt;http://lvl-softwares.com (195.88.80.41)&lt;/code&gt; (do NOT visit this site).&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/Sen-nCi_cgI/AAAAAAAAAjM/Q15Z7oHMmXE/s1600-h/AVAntispyware.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 319px;&quot; src=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/Sen-nCi_cgI/AAAAAAAAAjM/Q15Z7oHMmXE/s320/AVAntispyware.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5326067980994310658&quot; /&gt;&lt;/a&gt;&lt;br /&gt;VirusTotal scan result for the dropper can be found &lt;a href=&quot;http://www.ca.com/securityadvisor/pest/pest.aspx?id=453146855&quot;&gt;here&lt;/a&gt;, and AV Antispyware removal guide can be found &lt;a href=&quot;http://www.bleepingcomputer.com/virus-removal/remove-av-antispyware&quot;&gt;here&lt;/a&gt;.</description><link>http://swatrant.blogspot.com/2009/04/new-rogue-av-antispyware.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_g2qoDleHSYA/Sen-nCi_cgI/AAAAAAAAAjM/Q15Z7oHMmXE/s72-c/AVAntispyware.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-123025338413165292</guid><pubDate>Wed, 18 Mar 2009 14:40:00 +0000</pubDate><atom:updated>2009-03-18T20:28:28.793+05:30</atom:updated><title>Waledac&#39;s new geo-sensitive social engineering</title><description>&lt;a href=&quot;http://www.f-secure.com/v-descs/email-worm_w32_waledac_a.shtml&quot;&gt;Waledac&lt;/a&gt; spammers are using yet another social engineering tactic to spread their malware.  As usual, the spam mails contain link to dubious websites. One of such spam mail can be seen in the following screenshot:&lt;div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/ScEJLnFTYBI/AAAAAAAAAio/MgkAtlzPNO8/s1600-h/Waledac_Blast1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 87px;&quot; src=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/ScEJLnFTYBI/AAAAAAAAAio/MgkAtlzPNO8/s320/Waledac_Blast1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5314539130348331026&quot; /&gt;&lt;/a&gt;&lt;br /&gt;These websites look like a Reuters news webpage reporting &quot;powerful bomb blasts&quot; near your area/city, with a video clip embedded in it. To see the video, the site persuades you to download a fake Flash Player.&lt;br /&gt;&lt;br /&gt;These fake websites are geo-sensitive and they figure out the place/city of a visitor (based on visitor&#39;s IP address) and report it as the location of &quot;bomb blasts&quot;.  This technique is called &lt;a href=&quot;http://en.wikipedia.org/wiki/Geo_targeting&quot;&gt;geo-targeting&lt;/a&gt;. An innocuous PC user may fall for this trick by thinking that bomb blasts have really occurred in his/her area and download the fake Flash Player! Following screenshots show the location sensitive website content (check the place where blasts are reported; they change based on the visitor&#39;s gepgraphical location):&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/ScEJbZQpGuI/AAAAAAAAAiw/vtY7besxggY/s1600-h/Waledac_Blast2.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 233px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/ScEJbZQpGuI/AAAAAAAAAiw/vtY7besxggY/s320/Waledac_Blast2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5314539401515703010&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/ScEJr9WC_BI/AAAAAAAAAjA/v3BC1B2hR10/s1600-h/Waledac_Blast3.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 233px;&quot; src=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/ScEJr9WC_BI/AAAAAAAAAjA/v3BC1B2hR10/s320/Waledac_Blast3.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5314539686079953938&quot; /&gt;&lt;/a&gt;&lt;br /&gt;As of now, fake webpage is located at &lt;code&gt;yyr.breakingkingnews.com (81.241.128.178)&lt;/code&gt; (&lt;a href=&quot;http://whois.domaintools.com/breakingkingnews.com&quot;&gt;whois&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;VirusTotal results of the malware hosted at the above site can be found &lt;a href=&quot;http://www.virustotal.com/analisis/c9c6958d7dc4d792db4c66b4f47dd888&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;http://www.virustotal.com/analisis/eef11192d6b3d5e4566b2a79af88145c&quot;&gt;here&lt;/a&gt;. An automated analysis by ThreatExpert can be found &lt;a href=&quot;http://www.threatexpert.com/report.aspx?md5=54801ee56a615253cff1e6ac0b6604db&quot;&gt;here&lt;/a&gt;.&lt;/div&gt;&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2009/03/waledacs-new-geo-sensitive-social.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/_g2qoDleHSYA/ScEJLnFTYBI/AAAAAAAAAio/MgkAtlzPNO8/s72-c/Waledac_Blast1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-2486870212521488705</guid><pubDate>Sun, 15 Mar 2009 17:50:00 +0000</pubDate><atom:updated>2009-03-15T23:28:41.026+05:30</atom:updated><title>SysProt AntiRootkit v1.0.1.0 released</title><description>&lt;div&gt;Another update for SysProt AntiRootkit! The latest version, &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;SysProt AntiRootkit v1.0.1.0&lt;/span&gt;, contains few bug fixes and enhancements. The changelog is as follows:&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;Added a &quot;activity bar&quot; to indicate scan progress&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Optimzed device driver scanning&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Added help file&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Fixed process and driver scanning bugs in Windows 2003 SP1 and SP2&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;Get the latest version &lt;a href=&quot;http://sites.google.com/site/sysprotantirootkit/&quot;&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;br /&gt;&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2009/03/sysprot-antirootkit-v1010-released.html</link><author>noreply@blogger.com (swatkat)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-7454436022418491156</guid><pubDate>Thu, 12 Mar 2009 18:25:00 +0000</pubDate><atom:updated>2009-03-13T00:15:04.642+05:30</atom:updated><title>Yauba - Privacy Safe Search Engine!</title><description>&lt;blockquote&gt;&lt;/blockquote&gt;&lt;a href=&quot;http://www.yauba.co.in/&quot;&gt;&lt;b&gt;Yauba&lt;/b&gt;&lt;/a&gt; is a brand new search engine from &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;India&lt;/st1:place&gt;&lt;/st1:country-region&gt;. Yauba&#39;s search result quality is great and is comparable to that of Google. Yauba neatly organizes the search results and also shows text/image previews of websites.&lt;br /&gt;&lt;br /&gt;One of the important features of Yauba is its stress of user&#39;s privacy and security. Yauba operates in complete &lt;i&gt;incognito&lt;/i&gt; mode and does not collect any personal data. Their privacy policy goes like this!&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SblV2rRpQuI/AAAAAAAAAig/NgTdvdGZYE4/s1600-h/Yauba_PrivacyPolicy.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 82px;&quot; src=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SblV2rRpQuI/AAAAAAAAAig/NgTdvdGZYE4/s320/Yauba_PrivacyPolicy.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5312371633278239458&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Here&#39;s an excerpt from Yauba&#39;s site, which tells us about their privacy practices:&lt;br /&gt;&lt;blockquote&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-size:small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: italic;&quot;&gt;Most search engines try to gather and record as much information about their users as possible. They (or their parent companies) operate massive server farms with even more massive databases that secretly record your entire search history, your private contacts, the identity of your family and friends, your personal emails, your conversations and chats, your browsing habits, your physical location, details on the software you use on your computer, your IP address, and much much more. This is no exaggeration. Indeed, if you ever saw exactly how much most search engines actually know about your private details, you would be completely shocked.&lt;br /&gt;&lt;br /&gt;At Yauba, we completely reject the view that search engines somehow need to keep mountains of data on their own users. Instead, we take the exact opposite approach. We do everything we can to protect the privacy of our users.&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;This is why we do not keep any record of any of your search terms, browsing habits or any other personally identifiable information.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;This is why we automatically delete any and every piece of personally identifiable information from our servers on a continuous basis.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;This is why we can have the shortest privacy policy (9 words) of any major Internet service in the world.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;This is why you can visit almost every Internet site through the main Yauba service on a completely anonymous basis (with the only exception of file types that use other external third party software or plug-ins for downloading or playing).&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Yauba is still in Beta/Late-Alpha state, and I think it is a very good service. Try Yauba at &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(85, 26, 139); text-decoration: underline;&quot;&gt;&lt;a href=&quot;http://www.yauba.com/&quot;&gt;http://www.yauba.com/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2009/03/yauba-privacy-safe-search-engine.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_g2qoDleHSYA/SblV2rRpQuI/AAAAAAAAAig/NgTdvdGZYE4/s72-c/Yauba_PrivacyPolicy.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-1385850648292335791</guid><pubDate>Sat, 07 Mar 2009 20:52:00 +0000</pubDate><atom:updated>2009-03-08T02:37:42.616+05:30</atom:updated><title>SysProt AntiRootkit v1.0.0.9 released</title><description>&lt;div&gt;Here&#39;s the latest version of SysProt AntiRootkit. Now, &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;SysProt AntiRootkit v1.0.0.9&lt;/span&gt; supports Windows Vista (32 bit)! Check out few screenshots that show SysProt AntiRootkit in action:&lt;/div&gt;&lt;br /&gt;Kernel modules:&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SbLfJ5v9j4I/AAAAAAAAAhw/poFDiwRPWQQ/s1600-h/SysProtARK_KM.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 227px;&quot; src=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SbLfJ5v9j4I/AAAAAAAAAhw/poFDiwRPWQQ/s320/SysProtARK_KM.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5310552271837040514&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SbLgFw7-ecI/AAAAAAAAAiQ/O-JconP2Drw/s1600-h/SysProtARK_KM_Vista.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 229px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SbLgFw7-ecI/AAAAAAAAAiQ/O-JconP2Drw/s320/SysProtARK_KM_Vista.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5310553300263664066&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;SSDT hooks:&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SbLfVTIN8UI/AAAAAAAAAh4/pZvjU0YH-kY/s1600-h/SysProtARK_SSDT.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 227px;&quot; src=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SbLfVTIN8UI/AAAAAAAAAh4/pZvjU0YH-kY/s320/SysProtARK_SSDT.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5310552467628224834&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/SbLgPjQdruI/AAAAAAAAAiY/freRNTqhmvg/s1600-h/SysProtARK_SSDT_Vista.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 229px;&quot; src=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/SbLgPjQdruI/AAAAAAAAAiY/freRNTqhmvg/s320/SysProtARK_SSDT_Vista.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5310553468390190818&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Kernel inline hooks:&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SbLfdUIR5II/AAAAAAAAAiA/R1pYKBDU0Z8/s1600-h/SysProtARK_KernelHook.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 227px;&quot; src=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SbLfdUIR5II/AAAAAAAAAiA/R1pYKBDU0Z8/s320/SysProtARK_KernelHook.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5310552605335872642&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Following list summarizes the changes in &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;SysProt AntiRootkit v1.0.0.9&lt;/span&gt;:&lt;div&gt;&lt;ul&gt;&lt;li&gt;Added Windows Vista support&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Improved device driver detection&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Faster &quot;Kernel Hooks&quot; scan&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Faster &quot;Ports&quot; scan&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;The latest version can be downloaded from &lt;a href=&quot;http://sites.google.com/site/sysprotantirootkit/&quot;&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;. Supported operating systems are Windows 2000/XP/2003/Vista, 32 bit versions. Feedback is welcome :)&lt;br /&gt;&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2009/03/sysprot-antirootkit-v1009-released.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/_g2qoDleHSYA/SbLfJ5v9j4I/AAAAAAAAAhw/poFDiwRPWQQ/s72-c/SysProtARK_KM.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-5613297452125888652</guid><pubDate>Mon, 26 Jan 2009 14:29:00 +0000</pubDate><atom:updated>2009-01-26T23:24:14.590+05:30</atom:updated><title>New rogue: IE-Security</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;IE-Security&lt;/span&gt; is new rogue software that belongs to &lt;a href=&quot;http://www.symantec.com/security_response/writeup.jsp?docid=2007-111420-0754-99&quot;&gt;IEDefender&lt;/a&gt; family. The IE-Security installer, &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;ie.exe&lt;/span&gt;, is hosted at &lt;code&gt;216.240.151.112&lt;/code&gt; and &lt;code&gt;http://ie-security.com (216.240.151.135)&lt;/code&gt;. The user-interface of IE-Security is a rip-off of &lt;a href=&quot;http://www.microsoft.com/windows/products/winfamily/defender/default.mspx&quot;&gt;Microsoft Windows Defender&lt;/a&gt;.&lt;div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SX3JGFgJKUI/AAAAAAAAAhU/dE_JZDIfIRo/s1600-h/IE-Security_1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 257px;&quot; src=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SX3JGFgJKUI/AAAAAAAAAhU/dE_JZDIfIRo/s320/IE-Security_1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5295609843250964802&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;VirusTotal scan result of IE-Security installer can be found &lt;a href=&quot;http://www.virustotal.com/analisis/70c7e788714c3fb3ad90862e79bc3470&quot;&gt;here&lt;/a&gt;. By the way, people at IE-Security provide 27x7 support ;)&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SX3JVRqkNcI/AAAAAAAAAhc/54cOUQmXKL8/s1600-h/IE-Security_2.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 257px;&quot; src=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SX3JVRqkNcI/AAAAAAAAAhc/54cOUQmXKL8/s320/IE-Security_2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5295610104213943746&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(0, 0, 238); text-decoration: underline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;Files dropped by IE-Security installer:&lt;/div&gt;&lt;div&gt;%PROGRAMFILES%\&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;IE-Security\ies.s1&lt;/span&gt;&lt;/div&gt;&lt;div&gt;%PROGRAMFILES%\&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;IE-Security\ies.s2&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;%PROGRAMFILES%\&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;IE-Security\ies.s3&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;%PROGRAMFILES%\&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;IE-Security\ies.s4&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;%PROGRAMFILES%\&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;IE-Security\iescan.exe&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;%PROGRAMFILES%\&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;IE-Security\uninstall.exe&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;%USERPROFILE%\Desktop\&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;IE-Security.lnk&lt;/span&gt;&lt;/div&gt;&lt;div&gt;%USERPROFILE%\Start Menu\Programs\&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;IE-Security.lnk&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;where,&lt;/div&gt;&lt;div&gt;%PROGRAMFILES% is &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: italic;&quot;&gt;\Program Files\&lt;/span&gt; directory in root-drive,&lt;br /&gt;&lt;/div&gt;&lt;div&gt;%USERPROFILE% is &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: italic;&quot;&gt;\Documents and Settings\UserName\&lt;/span&gt; directory in root-drive.&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Registry keys created by IE-Security installer:&lt;/div&gt;&lt;div&gt;HKEY_CURRENT_USER\Software\&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;IE-Security&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&quot;IE-Security&quot;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;IE-Security&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2009/01/new-rogue-ie-security.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/_g2qoDleHSYA/SX3JGFgJKUI/AAAAAAAAAhU/dE_JZDIfIRo/s72-c/IE-Security_1.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-6598109202346113168</guid><pubDate>Mon, 26 Jan 2009 10:38:00 +0000</pubDate><atom:updated>2009-01-26T18:23:11.797+05:30</atom:updated><title>AntiSpyware 2009 and AntiSpywareBOT: Neighbours in crime!</title><description>Well, &lt;span style=&quot;font-style: italic;&quot;&gt;590-B Schillinger Rd. South, Mobile, Al, 36695&lt;/span&gt; seems to be the &lt;a href=&quot;http://en.wikipedia.org/wiki/John_Doe&quot;&gt;John Doe&lt;/a&gt; of addresses. Recently &lt;a href=&quot;http://blogs.paretologic.com/malwarediaries/index.php/2009/01/23/sweet-home-alabama/&quot;&gt;ParetoLogic blog&lt;/a&gt; posted about the address of the makers of rogueware &lt;a href=&quot;http://research.sunbelt-software.com/threatdisplay.aspx?&amp;amp;threatid=448762&quot;&gt;AntiSpyware 2009&lt;/a&gt;. It seems that the headquarters of &lt;a href=&quot;http://spywarewarrior.com/viewtopic.php?p=152826&quot;&gt;2Squared&lt;/a&gt;, makers of rogueware &lt;a href=&quot;http://research.sunbelt-software.com/threatdisplay.aspx?name=AntiSpywareBot&amp;amp;threatid=234001&quot;&gt;AntiSpywareBOT&lt;/a&gt;, is also located in the same street. Even these guys have got a high-tech, high-profile &lt;a href=&quot;http://en.wikipedia.org/wiki/Computer-generated_imagery&quot;&gt;CGI&lt;/a&gt; office ;)&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SX2UP9z3b2I/AAAAAAAAAhM/APlpBKpVdKY/s1600-h/AntiSpywareBOT_Office.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 230px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SX2UP9z3b2I/AAAAAAAAAhM/APlpBKpVdKY/s320/AntiSpywareBOT_Office.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5295551738868625250&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://swatrant.blogspot.com/2009/01/antispyware-2009-and-antispywarebot.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_g2qoDleHSYA/SX2UP9z3b2I/AAAAAAAAAhM/APlpBKpVdKY/s72-c/AntiSpywareBOT_Office.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-7436581105709300828</guid><pubDate>Sat, 17 Jan 2009 18:53:00 +0000</pubDate><atom:updated>2009-01-18T00:54:13.140+05:30</atom:updated><title>Fake Obama websites spreading malware</title><description>&lt;div&gt;Similar to &lt;a href=&quot;http://swatrant.blogspot.com/2009/01/fake-ecard-updates.html&quot;&gt;eCard spam&lt;/a&gt; mails, we are now seeing US president-elect Barack Obama themed mails which contain links to fake websites. These sites host a malicious executable and this malware belongs to the same old &lt;a href=&quot;http://en.wikipedia.org/wiki/Storm_botnet&quot;&gt;Storm/Waledac&lt;/a&gt; family. One such mail and a fake website (&lt;code&gt;http://donate.superobamadirect.com&lt;/code&gt;) are shown in following screenshots:&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SXIsSnmMCUI/AAAAAAAAAgs/TN3OIutUyUc/s1600-h/FakeObamaSites1.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 126px;&quot; src=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SXIsSnmMCUI/AAAAAAAAAgs/TN3OIutUyUc/s320/FakeObamaSites1.JPG&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292341210492176706&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SXIsfAHI-_I/AAAAAAAAAg0/AzPJnzkffTg/s1600-h/FakeObamaSites.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 230px;&quot; src=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SXIsfAHI-_I/AAAAAAAAAg0/AzPJnzkffTg/s320/FakeObamaSites.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292341423231269874&quot; /&gt;&lt;/a&gt;&lt;br /&gt;These fake sites are hosted using &lt;a href=&quot;http://en.wikipedia.org/wiki/Fast_flux&quot;&gt;fast flux&lt;/a&gt; DNS technique - a typical method used by Storm botnet. It can be seen from the following screenshot that the IP address keeps changing frequently:&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SXIvcyVnbQI/AAAAAAAAAg8/jLT7OhD5uOk/s1600-h/FakeObamaSites2.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 279px;&quot; src=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SXIvcyVnbQI/AAAAAAAAAg8/jLT7OhD5uOk/s320/FakeObamaSites2.JPG&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292344683709033730&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;VirusTotal scan result of the malware can be found &lt;a href=&quot;http://www.virustotal.com/analisis/932e9178548d6fb39d82a5b5254bf24d&quot;&gt;here&lt;/a&gt;. An automated analysis by ThreatExpert can be found &lt;a href=&quot;http://www.threatexpert.com/report.aspx?md5=ad9ccd3227b2ce1883c036819aa7b63f&quot;&gt;here&lt;/a&gt;.&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2009/01/fake-obama-websites-spreading-malware.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_g2qoDleHSYA/SXIsSnmMCUI/AAAAAAAAAgs/TN3OIutUyUc/s72-c/FakeObamaSites1.JPG" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-6352902655718177230</guid><pubDate>Wed, 07 Jan 2009 19:50:00 +0000</pubDate><atom:updated>2009-01-08T01:34:30.042+05:30</atom:updated><title>Fake eCard updates</title><description>Fake eCard spam mails continue to circulate even after the new-year excitement is settled down. As usual, these mails contain links to downloadable fake greeting cards that are generally named &quot;card.exe&quot; or &quot;postcard.exe&quot;.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SWUJk9PmbPI/AAAAAAAAAgk/j1BLXcEtESg/s1600-h/Waledac_eCard_1.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 102px;&quot; src=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SWUJk9PmbPI/AAAAAAAAAgk/j1BLXcEtESg/s320/Waledac_eCard_1.JPG&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5288643867936451826&quot; /&gt;&lt;/a&gt;&lt;br /&gt;When executed, these malicious executables turn your PC into a &lt;a href=&quot;http://en.wikipedia.org/wiki/Zombie_computer&quot;&gt;zombie machine&lt;/a&gt; that becomes a part of &lt;a href=&quot;http://en.wikipedia.org/wiki/Storm_botnet&quot;&gt;Storm/Waledac botnet&lt;/a&gt; (more information can be found &lt;a href=&quot;http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20081231&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;http://blog.threatfire.com/2009/01/ongoing-waledac-botnet-and-spam.html&quot;&gt;here&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SWUIfs2n4YI/AAAAAAAAAgc/7aXVni2EFcE/s1600-h/Waledac_eCard.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 227px;&quot; src=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SWUIfs2n4YI/AAAAAAAAAgc/7aXVni2EFcE/s320/Waledac_eCard.JPG&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5288642678125748610&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Newer variants of fake eCard executables (hosted at &lt;code&gt;http://topgreetingsite.com&lt;/code&gt; - do NOT visit that site! ) are not detected by many AVs as of now (as seen in VirusTotal scan &lt;a href=&quot;http://www.virustotal.com/analisis/335792ef8e18daa8f05062a726dc46d9&quot;&gt;here&lt;/a&gt;). An automated analysis of this file is available at ThreatExpert &lt;a href=&quot;http://www.threatexpert.com/report.aspx?md5=e26d8006afd9e34cf99d96220c3e3480&quot;&gt;here&lt;/a&gt;.</description><link>http://swatrant.blogspot.com/2009/01/fake-ecard-updates.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/_g2qoDleHSYA/SWUJk9PmbPI/AAAAAAAAAgk/j1BLXcEtESg/s72-c/Waledac_eCard_1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-2197953180289758460</guid><pubDate>Tue, 06 Jan 2009 17:49:00 +0000</pubDate><atom:updated>2009-01-10T16:07:56.953+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">SysProt AntiRootkit</category><category domain="http://www.blogger.com/atom/ns#">TDSServ rootkit removal</category><category domain="http://www.blogger.com/atom/ns#">Zlob rootkit</category><title>SysProt AntiRootkit v1.0.0.8 released</title><description>&lt;div&gt;A few key improvements were made in driver detection and disabling mechanisms, and hence here&#39;s the latest version of SysProt AntiRootkit :) The &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;SysProt AntiRootkit v1.0.0.8&lt;/span&gt; successfully detects and removes Zlob rootkits (&lt;a href=&quot;http://www.sophos.com/security/analyses/viruses-and-spyware/maltdssa.html&quot;&gt;TDSServ&lt;/a&gt; or &lt;a href=&quot;http://www.threatexpert.com/threats/trojan-win32-alureon-gen-j.html&quot;&gt;Alureon&lt;/a&gt; family).&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Similar to the steps followed in the case of GMER (as mentioned in the &lt;a href=&quot;http://swatrant.blogspot.com/2008/12/zlob-fake-codec-rootkit-removal.html&quot;&gt;previous post&lt;/a&gt;), SysProt AntiRootkit requires two reboots to completely remove rootkit driver and its Registry entry. Following screenshots show SysProt AntiRootkit detecting Zlob rootkit driver and injected DLL:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SWOa3LO8gSI/AAAAAAAAAgE/Ym5aRR5R4IY/s1600-h/SysProtARK_KernelModules.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 227px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SWOa3LO8gSI/AAAAAAAAAgE/Ym5aRR5R4IY/s320/SysProtARK_KernelModules.JPG&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5288240660162052386&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SWObLYZDEtI/AAAAAAAAAgM/OTQ2g--eyU4/s1600-h/SysProtARK_DLLs.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 226px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SWObLYZDEtI/AAAAAAAAAgM/OTQ2g--eyU4/s320/SysProtARK_DLLs.JPG&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5288241007291470546&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Steps to remove Zlob rootkit driver:&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;Run SysProt AntiRootkit v1.0.0.8 and click &quot;Kernel Modules&quot; tab.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;SysProt AntiRootkit shows rootkit/hidden drivers in red color. Click on the rootkit driver&#39;s entry and the click &quot;Disable&quot;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Reboot the PC&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Repeat steps 1 to 3 (SysProt AntiRootkit will detect the same rootkit driver again)&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;Now, all the malicious files dropped by Zlob should be unrooted and hence &quot;visible&quot; to standard anti-malware scanners.&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;&quot;&gt;More information, changelog and download link for &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;SysProt AntiRootkit v1.0.0.8&lt;/span&gt; can be found at following locations:&lt;br /&gt;&lt;a href=&quot;http://majorgeeks.com/SysProt_AntiRootkit_d5708.html&quot;&gt;MajorGeeks&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.softpedia.com/get/Security/Security-Related/SysProt-AntiRootkit.shtml&quot;&gt;Softpedia&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://sites.google.com/site/sysprotantirootkit&quot;&gt;SysProt AntiRootkit primary download page&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Feedbacks are welcome :)&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2009/01/sysprot-antirootkit-v1008-released.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_g2qoDleHSYA/SWOa3LO8gSI/AAAAAAAAAgE/Ym5aRR5R4IY/s72-c/SysProtARK_KernelModules.JPG" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-1319337916993493306</guid><pubDate>Wed, 31 Dec 2008 17:28:00 +0000</pubDate><atom:updated>2009-01-09T23:31:56.959+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">TDSServ rootkit removal</category><category domain="http://www.blogger.com/atom/ns#">Zlob rootkit</category><title>Zlob fake codec rootkit removal procedure</title><description>Lately there has been a rise in rootkit based Zlob fake codecs and video players. The rootkit belongs to &lt;a href=&quot;http://www.pctools.com/mrc/infections/id/Trojan.TDSServ/&quot;&gt;TDSServ family&lt;/a&gt;, and is quite difficult to remove using standard anti-malware tools. Now, we will see how to remove these rootkit based Zlob malware. This removal procedure holds good for Zlob variants that drop kernel mode rootkits such as &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;BrakePlayer&lt;/span&gt;, &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;Moon-Player&lt;/span&gt;, &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;TurboPlayer &lt;/span&gt;and &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;Light-Track&lt;/span&gt; etc.&lt;br /&gt;&lt;br /&gt;The removal process consists of three steps:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Removing rootkit driver file and its Registry entry&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Removing other malware files dropped by Zlob installer&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Removing stray &quot;shell open command&quot; entry (a.k.a malicious autorun.inf file)&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Download the following tools and install them (do not run them as of now):&lt;br /&gt;&lt;ol&gt;&lt;li&gt;&lt;a href=&quot;http://www.gmer.net/files.php&quot;&gt;GMER&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.malwarebytes.org/mbam.php&quot;&gt;Malwarebytes&#39; Anti-Malware (MBAM)&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-size:medium;&quot;&gt;Removing rootkit driver file and its Registry entry:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Launch GMER.exe. As soon as GMER starts, it performs a preliminary system scan. If it finds any traces of rootkit, it will ask you to run a full PC scan. Click &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&quot;No&quot;&lt;/span&gt; for this prompt.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Now, click on &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&quot;Rootkit/Malware&quot;&lt;/span&gt; tab and then select only &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&quot;Services&quot;&lt;/span&gt; checkbox (deselect all other scan options). Click &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&quot;Scan&quot;&lt;/span&gt; button to start scan. An example is shown in screenshot below.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/SVus-1Iz7MI/AAAAAAAAAfk/p0pppaxRnIs/s1600-h/GMER_Services_Scan.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 246px;&quot; src=&quot;http://4.bp.blogspot.com/_g2qoDleHSYA/SVus-1Iz7MI/AAAAAAAAAfk/p0pppaxRnIs/s320/GMER_Services_Scan.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5286008783065312450&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;GMER should show the rootkit service after the scan. Right-click on that entry and click &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&quot;Delete Service&quot;&lt;/span&gt;. Click &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&quot;Yes&quot;&lt;/span&gt; for the prompts that pop up. An example screenshot is shown below.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SVuta9NgC3I/AAAAAAAAAfs/yaYxKPuutpA/s1600-h/GMER_Services_DeleteService.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 246px;&quot; src=&quot;http://1.bp.blogspot.com/_g2qoDleHSYA/SVuta9NgC3I/AAAAAAAAAfs/yaYxKPuutpA/s320/GMER_Services_DeleteService.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5286009266268801906&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Reboot the PC.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Run GMER again and repeat steps 1, 2, 3 and 4 &lt;b&gt;again&lt;/b&gt; (GMER will again detect the same rootkit service again).&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;Note: If GMER does not detect any rootkit in its preliminary system scan (in Step 1 above), then you may not have kernel-mode rootkit variant of Zlob (or GMER is not detecting it ;)). Proceed to the section below.&lt;br /&gt;&lt;br /&gt;Update: Zlob rootkit driver can also be removed using SysProt AntiRootkit. More information can be found &lt;a href=&quot;http://swatrant.blogspot.com/2009/01/sysprot-antirootkit-v1008-released.html&quot;&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-size:medium;&quot;&gt;Removing other malware files dropped by Zlob installer:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Run Malwarebytes&#39; Anti-Malware (MBAM), click &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&quot;Update&quot;&lt;/span&gt; tab and then click &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&quot;Check for updates&quot;&lt;/span&gt; button to download latest malware database.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Once the update completes, click &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&quot;Scanner&quot;&lt;/span&gt; tab and select the &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&quot;Perform full scan&quot;&lt;/span&gt; option. Select all the hard disk partitions (C:\, D:\ etc) and then click &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&quot;OK&quot;&lt;/span&gt; to start scan.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Once the scan completes, remove all the malware that MBAM may report. An example screenshot is shown below.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SVutskk-uVI/AAAAAAAAAf0/FnYNB84A5GA/s1600-h/MBAM_Scan.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 200px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SVutskk-uVI/AAAAAAAAAf0/FnYNB84A5GA/s320/MBAM_Scan.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5286009568894040402&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Reboot the PC.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-size:medium;&quot;&gt;Removing stray &quot;shell open command&quot; (a.k.a malicious autorun.inf file):&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;ol&gt;&lt;li&gt;Go to &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;Start Menu&lt;/span&gt; &gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt; Search&lt;/span&gt; option to open Windows Search tool. Make Search to look in &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;sytem/hidden&lt;/span&gt; folders and files. Finally, search for files named &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;autorun.inf&lt;/span&gt;.  An example screenshot is shown below.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SVu2wMCZrvI/AAAAAAAAAf8/VnlGlMV-j2Q/s1600-h/Autorun_Search.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 230px;&quot; src=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SVu2wMCZrvI/AAAAAAAAAf8/VnlGlMV-j2Q/s320/Autorun_Search.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5286019526630682354&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;These autorun.inf files contain few commands which instruct Windows Explorer to load a Zlob malware file (generally, &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: italic;&quot;&gt;%rootdrive%\resycled\boot.com&lt;/span&gt;&lt;/span&gt;) whenever a user double-clicks on drive icons. Delete all the &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;autorun.inf&lt;/span&gt; files found in hard disk partitions (for ex: C:\, D:\ etc)&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Reboot the PC.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div&gt;Finally, run an online scan at &lt;a href=&quot;http://support.f-secure.com/enu/home/ols.shtml&quot;&gt;F-Secure&lt;/a&gt; or &lt;a href=&quot;http://housecall.trendmicro.com/&quot;&gt;TrendMicro&lt;/a&gt; to make sure that the PC is clean. Hopefully, the Zlob rootkit will be gone for good by this time!&lt;/div&gt;&lt;/div&gt;</description><link>http://swatrant.blogspot.com/2008/12/zlob-fake-codec-rootkit-removal.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_g2qoDleHSYA/SVus-1Iz7MI/AAAAAAAAAfk/p0pppaxRnIs/s72-c/GMER_Services_Scan.JPG" height="72" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-9143536118511569451</guid><pubDate>Tue, 30 Dec 2008 18:15:00 +0000</pubDate><atom:updated>2008-12-30T23:53:36.690+05:30</atom:updated><title>Rogue security software video tutorials</title><description>This is really hilarious. It seems that the &lt;a href=&quot;http://en.wikipedia.org/wiki/Rogue_software&quot;&gt;rogue software&lt;/a&gt; gang decided to improve &lt;a href=&quot;http://en.wikipedia.org/wiki/Out-Of-Box_Experience&quot;&gt;OOBE&lt;/a&gt; of their software! They now have video tutorials at &lt;a href=&quot;http://in.youtube.com/&quot;&gt;YouTube&lt;/a&gt;, which tell how to run online malware-scan and how to remove malware using their software for FREE! Check out these screenshots of the video:&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SVplr67H46I/AAAAAAAAAfc/42O5oR3rpCA/s1600-h/Rogue_On_YouTube.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 230px;&quot; src=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SVplr67H46I/AAAAAAAAAfc/42O5oR3rpCA/s320/Rogue_On_YouTube.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5285648917898716066&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Here are the links to some videos:&lt;br /&gt;http://www.youtube.com/watch?v=jykJ1erupZ4&lt;br /&gt;http://www.youtube.com/watch?v=FSQ0WpoyZJo&lt;br /&gt;&lt;br /&gt;Video uploaders&#39; profiles:&lt;br /&gt;http://www.youtube.com/user/AntiVirusSpywareMalw&lt;br /&gt;http://www.youtube.com/user/OkThisJustAnti&lt;br /&gt;&lt;br /&gt;The webiste, &lt;code&gt;www.antiviruson.com (89.111.176.21)&lt;/code&gt;, mentioned in those tutorials redirects to another website that hosts &lt;a href=&quot;http://swatrant.blogspot.com/2008/12/new-rogue-system-security.html&quot;&gt;System Security&lt;/a&gt; rogue application. Do NOT follow the steps told in those tutorials ;)</description><link>http://swatrant.blogspot.com/2008/12/rogue-security-software-video-tutorials.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_g2qoDleHSYA/SVplr67H46I/AAAAAAAAAfc/42O5oR3rpCA/s72-c/Rogue_On_YouTube.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-6028788054026710468</guid><pubDate>Sun, 28 Dec 2008 17:35:00 +0000</pubDate><atom:updated>2009-01-01T12:48:28.153+05:30</atom:updated><title>Zlob updates</title><description>Zlob gang does not seem to be in holiday mood. They are churning up more domains to spread their &lt;a href=&quot;http://www.stopbadware.org/home/badware&quot;&gt;badware&lt;/a&gt;. Here are some of the new domains:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;94.247.3.232&lt;br /&gt;216.240.151.112&lt;br /&gt;78.159.99.52&lt;br /&gt;www.newdllsolution.com (92.241.163.90)&lt;br /&gt;http://brakeplayer.net (94.247.2.183)&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;One of the site mentioned above, &lt;code&gt;http://brakeplayer.net (94.247.2.183)&lt;/code&gt;, hosts a fake media player installer called &lt;b&gt;BrakePlayer&lt;/b&gt;. This installer actually installs a nasty kernel mode rootkit. Following screenshot shows the kernel mode hooks installed by rootkit driver:&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SVfF9wbl3GI/AAAAAAAAAfU/z31DCtSLYh0/s1600-h/brakeplayer_rootkit.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 230px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SVfF9wbl3GI/AAAAAAAAAfU/z31DCtSLYh0/s320/brakeplayer_rootkit.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5284910352505887842&quot; /&gt;&lt;/a&gt;&lt;br /&gt;The &lt;a href=&quot;http://en.wikipedia.org/wiki/Backdoor_(computing)&quot;&gt;backdoor&lt;/a&gt; component of this rootkit establishes connection with a remote rogue server &lt;code&gt;85.255.112.188&lt;/code&gt; (&lt;a href=&quot;http://whois.domaintools.com/85.255.112.188&quot;&gt;whois&lt;/a&gt;). VirusTotal scan results for the installer and rootkit driver files can be found &lt;a href=&quot;http://www.virustotal.com/analisis/babfab40f4572b4aaaf0db20dcf4eee9&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;http://www.virustotal.com/analisis/fea2f902beb3a6eaab8cb472cf14ddb2&quot;&gt;here&lt;/a&gt; respectively.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Update:&lt;/b&gt; BrakePlayer removal procedure has been posted &lt;a href=&quot;http://swatrant.blogspot.com/2008/12/zlob-fake-codec-rootkit-removal.html&quot;&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;. Hope that helps :)</description><link>http://swatrant.blogspot.com/2008/12/zlob-updates_28.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_g2qoDleHSYA/SVfF9wbl3GI/AAAAAAAAAfU/z31DCtSLYh0/s72-c/brakeplayer_rootkit.JPG" height="72" width="72"/><thr:total>6</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-4473427010657956861</guid><pubDate>Fri, 26 Dec 2008 16:18:00 +0000</pubDate><atom:updated>2008-12-26T21:52:33.295+05:30</atom:updated><title>New rogue: System Security</title><description>&lt;b&gt;System Security&lt;/b&gt; is new rogue software. The installer is hosted at &lt;code&gt;http://webnetworksecurity.com (91.211.64.31)&lt;/code&gt;. Here&#39;s a screenshot of System Security:&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SVUELpOU6aI/AAAAAAAAAfM/qweh5GB4BJA/s1600-h/SystemSecurity.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 224px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SVUELpOU6aI/AAAAAAAAAfM/qweh5GB4BJA/s320/SystemSecurity.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5284134335880161698&quot; /&gt;&lt;/a&gt;&lt;br /&gt;VirusTotal scan results for the installer can be found &lt;a href=&quot;http://www.virustotal.com/analisis/988284739f2cf32ec7a58610e4c5fa31&quot;&gt;here&lt;/a&gt;. BleepingComputer has a removal guide &lt;a href=&quot;http://www.bleepingcomputer.com/malware-removal/remove-system-security&quot;&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.</description><link>http://swatrant.blogspot.com/2008/12/new-rogue-system-security.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_g2qoDleHSYA/SVUELpOU6aI/AAAAAAAAAfM/qweh5GB4BJA/s72-c/SystemSecurity.JPG" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-4997408925066826931</guid><pubDate>Mon, 22 Dec 2008 17:20:00 +0000</pubDate><atom:updated>2008-12-22T23:10:53.762+05:30</atom:updated><title>Zlob updates</title><description>Here are some of the new &lt;a href=&quot;http://en.wikipedia.org/wiki/Zlob_trojan&quot;&gt;Zlob trojan&lt;/a&gt; spreading domains:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;http://vidzwares.com (92.241.163.90)&lt;br /&gt;http://light-player.net (94.247.2.183)&lt;br /&gt;http://fire-player.net (93.190.140.48)&lt;br /&gt;http://downloadallsoft-now.com (94.247.3.228)&lt;br /&gt;http://myprivatetubes09.net (91.208.0.221)&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;One of the Zlob variant (named &lt;code&gt;wmpcdcs.exe&lt;/code&gt;, hosted at &lt;code&gt;http://myprivatetubes09.net&lt;/code&gt;) uses Microsoft Windows &lt;a href=&quot;http://msdn.microsoft.com/en-us/library/aa362708(VS.85).aspx&quot;&gt;Background Intelligent Transfer Service (BITS)&lt;/a&gt; to communicate with rogue servers to transfer data. Since BITS is a trusted Windows component, firewalls don&#39;t block it; making it easy for malware to download files from remote servers (info &lt;a href=&quot;https://forums.symantec.com/t5/Security-Risks/Malware-Update-with-Windows-Update/ba-p/306452;jsessionid=6450DE08D0CC93B994F7DB8F2D916646#A19&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;http://blog.washingtonpost.com/securityfix/2007/05/malware_using_microsoft_patch.html?nav=rss_blog&quot;&gt;here&lt;/a&gt;). An automated analysis of this malware is available at ThreatExpert &lt;a href=&quot;http://www.threatexpert.com/report.aspx?md5=4d4323e8a625b7a5c91a1525190133f5&quot;&gt;here&lt;/a&gt;.</description><link>http://swatrant.blogspot.com/2008/12/zlob-updates.html</link><author>noreply@blogger.com (swatkat)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-14777922.post-1924903890309826971</guid><pubDate>Sun, 21 Dec 2008 11:54:00 +0000</pubDate><atom:updated>2008-12-21T23:09:31.407+05:30</atom:updated><title>Antivirus 360 featured in top PC magazines and antivirus certification labs!</title><description>No, we are not talking about &lt;a href=&quot;http://www.symantec.com/norton360/&quot;&gt;Norton 360&lt;/a&gt;, which is a genuine security software. This is about &lt;b&gt;Antivirus 360&lt;/b&gt;, one of the latest rogue security software (info &lt;a href=&quot;http://sunbeltblog.blogspot.com/2008/12/new-rogue-scareware-program-antivirus.html&quot;&gt;here&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;Now, gang responsible for Antivirus 360 has gone one step further! Their new site, &lt;code&gt;http://anti-viruspcscanner.com (78.46.216.238)&lt;/code&gt;, claims that Antivirus 360 has been rated as top antivirus solution by reputed websites like &lt;a href=&quot;http://computershopper.com/&quot;&gt;Computer Shopper&lt;/a&gt;, &lt;a href=&quot;http://www.laptopmag.com/&quot;&gt;LAPTOP Magazine&lt;/a&gt;, &lt;a href=&quot;http://www.pcmag.com/&quot;&gt;PC Magazine&lt;/a&gt;, &lt;a href=&quot;http://www.computeractive.co.uk/&quot;&gt;Computer Active&lt;/a&gt;, &lt;a href=&quot;http://www.pcadvisor.co.uk/&quot;&gt;PC Advisor&lt;/a&gt; and &lt;a href=&quot;http://www.cnet.com/&quot;&gt;CNET&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SU4xQD8BHiI/AAAAAAAAAe0/JLcFVT6U37M/s1600-h/Av360_1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 194px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SU4xQD8BHiI/AAAAAAAAAe0/JLcFVT6U37M/s320/Av360_1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5282213564956876322&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SU4xdYUQylI/AAAAAAAAAe8/qyIJxsNqaE0/s1600-h/Av360_2.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 194px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SU4xdYUQylI/AAAAAAAAAe8/qyIJxsNqaE0/s320/Av360_2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5282213793765575250&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Apart from this, they also blatantly display &lt;a href=&quot;http://www.virusbtn.com/&quot;&gt;Virus Bulletin&lt;/a&gt;, &lt;a href=&quot;http://www.check-mark.com/&quot;&gt;West Coast Labs Checkmark&lt;/a&gt; and &lt;a href=&quot;http://www.icsalabs.com/&quot;&gt;ICSA Labs&lt;/a&gt; certifications, which are obviously fake!&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SU4xnnmj5GI/AAAAAAAAAfE/hgd2bqGcvYQ/s1600-h/Av360_3.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 194px;&quot; src=&quot;http://2.bp.blogspot.com/_g2qoDleHSYA/SU4xnnmj5GI/AAAAAAAAAfE/hgd2bqGcvYQ/s320/Av360_3.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5282213969667548258&quot; /&gt;&lt;/a&gt;&lt;br /&gt;All these fake recommendations and a deceptive name may lead an innocent PC user to download Antivirus 360 into his/her PC.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SU4voiS0wXI/AAAAAAAAAes/dD-hxmq_u7U/s1600-h/Av360_4.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 198px;&quot; src=&quot;http://3.bp.blogspot.com/_g2qoDleHSYA/SU4voiS0wXI/AAAAAAAAAes/dD-hxmq_u7U/s320/Av360_4.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5282211786399203698&quot; /&gt;&lt;/a&gt;&lt;br /&gt;As per the site &lt;code&gt;http://anti-viruspcscanner.com (78.46.216.238)&lt;/code&gt;, the company responsible for Antivirus 360 is:&lt;br /&gt;&lt;code&gt;BOLZAR LIMITED Arch. Makariou III. 69. TLAIS TOWER. P.C. 1070. Nicosia, Cyprus.&lt;br /&gt;Contact email: company@Antivirus360pro.com&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;And, it seems that BOLZAR LIMITED (&lt;code&gt;http://bolzar.biz (216.195.62.169)&lt;/code&gt;) develops few other fake security software as well:&lt;br /&gt;&lt;b&gt;Antivirus Security&lt;/b&gt; - &lt;code&gt;http://antivirussecurity-solution.com/ (89.149.255.191)&lt;/code&gt;&lt;br /&gt;&lt;b&gt;Antispyware32&lt;/b&gt; - &lt;code&gt;http://antispyware32.com/ (84.16.231.194)&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;VirusTotal scan result of Antivirus 360 is available &lt;a href=&quot;http://www.virustotal.com/analisis/62c8db6da8797579eedf2b39c2d17c04&quot;&gt;here&lt;/a&gt;. An automated analysis of Antivirus 360 is available at &lt;a href=&quot;http://www.threatexpert.com/report.aspx?md5=e700015a104159701ab7b486ef609f1c&quot;&gt;ThreatExpert&lt;/a&gt;. Stay away from these rogues :)</description><link>http://swatrant.blogspot.com/2008/12/antivirus-360-featured-in-top-pc.html</link><author>noreply@blogger.com (swatkat)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_g2qoDleHSYA/SU4xQD8BHiI/AAAAAAAAAe0/JLcFVT6U37M/s72-c/Av360_1.jpg" height="72" width="72"/><thr:total>141</thr:total></item></channel></rss>