<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Threat Center Live Blog</title><description>News, updates, and advice on network security from the experts at zvelo.</description><managingEditor>noreply@blogger.com (acarrillojr)</managingEditor><pubDate>Thu, 24 Oct 2024 02:11:01 -0600</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">90</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://threatcenter.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>Copyright (c) 2007 eSoft Inc</copyright><itunes:image href="http://threatcenter.esoft.com/feeds/threatcenter300.png"/><itunes:keywords>Security,Tech,News,Vulnerabilities,Exploits,Network,Technology,Internet,Threats</itunes:keywords><itunes:summary>5 minute updates on the latest in computer and network security. Sponsored by eSoft.</itunes:summary><itunes:subtitle>5 minute updates on the latest in computer and network security. Sponsored by eSoft.</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:author>Patrick Walsh</itunes:author><itunes:owner><itunes:email>threatcenter@esoft.com</itunes:email><itunes:name>Patrick Walsh</itunes:name></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><title>ThreatCenter Live Blog is now zveloBLOG™</title><link>http://threatcenter.blogspot.com/2011/02/threatcenter-live-blog-is-now-zveloblog.html</link><pubDate>Wed, 9 Feb 2011 14:25:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-3440594265772306080</guid><description>&lt;span id="SPELLING_ERROR_0" class="blsp-spelling-error"&gt;zvelo&lt;/span&gt; is proud to announce that the &lt;span id="SPELLING_ERROR_1" class="blsp-spelling-error"&gt;Threat Center&lt;/span&gt; Live Blog has moved, and is now &lt;a href="http://zvelo.com/blog"&gt;&lt;span id="SPELLING_ERROR_2" class="blsp-spelling-error"&gt;zveloBLOG&lt;/span&gt;™&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;We greatly appreciate all current subscribers to this blog and kindly thank you for the expressed interest and support over the past couple of years. &lt;span id="SPELLING_ERROR_3" class="blsp-spelling-error"&gt;zvelo&lt;/span&gt; looks forward to possibly continuing the discussions at our new location.&lt;br /&gt;&lt;br /&gt;So go ahead, subscribe and partake in the conversation at the new &lt;a href="http://zvelo.com/blog"&gt;&lt;span id="SPELLING_ERROR_4" class="blsp-spelling-error"&gt;zveloBLOG&lt;/span&gt;™&lt;/a&gt;, where we will continue to feature alerts and discussions about the latest &lt;span id="SPELLING_ERROR_5" class="blsp-spelling-error"&gt;malware&lt;/span&gt;, spam, viruses, &lt;span id="SPELLING_ERROR_6" class="blsp-spelling-error"&gt;phishing&lt;/span&gt; scams, rogue software and other web threats stemming from the exclusive research conducted by the engineers and Web Analysts at &lt;span id="SPELLING_ERROR_7" class="blsp-spelling-error"&gt;zveloLABS&lt;/span&gt;™.&lt;br /&gt;&lt;br /&gt;&lt;em&gt;Please note that this &lt;span id="SPELLING_ERROR_8" class="blsp-spelling-error"&gt;Threat Center Live&lt;/span&gt; Blog will be shut down sometime in the &lt;span style="font-weight: bold;"&gt;summer of 2011&lt;/span&gt;. &lt;/em&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Adobe CS7 Searches Saturated With Dangerous Results</title><link>http://threatcenter.blogspot.com/2010/07/adobe-cs7-searches-saturated-with.html</link><category>blackhat seo</category><category>fraud</category><category>malware</category><category>web security</category><pubDate>Thu, 29 Jul 2010 13:21:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-6751848107082120699</guid><description>Looking to save a few bucks on software will almost always lead users down a dangerous path.&amp;nbsp; Users either end up at “OEM Software” sites offering unlicensed and illegal software, or to downloading cracks or keygens laced with malware.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
One of the big issues here is that these sites are quite easy to find. Google searches for “cheap” or “discount” software reveal it’s very easy to come across these sites.&amp;nbsp; Searches for all kinds of popular software from MS Office, to Adobe CS will bring up dangerous results. &lt;br /&gt;
&lt;br /&gt;
Even searches like ‘Microsoft Windows 7’ which should be filled with Microsoft related sites and articles instead include fraudulent OEM sites in the top results.&amp;nbsp; Today, the eSoft Threat Prevention Team is warning users to be especially wary of unreleased software.&amp;nbsp; A major target of these scams is Adobe, who recently released their Creative Suite 5 (CS5) software.&amp;nbsp; However, searches for CS7, a product not yet announced and two versions premature, result in a solid wall of bogus search results leading to scams and malware. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4QM3F-gvEk4t98uZIUUpGc5N6swxsmPe5VjbY1P91uDslFaBrqZ88I1rFuxBTgOtRxmnYOg9VhAQE0kcdiwGGUrxzIEh-DeHy05MhKSruYpU5x6OSn0WRVHlASfLE-5Dus0hIKQLsScAG/s1600/adobe_cs7-2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4QM3F-gvEk4t98uZIUUpGc5N6swxsmPe5VjbY1P91uDslFaBrqZ88I1rFuxBTgOtRxmnYOg9VhAQE0kcdiwGGUrxzIEh-DeHy05MhKSruYpU5x6OSn0WRVHlASfLE-5Dus0hIKQLsScAG/s400/adobe_cs7-2.jpg" width="347" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhweUU3E5qgpPNtTlFOJfFE61gnU-YFi7kgG02wyG9yyxAsYzFGAalL0DI9WvgwN39345ON20tAHq2QrZZlKiOCZYRK0jgCULXWXck2PWu5tESeddmdgObfiOQA5rI24IM4ueEHFmDgiJiH/s1600/adobe_cs7-5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="367" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhweUU3E5qgpPNtTlFOJfFE61gnU-YFi7kgG02wyG9yyxAsYzFGAalL0DI9WvgwN39345ON20tAHq2QrZZlKiOCZYRK0jgCULXWXck2PWu5tESeddmdgObfiOQA5rI24IM4ueEHFmDgiJiH/s400/adobe_cs7-5.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Aside from poisoning search results, the criminal enterprises behind these scams are increasingly using Spam to increase their reach.&amp;nbsp; The criminal rings associated with these sites also control infected machines capable of sending millions of Spam messages per day, making it very easy to draw users to these sites.&amp;nbsp; Spam messages are sent offering “instant” downloads and huge savings, only leading the user to a full blown fraud operation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPlT-JeO86x3V0JbuibH61XCjvWw4mqoBSkvM9oOMfwnwEGJbgKbNbSJpj50iRav2C7DmGSiIL60CE2y6L1hC1qZJJdM4aecyQtevauIVgOn0O0iUfn3JffdAicyRRGSkPhz_GMyj399tH/s1600/adobe_cs7.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="275" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPlT-JeO86x3V0JbuibH61XCjvWw4mqoBSkvM9oOMfwnwEGJbgKbNbSJpj50iRav2C7DmGSiIL60CE2y6L1hC1qZJJdM4aecyQtevauIVgOn0O0iUfn3JffdAicyRRGSkPhz_GMyj399tH/s400/adobe_cs7.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Rightly suspicious users who are wary of entering their personal information on these sites, or don’t want to pay for the software at all (aka stealing), may try to find cracks or keygens to allow them to activate trial versions of the software.&lt;br /&gt;
&lt;br /&gt;
Take the example of the site below, keygenguru.com.&amp;nbsp; The keygen download  on this page is malware that attempts to call home and download more  malicious software.&amp;nbsp; The other links on this page lead the user right  back to the same OEM software scams.&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGZTpCFb-iWzPaZED6e4jsSnCcXEePAupfBiGrvH5EoRfkBjwiz0eIOCAEK_Fsm2mUEtjlODz_UZFEBZi0bDf6Zsragjec3VNtibRgFCQX_jxDuHOfAUS9lwJZkCsru6JvN5LkFefPvvZl/s1600/adobe_cs7-4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGZTpCFb-iWzPaZED6e4jsSnCcXEePAupfBiGrvH5EoRfkBjwiz0eIOCAEK_Fsm2mUEtjlODz_UZFEBZi0bDf6Zsragjec3VNtibRgFCQX_jxDuHOfAUS9lwJZkCsru6JvN5LkFefPvvZl/s320/adobe_cs7-4.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Each week eSoft finds hundreds of sites and domains related to these &lt;a href="http://threatcenter.blogspot.com/2009/08/new-rash-of-fraud-sites-touting-cheap.html"&gt;OEM Scams&lt;/a&gt;.&amp;nbsp; It’s important for users to realize that these sites are fraudulent and could potentially be very dangerous.&amp;nbsp; If you are purchasing new software, make sure it is from the vendor itself or a reputable distributor.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4QM3F-gvEk4t98uZIUUpGc5N6swxsmPe5VjbY1P91uDslFaBrqZ88I1rFuxBTgOtRxmnYOg9VhAQE0kcdiwGGUrxzIEh-DeHy05MhKSruYpU5x6OSn0WRVHlASfLE-5Dus0hIKQLsScAG/s72-c/adobe_cs7-2.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Widespread Compromise Impacts Thousands of Legitimate Websites</title><link>http://threatcenter.blogspot.com/2010/07/widespread-compromise-impacts-thousands.html</link><category>blackhat seo</category><category>compromised sites</category><category>malware</category><category>web security</category><pubDate>Mon, 19 Jul 2010 19:33:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-7168555672414375776</guid><description>The eSoft Threat Prevention Team has detected a new widespread compromise, with tens of thousands of domains infected.&amp;nbsp; Cybercriminals have used stolen credentials, placing specially crafted pages into legitimate websites that lead visitors to malicious payloads. &lt;br /&gt;
&lt;br /&gt;
The cybercriminals involved in this campaign are primarily targeting pornographic search terms.&amp;nbsp; Poisoned searches involve celebrities and porn stars nude, nudism, sex parties and searches that are much more lewd and inappropriate.&amp;nbsp; Obfuscated javascript is used to redirect a visitor to &lt;a href="http://threatcenter.blogspot.com/2010/06/introduction-to-rogue-anti-virus.html"&gt;Rogue Anti-Virus&lt;/a&gt; and other malicious payloads.&lt;br /&gt;
&lt;br /&gt;
At the time of writing most infected pages lead to the rogue anti-virus scam “Antivirus Plus” as shown below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4HB2-OBSl6y_XouG4RM8QGWDgKQcVz2w_irYDItceY5X4UwMlU1eWBtjhIhqXHovwrRJVIPI1H9Utmsyq-Z4QR3H1uihZiNHHpKlz78qeYMlnDGI9byCkOA7b7agGPFjkpmvrOQLRx0G9/s1600/Screenshot-AntivirusPlus+-+Mozilla+Firefox-1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="371" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4HB2-OBSl6y_XouG4RM8QGWDgKQcVz2w_irYDItceY5X4UwMlU1eWBtjhIhqXHovwrRJVIPI1H9Utmsyq-Z4QR3H1uihZiNHHpKlz78qeYMlnDGI9byCkOA7b7agGPFjkpmvrOQLRx0G9/s400/Screenshot-AntivirusPlus+-+Mozilla+Firefox-1.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Cybercriminals are increasingly infecting legitimate sites rather than creating their own websites.&amp;nbsp; Otherwise honest sites that have been compromised have a much longer lifetime with which to infect visitors and have a better chance of passing undetected through web filtering technologies, infecting a greater number of users.&amp;nbsp; Sites created specifically for malware distribution or malicious intentions can be shut down by the domain registrar or ISP much more quickly than a legitimate site that’s been compromised.&amp;nbsp; With granular URL classifications, eSoft SiteFilter technology is able to detect and block these sites before a user is infected.&lt;br /&gt;
&lt;br /&gt;
Based on the number of different platforms and web server software that are infected in this specific attack (recognized by the recurring malicious code it uses), it’s most likely the sites were compromised using stolen FTP credentials. For webmasters out there, be sure to keep your FTP passwords secure, and don’t save them in popular FTP programs where they can easily be harvested by attackers. If possible, use SFTP and key based authentication instead of the less secure FTP protocol.&amp;nbsp; Also avoid passwords that are found in the dictionary or are common place or person names (even adding a number to the end will not protect you from a determined brute force attack).&lt;br /&gt;
&lt;br /&gt;
Further details are available for security researchers interested in the specific attack and related code.&amp;nbsp; Right now, eSoft estimates that the attack affects 3,200 websites.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4HB2-OBSl6y_XouG4RM8QGWDgKQcVz2w_irYDItceY5X4UwMlU1eWBtjhIhqXHovwrRJVIPI1H9Utmsyq-Z4QR3H1uihZiNHHpKlz78qeYMlnDGI9byCkOA7b7agGPFjkpmvrOQLRx0G9/s72-c/Screenshot-AntivirusPlus+-+Mozilla+Firefox-1.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Red Button SEO Poisoning and Malware Campaign</title><link>http://threatcenter.blogspot.com/2010/06/red-button-seo-poisoning-and-malware.html</link><category>blackhat seo</category><category>malware</category><category>rogue av</category><category>web security</category><pubDate>Tue, 29 Jun 2010 19:49:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-5345343196109734849</guid><description>eSoft researchers have been tracking a new campaign by cybercrooks, compromising and creating websites for use in SEO poisoning and malware distribution.  Thousands of these sites have been detected which use elaborate techniques to trick search engines and are ready to serve malware in an instant. &lt;br /&gt;
&lt;br /&gt;
At the forefront of this attack is the use of a website referrer, or user-agent, which enables the cybercriminals to effectively increase their search engine ranking while keeping their malicious intentions hidden.  Google and other search engine bots will be served up SEO tailored content to manipulate search results and drive traffic. This content cleverly uses a mashup of text and images scraped from various sites. &lt;br /&gt;
&lt;br /&gt;
Danger lurks for users that visit these pages using Google search or other search engines.  In the course of monitoring, eSoft has seen these pages deliver &lt;a href="http://threatcenter.blogspot.com/2010/06/introduction-to-rogue-anti-virus.html"&gt;Rogue AV&lt;/a&gt;, redirect to &lt;a href="http://threatcenter.blogspot.com/search/label/pharma%20fraud"&gt;fraudulent pharmacies&lt;/a&gt;, fake search pages and more.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrU86NnQfpPseKsswGx7ViHLCeBgQkOzZ8qNslu3WfkpXQPbCo_9koGEhM8Z2LpwC7eTrBLifghvsPprdYeEJGW2OViLLhxP_vWQYHj0SgkvQlHQ9Gxga-v9JzfUfNMSAb-jYB2Ln6LVOk/s1600/pharm_redbutton.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="242" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrU86NnQfpPseKsswGx7ViHLCeBgQkOzZ8qNslu3WfkpXQPbCo_9koGEhM8Z2LpwC7eTrBLifghvsPprdYeEJGW2OViLLhxP_vWQYHj0SgkvQlHQ9Gxga-v9JzfUfNMSAb-jYB2Ln6LVOk/s400/pharm_redbutton.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
At the time of writing, most of the sites involved in the&amp;nbsp;campaign are currently hosting a&amp;nbsp;Red&amp;nbsp;Button&amp;nbsp;flash file, as shown&amp;nbsp;below.&amp;nbsp;&amp;nbsp;This file indicates a compromise, but&amp;nbsp;clicking the red button currently does nothing malicious, but&amp;nbsp;these pages serve as a placeholder for the&amp;nbsp;attackers.&amp;nbsp;&amp;nbsp;These pages change their character depending on how they are referenced and at&amp;nbsp;any time these pages could be&amp;nbsp;infect the user with malware.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnErnDHk7PJYPBhABvVCHENosIyPsBy89ZF9sd0Xw7mNDCET3WEAmClkq_KFu4BQsGF7Bppl4XF0zdA_8_snHdg3ZcJHCgKjRaIMNV7VrxzzYIrNeUQAvYODZfe2YbGEciqrTC_pthYSIh/s1600/redbutton.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="247" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnErnDHk7PJYPBhABvVCHENosIyPsBy89ZF9sd0Xw7mNDCET3WEAmClkq_KFu4BQsGF7Bppl4XF0zdA_8_snHdg3ZcJHCgKjRaIMNV7VrxzzYIrNeUQAvYODZfe2YbGEciqrTC_pthYSIh/s400/redbutton.png" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The Threat Prevention Team is keeping a close watch on these&amp;nbsp;sites as they continue to multiply. &amp;nbsp;There is a strong chance that these sites are currently establishing good reputations with security companies that will make future attacks through these sites more effective. &amp;nbsp;eSoft is&amp;nbsp;classifying these sites as Compromised to protect&amp;nbsp;SiteFilter users from any future malicious payloads.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrU86NnQfpPseKsswGx7ViHLCeBgQkOzZ8qNslu3WfkpXQPbCo_9koGEhM8Z2LpwC7eTrBLifghvsPprdYeEJGW2OViLLhxP_vWQYHj0SgkvQlHQ9Gxga-v9JzfUfNMSAb-jYB2Ln6LVOk/s72-c/pharm_redbutton.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>What Drives Organizational Web Filtering?</title><link>http://threatcenter.blogspot.com/2010/06/what-drives-organizational-web.html</link><category>web security</category><pubDate>Thu, 24 Jun 2010 11:53:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-4647909656614311638</guid><description>Network administrators and businesses install web filtering on networks for a variety of reasons ranging from compliance and legal requirements to worker productivity issues.  To gain some insight, eSoft is taking a poll of network administrators, customers, readers, and security professionals to identify the most important drivers behind web filtering. We’d love participation of our readers and loyal eSoft customers. When complete, we’ll report the findings back to readers on the Threat Center Live blog.  &lt;br /&gt;
&lt;br /&gt;
Please take a moment to respond below, or on the &lt;a href="http://www.esoft.com/new_products"&gt;eSoft website&lt;/a&gt;, and thanks for your participation. &lt;br /&gt;
&lt;br /&gt;
&lt;div style="padding-left: 60px;"&gt;&lt;script type='text/javascript' language='JavaScript' src='http://survey.constantcontact.com/poll/a07e2y03kimgasdqbz6/start.js?v=1&amp;w=300'&gt;
&lt;/script&gt;&lt;noscript&gt;JavaScript needs to be enabled for polling to work. &lt;br /&gt;
&lt;a href='http://www.constantcontact.com/survey/index.jsp?cc=ViraWidPOL'&gt;Online Surveys&lt;/a&gt; by Constant Contact.&lt;br /&gt;
&lt;/noscript&gt;&lt;br /&gt;
&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Introduction to Rogue Anti-Virus</title><link>http://threatcenter.blogspot.com/2010/06/introduction-to-rogue-anti-virus.html</link><category>malware</category><category>rogue av</category><category>web security</category><pubDate>Wed, 23 Jun 2010 12:05:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-6726054250963519759</guid><description>If you follow the Threat Center Blog, you’ve heard us talk about “Rogue AV,” but may not fully understand what we’re referencing.&amp;nbsp; This post is for those users who are not already familiar with this widespread and common threat.&lt;br /&gt;
&lt;br /&gt;
In short, when we and other security researchers reference Rogue AV, we’re referring to an Internet scam where an official-looking web page pops up telling the user that a virus has been detected on their computer.&amp;nbsp; The web page often appears to be scanning the local computer and often reports multiple found infections.&amp;nbsp; The web page, the report, and everything about this scam is a fraud.&lt;br /&gt;
&lt;br /&gt;
Millions of users have been duped into installing malicious software, also known as malware onto their systems allowing cybercriminals to steal money and other personal details. Here’s how the attack works:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Step One: Get the user to the malicious website&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
First, the group or groups behind these attacks first post large numbers of links to some new domain by spamming community forums, blog comments, and by putting the links inside hidden elements on compromised websites in a technique known as &lt;a href="http://threatcenter.blogspot.com/search/label/blackhat%20seo"&gt;Blackhat SEO&lt;/a&gt; (Search Engine Optimization).&amp;nbsp; In this way, they are able to get the target website high up in search results for common or recently trending search terms.&amp;nbsp; Right now, for example, search results on Wimbledon and the World Cup are actively being poisoned in this manner.&lt;br /&gt;
&lt;br /&gt;
The above technique is usually seen in conjunction with one or more of the following:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Redirects from compromised websites that are otherwise legitimate&lt;/li&gt;
&lt;li&gt;Spam emails that are often sent via other compromised computers &lt;/li&gt;
&lt;li&gt;Malvertisements where attackers pay for an ad in a legitimate ad network, but use the ad to send people to the malicious website.&amp;nbsp; In the past year, reputable sites like the New York Times, White Pages, Tech Crunch and others have been caught hosting such malvertizements.&lt;/li&gt;
&lt;/ul&gt;&lt;b&gt;&lt;u&gt;Step Two: The con game&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Once on the website, social engineering tricks are invoked to convince a user to fall for this modern Internet con.&amp;nbsp; Computer users are conditioned with constant reminders to keep their computer free from virus and malware by running anti-virus software and keeping their virus definitions up to date.&amp;nbsp; These websites use this conditioning against the user, using visual elements to establish authority and trust and then causing a sense of danger and urgency when notifying the user that their computer is infected with viruses and that their data personal computer is under someone else’s control.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Rogue anti-virus malware comes in many different forms and will take different approaches to fool a user, but at the most basic level, rogue anti-virus scams convince the user that they have a problem and that they need to download some software to fix the problem.&lt;br /&gt;
&lt;br /&gt;
The screenshots below are just a few examples of fake scanners. These specially crafted pages are made with great detail to look exactly like Windows XP, Vista, or Windows 7 system alerts.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy8lem1mMfhFxVXUfYrEU0pcD97UhbUehjUTmxbdMD4mb-wsGoTox6O8VbwBCkp1FEpPtYqHDw_UaAk75IY7XSuLCKTv3vITX6DgHkfCibKQzzxWFz7U0-oZey-baInfACjzDPRS1MGjOh/s1600/fakescan1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="193" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy8lem1mMfhFxVXUfYrEU0pcD97UhbUehjUTmxbdMD4mb-wsGoTox6O8VbwBCkp1FEpPtYqHDw_UaAk75IY7XSuLCKTv3vITX6DgHkfCibKQzzxWFz7U0-oZey-baInfACjzDPRS1MGjOh/s400/fakescan1.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzXizqdJ6XAc_OhUa-Nzeu8i5FvsIaELLQvubXHnnO3kJP4qTfgV78o1K0-YMhtD5DWDQapuc9CpBDbD2q6o0KSuPAroBbJChrkjaW02BCQUPidKq-TZKQgRZNeL-TnjXc63dJyXPYv6D5/s1600/fakescan2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="220" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzXizqdJ6XAc_OhUa-Nzeu8i5FvsIaELLQvubXHnnO3kJP4qTfgV78o1K0-YMhtD5DWDQapuc9CpBDbD2q6o0KSuPAroBbJChrkjaW02BCQUPidKq-TZKQgRZNeL-TnjXc63dJyXPYv6D5/s400/fakescan2.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZN0Lm_3x4f7X5mjLRpIromL-8fDDKi4p-RqcYtC5ePeFwHrtOXMLcWdL0s48AfiRDKyGUZPYnAImUNUA7au0sknOhiZIf7rfEgdYc_ur483zpPDAqYGJY04cDWZ-Oj2C6fCY1kKtuYIMh/s1600/fakescan3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="278" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZN0Lm_3x4f7X5mjLRpIromL-8fDDKi4p-RqcYtC5ePeFwHrtOXMLcWdL0s48AfiRDKyGUZPYnAImUNUA7au0sknOhiZIf7rfEgdYc_ur483zpPDAqYGJY04cDWZ-Oj2C6fCY1kKtuYIMh/s400/fakescan3.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Fake scans like these are very believable for uneducated users and lead to a very high success rate for cybercriminals.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Step Three: Infection&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Frequently a box pops up that asks the user if they want to download the software that will fix the purported problem.&amp;nbsp; In many cases, it doesn’t matter if the user agrees or cancels, the download will begin in either case. Once the downloaded file is opened, the system is infected and the user has been tricked into installing the very thing he or she sought to remove.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Cybercriminals make it very difficult to click away from the page, so that in some cases, the user relents out of a sense of frustration and not knowing how else to move forward.&amp;nbsp; In many cases the malicious file is downloaded with no user interaction at all. &lt;br /&gt;
&lt;br /&gt;
The actual file that is downloaded changes often with different names and characteristics.&amp;nbsp; eSoft rarely sees more than two or three legitimate anti-virus software (of over 40 checked) detecting the file as a virus at the time of the attack.&amp;nbsp; The perpetrators of this attack spit out new variations on the download at a very high rate in an attempt to stay ahead of signature-based anti-virus software.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Step Four: Asking for payment&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Once a user has clicked to open the malicious file and install the software, the problem only gets worse. The cybercriminals do well in masking their malicious intentions throughout the install process. In many cases the installation is a &lt;i&gt;silent&lt;/i&gt; install – one which requires no user interaction – or a standard install wizard which raises no red flags to the user.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRv6jynxmw2CGGmEoWgi_H_fnX7NVP0-DL0z5_l8i3plRf3f1TMyhpUId7Nn53R92qE-PgJD8QbvVM9E0k2-hHEtfUSd3Z88oIrc2oaMaqChzYGvwn_xWhGB0OBeH-w4PyyTHSQ4-nPzzL/s1600/install1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="246" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRv6jynxmw2CGGmEoWgi_H_fnX7NVP0-DL0z5_l8i3plRf3f1TMyhpUId7Nn53R92qE-PgJD8QbvVM9E0k2-hHEtfUSd3Z88oIrc2oaMaqChzYGvwn_xWhGB0OBeH-w4PyyTHSQ4-nPzzL/s400/install1.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOMg2sXGOKcxvkOo7IovCgB1GGP4lFMLoFyJ80-051WHsz9e9zL5UkZXbs8aGlE9UYWq_TnrTPHlAZcXNeq8kZa2GdGinQ_IeC2qpUtkTygu11cdohIafzCf6nMbYxRT764Hk0ml6TzT7Z/s1600/install2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="280" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOMg2sXGOKcxvkOo7IovCgB1GGP4lFMLoFyJ80-051WHsz9e9zL5UkZXbs8aGlE9UYWq_TnrTPHlAZcXNeq8kZa2GdGinQ_IeC2qpUtkTygu11cdohIafzCf6nMbYxRT764Hk0ml6TzT7Z/s400/install2.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Once installed, the rogue anti-virus program will inundate the user with notifications that the system is infected and that they still need to take action. In order to remove the supposed infections (not the real problem) the user is asked to pay a license or subscription fee that typically runs between $50 and $100 USD.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhh-zzRqlpUyEVLgS8X-TxCM6o_83eSeT4aIVEU40fWiGESRvOADxf88VLRAywPG2VHxsKZLIooFhz0j0L9O0z064sTZKjQGHrecjUPbMv0TP7racazHermSXSQT-Wj0Q0tRWPLMBz_orr0/s1600/install3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhh-zzRqlpUyEVLgS8X-TxCM6o_83eSeT4aIVEU40fWiGESRvOADxf88VLRAywPG2VHxsKZLIooFhz0j0L9O0z064sTZKjQGHrecjUPbMv0TP7racazHermSXSQT-Wj0Q0tRWPLMBz_orr0/s320/install3.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh49671PUnW0BZf4PD6FF97WPsHAkRSz275Vqr0u3JLDjD1rOHYc_UN6kY96fFeC6RuLRhYvsuw1rwVfrXXXzmMl_DySBTBSwJQompFm4eS37IjVR8Xw-10K5b802eAhl4hYsEgeMPQqwZY/s1600/install4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="242" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh49671PUnW0BZf4PD6FF97WPsHAkRSz275Vqr0u3JLDjD1rOHYc_UN6kY96fFeC6RuLRhYvsuw1rwVfrXXXzmMl_DySBTBSwJQompFm4eS37IjVR8Xw-10K5b802eAhl4hYsEgeMPQqwZY/s400/install4.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Though the branding changes – these screenshots show the Rogue AV “Alpha AntiVirus” – the checkout pages remain as convincing as the rest of the scam, frequently with badges showing secure payments and other “trust me” icons.&amp;nbsp; Pricing is comparable to legitimate anti-virus products and comes with a money back guarantee to further convince the user who may be wavering that the risk to giving up their credit card and personal information is low.&amp;nbsp; In reality, submitting credit card info does not clean their system, but instead sends name, address, and credit card info directly to the perpetrators of the attack. &lt;br /&gt;
&lt;br /&gt;
Users infected with this might just assume this is an annoyance, but the scam goes much deeper than this. These programs have been created by large underground crime rings that now have the users’ personal information and credit card number.&amp;nbsp; In addition, these programs are often packaged with downloader Trojans which are capable of downloading any type of malware the attacker chooses. Because many of these criminal enterprises are also heavily involved in banking malware this is just one of the many additional types of malware that can be installed.&amp;nbsp; As a result, an infected computer should have a computer professional remove the virus, which can cost small businesses thousands of dollars per year. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Prevention&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Cybercriminals go a long way to making sure they can infect a machine and to get around classic signature-based virus scanning.&amp;nbsp; If a user gets a web browser window that says their computer is infected with malware, they should immediately attempt to close the window.&amp;nbsp; If that is not possible, then quitting and restarting the web browser is the next best thing.&amp;nbsp; This, of course, requires that users are trained in spotting and avoiding this attack, but in practice, training unsavvy users alone is not always fruitful.&lt;br /&gt;
&lt;br /&gt;
Now more than ever, malware is distributed via the web. In fact, over 75% of new malware is delivered through the web. Classic anti-virus is struggling to address these threats effectively.&amp;nbsp; The most effective way to stop web-based threats is with &lt;i&gt;Secure Web Filtering&lt;/i&gt;.&amp;nbsp; Secure web filtering works by detecting and blocking dangerous sites even before there is any anti-virus protection.&amp;nbsp; By blocking access to the site, the threat is mitigated. Secure web filtering must have real-time updates in order to block these fast moving websites, but with such a solution, users should be well protected from this pervasive threat.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy8lem1mMfhFxVXUfYrEU0pcD97UhbUehjUTmxbdMD4mb-wsGoTox6O8VbwBCkp1FEpPtYqHDw_UaAk75IY7XSuLCKTv3vITX6DgHkfCibKQzzxWFz7U0-oZey-baInfACjzDPRS1MGjOh/s72-c/fakescan1.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Alert to Web Security Researchers: Malicious scripts masquerade as Google Analytics</title><link>http://threatcenter.blogspot.com/2010/06/alert-to-web-security-researchers.html</link><category>compromised sites</category><category>web security</category><pubDate>Mon, 14 Jun 2010 15:48:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-3337213757546624539</guid><description>eSoft's Threat prevention team has detected attacks that are masked to look like standard Google Analytics code. Google Analytics issues snippets of javascript code that dynamically adds a script tag for a page. This tag then loads the Google Analytics code for logging visists to the site.&lt;br /&gt;
&lt;br /&gt;
Researchers see this code in HTML source so often that it almost never gets a second glance - until now. eSoft researchers have seen several compromised sites recently using Google Analytics to mask malicious scripts, as in the example below.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCXm8A_8jkm1DyIsnQWPbazWT8bq7J6IozzWnJs2RYGsOW5bIi73HjcLRkn9tkMIeu7jCxANrUgfbANMCjANdL1BVyP3WkFGrms-kvnCQRF9xurBB-Fob8sSVNcr9fT7j1tqzftVgzylC9/s1600/script1.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="41" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCXm8A_8jkm1DyIsnQWPbazWT8bq7J6IozzWnJs2RYGsOW5bIi73HjcLRkn9tkMIeu7jCxANrUgfbANMCjANdL1BVyP3WkFGrms-kvnCQRF9xurBB-Fob8sSVNcr9fT7j1tqzftVgzylC9/s640/script1.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Decoded, this turns into a script tag that looks like this:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEithaxA4Oumo8_l3qYoMDechwK-UqpQh1IMBNoVTL1lLW-TI3EILbgEZiJDAdArabXBDpL6k02fyPSk6n4KCuedik6QShl6TpaFftVSdINMQ2owDrY3xOf3eupGPyIUv_fChJMvc32w9__D/s1600/script2.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="17" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEithaxA4Oumo8_l3qYoMDechwK-UqpQh1IMBNoVTL1lLW-TI3EILbgEZiJDAdArabXBDpL6k02fyPSk6n4KCuedik6QShl6TpaFftVSdINMQ2owDrY3xOf3eupGPyIUv_fChJMvc32w9__D/s640/script2.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Note the use of the "sr?" tag for the Google Analytics URL, with the actual "src" tag pointing to the malicious script at 91.212.65.148. Security researchers out there, be sure to take a second look at that Google Analytics code next time you're looking at an infected site.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCXm8A_8jkm1DyIsnQWPbazWT8bq7J6IozzWnJs2RYGsOW5bIi73HjcLRkn9tkMIeu7jCxANrUgfbANMCjANdL1BVyP3WkFGrms-kvnCQRF9xurBB-Fob8sSVNcr9fT7j1tqzftVgzylC9/s72-c/script1.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>New Email Phish Targets Twitter Users, Abuses Google Groups</title><link>http://threatcenter.blogspot.com/2010/06/new-email-phish-targets-twitter-users.html</link><category>compromised sites</category><category>email</category><category>phishing scams</category><category>spam</category><pubDate>Mon, 7 Jun 2010 18:14:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-6680320281725160821</guid><description>A new twitter spam campaign is making rounds, infecting users with rogue anti-virus malware. The spam mail attempts to convince the user that someone was trying to steal their Twitter account information, and to download a “secure module” to protect their account. &lt;br /&gt;
&lt;br /&gt;
The email that begins the attack looks like authentic communications from Twitter with a link ostensibly to twitter.com.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifEamW62Cy-Hnkglx_gUSea4aTrqQirPXSz_ibBnD8PiQj3L6N6o5bw00FGE5iZ2ceoHZKQ9ya8iijE04DsVAhQPrghn3HNonRnBSVaPC9-KEgUEMsuiXxTOchHJd7s1UfCWP6uddh3CA_/s1600/twitter_google.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="367" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifEamW62Cy-Hnkglx_gUSea4aTrqQirPXSz_ibBnD8PiQj3L6N6o5bw00FGE5iZ2ceoHZKQ9ya8iijE04DsVAhQPrghn3HNonRnBSVaPC9-KEgUEMsuiXxTOchHJd7s1UfCWP6uddh3CA_/s400/twitter_google.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
However, the link provided by the attacker does not actually link back to Twitter, but to a Google Groups page where the malware is currently hosted.&amp;nbsp; The use of Google Groups to distribute malware has been a continuing trend since eSoft first &lt;a href="http://threatcenter.blogspot.com/2010/05/google-groups-latest-hot-spot-for-rogue.html"&gt;blogged&lt;/a&gt; about it last month.&lt;br /&gt;
&lt;br /&gt;
Virus Total shows a &lt;a href="http://www.virustotal.com/analisis/19a844fd5ae3c41b964549ce4e7388776be2fb24730f01576d69c21fb45e2658-1275931409"&gt;moderate detection rate&lt;/a&gt; of 21 out of 41 anti-virus companies that currently detect this threat.&amp;nbsp; For users whose anti-virus software does not detect the threat, a download will result in an infection with the &lt;a href="http://threatcenter.blogspot.com/search/label/rogue%20av"&gt;rogue anti-virus malware&lt;/a&gt;.&amp;nbsp; The malware launches a “Protection Center,” which runs a fake anti-virus scan ostensibly revealing the machine is infected by a slew of viruses. The user must activate the software to remove the bogus infections, handing their credit card info over to cyber criminals. &lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY9m9vG-JIlroxvLDbpA0k7oecYWYudaFJnJdiHyPq5s8mMimTnyfsGYNty6QYrYynHKEYBMqxAMB61OXr0ELCDhookkVu3rCdMxVOxcWkOf0bv6wKTgZk_O1F7Pujvk2p6rkucfg2IajO/s1600/protectioncenter.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY9m9vG-JIlroxvLDbpA0k7oecYWYudaFJnJdiHyPq5s8mMimTnyfsGYNty6QYrYynHKEYBMqxAMB61OXr0ELCDhookkVu3rCdMxVOxcWkOf0bv6wKTgZk_O1F7Pujvk2p6rkucfg2IajO/s400/protectioncenter.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
The cybercriminals behind this attack make excellent use of social engineering tricks to fool users into installing this malware. They use the topic of stolen Twitter account credentials to get the users’ attention, then link to Google Groups to make users feel comfortable with the download, and finally use convincing fake anti-virus scans to make the user believe their machine is infected. &lt;br /&gt;
&lt;br /&gt;
eSoft is flagging these infected Google Groups pages as Compromised.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifEamW62Cy-Hnkglx_gUSea4aTrqQirPXSz_ibBnD8PiQj3L6N6o5bw00FGE5iZ2ceoHZKQ9ya8iijE04DsVAhQPrghn3HNonRnBSVaPC9-KEgUEMsuiXxTOchHJd7s1UfCWP6uddh3CA_/s72-c/twitter_google.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>135,000 Fake YouTube Pages Delivering Malware</title><link>http://threatcenter.blogspot.com/2010/06/135000-fake-youtube-pages-delivering.html</link><category>blackhat seo</category><category>compromised sites</category><category>web security</category><pubDate>Mon, 7 Jun 2010 13:36:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-3958915284867001636</guid><description>The eSoft Threat Prevention Team has uncovered thousands compromised web servers hosting fake YouTube pages.&amp;nbsp; Attempting to play the video on these fake pages prompts the user to install a ‘media codec’ which then infects the machine with malware. &lt;br /&gt;
&lt;br /&gt;
The fake YouTube pages are well crafted and look almost identical to the real site.&amp;nbsp; By using websites like YouTube, cyber criminals are taking advantage of a users’ inherent trust in the site and are able to infect more machines.&lt;br /&gt;
&lt;br /&gt;
Each page claims to have a “Hot Video” associated with anything from the  Gulf Oil Spill to the NBA Playoffs.&amp;nbsp; Google search results show 135,000  of these infected pages at the time of writing.&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRFz5WWIJMoKOms7nUreJd_PGNSlWOIi7vrGVRSe6x42oXOA1TlqNiXK_W7ymqegljFrZrFgIkn4Op2lpxv9qr5QN_IMkLFJZApi-SHPOTV6N4lipwZ1kgd8YS6lg-uA8_-EXu3oiEzCw_/s1600/youtube_oilspill.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="292" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRFz5WWIJMoKOms7nUreJd_PGNSlWOIi7vrGVRSe6x42oXOA1TlqNiXK_W7ymqegljFrZrFgIkn4Op2lpxv9qr5QN_IMkLFJZApi-SHPOTV6N4lipwZ1kgd8YS6lg-uA8_-EXu3oiEzCw_/s400/youtube_oilspill.bmp" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg17et7FSPUI0T8JLuUcDIUHSbiLS7tSyoT3Glpetm3q_DLq-_4_wq_XSNEhmi8Hs5qIUd1FLgqvcLe6PSt8MRBfLYv8Drycmym52JuBfNsYB1GhGHVfnbP3FfpwVhe41I5_-Nm5DFYDplg/s1600/youtube_oilspill2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="292" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg17et7FSPUI0T8JLuUcDIUHSbiLS7tSyoT3Glpetm3q_DLq-_4_wq_XSNEhmi8Hs5qIUd1FLgqvcLe6PSt8MRBfLYv8Drycmym52JuBfNsYB1GhGHVfnbP3FfpwVhe41I5_-Nm5DFYDplg/s400/youtube_oilspill2.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp; &lt;br /&gt;
By clicking ‘OK’ to install the codec the user is redirected through intermediary sites to a final destination where the malware is downloaded.&amp;nbsp; After opening the file, the malware runs silently in the background giving unsuspecting users no sign that their computer is now infected and their data and computing resources are under the control of hackers. &lt;br /&gt;
&lt;br /&gt;
Presently, this fake codec is actually a downloader Trojan with very low anti-virus detection.&amp;nbsp; Virus Total shows that only 8 of 41 anti-virus scanners currently &lt;a href="http://www.virustotal.com/analisis/9df2003a7783ad86ecd03c3c71c1a14fbfbdfa8f5020df5f7faeebdd5c73286d-1275929076"&gt;detect the threat&lt;/a&gt;.&amp;nbsp; Without capable, secure web filtering to block access to these malicious sites these threats will have a high percentage chance of infecting users.&lt;br /&gt;
&lt;br /&gt;
eSoft is flagging any sites hosting the fake YouTube pages as compromised until the pages are removed.&amp;nbsp; Intermediary sites and distribution points will also be blocked as compromised or malicious distribution points, protecting SiteFilter customers from infection.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRFz5WWIJMoKOms7nUreJd_PGNSlWOIi7vrGVRSe6x42oXOA1TlqNiXK_W7ymqegljFrZrFgIkn4Op2lpxv9qr5QN_IMkLFJZApi-SHPOTV6N4lipwZ1kgd8YS6lg-uA8_-EXu3oiEzCw_/s72-c/youtube_oilspill.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Anatomy of a Modern Compromised Website</title><link>http://threatcenter.blogspot.com/2010/05/anatomy-of-modern-compromised-website.html</link><category>blackhat seo</category><category>compromised sites</category><category>pagerank bomb</category><category>security</category><category>web security</category><pubDate>Tue, 25 May 2010 16:48:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-1545469760187978949</guid><description>In the security community, little attention is paid to compromised websites that don't serve up malware.  The malicious URL lists maintained by the anti-virus companies, by Google, and by nearly every other source of malicious URLs rely on anti-virus to trigger on exploits and malware to determine if a site is malicious.  In a few select cases, behavioral analysis may be used to determine if a visit to a website will lead to an infected computer.  But sites that are taken over by hackers are frequently used for other purposes besides directly serving up viruses or redirecting to sites that do.&lt;br /&gt;
&lt;br /&gt;
When a hacker gains control of a site, they generally do one of several things:&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Nothing&lt;/strong&gt; -- they sit on it waiting for a later date,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Malware&lt;/strong&gt; -- they load on exploits and malware or links to sites that host these in an attempt to infect visitors to the site,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Defacement&lt;/strong&gt; -- they put up a big notice saying they hacked the site,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Attack relay&lt;/strong&gt; -- they use the site as part of a chain of sites that lead to malware, or&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hijacked advertising&lt;/strong&gt; -- they put ads on the site or change ads on the site to make themselves the beneficiaries&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Blackhat SEO&lt;/strong&gt; -- they use the site to trick search engines into thinking that some other site or sites are very popular and should be elevated in search page results&lt;/li&gt;
&lt;/ol&gt;&lt;br /&gt;
&lt;br /&gt;
It is the last one, Blackhat Search Engine Optimization (SEO), where hackers are seeing so much success (see our &lt;a href="http://threatcenter.blogspot.com/search/label/blackhat%20seo"&gt;previous blogs on this topic&lt;/a&gt;).  SEO is the pseudo science of increasing a website's ranking in a set of search results.  Landing at or near the top means more traffic to a website, which can mean advertising revenue or, if the site is malicious, a larger number of infected computers.  In either case, the motive is money.  And in some cases, hackers sell their SEO services and make money by increasing that search engine ranking.&lt;br /&gt;
&lt;br /&gt;
In any case, search engine rankings are largely driven by popularity.  The top results have links coming from many other sites where the more popular the sites that link, the higher the popularity of the site being linked.  We call it Blackhat SEO because hackers use the websites they've compromised to host links to a website that they want to appear high up in search results.  These links are usually hidden so that casually visitors to the site and the site's maintainers don't see them.  The links are disguised by putting them off screen or using other techniques to make them invisible to a human visitor, while they remain perfectly visible to computers like Google's crawlers.&lt;br /&gt;
&lt;br /&gt;
Take, for example, the case of Nauman Sod Farms, a small business in Iowa with a simple website that eSoft first flagged as compromised on February 4th, 2009.  It was continuously rechecked and found by eSoft to be infected from then up through this posting.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggGX26N3Svx01GgorZH2-grn9OdksNwzmnsqx2yeD0Ctx-0pjXd5QYmAxtUrEjCElaznDWb4yDE5NfSphJJ80NU2GpyUa-qCx9vf_TLZRm5Ba_PyMfpnWJFHDQNQykWnctUBD1kL45M0gG/s400/nauman-homepage.png" width="348" /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
It is easy to see why someone would think this site is innocent.  To a normal user, it appears perfectly fine, but this small business is being exploited by hackers.  If you view their home page without security precautions, everything looks normal.  If you then disable javascript (using the NoScript plugin or your browser preferences) and reload the home page, you’ll see a long stream of cell phone related links show up at the bottom of the page including:&lt;br /&gt;
&lt;br /&gt;
&lt;img align="right" border="0" height="152" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdwMhm3nDtnfbqplQdaLWGHug_J7Kw4qqAB-rRbFK1u598CvhmA1J_8d1VXw9QEYbcStDIC-qLL_W385745d24HTqzL-T6BT5kO-TL1EuzIrYWGrTXsnikvRqrDfyfNenUoMOkJoLnzOEZ/s200/nauman-homepage-seolinks.png" width="200" /&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;cf card gsm review siemens&lt;/li&gt;
&lt;li&gt;unlocking nokia 5210e&lt;/li&gt;
&lt;li&gt;tocatta and fugue in d minor ringtone verizon&lt;/li&gt;
&lt;li&gt;motorola e1 secret codes&lt;/li&gt;
&lt;li&gt;samsung le32r41bd&lt;/li&gt;
&lt;li&gt;free download polyphonic ringtones through sms&lt;/li&gt;
&lt;li&gt;motorola java games&lt;/li&gt;
&lt;li&gt;law and order ringtone&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In this case, javascript was used to hide the links, but that is not necessarily the case.  And in this case, the links are search engine bait for various mobile phone searches, but we more often see links to pornography sites and malicious sites inside these PageRank Bombs.  &lt;br /&gt;
&lt;br /&gt;
In this case, two pieces of obfuscated javascript (meaning it is loosely encrypted to evade anti-virus signatures) add some code to the page that hides the links for those who have javascript enabled.  This obfuscated javascript looks like this:&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;document.write(unescape('%3C%73%63%72%69%70%74...&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;dF('*8HXHWNUY*8J*5Fi...&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
and basically evaluates to this:&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;document.write('&amp;lt;div style="&lt;span style="background-color: yellow;"&gt;height:1px;&lt;/span&gt;overflow:auto;\"&amp;gt;');&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
where that height of 1 pixel is what instructs the browser to hide the links from a visiting user.&lt;br /&gt;
&lt;br /&gt;
Scanning this compromised page with novirusthanks.org shows that of their 20 AV scanners, none detect a problem.  Similarly, not one other URL checker shows any problem with this site including Google’s Safe Search and SiteAdvisor.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, in the case of this particular site, the infection runs deeper.  Clicking through into the site offers up a new threat.  At the bottom of the page, a hidden iframe has been injected.  Essentially this means that the attackers have chosen to have the browser fetch content from another site but not for the purpose of displaying anything to the user.  These are typically used to embed exploits hosted on another site onto the compromised site while reducing the maintenance effort.  In this particular case, the iframe links to a page that is now missing, so for the moment, visitors are not being infected with malware.  Based on our records though, the embedded iframe used to lead to malware, meaning that visitors to this site were targeted with viruses.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDz8Armje9NQsbTY6u1eXtLeZTIV8_MP_fqgMlvn2NCdkYCmGphElOwCqQ1w8OT11FR8PmLKQZv_xUNjCYzlsGPnfNXxWWRnrCj9wlwGen1P1g3qtJLRe2PaLUsIDmPPRNOau2NlATb-JU/s320/nauman-embedded-iframe.png" /&gt; &lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
This site has been compromised like this for over a year without the owner of the web site knowing -- and this is quite common.  It is difficult for security companies like eSoft to automatically notify website owners when their websites are compromised since public information about sites is frequently hidden through privacy screens or else leads to spam traps.  eSoft's Threat Prevention Team reached out to Nauman Sod Farms four days ago using the email address on their site to alert them to the problem, but so far there has been no response and the website remains under the control of hackers.  Until this is fixed and because of the likelihood of that the hackers may again start infecting visitors with malware, we recommend that folks avoid this site for now.  Users of eSoft's secure web filtering will see this site marked as Compromised.&lt;br /&gt;
&lt;br /&gt;
In general, we believe it is important to identify sites that are under the control of hackers even when those sites aren't being used to propagate computer viruses.  These sites may at any time become threatening in that way and are frequently used as part of the machine that drives other sites where the actual malware is stored.  The industry as a whole needs to pay more attention to these sites.  In the meantime, eSoft does provide protection from these sites and identifies thousands like this one every day.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggGX26N3Svx01GgorZH2-grn9OdksNwzmnsqx2yeD0Ctx-0pjXd5QYmAxtUrEjCElaznDWb4yDE5NfSphJJ80NU2GpyUa-qCx9vf_TLZRm5Ba_PyMfpnWJFHDQNQykWnctUBD1kL45M0gG/s72-c/nauman-homepage.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Phishing Scams Lure Twitter Users</title><link>http://threatcenter.blogspot.com/2010/05/phishing-scams-lure-twitter-users.html</link><category>phishing</category><category>phishing scams</category><category>spam</category><category>web security</category><pubDate>Fri, 14 May 2010 12:56:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-9087088395371724785</guid><description>The newest phishing scam on Twitter has snared thousands of users hoping to increase their number of followers.&amp;nbsp; Instead, users are sent off to a phishing page where cybercriminals steal their Twitter logins using them to generate more spam.&lt;br /&gt;
&lt;br /&gt;
Thousands of spam messages are floating around on Twitter with links to increase the users’ follower count:&lt;br /&gt;
&lt;br /&gt;
&lt;div style="padding-left: 30px;"&gt;FREE MORE TWITTER FOLLOWERS!&lt;br /&gt;
CHECK out this site, im a member of it, gets you more followers&lt;br /&gt;
If you trying to get more followers check out&lt;br /&gt;
WANT MORE TWITTER FOLLOWERS?&lt;br /&gt;
Get more followers for free!&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIhAf6rN6gZ3q9IPqS2d4VoOPGzrX2nh1Wj-MERiM3YPtcc_7aouOVjl36vXUdms-yvUoksmH3orwl8ZyW7YYYA-ARukLJ4DchLsklo3L5dzYD-06-nrlOgtyBMS51aKY_mI3YHWRGt-iZ/s1600/twitter3.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIhAf6rN6gZ3q9IPqS2d4VoOPGzrX2nh1Wj-MERiM3YPtcc_7aouOVjl36vXUdms-yvUoksmH3orwl8ZyW7YYYA-ARukLJ4DchLsklo3L5dzYD-06-nrlOgtyBMS51aKY_mI3YHWRGt-iZ/s320/twitter3.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The cybercriminals use shortened URLs to prevent spam detection on Twitter.&amp;nbsp; Scammers are using a variety of URL shortening services to evade standard security precautions.&lt;br /&gt;
&lt;br /&gt;
The shortened links lead to phishing pages capturing the users Twitter login, but never doing anything to increase the users following. The compromised accounts are then used to send more spam and lure in more unsuspecting users.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMz-NFrn3RQsd6xAvIG995f-r8i-_yZvc-i5iR93VC6kV9o-BM2piAN4qUlrCdh7LQcR_qONmbgIbDTqlkhtQdHU2uR7Pvb9ecHPmPzhfTk0SreJ_TZEHICPsAqk41LeJzp4ApdmTB3_o2/s1600/twitter6.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="341" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMz-NFrn3RQsd6xAvIG995f-r8i-_yZvc-i5iR93VC6kV9o-BM2piAN4qUlrCdh7LQcR_qONmbgIbDTqlkhtQdHU2uR7Pvb9ecHPmPzhfTk0SreJ_TZEHICPsAqk41LeJzp4ApdmTB3_o2/s400/twitter6.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
With more followers on Twitter, you’re able to expand your reach and connect with more people.&amp;nbsp; This makes for a very effective social engineering trick; taking advantage of user tendencies for malicious purposes. Users are typically none the wiser until spam messages start appearing from their account.&lt;br /&gt;
&lt;br /&gt;
There are now a tremendous amount of 3rd party sites and services available to support the Twitter crowd.&amp;nbsp; It’s important that users remember not to give out login information without first verifying the legitimacy of Twitter applications and websites.&amp;nbsp; Most legitimate services now redirect users directly to the Twitter API and use the OAuth method of authentication.&amp;nbsp; Users should look closely at their URL bar to be sure they are on Twitter's site before entering their login credentials.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLVTP2tRSVzE7g9s7jjwLSHaL-m6B6qoMGYsoz3Ocos_f2IyuBwyRBrG-j-FUxYVYHdL2xp-nVWNNmDOsgCNGJsD9xL6JmKBpyD00x6L1UsaCO6DBVD4yQypu_VhOLM29wq_CfQ-XNDERd/s1600/twitter8.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="257" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLVTP2tRSVzE7g9s7jjwLSHaL-m6B6qoMGYsoz3Ocos_f2IyuBwyRBrG-j-FUxYVYHdL2xp-nVWNNmDOsgCNGJsD9xL6JmKBpyD00x6L1UsaCO6DBVD4yQypu_VhOLM29wq_CfQ-XNDERd/s400/twitter8.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you see strange spam messages like these showing up on your account, change your password immediately.&amp;nbsp; eSoft protects SiteFilter users from these phishing sites with the “Phishing &amp;amp; Fraud” category and is actively flagging new sites as they’re discovered.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIhAf6rN6gZ3q9IPqS2d4VoOPGzrX2nh1Wj-MERiM3YPtcc_7aouOVjl36vXUdms-yvUoksmH3orwl8ZyW7YYYA-ARukLJ4DchLsklo3L5dzYD-06-nrlOgtyBMS51aKY_mI3YHWRGt-iZ/s72-c/twitter3.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Google Groups Latest Hot Spot for Rogue AV and Malware</title><link>http://threatcenter.blogspot.com/2010/05/google-groups-latest-hot-spot-for-rogue.html</link><category>compromised sites</category><category>malware</category><category>spam</category><category>virus</category><pubDate>Wed, 12 May 2010 08:52:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-716801672014996038</guid><description>eSoft researchers have been tracking a recent campaign abusing Google Groups to spread malicious links in Spam emails. &amp;nbsp;Users following the link are infected with a Downloader Trojan, silently infecting the machine with various types of malware including Rogue Anti-Virus.&lt;br /&gt;
&lt;br /&gt;
The scam starts with an email asking the user to update their email settings according to the linked instructions. &amp;nbsp;The URL in the message brings the user to a Google Groups page linking to a malicious download.&lt;br /&gt;
&lt;br /&gt;
Sample Email:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a bitly="BITLY_PROCESSED" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-9py7aLoz7EK-WISEiaR5hAfREfVA9q7eetvYFU7-aD8GtpXvJ9dOii_epTWjtpvT6WFajBzqGRw2qEBqrheXCM7eO8QGBn7M2yJkCvlOGGRNtlEF3hUALQCL5YngJrgJsg0U5a_0qOv4/s1600/email.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="105" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-9py7aLoz7EK-WISEiaR5hAfREfVA9q7eetvYFU7-aD8GtpXvJ9dOii_epTWjtpvT6WFajBzqGRw2qEBqrheXCM7eO8QGBn7M2yJkCvlOGGRNtlEF3hUALQCL5YngJrgJsg0U5a_0qOv4/s400/email.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a bitly="BITLY_PROCESSED" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQKhy0qxw3-kU_BbYp7z9s5cBtns6QHsLbRxgLd8-xD5pxtRTmZni3ADeYFvVQisQN_GRTnScscuh2LLJr17kZTzCFZZaGNrohwB6vxbWGmcSJoxXhsSa2JxyYFSiqKiJmEfVl9s8Dzo5B/s1600/linkedpage.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="231" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQKhy0qxw3-kU_BbYp7z9s5cBtns6QHsLbRxgLd8-xD5pxtRTmZni3ADeYFvVQisQN_GRTnScscuh2LLJr17kZTzCFZZaGNrohwB6vxbWGmcSJoxXhsSa2JxyYFSiqKiJmEfVl9s8Dzo5B/s400/linkedpage.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The link on the Google Groups page is a Downloader Trojan with better than normal virus detection. &amp;nbsp;58% of virus scanners detected the file as malicious on &lt;a bitly="BITLY_PROCESSED" href="http://www.virustotal.com/analisis/9bd5534eeed04cc9cf1f6ff5739e9fc2076a6de79113938ac9a7d0497ea20d6c-1273505152"&gt;Virus Total&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
The Downloader then does its job, downloading a mixed bag of malware from several locations. eSoft is currently blocking all known distribution points. &amp;nbsp;Among the malware downloaded is Desktop Security 2010, a Rogue Anti-Virus program.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a bitly="BITLY_PROCESSED" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmfq39H_c8_4IkYPVe2NAaWIQ3nyl5SkKwXRK6c-zYC0OWLD1QEFvaAXTVRyuYBeH02SoWPrZCaSD0wF0AzkPOzNYccms2qqUFhnbh2G2bZGQk6XIAuP7ouDkaOpDdayeBzdQHel1q8fQI/s1600/googlegroups2.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmfq39H_c8_4IkYPVe2NAaWIQ3nyl5SkKwXRK6c-zYC0OWLD1QEFvaAXTVRyuYBeH02SoWPrZCaSD0wF0AzkPOzNYccms2qqUFhnbh2G2bZGQk6XIAuP7ouDkaOpDdayeBzdQHel1q8fQI/s400/googlegroups2.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A fake system scan is run notifying the user they’ve been infected and prompting the user to purchase a license key to remove the malware.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a bitly="BITLY_PROCESSED" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjltUC98G29hYrTaVbIuNWWI6nKow4lyQsrEUNo7-9w96tylIwwAiJUsF_FtMY5xBuflA3bmgMRGkt7Ytob1MZv_ki9wEvu-MV7z62HEi0JliUCSxxO9eFq0uM52CE0qKVpkmi9tEQeN0Z1/s1600/googlegroups3.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="321" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjltUC98G29hYrTaVbIuNWWI6nKow4lyQsrEUNo7-9w96tylIwwAiJUsF_FtMY5xBuflA3bmgMRGkt7Ytob1MZv_ki9wEvu-MV7z62HEi0JliUCSxxO9eFq0uM52CE0qKVpkmi9tEQeN0Z1/s400/googlegroups3.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For only $89.95 you can get a lifetime license with special support. Users following through on the purchase have handed their credit card and other personal information to cybercriminals on a silver platter.&lt;br /&gt;
&lt;br /&gt;
Access to the Internet through the browser is blocked until you’ve purchased a license, adding a hint of Ransomware to the mix. &amp;nbsp;Between this tactic and the official looking interface, unsavvy users are unfortunately easy prey.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a bitly="BITLY_PROCESSED" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV1vb-bMpsrgDZMgLZ6-fVuBe3Lx7U-rMPD7jU6Ex-pya92KBKL9MtwdrBVO0FSjUDAOdjjv-xNIfzW1ZxM2SFVfLNArB-1r0j7WPFZSHo45rOWDCA1IgUzz_gRIg_6JrZkSedxwMZK970/s1600/blockedpage.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="270" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV1vb-bMpsrgDZMgLZ6-fVuBe3Lx7U-rMPD7jU6Ex-pya92KBKL9MtwdrBVO0FSjUDAOdjjv-xNIfzW1ZxM2SFVfLNArB-1r0j7WPFZSHo45rOWDCA1IgUzz_gRIg_6JrZkSedxwMZK970/s400/blockedpage.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use of community sites like Google Groups, &lt;a bitly="BITLY_PROCESSED" href="http://threatcenter.blogspot.com/2009/12/livecom-exploited-as-pharma-fraud-cover.html"&gt;Windows Live&lt;/a&gt;, Blogger and others is becoming commonplace for cybercriminals looking to get the upper hand on web and spamfilters. &amp;nbsp;Secure Web Filtering with a combination of granular classifications and real-time URL lookups is the most effective way to combat these threats.&lt;br /&gt;
&lt;br /&gt;
eSoft is actively identifying and flagging select Google Groups pages as Compromised as they’re discovered. &amp;nbsp;Other sites involved with this attack are blocked as Malware Distribution Points.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;Update: May 12th 10:00 AM &lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
It appears the spammers have switched tactics and are now sending fake ecards claiming to be from 123greetings.com. Users receive an email in the form below with an image link.&amp;nbsp; The links in the email use the same Google Groups URLs and present the same dangerous malware.&amp;nbsp; This new round of spam uses an even more effective social engineering trick than in the first campaign, and more unsuspecting users will certainly fall victim.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2sSBjgylHQvVWRW4w7DR9Ank57vJSgOMP7-4RsIkswCRCoiMi6SI-qBH9xxKY0CPkaJXLTRABVhV4KilWSzOAY53x0kTa4fOgAVsAf4jmGDB9LKoL-3DL-fLEZFQ6fxbNrd9fbva9QlNj/s1600/ecard.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="187" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2sSBjgylHQvVWRW4w7DR9Ank57vJSgOMP7-4RsIkswCRCoiMi6SI-qBH9xxKY0CPkaJXLTRABVhV4KilWSzOAY53x0kTa4fOgAVsAf4jmGDB9LKoL-3DL-fLEZFQ6fxbNrd9fbva9QlNj/s400/ecard.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-9py7aLoz7EK-WISEiaR5hAfREfVA9q7eetvYFU7-aD8GtpXvJ9dOii_epTWjtpvT6WFajBzqGRw2qEBqrheXCM7eO8QGBn7M2yJkCvlOGGRNtlEF3hUALQCL5YngJrgJsg0U5a_0qOv4/s72-c/email.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Pharma-Fraud Continues to Dominate Spam</title><link>http://threatcenter.blogspot.com/2010/04/pharma-fraud-continues-to-dominate-spam.html</link><category>fraud</category><category>pharma fraud</category><category>spam</category><pubDate>Thu, 22 Apr 2010 10:51:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-7265768628539287259</guid><description>Have you taken a look inside your Spam folder recently? &amp;nbsp;Without a doubt you’ll find the folder full of pharmacy Spam, pitching everything from Cialis and Viagra to Vicodin and Hydrocodone. &amp;nbsp;The problem is almost none of the linked web sites are legitimate certified pharmacies.&lt;br /&gt;
&lt;br /&gt;
Pharmacy Spam is delivered at an estimated 70% of global spam volumes, or &lt;i&gt;140 billion messages per day&lt;/i&gt;. These massive volumes are largely fueled by botnets such as Grum and Cutwail, creating all types of problems for business networks large and small.&lt;br /&gt;
&lt;br /&gt;
These botnet operators are continually trying to find ways around Spam filters and web filters to earn money as part of the larger criminal operation behind these sites. &amp;nbsp;The latest attempt to get around these filters uses livejournal.com, a free blogging service, to link back to fraudulent pharmacy sites. &amp;nbsp;eSoft has seen similar attempts using other free blog services, including &lt;a bitly="BITLY_PROCESSED" href="http://threatcenter.blogspot.com/2009/12/livecom-exploited-as-pharma-fraud-cover.html"&gt;Windows Live Spaces&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a bitly="BITLY_PROCESSED" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimZYZ7gNkXc2wOo5eBhUkCxSTMlnlBsOQ4g28rVSmExc5XPE5zDoYwqsL7-9JFfn8zPoQCfbLJI4ZavZjK1yzFQ8ernbgUKcKIWkDPHFL8sY6T3MfblDiC5yCV0maQLO8dlpvS7zkPJMgD/s1600/pharm1.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="176" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimZYZ7gNkXc2wOo5eBhUkCxSTMlnlBsOQ4g28rVSmExc5XPE5zDoYwqsL7-9JFfn8zPoQCfbLJI4ZavZjK1yzFQ8ernbgUKcKIWkDPHFL8sY6T3MfblDiC5yCV0maQLO8dlpvS7zkPJMgD/s400/pharm1.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In this example, a number of methods were used to get around Spam filtering technologies including using numbers and underscores (0rder_Now) to prevent the text from being detected as Spam. &amp;nbsp;A user following the link is taken to the Live Journal blog which then links them to the fraudulent online pharmacy.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a bitly="BITLY_PROCESSED" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_cwzTXCxtbcIXFD3-6lJGo45BVrkkHPXxGqtivkFyjNqpfkidRBsckSF_Tk2FxJ1gMxQNl-QIlh1EgnPnaE9Wf2z20yD8zuO8aYIr8bqYnN_6XRoXjpZXOagclMu4XrNG2XEOCHRoAy35/s1600/pharm2.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_cwzTXCxtbcIXFD3-6lJGo45BVrkkHPXxGqtivkFyjNqpfkidRBsckSF_Tk2FxJ1gMxQNl-QIlh1EgnPnaE9Wf2z20yD8zuO8aYIr8bqYnN_6XRoXjpZXOagclMu4XrNG2XEOCHRoAy35/s400/pharm2.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In our research, the image link provided on each of the blogs linked back to many different “Canadian pharmacy” type pages. &amp;nbsp;eSoft has very good detection of pharma-fraud sites, finding hundreds of new sites per week. &amp;nbsp;Last year eSoft worked with the &lt;a bitly="BITLY_PROCESSED" href="http://threatchaos.com/home-mainmenu-1/16-blog/49"&gt;ThreatChaos blog&lt;/a&gt;&amp;nbsp;to report on these sites. &amp;nbsp;The recent government crackdown has decreased the amount of sites coming online as compared to last year’s report, but certainly not stopped the operation or the related Spam.&lt;br /&gt;
&lt;br /&gt;
It can be difficult to ascertain if an online pharmacy is legitimate or not. &amp;nbsp;The National Association of Boards of Pharmacy (NABP) provides some excellent &lt;a bitly="BITLY_PROCESSED" href="http://www.nabp.net/programs/consumer-protection/buying-medicine-online"&gt;safety information for buying medicine online&lt;/a&gt;. &amp;nbsp;Here are a few of the jaw dropping stats from their site.&lt;br /&gt;
&lt;br /&gt;
•&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;83% do not require a valid prescription&lt;br /&gt;
•&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;42% offer foreign or non-FDA-approved drugs&lt;br /&gt;
•&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;55% do not provide a physical address&lt;br /&gt;
•&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;b&gt;&lt;i&gt;96% of sites reviewed are NOT recommended&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
At the time of writing, Live Journal has disabled the fake blogs we found using their service. &amp;nbsp;eSoft categorizes these fake blogs and the pharma-fraud sites they link to as "Pharmaceuticals" paired with “Phishing &amp;amp; Fraud” and “Spam” if the URL was detected in a Spam message.&lt;br /&gt;
&lt;br /&gt;
Note that visiting these sites may result in stolen identity,&amp;nbsp;delivery&amp;nbsp;of fake products,&amp;nbsp;further&amp;nbsp;Spam and more. &amp;nbsp;eSoft strongly recommends sticking to lists of approved pharmacies and always using extreme caution and skepticism before following links in emails.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimZYZ7gNkXc2wOo5eBhUkCxSTMlnlBsOQ4g28rVSmExc5XPE5zDoYwqsL7-9JFfn8zPoQCfbLJI4ZavZjK1yzFQ8ernbgUKcKIWkDPHFL8sY6T3MfblDiC5yCV0maQLO8dlpvS7zkPJMgD/s72-c/pharm1.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Tiger Woods (Searches) Not to Be Trusted</title><link>http://threatcenter.blogspot.com/2010/04/tiger-woods-searches-not-to-be-trusted.html</link><category>blackhat seo</category><category>rogue av</category><category>web security</category><pubDate>Thu, 8 Apr 2010 13:54:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-1269401374267933820</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivTEKZa2cNFQgy3jB4corZj1_hsBp22ebqWCZmnVocqT6OFuT2ixty4MWH0lsM3LNT0vnGRzEpSJn6mDF52vktN6HCRL_kAxJdAEkhR-GI9dMY-Y0zDlRTav1U4_4jbmXbhVWCYOzQa2N4/s1600/tigerwoods2.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="161" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivTEKZa2cNFQgy3jB4corZj1_hsBp22ebqWCZmnVocqT6OFuT2ixty4MWH0lsM3LNT0vnGRzEpSJn6mDF52vktN6HCRL_kAxJdAEkhR-GI9dMY-Y0zDlRTav1U4_4jbmXbhVWCYOzQa2N4/s200/tigerwoods2.png" style="margin-top: 20px;" width="200" /&gt;&lt;/a&gt;&lt;br /&gt;
Tiger Woods’ personal life and marital affairs have attracted constant attention from the press and has certainly damaged his public reputation.&amp;nbsp; With his return to the Masters only days away, Nike has released a new commercial in an effort to rebuild Woods’ image.&amp;nbsp; This compelling commercial is intended to spark a reaction, and may well be the next thing you talk about at the office water cooler.&amp;nbsp; Anyone who hasn’t seen it will go right back to their desk and search for the video. Blackhats have once again worked their way into these search results, leading users to malicious sites and Rogue Anti-Virus downloads.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
A user looking to see the commercial online would likely search “tiger woods commercial” – the search is heavily poisoned.&amp;nbsp; Out of the top 7 search results, six lead to Fake Anti-Virus pages begging the user to install malicious software.&amp;nbsp; The video results have also been poisoned to do the same.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhikO77nxQY5xn_FjFbjZFNSktcolt-77xCvxBJp2oGWqcgfnUQjiMH4aITQZ_fz7CGj7I0rNc2e4EEhXreCdvZVi9HkZU2JKMcNrxlOQj7oJqHls3k-oiEY7AuEhhYwto-1eSfiExW7XJm/s1600/tigerwoods4.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhikO77nxQY5xn_FjFbjZFNSktcolt-77xCvxBJp2oGWqcgfnUQjiMH4aITQZ_fz7CGj7I0rNc2e4EEhXreCdvZVi9HkZU2JKMcNrxlOQj7oJqHls3k-oiEY7AuEhhYwto-1eSfiExW7XJm/s400/tigerwoods4.png" width="312" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
With low anti-virus detection rates, users tricked by this attack have little to prevent them from installing downloaded malware.&amp;nbsp; In fact, only 1 out of the 20 scanners on &lt;a href="http://virusscan.jotti.org/en/scanresult/3aa0d1aecef4adb8e032a50418c5050c09b75cf6/e9415a5e2f313e62330c09895c52bf30007f3265"&gt;Jotti&lt;/a&gt; detected the payload as malicious.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAG7ojOexUUfUobqBQIJ_3dX6GCqrjJXEJTMcQtHsC4Ab2hUFHdWZAViTbNSXnV-XMcjoCrHrXzi8ELsHq_OvFQqFA4UkkGD6p2Amwu9E7O2JepOJFQRQU2R5f25Qj99dvcetMSuAMFnN0/s1600/tigerwoods3.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="132" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAG7ojOexUUfUobqBQIJ_3dX6GCqrjJXEJTMcQtHsC4Ab2hUFHdWZAViTbNSXnV-XMcjoCrHrXzi8ELsHq_OvFQqFA4UkkGD6p2Amwu9E7O2JepOJFQRQU2R5f25Qj99dvcetMSuAMFnN0/s400/tigerwoods3.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Users should also be wary of any Masters’ related searches as these will also be a target of cyber criminals. eSoft’s proactive detection of these attacks protects any SiteFilter customers.&amp;nbsp; Any sites associated with these attacks are being flagged as malicious or compromised.&lt;br /&gt;
&lt;br /&gt;
[&lt;i&gt;Additional Note&lt;/i&gt;: In this particular attack, the referring site is also important.&amp;nbsp; If the user is not coming from Google, or presumably other search engines they will be redirected to cnn.com rather than the malicious site.&amp;nbsp; eSoft has &lt;a href="http://threatcenter.blogspot.com/2009/09/google-users-targeted-by-new-malicious.html"&gt;noted the use of this technique&lt;/a&gt; in the past, but it is interesting the attackers have chosen CNN for use in this campaign.]</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivTEKZa2cNFQgy3jB4corZj1_hsBp22ebqWCZmnVocqT6OFuT2ixty4MWH0lsM3LNT0vnGRzEpSJn6mDF52vktN6HCRL_kAxJdAEkhR-GI9dMY-Y0zDlRTav1U4_4jbmXbhVWCYOzQa2N4/s72-c/tigerwoods2.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Affiliate Programs Rising Cause of Fraud and Abuse</title><link>http://threatcenter.blogspot.com/2010/04/affiliate-programs-rising-cause-of.html</link><category>fraud</category><category>spam</category><category>web security</category><pubDate>Mon, 5 Apr 2010 07:01:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-7929789235276450248</guid><description>What happens when you offer up money to anyone who can drive traffic to your website?&amp;nbsp; Hackers, scammers, spammers and fraudsters come to your aid.&amp;nbsp; That’s the case with online movie site zml.com, which offers 30% of each sale and 5% of rebills paid via anonymous means to anyone who refers paying customers to the site.&amp;nbsp; And zml.com is just one of many.&lt;br /&gt;
&lt;br /&gt;
In general, it works like this: a person signs up as an affiliate and is given a code.&amp;nbsp; If someone goes to the website with the proper code embedded in the URL, then a cookie is set and if that person later buys something on the site, the affiliate gets a piece of the transaction.&amp;nbsp; Outside of the shadows this means others are encouraged to setup ads or to refer friends to the site.&amp;nbsp; But on bigger scales, this can be big money, so the established cyber criminal community gets in on the action – not always by breaking the law, but certainly using shady means to drive customers to these websites.&lt;br /&gt;
&lt;br /&gt;
Among the techniques being used by these shadow affiliates are blackhat SEO, fake blogs, spam campaigns and more.&amp;nbsp; These will frequently redirect through servers managed by the shadow affiliate and, in eSoft’s investigations, frequently used for other purposes such as malware distribution and phishing campaigns.&lt;br /&gt;
&lt;br /&gt;
Windows Live Spaces is &lt;a href="http://threatcenter.blogspot.com/2009/12/livecom-exploited-as-pharma-fraud-cover.html"&gt;again being abused&lt;/a&gt; with a slew of fake blog pages covering hundreds of popular movies available for download. The download links redirect the user to a number of different movie sites that offer high paying affiliate programs. &lt;br /&gt;
&lt;br /&gt;
Example 1&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwdh7dGGtfX8HTZbxkEh7O6rZJZW87LKeUrfe_gj4W63JhLjiFVECLLV1pDT1gcai6yiFDWEg9K_p_7BT2K-jCNqQ-sPJAAngzMi3XqL2bq-8eJ7biNgQmukXQb7D-Yeg-FjQkakkan-FF/s1600/hangover.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="298" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwdh7dGGtfX8HTZbxkEh7O6rZJZW87LKeUrfe_gj4W63JhLjiFVECLLV1pDT1gcai6yiFDWEg9K_p_7BT2K-jCNqQ-sPJAAngzMi3XqL2bq-8eJ7biNgQmukXQb7D-Yeg-FjQkakkan-FF/s400/hangover.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The blockbuster movie The Hangover is the sole blog post in the blog shown above and includes a promo image and full description of the movie with links to download. After a series of redirects to ensure the scammer gets paid, the user is brought to moviedownloads-pro.com. In order to download for free, the user must sign up for a yearly subscription with a credit card and our blog spammer gets a cut.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsM7bm_9FAAzrVlJmn3PtiOK4PN22LsqASae2bifQ2HDgJTVXFpm3ZBxzDUDdjC3Xn85c31gQej3LzhrbjWT8U5rayQpg-AmD-lMuewremQcNERzNQV7scc_ZjQs8ZrLhD4KjzbxBHw069/s1600/moviedownload-pro_signup.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="298" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsM7bm_9FAAzrVlJmn3PtiOK4PN22LsqASae2bifQ2HDgJTVXFpm3ZBxzDUDdjC3Xn85c31gQej3LzhrbjWT8U5rayQpg-AmD-lMuewremQcNERzNQV7scc_ZjQs8ZrLhD4KjzbxBHw069/s400/moviedownload-pro_signup.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After signing up, the user is emailed a link to download software which we suspect to be questionable although we did not give up our credit card info to find out.&amp;nbsp; The affiliate network in this case is Marketbay, which is also home to some other very shady software including 14 different bogus anti-virus products. &lt;br /&gt;
&lt;br /&gt;
Example 2&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWsXDFjktDiFYLbqjFH2tk86FVMb37H86wdRKYYCzuqyM01P65a5M1V4uWXNOAk59FoGq_Onv-nh8c0RYRq5SBj_KbS9FC4-DQP5TdsZhHkzQCc8OpkEs6nlo38E1wtWI7OiLp3aKDIEx5/s1600/marketbay_shady.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="298" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWsXDFjktDiFYLbqjFH2tk86FVMb37H86wdRKYYCzuqyM01P65a5M1V4uWXNOAk59FoGq_Onv-nh8c0RYRq5SBj_KbS9FC4-DQP5TdsZhHkzQCc8OpkEs6nlo38E1wtWI7OiLp3aKDIEx5/s400/marketbay_shady.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In another example, the eSoft Threat Prevention Team found the intermediary sites used by a shadow affiliate were hosted on the same site used in a &lt;a href="http://threatcenter.blogspot.com/2009/08/new-rash-of-fraud-sites-touting-cheap.html"&gt;ring of fraudulent "OEM Software" distribution sites&lt;/a&gt; we blogged about last year.&amp;nbsp; These links lead to zml.com, whose affiliate signup page contains the warning, "SEO or E-Mail spam is not tolerated!"&amp;nbsp; However, after sharing information of abuse with zml.com five days before the posting of this blog, we have yet to see the affiliate removed or to receive any response from zml.com.&amp;nbsp; In all likelihood, it is simply more profitable to turn a blind eye.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjrvkw0YzDa8b-ISbzVCk3RuQGHYplnoixjp6NJPyfuxs6UTFvepweQ_Y5xuHA2ycZw-QIVRd37co694I1I1kF4Jg25oVP7o0TJ-k3AJIsFaaAEqO284PxdkbvsYV1jK2iapVwMAKmXKYh/s1600/zml_affiliate.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="287" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjrvkw0YzDa8b-ISbzVCk3RuQGHYplnoixjp6NJPyfuxs6UTFvepweQ_Y5xuHA2ycZw-QIVRd37co694I1I1kF4Jg25oVP7o0TJ-k3AJIsFaaAEqO284PxdkbvsYV1jK2iapVwMAKmXKYh/s400/zml_affiliate.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using Windows Live Blogs to disguise URLs can be an effective way to get around some Spam and Web filters. eSoft reported on a similar tactic used to push &lt;a href="http://threatcenter.blogspot.com/2009/12/livecom-exploited-as-pharma-fraud-cover.html"&gt;pharma-fraud sites&lt;/a&gt; just a few months back. While this is nothing new, it goes to show that cybercriminals will continue these types of campaigns so long as they continue to be effective and profitable. &lt;br /&gt;
&lt;br /&gt;
eSoft currently categorizes a number of these affiliates’ sites as Phishing &amp;amp; Fraud due to their use in &lt;a href="http://threatcenter.blogspot.com/2009/09/blackhats-quickly-saturate-google-with.html"&gt;Blackhat SEO campaigns&lt;/a&gt; and others are categorized as Online Ads or Spammed URLs depending on the methods being used to drive users to the links.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwdh7dGGtfX8HTZbxkEh7O6rZJZW87LKeUrfe_gj4W63JhLjiFVECLLV1pDT1gcai6yiFDWEg9K_p_7BT2K-jCNqQ-sPJAAngzMi3XqL2bq-8eJ7biNgQmukXQb7D-Yeg-FjQkakkan-FF/s72-c/hangover.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Obfuscated URLs no match for eSoft SiteFilter</title><link>http://threatcenter.blogspot.com/2010/03/obfuscated-urls-no-match-for-esoft.html</link><category>web security</category><pubDate>Mon, 22 Mar 2010 15:54:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-4835344848937245271</guid><description>&lt;span id="goog_1269294545044"&gt;&lt;/span&gt;&lt;span id="goog_1269294545045"&gt;&lt;/span&gt;Researchers at Kaspersky labs have discovered a new &lt;a href="http://www.viruslist.com/en/weblog?weblogid=208188044"&gt;banking malware campaign&lt;/a&gt; that uses an old trick to obfuscate malicious URLs. Rather than using a domain name or IP address for their malicious link the URL is converted to numerical bases such as octal or hexadecimal formats. These formats are supported by major browsers and serve the purpose of tricking users into following the link and infecting their machine. &lt;br /&gt;
&lt;br /&gt;
The post goes on to speculate that URL filters would have difficulty detecting and blocking the obfuscated URLs, leaving users vulnerable to these attacks. While many web filtering vendors may be susceptible to this attack, eSoft customers are protected. eSoft SiteFilter provides full support for these obfuscated URLs, filtering sites in ALL categories. &lt;br /&gt;
&lt;br /&gt;
Using the example of playboy.com, the URL can be expressed in many different ways including the few examples below. &lt;br /&gt;
&lt;br /&gt;
http://216.163.137.68&lt;br /&gt;
http://3634596164&lt;br /&gt;
http://0xd8.0xa3.0x89.0x44&lt;br /&gt;
http://0xd8.0xa3.0x89.68&lt;br /&gt;
http://0330.0243.0211.0104&lt;br /&gt;
http://000000330.0xa3.137.0104&lt;br /&gt;
http://0xD8A38944&lt;br /&gt;
http://033050704504&lt;br /&gt;
&lt;br /&gt;
As shown on the &lt;a href="http://www.esoft.com/new_products/sflookupoem.cfm"&gt;Test a Site&lt;/a&gt; portal, eSoft correctly interprets these encoded addresses and detects each of these URLs as Pornography/Sex, the same as the domain playboy.com.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_Qy3MdfwOOBfZRxTjuM3QGdqzUH1W0WILzouTKqL8F_0wJm4MyA3F_p6EZXmPT36bTf_pX-vFsFb9xR-oBm1CSDM290u3F99dRbgEfuZMcAfldDqp31Nz1UmoG75tfq5WSO0XuZ8WZtPO/s1600-h/testsite2.png" imageanchor="1" style="clear: left; float: left; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_Qy3MdfwOOBfZRxTjuM3QGdqzUH1W0WILzouTKqL8F_0wJm4MyA3F_p6EZXmPT36bTf_pX-vFsFb9xR-oBm1CSDM290u3F99dRbgEfuZMcAfldDqp31Nz1UmoG75tfq5WSO0XuZ8WZtPO/s200/testsite2.png" width="172" /&gt;&lt;/a&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt22-LM1s4e-Uuh5uGHRFGR1UpDgFtmJ9427QLYHA_DK0QoJ6jXbGs4J8NLgHKHJra1h2QWIZt8xJv7Y_G3MGXL6z9NZB20AQzbJ5wRcwK-7sfNHKIPVCXnU6_IVVWIiOiQ4qbmLnthNy_/s1600-h/testsite1.png" imageanchor="1" style="float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt22-LM1s4e-Uuh5uGHRFGR1UpDgFtmJ9427QLYHA_DK0QoJ6jXbGs4J8NLgHKHJra1h2QWIZt8xJv7Y_G3MGXL6z9NZB20AQzbJ5wRcwK-7sfNHKIPVCXnU6_IVVWIiOiQ4qbmLnthNy_/s200/testsite1.png" width="173" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
With the example found by Kaspersky, vendors that do not accurately filter these URLs leave users vulnerable to dangerous banking Trojans and end-user evasions. Malicious campaigns using this technique have been seen in the past and due to their effectiveness will be used in the future. &lt;br /&gt;
&lt;br /&gt;
eSoft’s web filtering technology and focus on security provides users with unsurpassed protection against the latest web threats, including these obfuscation techniques.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_Qy3MdfwOOBfZRxTjuM3QGdqzUH1W0WILzouTKqL8F_0wJm4MyA3F_p6EZXmPT36bTf_pX-vFsFb9xR-oBm1CSDM290u3F99dRbgEfuZMcAfldDqp31Nz1UmoG75tfq5WSO0XuZ8WZtPO/s72-c/testsite2.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Cinderella Story Leads to March Madness Malware</title><link>http://threatcenter.blogspot.com/2010/03/cinderella-story-leads-to-march-madness.html</link><category>blackhat seo</category><category>pagerank bomb</category><category>rogue av</category><category>web security</category><pubDate>Sun, 21 Mar 2010 19:53:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-6880394697599795989</guid><description>The first week of March Madness has brought about many compelling stories, with a good deal of upsets and bracket busters. The most newsworthy of these has been the University of Northern Iowa’s ousting of #1 overall seed Kansas. This ‘Cinderella’ story has deservedly gotten a great deal of press coverage. However, those looking for information on the web may get infected with malware rather than a great story. &lt;br /&gt;
&lt;br /&gt;
The eSoft Threat Prevention Team has been tracking search results on the story, and the NCAA Basketball Tournament in general, uncovering a great number of poisoned search terms. Searches for UNI Basketball or star player Ali Farokhmanesh return dangerous results leading to malware. &lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuiiv-qhcLrnYWPhX-neog01T_q5d3Si_b2HB_vCjslu6xMMDjY-0SQAT3S4a3xQu3AXs87sXesVHjGynIZt8zyefEBk82oF6-B6qFY7O0_3JR4jgcoERpHh-YRlSv-ieRgGdywRYD_gxp/s1600-h/uni_ncaa_001.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuiiv-qhcLrnYWPhX-neog01T_q5d3Si_b2HB_vCjslu6xMMDjY-0SQAT3S4a3xQu3AXs87sXesVHjGynIZt8zyefEBk82oF6-B6qFY7O0_3JR4jgcoERpHh-YRlSv-ieRgGdywRYD_gxp/s400/uni_ncaa_001.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;7 out of the top 10 results for UNI Basketball link to malware including the second result.&lt;/b&gt;&lt;/i&gt; The rogue anti-virus payload has &lt;a href="http://www.virustotal.com/analisis/8f8ec2b28f060ef8f9ba1a5741d7c2eba44ba449eb1b96d890eca9c947e4ca11-1269210920"&gt;very low detection&lt;/a&gt; among anti-virus vendors. &lt;br /&gt;
&lt;br /&gt;
eSoft proactively detects and blocks blackhat SEO and search attacks similar to these using its automated systems and in-depth web site analysis. Any sites found are flagged as Compromised or Malicious, protecting eSoft SiteFilter customers.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuiiv-qhcLrnYWPhX-neog01T_q5d3Si_b2HB_vCjslu6xMMDjY-0SQAT3S4a3xQu3AXs87sXesVHjGynIZt8zyefEBk82oF6-B6qFY7O0_3JR4jgcoERpHh-YRlSv-ieRgGdywRYD_gxp/s72-c/uni_ncaa_001.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Virus Alert! Twitter, Google, Hallmark and Others Subject To Attack</title><link>http://threatcenter.blogspot.com/2010/03/virus-alert-twitter-google-hallmark-and.html</link><category>email</category><category>malware</category><category>spam</category><category>virus</category><pubDate>Thu, 4 Mar 2010 17:08:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-7000820387677718635</guid><description>The eSoft Threat Prevention Team is warning customers today of a new email scam circulating very quickly. &amp;nbsp;These fraudulent emails claim to be from Google Staffing, Hallmark, Twitter as well as other social networks and legitimate businesses.&lt;br /&gt;
&lt;br /&gt;
The email persuades the user to open the attached zip file to find out more information. Users that follow through and open the file infect their own system and become part of the threat. &lt;br /&gt;
&lt;br /&gt;
The very legitimate looking email below is just one example of the scam. &amp;nbsp;The email uses the actual Google logo downloaded directly from their website and easily hooks you into opening the attached file to find out more.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a bitly="BITLY_PROCESSED" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLha8ClMnAH3QZIqmeEsRAJWop1W4h4X5yeQ-a_A72sjBxGVhM2ltXsNHc5S2iuDpGU9VqVc-BXb7SCsr-6Sc6aTDQI0hhYZ8toQM2tYUGk1kflX-p7SZ2ErAwOwH0BSaWajpEXn3-d-th/s1600-h/google_jobs_scam3.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;br /&gt;
&lt;/a&gt;&lt;a bitly="BITLY_PROCESSED" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLha8ClMnAH3QZIqmeEsRAJWop1W4h4X5yeQ-a_A72sjBxGVhM2ltXsNHc5S2iuDpGU9VqVc-BXb7SCsr-6Sc6aTDQI0hhYZ8toQM2tYUGk1kflX-p7SZ2ErAwOwH0BSaWajpEXn3-d-th/s1600-h/google_jobs_scam3.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;br /&gt;
&lt;/a&gt;&lt;a bitly="BITLY_PROCESSED" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLha8ClMnAH3QZIqmeEsRAJWop1W4h4X5yeQ-a_A72sjBxGVhM2ltXsNHc5S2iuDpGU9VqVc-BXb7SCsr-6Sc6aTDQI0hhYZ8toQM2tYUGk1kflX-p7SZ2ErAwOwH0BSaWajpEXn3-d-th/s1600-h/google_jobs_scam3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLha8ClMnAH3QZIqmeEsRAJWop1W4h4X5yeQ-a_A72sjBxGVhM2ltXsNHc5S2iuDpGU9VqVc-BXb7SCsr-6Sc6aTDQI0hhYZ8toQM2tYUGk1kflX-p7SZ2ErAwOwH0BSaWajpEXn3-d-th/s320/google_jobs_scam3.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div&gt;In this case, the downloader infected the system with a bot which immediately begins spewing thousands more of infected emails including fake e-cards from Hallmark, and invitations from social networks like Twitter and Hi5.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;div&gt;The Twitter email is also very well crafted to make the user believe they were invited by a friend and is legitimately from Twitter. &amp;nbsp;The from address is spoofed to invitations@twitter.com with a subject “Your friend invited you to Twitter!”. &amp;nbsp;The body of the message begs the user to open the attached file - “To join or see who invited you check the attachment”. &amp;nbsp;Using this clever social engineering tactic the scammers are able to peak interest in finding out who may have sent them the message. &amp;nbsp;The user is tricked into opening the attachment and infecting their system.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;As always, be very cautious opening any attachments and especially cautious when they are unexpected. &amp;nbsp;When in doubt verify with the sender or do not open them.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLha8ClMnAH3QZIqmeEsRAJWop1W4h4X5yeQ-a_A72sjBxGVhM2ltXsNHc5S2iuDpGU9VqVc-BXb7SCsr-6Sc6aTDQI0hhYZ8toQM2tYUGk1kflX-p7SZ2ErAwOwH0BSaWajpEXn3-d-th/s72-c/google_jobs_scam3.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Hotmail Users Look for Answers in Dangerous Places</title><link>http://threatcenter.blogspot.com/2010/02/hotmail-users-look-for-answers-in.html</link><category>blackhat seo</category><category>pagerank bomb</category><category>rogue av</category><category>web security</category><pubDate>Tue, 16 Feb 2010 16:28:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-2269682742438869415</guid><description>An &lt;a href="http://windowsteamblog.com/blogs/windowslive/archive/2010/02/16/short-outage-now-resolved.aspx"&gt;outage&lt;/a&gt; of the Windows Live ID service affected a large number of MSN users today including users of the popular Hotmail email service.  Hotmail is one of the largest web based email outlets and not surprisingly news of the outage spread quickly as users were not able to access their email. &lt;br /&gt;
&lt;br /&gt;
Those hoping to find more information on Google may have ended up with more than they bargained for.  Blackhats have once again worked their magic to infect users looking for news related to the outage. In fact, &lt;b&gt;8 out of the top 10&lt;/b&gt; results for “hotmail service unavailable” returned dangerous URLs.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLo10V_Lbj3r3eo-Na8yWu59LgWQWPqglOW7kTypiCM599a2eebsm8Ro9FyG0Pfn6W2sZFnJo1eJ9SzXklBXZmkAur0hwe2TyY8d4dHW2Ndzi1OU4zx9sC3O0CWCxARRUly1ttTQpaacf5/s1600-h/hotmailserviceunavail.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="287" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLo10V_Lbj3r3eo-Na8yWu59LgWQWPqglOW7kTypiCM599a2eebsm8Ro9FyG0Pfn6W2sZFnJo1eJ9SzXklBXZmkAur0hwe2TyY8d4dHW2Ndzi1OU4zx9sC3O0CWCxARRUly1ttTQpaacf5/s400/hotmailserviceunavail.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
At the time of writing Google Trends shows this as one of the top searches of the day.  Other dangerous searches include “hotmail down” and “hotmail not working” both of which also returned malicious URLs that can cause a visitor’s computer to become infected with malware.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjAbjG_MbSs3F-bxMxtcuviRXVOGyPgRSgq5eJdfCWOSJuzVaITfpL0O1R08nwwnmEnp_iKyxZx6gSXX1NQlCAVbkuMllrAAKIYDJ1YIxn38Pug3hk64gsdslcogaKJbmIiWwPqyl0jmoe/s1600-h/trends-hotmail.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="165" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjAbjG_MbSs3F-bxMxtcuviRXVOGyPgRSgq5eJdfCWOSJuzVaITfpL0O1R08nwwnmEnp_iKyxZx6gSXX1NQlCAVbkuMllrAAKIYDJ1YIxn38Pug3hk64gsdslcogaKJbmIiWwPqyl0jmoe/s400/trends-hotmail.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
As an added twist, some results direct users that revisit the same page to a fake download site. The user is asked to &lt;i&gt;download hotmail_down.rar&lt;/i&gt;, but not before entering their credit card information.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMmMXABfE75V6BC3wcLhgU184JBnCH2DhkWSh1kzQaD2ycabVb05nhr78gp13TYLUceF5TYAkB9SDEXaLadxckpUHEbbF2wEENRxC5wj7L-CwRy6CoOhQI3Vh0TdPJ94CIwP2CFOOwNty8/s1600-h/hotmaildown2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="287" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMmMXABfE75V6BC3wcLhgU184JBnCH2DhkWSh1kzQaD2ycabVb05nhr78gp13TYLUceF5TYAkB9SDEXaLadxckpUHEbbF2wEENRxC5wj7L-CwRy6CoOhQI3Vh0TdPJ94CIwP2CFOOwNty8/s400/hotmaildown2.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6e4hyphenhyphenkMym2XQtYRP-mos632prtdOYTwQXZ7TLyJ8ckm6-NyGB-QL9P7ligI0LF89zL6ddEFJC1mP96HGHNk41B26MWtrI9Bjp7cC6CPB3Srt_k8jSgc40McfMf3Pjc2tH2IJbwjXnvcxq/s1600-h/hotmaildown9.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="282" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6e4hyphenhyphenkMym2XQtYRP-mos632prtdOYTwQXZ7TLyJ8ckm6-NyGB-QL9P7ligI0LF89zL6ddEFJC1mP96HGHNk41B26MWtrI9Bjp7cC6CPB3Srt_k8jSgc40McfMf3Pjc2tH2IJbwjXnvcxq/s400/hotmaildown9.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
eSoft has detection for many of these sites and is flagging any new sites into their appropriate security category to protect SiteFilter users.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLo10V_Lbj3r3eo-Na8yWu59LgWQWPqglOW7kTypiCM599a2eebsm8Ro9FyG0Pfn6W2sZFnJo1eJ9SzXklBXZmkAur0hwe2TyY8d4dHW2Ndzi1OU4zx9sC3O0CWCxARRUly1ttTQpaacf5/s72-c/hotmailserviceunavail.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>IRS Tax Avoidance Scam</title><link>http://threatcenter.blogspot.com/2010/02/irs-tax-avoidance-scam.html</link><category>fraud</category><category>malware</category><pubDate>Sat, 6 Feb 2010 11:08:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-6090845513117341085</guid><description>Today, eSoft is alerting customers to a new targeted email scam.&amp;nbsp; This newest twist to the common IRS email scam seems to be targeted to organizations, notifying the recipient of a tax evasion complaint being filed against the company.&amp;nbsp; Opening the file infects the user's machine with dangerous trojans that monitor the infected machine, report back to the attacker and download other malicious payloads. &lt;br /&gt;
&lt;br /&gt;
An example of the fraudulent email is below, which prompts the user to open "balance report" attachment.&amp;nbsp; Because the attachment appears to be a Word file, most users will readily trust the file and proceed to open the file to find out more.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigqA_CmTEfu0Q06ujUcXp1959PS48u-Plj8BsAq4ZDowjKhiimoOKyl3WYUS8kti2mHs1tIP4kiG0tUPd6ZqfzQDV5ikwTEeNc7Ki_58zRih8fTnjLvOk8gACsAhzXO4flsmpe9WZwAzS9/s1600-h/irs_tax_avoidance.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="327" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigqA_CmTEfu0Q06ujUcXp1959PS48u-Plj8BsAq4ZDowjKhiimoOKyl3WYUS8kti2mHs1tIP4kiG0tUPd6ZqfzQDV5ikwTEeNc7Ki_58zRih8fTnjLvOk8gACsAhzXO4flsmpe9WZwAzS9/s400/irs_tax_avoidance.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
The file is actually in Rich Text Format (RTF) and contains a hidden executable.&amp;nbsp; Upon opening the file, an error is reported and the user is asked to double click to restart Word.&amp;nbsp; Doing so will open the executable as shown below, with most unsuspecting users allowing the malicious file to run.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzfoMONUfhNaCT-4JlvcnZGcWFjFYzrWhq27ILTCguTLUBZXi12Hj2Xz5IH5NvQj_MVdALHQK1NjIV-jEAmz1l8D3448cuvyr3TwT4eaW8Iwl24NuvcsHr-uKx-X7PMgq1vxC0ph0kH-m9/s1600-h/irs_run.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="167" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzfoMONUfhNaCT-4JlvcnZGcWFjFYzrWhq27ILTCguTLUBZXi12Hj2Xz5IH5NvQj_MVdALHQK1NjIV-jEAmz1l8D3448cuvyr3TwT4eaW8Iwl24NuvcsHr-uKx-X7PMgq1vxC0ph0kH-m9/s400/irs_run.png" width="400" /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;br /&gt;
Two processes are started and added to Windows startup to run on subsequent boots, microsoft.exe and wks.exe.&amp;nbsp; These processes send data back to the attacker using HTTP connections to their call home destination.&amp;nbsp; eSoft is flagging these sites as Malicious to protect any victims of this attack. &lt;br /&gt;
&lt;br /&gt;
These call home destinations are even disguised as a Google search page to evade detection by web filtering companies and automated systems which may detect the site as a search engine.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvMYSTEIjaed-tFOSDMjJxE8uaRgnJOyyAoQqlUyTWkHvKnTLa663iB-Qb4MM3AByd-QdlmLXTv_LzxIm7JDUA3jz-SGkFIJE3TajcTod4ANEIXsXHSAsUKCWFGUm-397M562RLBTgqoFP/s1600-h/fakegoogle3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="162" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvMYSTEIjaed-tFOSDMjJxE8uaRgnJOyyAoQqlUyTWkHvKnTLa663iB-Qb4MM3AByd-QdlmLXTv_LzxIm7JDUA3jz-SGkFIJE3TajcTod4ANEIXsXHSAsUKCWFGUm-397M562RLBTgqoFP/s400/fakegoogle3.png" width="400" /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;At the time of writing, Virus Total reports only a &lt;a href="http://www.virustotal.com/analisis/09db311fc2fb36d3d0df03bc4fffd054bcc31c78b8e8dc348b35c8654bafe39b-1265383450"&gt;25% detection rate&lt;/a&gt; on the most recent samples. &lt;br /&gt;
&lt;br /&gt;
Users should be very cautious with any unsolicited emails, particularly those containing an attachment.&amp;nbsp; The IRS will never email you if they need to contact you, and any emails appearing to come from them are very likely malicous scams.&amp;nbsp; As noted on the &lt;a href="http://www.irs.gov/privacy/article/0,,id=179820,00.html"&gt;IRS website&lt;/a&gt;, "The IRS does not initiate taxpayer communications through email."</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigqA_CmTEfu0Q06ujUcXp1959PS48u-Plj8BsAq4ZDowjKhiimoOKyl3WYUS8kti2mHs1tIP4kiG0tUPd6ZqfzQDV5ikwTEeNc7Ki_58zRih8fTnjLvOk8gACsAhzXO4flsmpe9WZwAzS9/s72-c/irs_tax_avoidance.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Fake Firefox Update Pages Push Adware</title><link>http://threatcenter.blogspot.com/2010/02/fake-firefox-update-pages-push-adware.html</link><category>adware</category><category>fraud</category><pubDate>Tue, 2 Feb 2010 17:42:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-304524624556862199</guid><description>Since its’ release on January 21st, the newest version of the Firefox web browser has received a great deal of attention.  In just a short time it has achieved over 30 million downloads. Adware pushers are capitalizing on the success of Firefox, packing ad serving software in with the program in an effort to increase their reach. &lt;br /&gt;
&lt;br /&gt;
Purveyors of spyware and adware will try to take advantage of well known programs, illegitimately bundling their software into the install of the popular software.  These programs are also commonly referred to as Potentially Unwanted Programs (PUPs) whose content is not necessarily malicious, but is almost never wanted by the user. These types of software are often used to collect information about the user without the users’ knowledge or consent.&lt;br /&gt;
&lt;br /&gt;
The latest example is found on the fake Firefox download site below.&amp;nbsp; The page is cleverly disguised with the appearance of a legitimate Firefox download site and could easily fool many users hoping to upgrade.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKWgV4qfQScoEJMfTWpUXaio3fHm40OwIB4TxMNVJAEHZ6clXEqwLJV54Q1SL0RO7xVY5c5xk5K2Ox7jhv61IZ6HEMnlBGAtXkzyHOdv5J5AlRFryPjWdCdUqv4bvin3ouZZTFz4AqmWyy/s1600-h/fakefirefox.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKWgV4qfQScoEJMfTWpUXaio3fHm40OwIB4TxMNVJAEHZ6clXEqwLJV54Q1SL0RO7xVY5c5xk5K2Ox7jhv61IZ6HEMnlBGAtXkzyHOdv5J5AlRFryPjWdCdUqv4bvin3ouZZTFz4AqmWyy/s400/fakefirefox.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Taking a closer look reveals clues to the fraudulent page. While the page advertises version 3.5 the newest version is actually 3.6.&amp;nbsp; There are also misspellings such as “Anti-Pishing” in the title of the security section. &lt;br /&gt;
&lt;br /&gt;
Victims of this scam install the “Hotbar” toolbar by Pinball Corp, formerly Zango.&amp;nbsp; Not only are users subject to the annoying toolbar, they're also barraged with pop-up ads and host to a new Hotbar weather application running in the system tray.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz2yOKTMGwv0oJfUNE_R2tBqBEaXueuioAWJoo4kt0SwLiJz24EXKbBN72lLHpaypJDpe4LAsy5VgKNJtFiwJXPf1XeTropGZlW4_Ok4CArmVSyczNZLwPbjnwaRMOwVDOH8hCVY6G43e8/s1600-h/hotbar.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="147" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz2yOKTMGwv0oJfUNE_R2tBqBEaXueuioAWJoo4kt0SwLiJz24EXKbBN72lLHpaypJDpe4LAsy5VgKNJtFiwJXPf1XeTropGZlW4_Ok4CArmVSyczNZLwPbjnwaRMOwVDOH8hCVY6G43e8/s400/hotbar.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
It should be noted that the owner of the fake Firefox site above is most likely not associated with Pinball Corp and only using its pay-per-install ad network for fast cash. Pay-per-install affiliate programs reward referring sites that generate installs of their programs, with Pinball paying as high as $1.45 per install.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Always take caution installing any software and ensure the software is downloaded directly from the publisher whenever possible.&amp;nbsp; Users looking to upgrade Firefox should go to the real download site at &lt;a href="http://getfirefox.com/"&gt;http://getfirefox.com&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Blocking the Spyware and Malicious Sites category protects eSoft SiteFilter customers from this site and others like it.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKWgV4qfQScoEJMfTWpUXaio3fHm40OwIB4TxMNVJAEHZ6clXEqwLJV54Q1SL0RO7xVY5c5xk5K2Ox7jhv61IZ6HEMnlBGAtXkzyHOdv5J5AlRFryPjWdCdUqv4bvin3ouZZTFz4AqmWyy/s72-c/fakefirefox.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Super Bowl Associations: football, nachos, big screens and … malware?</title><link>http://threatcenter.blogspot.com/2010/01/super-bowl-associations-football-nachos.html</link><category>blackhat seo</category><category>pagerank bomb</category><category>rogue av</category><category>web security</category><pubDate>Tue, 19 Jan 2010 12:08:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-4082303531882483870</guid><description>The Super Bowl is the one of the biggest and most watched television events of the year in the United States. People everywhere scour the internet looking for predictions, gambling spreads and news before the event and scores, stories and clips after the event.&amp;nbsp; In anticipation of the increased search traffic for Super Bowl related terms, cybercriminals have shown themselves to be well-organized and planning ahead.&amp;nbsp; Search results for Super Bowl related search terms are already turning up top-ten results linked to malicious websites. &lt;br /&gt;
&lt;br /&gt;
Among the poisoned search terms detected by eSoft are:&amp;nbsp; &lt;br /&gt;
Super bowl 2010 score&lt;br /&gt;
Super bowl 44 MVP&lt;br /&gt;
Super bowl 2010 entertainment&lt;br /&gt;
Super bowl champions 2010&lt;br /&gt;
&lt;br /&gt;
For some of these searches, the top result is malicious.&amp;nbsp; It seems that this round of poisoning is, so far, being done by the Rogue AV outfits as these links lead to sites with fake antivirus software and &lt;a href="http://www.virustotal.com/analisis/b7e2297877f21ae5d53400e8148a0a48989a422ddc5d926f0343a397d6364346-1263921836"&gt;low detection rates&lt;/a&gt; from legitimate anti-virus software:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH8Z4_v6aPpRyARZQnnN9sNJaISMsAAWQSAcUPWlJ98-6pURFyv4VOC3MhJU3MU5Xa6Ld5UjV7wghXc0k7whiV34k9mZvpH23gwqWK2gBvl1tNs3Fbmb2iE1hgkMFZtFCCfFgKZ-KaDAuK/s1600-h/superbowl2010.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH8Z4_v6aPpRyARZQnnN9sNJaISMsAAWQSAcUPWlJ98-6pURFyv4VOC3MhJU3MU5Xa6Ld5UjV7wghXc0k7whiV34k9mZvpH23gwqWK2gBvl1tNs3Fbmb2iE1hgkMFZtFCCfFgKZ-KaDAuK/s400/superbowl2010.png" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;h3 class='post-title'&gt;Background&lt;/h3&gt;Poisoned search results are becoming commonplace.&amp;nbsp; Most recently searching for information on the earthquake in Haiti returned large numbers of poisoned results.&amp;nbsp; Getting bogus search results to the top of the rankings is commonly achieved by linking to the site from compromised sites or fake blogs and thereby boosting the apparent popularity of the bogus site.&amp;nbsp; The bogus site is then used to compromise the machine of visiting users through social engineering tricks and browser or browser-plugin exploits.&lt;br /&gt;
&lt;br /&gt;
eSoft’s automated systems quickly identify these risky websites and block them for customers and partners.&lt;br /&gt;
&lt;br /&gt;
eSoft recommends confining Super Bowl searches to news search engines such as &lt;a href="http://news.google.com/"&gt;Google News&lt;/a&gt;.&amp;nbsp; These results tend to be safer since the sources have gone through an approval process.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH8Z4_v6aPpRyARZQnnN9sNJaISMsAAWQSAcUPWlJ98-6pURFyv4VOC3MhJU3MU5Xa6Ld5UjV7wghXc0k7whiV34k9mZvpH23gwqWK2gBvl1tNs3Fbmb2iE1hgkMFZtFCCfFgKZ-KaDAuK/s72-c/superbowl2010.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Lack of Egress Filtering Spurs Success of Injected IFrame Attack</title><link>http://threatcenter.blogspot.com/2010/01/lack-of-egress-filtering-spurs-success.html</link><category>firewall</category><category>web security</category><pubDate>Mon, 18 Jan 2010 15:05:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-2828467055338395542</guid><description>The security community at large and the eSoft Threat Prevention Team have recently noticed an uptick in sites compromised by a new injection attack that results in an injected iframe. &amp;nbsp;This attack can be recognized by its attempts to masquerade the malicious script as GNU GPL or LGPL. &amp;nbsp;GPL and LGPL refer to public licenses for open source software and add a veneer of legitimacy to the malicious files.&lt;br /&gt;
&lt;br /&gt;
The attacks in themselves are not new or novel, but their success seems to be in part because the iframes point to websites on non-standard ports. &amp;nbsp;In particular, the attackers are hosting browser exploits and social engineering tricks on servers running on port 8080. Such as this one shown below:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglLML6pCEdaHhUPvi7ZwywfXTDaJSjUXjxMkelK7QnWMM6KVHTZFL4E7aiYyiNaU688iBaAprK-0FIsF7KtfYvdwPDj0uHscOxwrqwNMwccN93aCTFuAOUsspVRKN-ZpQgz21PDaUnf1jV/s1600-h/url_image_use.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglLML6pCEdaHhUPvi7ZwywfXTDaJSjUXjxMkelK7QnWMM6KVHTZFL4E7aiYyiNaU688iBaAprK-0FIsF7KtfYvdwPDj0uHscOxwrqwNMwccN93aCTFuAOUsspVRKN-ZpQgz21PDaUnf1jV/s400/url_image_use.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
(note also the trusted domains that have been added to the URL to get the casual user to trust the link)&lt;br /&gt;
&lt;br /&gt;
As secure web filtering is added to anti-virus products and makes inroads in gateway security products, attackers are trying to circumvent the web filters with this age-old technique. &amp;nbsp;Frequently these secure web filters only operate on common ports such as port 80. &amp;nbsp;By hosting a web server on an alternate port, the security may be bypassed.&lt;br /&gt;
&lt;br /&gt;
For this reason, it is essential that administrators who deploy secure web filtering lock down any ports not expressly being scanned. &amp;nbsp;In other words, egress firewall rules that block outbound traffic on ports that don't have some security and content filtering, will save networks from this attack and ones like it.&lt;br /&gt;
&lt;br /&gt;
At present, eSoft is detecting dozens to hundreds of newly compromised websites that have fallen victim to this attack and become conduits for attacks against their site's visitors. &amp;nbsp;More detailed information on how the attack is spreading and its links to gumblar can be found on the &lt;a href="http://blog.unmaskparasites.com/2009/12/23/from-hidden-iframes-to-obfuscated-scripts/"&gt;Unmask Parasites&lt;/a&gt; blog.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglLML6pCEdaHhUPvi7ZwywfXTDaJSjUXjxMkelK7QnWMM6KVHTZFL4E7aiYyiNaU688iBaAprK-0FIsF7KtfYvdwPDj0uHscOxwrqwNMwccN93aCTFuAOUsspVRKN-ZpQgz21PDaUnf1jV/s72-c/url_image_use.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Live.com Exploited as Pharma-Fraud Cover</title><link>http://threatcenter.blogspot.com/2009/12/livecom-exploited-as-pharma-fraud-cover.html</link><category>blackhat seo</category><category>pagerank bomb</category><category>pharma fraud</category><pubDate>Tue, 22 Dec 2009 12:54:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-4363997368518775680</guid><description>The FDA crackdown on online pharmacy sites has driven a lot of attention to illegal and fraudulent online pharmacies and in particular to their methods for tricking people to visit their sites.  These practices include prolific spam and search engine poisoning. &lt;br /&gt;
&lt;br /&gt;
eSoft’s Threat Prevention Team has noticed that the search engine poisoning is now very actively making use of Microsoft’s Windows Live Spaces – a free blog hosting environment.  By registering accounts and using those accounts solely to link to the pharma-fraud sites, the search engine ranking of the target sites goes up. Additionally, the spam emails now link to these fake blogs rather than directly to the pharma-fraud site in an effort to better evade spam filters that might otherwise detect the link to the fraudulent website.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie4VZXcFtcj7MiLk59AzWJ9dYkyYMwUkogwz5KoDbYMTmypNMhaLuzdeouM5_E4wmK_WFS2sffKMBltGDAjVb9ZBPjVi9HO24TIO6gaE-Dnh4qWnMvs7Fl_P-SxhnGJ0_P-3qa2hR3zQKd/s1600-h/pharma_live1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie4VZXcFtcj7MiLk59AzWJ9dYkyYMwUkogwz5KoDbYMTmypNMhaLuzdeouM5_E4wmK_WFS2sffKMBltGDAjVb9ZBPjVi9HO24TIO6gaE-Dnh4qWnMvs7Fl_P-SxhnGJ0_P-3qa2hR3zQKd/s400/pharma_live1.png" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
The blog page shown here is typical of those seen by the Threat Prevention Team: it consists of a single blog entry with a single image that is linked to a classic “Canadian Pharmacy” website using a template that eSoft has seen used on thousands of websites.&amp;nbsp; eSoft worked with the ThreatChaos blog to shine the light and provide full details on these sites during a major outbreak in May.&amp;nbsp; More details about this threat may be found in &lt;a href="http://threatchaos.com/2009/05/pharma-fraud-escalates-dramatically"&gt;that posting&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicvCDlT9Eidjwufpqz0qK0AzoAoXGo99Vb7V5ztkd6B6W-uGy-0XMGg2frAs6bgxqjnlzmru1UXMWMsep2LqLh6UyA9GqjEHRPnpg89D2Inr3nQmm1TdexA5kEYXaOsyJ_1yQFV2aY4leu/s1600-h/pharma_live2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicvCDlT9Eidjwufpqz0qK0AzoAoXGo99Vb7V5ztkd6B6W-uGy-0XMGg2frAs6bgxqjnlzmru1UXMWMsep2LqLh6UyA9GqjEHRPnpg89D2Inr3nQmm1TdexA5kEYXaOsyJ_1yQFV2aY4leu/s400/pharma_live2.png" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;Similar attacks have been reported recently using Yahoo and Blogger to draw users to fraudulent pharmacy sites. Google Job Spam has also reportedly infiltrated spaces.live.com.&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
Whatever the distribution method, its clear these cybercriminals will stop at nothing and continue to evolve new ways of advertising their bogus sites. eSoft has excellent detection for pharma-fraud sites and detects thousands of these URLs month after month.&amp;nbsp; Exploited blogs on spaces.live.com are being flagged as ‘Phishing &amp;amp; Fraud’. &lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie4VZXcFtcj7MiLk59AzWJ9dYkyYMwUkogwz5KoDbYMTmypNMhaLuzdeouM5_E4wmK_WFS2sffKMBltGDAjVb9ZBPjVi9HO24TIO6gaE-Dnh4qWnMvs7Fl_P-SxhnGJ0_P-3qa2hR3zQKd/s72-c/pharma_live1.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item><item><title>Boeing 787 Searches Hijacked by Rogue AV</title><link>http://threatcenter.blogspot.com/2009/12/boeing-787-searches-hijacked-by-rogue.html</link><category>blackhat seo</category><category>pagerank bomb</category><category>rogue av</category><pubDate>Tue, 15 Dec 2009 21:33:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-144924062834049120.post-3105099176644496738</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1KiPP1-iPC1CgzmuhbmI97W33c-fB-POqL1yXLNntb-hhQP_GmQRMsTAzZW7Yf4yLxZ6zhE9Qyj9f0JTIbXfrhenE9mbvPsMZJsi57JAmD0U6NXQ8Xx7e1oV2gSR2dJScUxCc8G7Jjwe-/s1600-h/boeing787.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1KiPP1-iPC1CgzmuhbmI97W33c-fB-POqL1yXLNntb-hhQP_GmQRMsTAzZW7Yf4yLxZ6zhE9Qyj9f0JTIbXfrhenE9mbvPsMZJsi57JAmD0U6NXQ8Xx7e1oV2gSR2dJScUxCc8G7Jjwe-/s200/boeing787.jpg" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;Today, the Boeing 787 Dreamliner jet completed its much awaited first flight. As users searched to find videos and news articles related to the story, blackhats quickly moved in for yet another attack against Google search results.&lt;br /&gt;
&lt;br /&gt;
The most popular search for several hours today was “787 first flight video”. This search and related searches are saturated with malicious results leading to rogue AV and potentially other malicious payloads.&lt;br /&gt;
&lt;br /&gt;
At peak hours, 5 out of the first 9 results lead to malicious payloads as users were pushed through a series of redirect pages and to different distribution points. &lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzzvqF-gSCC9dbwz6Y71LyOs0kpO-0_npBl6q636Lj19gXsZa40o8fTuDSNrxK1R0YLYsWF0fW4rPbVb-0v6IJZ6TUvw0x5q0pIJtngVA4WzHB6sNmNJ4HPj_ysDMF85Nh0T2OXw4dLsmp/s1600-h/boeing787-2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzzvqF-gSCC9dbwz6Y71LyOs0kpO-0_npBl6q636Lj19gXsZa40o8fTuDSNrxK1R0YLYsWF0fW4rPbVb-0v6IJZ6TUvw0x5q0pIJtngVA4WzHB6sNmNJ4HPj_ysDMF85Nh0T2OXw4dLsmp/s400/boeing787-2.png" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
While the distribution points and payloads varied, their effectiveness did not. Most sites were undetected by Google Safe Browsing and the malicious payloads they delivered had very low anti-virus detection rates. &lt;br /&gt;
&lt;br /&gt;
This latest attack is nothing new, but it is shocking how quickly and effectively cybercriminals are able to react to the latest news trends. In this particular attack, the dangerous top results seemed to be compromised sites with existing reputations which makes detection much more difficult.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1KiPP1-iPC1CgzmuhbmI97W33c-fB-POqL1yXLNntb-hhQP_GmQRMsTAzZW7Yf4yLxZ6zhE9Qyj9f0JTIbXfrhenE9mbvPsMZJsi57JAmD0U6NXQ8Xx7e1oV2gSR2dJScUxCc8G7Jjwe-/s72-c/boeing787.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>threatcenter@esoft.com (Patrick Walsh)</author></item></channel></rss>