<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-5452717410626050541</atom:id><lastBuildDate>Fri, 13 Sep 2024 19:14:58 +0000</lastBuildDate><category>Threats</category><category>Conferences</category><category>Ramblings</category><category>Technology</category><title>----- Anti-Malware -----            Analysis and Defense</title><description>Analyzing malware, Understanding threats, Developing defenses.</description><link>http://fightmalware.blogspot.com/</link><managingEditor>noreply@blogger.com (Eric Uday Kumar)</managingEditor><generator>Blogger</generator><openSearch:totalResults>16</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-2332652563609719205</guid><pubDate>Fri, 10 Oct 2008 02:19:00 +0000</pubDate><atom:updated>2008-10-09T22:27:02.928-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Conferences</category><title>Virus Bulletin Conference 2008, Ottawa, Canada</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnuoSIpcVx_Lia1RwTDCV8_fBiZuDCX9I1kBVUHI3kfOV0swL6kdVF-pCdo1m_Px49Uffa_LP6mJ6OfBgP0FLKgEfYlHrQPYknPMJz4Qe13RksHpTMktYj9oFJykFJrQWDVVwoHhlio-s/s1600-h/101_5158.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnuoSIpcVx_Lia1RwTDCV8_fBiZuDCX9I1kBVUHI3kfOV0swL6kdVF-pCdo1m_Px49Uffa_LP6mJ6OfBgP0FLKgEfYlHrQPYknPMJz4Qe13RksHpTMktYj9oFJykFJrQWDVVwoHhlio-s/s320/101_5158.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5255356273638610082&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;I had the opportunity to present at the &lt;a href=&quot;http://www.virusbtn.com/conference/vb2008/index&quot;&gt;Virus Bulletin Conference&lt;/a&gt; this year in Ottawa, Canada. This is one of the big security conferences and a lot of well known personnel from the AV-industry attend it. It was really good interacting with the attendees, developing relations, and learning about new cutting-edge technological developments in the area of anti-malware.&lt;br /&gt;&lt;br /&gt;My presentation was about &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;Applying User-mode Memory Scanning on Windows NT based systems&lt;/span&gt;&quot;. A copy of this paper can be downloaded from &lt;a href=&quot;http://ericuday.googlepages.com/knowledgebase&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;The keynote talk on the first day of the conference by Alex Eckelberry from Sunbelt Software was interesting and explained the expectations of a typical desktop consumer and enterprise customer from AV-vendors. He stressed the importance of customer support in gaining consumer confidence and keeping the business running. The presentation about  MBR rootkit by Kimmo Kassilin from F-Secure was very technical and particularly gripping to me. This explained one of the most sophisticated piece of malware we have seen in recent times.&lt;br /&gt;&lt;br /&gt;There were some thought provoking discussions and presentations surrounding AV-software testing and one of them was by Dr. Igor Muttik from McAfee. There was also the new proposal from Dr. Richard Ford from Florida Institute of Technology about malware sample sharing that seemed very practical. His new approach and concept is sure is help the AV-industry. Last but not the least, the one presentation I was really looking forward to was by Peter Szor from Symantec, along with Dimitris and Adami from Graduate Institue of Applied Life Science. The presentation was about the evolution of computer programs (such as malware) into new forms that are functionally different from their parent, much like mutation creating new species in biological life. The presentation was very interesting and clearly exceeded my expectations.&lt;br /&gt;&lt;br /&gt;The gala dinner on the second day of the conference was simply fun. They had each table form a team and compete against other teams in a frenzy of intelligent questioners. Although our team did not win, we still had a good time. All in all, the conference was informative and fun.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAakNqpsithCOQKVPEH-4wbB6SzgPWiGNqv1JkFtLUertGdq0MuVzqwHLrGp-ypVmcZE9j3xbyDNHxlmt9XrU0a-EQSX8KLYE7GmKCOhU7nt69If4Zw-CCKBvy7GG3Q_iH0csvScEsDn8/s1600-h/IMG_4930.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAakNqpsithCOQKVPEH-4wbB6SzgPWiGNqv1JkFtLUertGdq0MuVzqwHLrGp-ypVmcZE9j3xbyDNHxlmt9XrU0a-EQSX8KLYE7GmKCOhU7nt69If4Zw-CCKBvy7GG3Q_iH0csvScEsDn8/s320/IMG_4930.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5255357571122656642&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;I got to stay around Ottawa a day after the conference,  rent a car, and drove up the mountains in Quebec to look at the beautiful fall foliage. The sights were really pretty.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5dcD1atV1FmqsBeXqBgZFbRqSvs2hrJySB5EY9IBe5VkbEumy_yZyyX59yab4pNixFlibs1-qcUFtHoE9nxMK4m2ee_EVSHXcld_AAs2RIxN3MVNiRjEH5TD5Ux4m9zgw5zxHvhgV9is/s1600-h/101_5197.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5dcD1atV1FmqsBeXqBgZFbRqSvs2hrJySB5EY9IBe5VkbEumy_yZyyX59yab4pNixFlibs1-qcUFtHoE9nxMK4m2ee_EVSHXcld_AAs2RIxN3MVNiRjEH5TD5Ux4m9zgw5zxHvhgV9is/s320/101_5197.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5255356625975661698&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://fightmalware.blogspot.com/2008/10/virus-bulletin-conference-2008-ottawa.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnuoSIpcVx_Lia1RwTDCV8_fBiZuDCX9I1kBVUHI3kfOV0swL6kdVF-pCdo1m_Px49Uffa_LP6mJ6OfBgP0FLKgEfYlHrQPYknPMJz4Qe13RksHpTMktYj9oFJykFJrQWDVVwoHhlio-s/s72-c/101_5158.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-1821986462497303791</guid><pubDate>Sat, 24 May 2008 00:38:00 +0000</pubDate><atom:updated>2008-05-23T21:00:17.960-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Conferences</category><title>EICAR 2008 Conference, Laval, France</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGXXivWGCzImJ7jW1TUtdDWo9CZCw2fFXlOyjjsc1Jfh9CmdazgUD_BE6GBHeI9ahPYR7g7lIaFRv-jCb_AM22fPViSzzM19qIYNgv-1j9L4SinF7_3GdaIcU0TxyHIwMb0grvYFSbJ44/s1600-h/IMG_3696.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGXXivWGCzImJ7jW1TUtdDWo9CZCw2fFXlOyjjsc1Jfh9CmdazgUD_BE6GBHeI9ahPYR7g7lIaFRv-jCb_AM22fPViSzzM19qIYNgv-1j9L4SinF7_3GdaIcU0TxyHIwMb0grvYFSbJ44/s400/IMG_3696.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5203754809433346770&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;It has been a while since I have posted anything on my blog. Life has been busy with work and family, but things have been good. I had the opportunity to present a paper at the &lt;a href=&quot;http://www.eicar.org/conference/&quot;&gt;EICAR 2008&lt;/a&gt; conference, which was held in Laval, France. It was great to be able to know some of the well respected people from computer security academia and the industry. During this time, I was also able to do some traveling with my wife and see some amazing places and meet fascinating people. It has truly been a pleasurable experience.&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;The conference - merging academia and industry&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The EICAR 2008 conference I attended was very interesting and informative. It provided for an atmosphere of personal interaction with the attendees. The good thing about the EICAR conference is that people who attend are from a diverse group of academic and and industry backgrounds. This allows technology and knowledge transfer between the two sectors, which in my opinion, is a key factor for the growth of both. While I represent the industry steam, some of the academic presentations helped me understand how theoretical ideas could or could not be applied for practical purposes. In turn, the people in academia get insight of whether their work is relevant (or useful) to real-world practical use. I must admit that some of the technologies being developed at Universities can very well find a place in the commercial market and be used for malware analysis and mitigation. One such technology is the &lt;a href=&quot;http://www.cacs.ull.edu/labs/SRL/vilo.html&quot;&gt;VILO&lt;/a&gt; malware defense suite being developed at University of Louisiana at Lafayette (from where I had graduated in Dec 2004 with a Masters in Computer Science). This tool demonstrates how program-matching techniques can help in triage, in-depth malware analysis and signature generation.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Presentation&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2YfQaQZUTOVMSd0i8rSBlYi4MofQwy5wVgGvQMlH8SFe1XmpJefnO62Ehr02A3iWv4IZoGUa_3sKT-60gvADj8a6ZeGtPGFQlVvtJza-_jplpbCSzFzPXdBRHC8j2qWbsSiNIwfsgMdg/s1600-h/IMG_3779.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2YfQaQZUTOVMSd0i8rSBlYi4MofQwy5wVgGvQMlH8SFe1XmpJefnO62Ehr02A3iWv4IZoGUa_3sKT-60gvADj8a6ZeGtPGFQlVvtJza-_jplpbCSzFzPXdBRHC8j2qWbsSiNIwfsgMdg/s400/IMG_3779.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5203751339099771490&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The paper I presented was about &quot;User-mode memory scanning on 32-bit &amp;amp; 64-bit Windows&quot;. It details about the background and theory of implementing the memory scanner as well as its pros and cons of using it from user mode. You can find the paper and presentation &lt;a href=&quot;http://ericuday.googlepages.com/knowledgebase&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;The fun part&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;We were treated to a nice gala dinner on the evening of first day in the old castle (Vieux Chateau). It was quite fun and I also had the privilege of bringing my wife to it as well. We definitely had a good time and the group at our table were a fun and lively bunch to interact with. The evening was well spent while listening to authentic French live band playing in the background.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjglNWvHMxMByPz4jVe45iQQqxbc4CFkvzK7Kgr9nmalQenel8piS3xihDUvt0V04QaPPALkCpeHOj4oTSijHHHaRwico0fGY-t3CbrFaq4q3YPhA4272kbGxWQy6c6PmKGJpTYbPnAOfw/s1600-h/101_3392.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjglNWvHMxMByPz4jVe45iQQqxbc4CFkvzK7Kgr9nmalQenel8piS3xihDUvt0V04QaPPALkCpeHOj4oTSijHHHaRwico0fGY-t3CbrFaq4q3YPhA4272kbGxWQy6c6PmKGJpTYbPnAOfw/s320/101_3392.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5203753989094593138&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;                                                                        Me and my beautiful wife, Amy Adams.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://picasaweb.google.com/ericuday/Laval_France&quot;&gt;Click Here&lt;/a&gt; to see more pictures about our stay in Laval, France.&lt;br /&gt;&lt;br /&gt;My wife likes to blog as well and she has a nice one about this trip to Europe. &lt;a href=&quot;http://amylynneadams.blogspot.com/2008/05/enchanting-european-vacation.html&quot;&gt;Click Here&lt;/a&gt; to visit her blog.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://fightmalware.blogspot.com/2008/05/eicar-2008-conference-laval-france.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGXXivWGCzImJ7jW1TUtdDWo9CZCw2fFXlOyjjsc1Jfh9CmdazgUD_BE6GBHeI9ahPYR7g7lIaFRv-jCb_AM22fPViSzzM19qIYNgv-1j9L4SinF7_3GdaIcU0TxyHIwMb0grvYFSbJ44/s72-c/IMG_3696.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-2132446170196946576</guid><pubDate>Sun, 06 Jan 2008 19:27:00 +0000</pubDate><atom:updated>2008-07-01T15:07:44.756-05:00</atom:updated><title>Fun with Ubuntu</title><description>&lt;div style=&quot;font-family: verdana; text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQkzFnBE1Nn7q_5PZYQuHpY3Dr7IOxhHhNaf6tArUzWqP3w_2_E4U2zFwQhAPYVa43Chii1fzfeO3LL7p_v_bmxKQy-Ao174IngnqAz7hySfJc8nkz2ZivM7be2WoveoeWZhDBA4ra8ws/s1600-h/ubuntu-logo.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 126px; height: 116px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQkzFnBE1Nn7q_5PZYQuHpY3Dr7IOxhHhNaf6tArUzWqP3w_2_E4U2zFwQhAPYVa43Chii1fzfeO3LL7p_v_bmxKQy-Ao174IngnqAz7hySfJc8nkz2ZivM7be2WoveoeWZhDBA4ra8ws/s200/ubuntu-logo.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5152566227318193410&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;A distribution of Linux I recently tried is &lt;a href=&quot;http://en.wikipedia.org/wiki/Ubuntu_%28Linux_distribution%29&quot;&gt;Ubuntu&lt;/a&gt;. &quot;Ubuntu&quot; is an ancient African word, meaning &quot;humanity to others&quot;. The operating system is extremely slick, cool, and user-friendly. Actually I like it! It is based off of &lt;a href=&quot;http://en.wikipedia.org/wiki/Debian_GNU/Linux&quot;&gt;Debian GNU/Linux&lt;/a&gt;. You can download its latest version (7.10 Gutsy Gibbon released on 18 October 2007) from the official website &lt;a href=&quot;http://www.ubuntu.com/&quot;&gt;here&lt;/a&gt;. You can also learn about its desktop and server editions. Like most Linux distributions, it is free and &lt;a href=&quot;http://en.wikipedia.org/wiki/Open_source&quot;&gt;open source&lt;/a&gt;.&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;font-family: verdana; text-align: justify;&quot;&gt;&lt;br /&gt;There are also a number of interesting &lt;a href=&quot;http://www.ubuntu.com/products/whatisubuntu/derivatives&quot;&gt;derivatives&lt;/a&gt; of Ubuntu such as:&lt;br /&gt;&lt;a href=&quot;http://ubuntustudio.org/&quot;&gt;Ubuntu Studio&lt;/a&gt; - Designed for multimedia editing and creation.&lt;br /&gt;&lt;a href=&quot;http://www.kubuntu.org/&quot; class=&quot;external&quot;&gt;Kubuntu&lt;/a&gt; - Ubuntu with the K Desktop Environment (KDE).&lt;br /&gt;&lt;a href=&quot;http://www.edubuntu.org/&quot; class=&quot;external&quot;&gt;Edubuntu&lt;/a&gt; - Ubuntu for Education.&lt;br /&gt;&lt;a href=&quot;http://www.xubuntu.org/&quot; class=&quot;external&quot;&gt;Xubuntu&lt;/a&gt; - Ubuntu with the XFCE desktop environment.&lt;br /&gt;&lt;a href=&quot;http://www.ubuntu.com/products/whatisubuntu/gobuntu&quot;&gt;Gobuntu&lt;/a&gt; - A flavour of Ubuntu that strives to be completely devoid of software, drivers or firmware with restrictive licenses.&lt;br /&gt;&lt;br /&gt;Dell also offers some of its consumer systems with Ubuntu &lt;a href=&quot;http://direct2dell.com/one2one/archive/2007/05/24/15994.aspx&quot;&gt;pre-installed&lt;/a&gt;!&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguQ7rOYee5n55JSpa9aJhroSHwaS_3E4VfPxYeHnhkU5Qzo7dviS74660XFd6Vvf5p-wBZszPkTYZF6zpO7vPN-nCpPLb4ls_rcbxBYvFrw2i2wzmA2kVqTSJn0RIv8BOzbkCXJh6-7So/s1600-h/ubuntu.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguQ7rOYee5n55JSpa9aJhroSHwaS_3E4VfPxYeHnhkU5Qzo7dviS74660XFd6Vvf5p-wBZszPkTYZF6zpO7vPN-nCpPLb4ls_rcbxBYvFrw2i2wzmA2kVqTSJn0RIv8BOzbkCXJh6-7So/s200/ubuntu.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5152990552907169042&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;My adventure with Ubuntu began with trying to evaluate a certain piece of software that required installing &lt;a href=&quot;http://fabrice.bellard.free.fr/qemu/&quot;&gt;QEmu&lt;/a&gt; on Linux. In this particular case, choosing Ubuntu as the Linux flavor meant &quot;life is easier&quot; (i.e. I would not have to deal with missing dependencies or packages).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Installing Ubuntu&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;So I downloaded the ISO for the latest version (Ubuntu 7.10), for a 32-bit machine (&lt;a href=&quot;http://en.wikipedia.org/wiki/Intel_80386&quot;&gt;i386&lt;/a&gt; or &lt;a href=&quot;http://en.wikipedia.org/wiki/X86&quot;&gt;x86&lt;/a&gt;), from the official website and burnt it to a CD. Note that sometimes when you burn the CD at 40x speed, the final disk acts funny or gets corrupt! A burn speed of 10x seems to give no problems. In my case, I got the server edition of Ubuntu which unfortunately does not come with the nice GUI like the desktop edition. I learned the hard way, and below I will describe how to install the GUI for the server edition.&lt;br /&gt;&lt;br /&gt;Simply follow the installation instructions and soon you will have Ubuntu installed on your system. Note that Ubuntu does not have a &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;root&lt;/span&gt;&quot; user nor does it prompt for a &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;root&lt;/span&gt; password&quot; during installation. This is because, for security reasons, it does not want anyone to login as &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;root&lt;/span&gt;&quot;. In order to perform any tasks or actions via command line that require administrator privileges, simply use &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;sudo&lt;/span&gt; &lt;command&gt;&quot;. This prompts for a password for the currently logged-on user. In case of GUI programs, a pop-up box asks to enter the password for the currently logged-on user (much like &lt;a href=&quot;http://en.wikipedia.org/wiki/User_Account_Control&quot;&gt;UAC&lt;/a&gt; on Window&#39;s Vista).&lt;br /&gt;&lt;br /&gt;Note that &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;sudo&lt;/span&gt;&quot; will only escalate privileges of the current command and won&#39;t work in case of re-directions. Example: Say you want to write to a system file that requires administrator privileges and you type the following command:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;sudo echo 1 &gt; /proc/sys/net/ipv4/tcp_sack&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You would still get &quot;Permission denied&quot;. This is because &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;sudo&lt;/span&gt;&quot; only performed on &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;echo 1&lt;/span&gt;&quot; but not on &quot;writing to file&quot;. There are two ways of tackling this:&lt;br /&gt;&lt;br /&gt;(1) Escalate privileges of entire shell, execute your command withing the escalated shell, and then exit escalated shell. This is done as shown:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;sudo bash&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;echo 1 &gt; /proc/sys/net/ipv4/tcp_sack&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;exit&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;(2) A second method is by using the following command:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;sudo bash &#39;echo 1 &gt; /proc/sys/net/ipv4/tcp_sack&#39;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/command&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Good ole GUI, where are you?&lt;/span&gt;&lt;br /&gt;&lt;command&gt;&lt;br /&gt;Well, after installing the server version of Ubuntu, I noticed that I wasn&#39;t presented with a nice GUI to play around, instead was faced with the command prompt. Nothing against command lines, but I like my GUIs :)&lt;br /&gt;&lt;br /&gt;So I learned that typing the command &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;startx&lt;/span&gt;&quot; will start the X server and associated GUI environment. But on executing the command, I am confronted with the following errors:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;xauth: creating new authority file /root/.serverauth.38.66&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;xauth: creating new authority file /root/Xauthority&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;xauth: creating new authority file /root/Xauthority&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;X: cannot stat /etc/X11/X (no such file or directory), aborting&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;giving up&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;xinit: Connection refused (errno111): unable to connect the x server&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;xinit: No such process (errno 3): Server Error.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Aah! so I am missing X server and a GUI environment. I needed to install them first. For that, I used the following commands:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;sudo apt-get install kde&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;sudo apt-get install xorg&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;This installs the KDE GUI environment and X server.&lt;br /&gt;&lt;br /&gt;Now type &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;startx&lt;/span&gt;&quot; and you will be presented with the KDE desktop. Do not type &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;sudo startx&lt;/span&gt;&quot; which will cause all your applications to run with administrator privileges, and hence reducing security. On logging out, you will once again be presented with the command shell.&lt;br /&gt;&lt;br /&gt;To rather be presented with the GUI (all the way), without having to encounter the command shell each time and typing &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;startx&lt;/span&gt;&quot;, simply install one of the GUI desktops all together, instead of the above two packages (&lt;span style=&quot;font-style: italic;&quot;&gt;kde&lt;/span&gt; and &lt;span style=&quot;font-style: italic;&quot;&gt;xorg&lt;/span&gt;). For installing one of the GUI desktops, type any one of the following commands:&lt;br /&gt;&lt;br /&gt;To install the default GNOME desktop:&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;sudo apt-get install ubuntu-desktop&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;To install the KDE desktop:&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;sudo apt-get install kubuntu-desktop&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;After install, reboot your machine and you will be presented with a nice GUI based desktop :)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Some things I learned&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;In the process of trying to figure out these things, I learned some new things, which I would like to share here. Most Linux distributions have the file &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;/etc/inittab&lt;/span&gt;&quot; that defines the &quot;&lt;a href=&quot;http://en.wikipedia.org/wiki/Runlevel&quot;&gt;runlevel&lt;/a&gt;&quot; into which the kernel boots up. Typically a runlevel of 2 means you will be presented with a command prompt, and a runlevel of 5 means you will be presented with a GUI. Example: for runlevel 5, the entry in &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;/etc/inittab&lt;/span&gt;&quot; would be as such:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;id:5:initdefault:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The following command gives the current runlevel you are in:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;who -r&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The following command will change your runlevel to 2 by shutting down unnecessary process&#39;s and starting up all runlevel 2 processes:&lt;br /&gt;&lt;br /&gt;&lt;/command&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;telinit 2&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;command&gt;&lt;br /&gt;Each defined runlevel will have an &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;/etc/rcX.d/&lt;/span&gt;&quot; directory where &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;X&lt;/span&gt;&quot; is the runlevel number. &lt;/command&gt;The contents of the &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;rcX.d&lt;/span&gt;&quot; directory determines what happens at that runlevel. &lt;command&gt;For Ubuntu, the default runlevel is 2. Also, the runlevels 2 through 5 on Ubuntu are all the same. There is no distinction between them, i.e. the contents of &lt;span style=&quot;font-style: italic;&quot;&gt;/etc/rc2.d/&lt;/span&gt;, &lt;span style=&quot;font-style: italic;&quot;&gt;/etc/rc3.d/&lt;/span&gt;, &lt;span style=&quot;font-style: italic;&quot;&gt;/etc/rc4.d/&lt;/span&gt;, &lt;span style=&quot;font-style: italic;&quot;&gt;/etc/rc5.d/&lt;/span&gt; directories are all the same. This presents you with the default command line shell when you boot up, if you hadn&#39;t installed any of the GUI desktops.&lt;br /&gt;&lt;br /&gt;Note that in Ubuntu, &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;init&lt;/span&gt;&quot; has been replaced by &quot;&lt;a href=&quot;http://upstart.ubuntu.com/&quot;&gt;upstart&lt;/a&gt;&quot;. So, if you wish to change you runlevel, &quot;upstart&quot; still looks for the &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;inittab&lt;/span&gt;&quot; file for a user set runlevel. Just create the &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;/etc/inittab&lt;/span&gt;&quot; file and put the following line in it to boot to runlevel 5:&lt;br /&gt;&lt;br /&gt;&lt;/command&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;id:5:initdefault:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;command&gt;&lt;br /&gt;And then you have to add some new content to the directory &quot;&lt;/command&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;/etc/rc5.d/&lt;/span&gt;&quot; in order to start the X server and GUI environment by default on boot up (instead of the command line shell). This I am not sure how to do yet!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Accessing a Window&#39;s share from Ubuntu&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;In order to access a Window&#39;s shared folder in Ubuntu, over the network, you need to install &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;smbfs&lt;/span&gt;&quot;. Select System &gt; Administration &gt; Synaptic Package Manager and search for &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;samba server&lt;/span&gt;&quot;. Then select &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;smbfs&lt;/span&gt;&quot; for install. This will install the and insert the &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;smbfs&lt;/span&gt;&quot; kernel module (.ko - kernel object file) into the running kernel. This facilitates mounting of remote &lt;a href=&quot;http://en.wikipedia.org/wiki/Server_Message_Block&quot;&gt;SMB&lt;/a&gt; share (such as the Window&#39;s share) on Linux. You can find if the kernel module has been properly inserted by executing the following command:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;lsmod | grep smbfs&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you do not see it inserted, then you can manually insert the associated kernel object (.ko file) by issuing the following command:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;modprobe smbfs&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Also make sure that the &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;smb server&lt;/span&gt;&quot; is up and running. In order to check this, type the following command:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;netstat -antupo&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Check to see if the &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;smb server&lt;/span&gt;&quot; is listening on ports 139 and 445. If not, you can start it by issuing the following commands:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;font-size:85%;&quot;  &gt;cd /etc/init.d/&lt;/span&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;font-size:85%;&quot;  &gt;./smb start&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Now say the IP address to your Window&#39;s machine over the network is &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;192.168.1.1&lt;/span&gt;&quot;. Then type the following command:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;smbclient -L 192.168.1.1&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;When prompted for &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;Password&lt;/span&gt;&quot; simply hit &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;Return&lt;/span&gt;&quot;. This will list all shared folders on the Window&#39;s machine that do not require a password for read access. Say one of these shared folders is called &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;Documents&lt;/span&gt;&quot;. Then type the following command:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;sudo mkdir /mnt/share&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;sudo chmod 755 /mnt/share&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;sudo mount //192.168.1.1/Documents /mnt/share&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;The first two commands will create the directory &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;/mnt/share/&lt;/span&gt;&quot; and give appropriate permissions. The third command will mount the Window&#39;s share onto &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;/mnt/share/&lt;/span&gt;&quot;. If prompted for &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;Password&lt;/span&gt;&quot;, simply hit &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;Return&lt;/span&gt;&quot;.&lt;br /&gt;&lt;br /&gt;In order to un-mount the share, type the following command:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;font-family:courier new;&quot; &gt;sudo umount /mnt/share&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Useful info and links&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;During my learning experience with Ubuntu, I also stumbled upon a number of useful resources, that I would like to share here:&lt;br /&gt;&lt;br /&gt;Loads of help at &lt;a href=&quot;http://ubuntuforums.org/&quot;&gt;Ubuntu Forums&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://help.ubuntu.com/&quot;&gt;Documentation&lt;/a&gt; for Latest Version of Ubuntu.&lt;br /&gt;&lt;br /&gt;Useful documentation for Ubuntu, &lt;a href=&quot;https://help.ubuntu.com/community/TitleIndex&quot;&gt;browse by title&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Switching to Ubuntu &lt;a href=&quot;https://help.ubuntu.com/community/SwitchingToUbuntu/FromWindows&quot;&gt;from Windows&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Switching to Ubuntu &lt;a href=&quot;https://help.ubuntu.com/community/SwitchingToUbuntu/FromMacOSX&quot;&gt;from MacOS&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://help.ubuntu.com/community/WindowsApplicationsEquivalents&quot;&gt;Ubuntu equivalents&lt;/a&gt; to Windows applications.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://help.ubuntu.com/community/SoftwareEquivalents&quot;&gt;Software Equivalents&lt;/a&gt; in Ubuntu.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://ubuntuforums.org/showthread.php?t=179472&quot;&gt;How-To&lt;/a&gt;: Setting up QEmu on Ubuntu with TUN/TAP and NAT.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://codepoets.co.uk/docs/qemu_windows2000_on_ubuntu_linux_howto&quot;&gt;How-To&lt;/a&gt;: Install and run Windows 2000 under QEmu on Ubuntu 5.10.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://help.ubuntu.com/community/WindowsXPUnderQemuHowTo&quot;&gt;How-To&lt;/a&gt;: Install and run Windows XP under QEmu on Ubuntu.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://help.ubuntu.com/community/Installation/QemuEmulator&quot;&gt;How-To&lt;/a&gt;: Install and run any release of Ubuntu under QEmu on Ubuntu.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://homepage.sunrise.ch/mysunrise/ekeller00/EricKellerUbuntuPage.html&quot;&gt;How-To&lt;/a&gt;: Install and run Ubuntu under QEmu or VMware on Windows.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.howtoforge.com/ubuntu_feisty_fawn_vmware_server_howto&quot;&gt;How-To&lt;/a&gt;: Install and run VMWare Server (or Workstation) on Ubuntu.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://alien.slackbook.org/dokuwiki/doku.php?id=slackware:qemu&quot;&gt;Wiki page&lt;/a&gt;: About QEmu, and installing it on &lt;a href=&quot;http://www.slackware.com/&quot;&gt;Slackware Linux&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://help.ubuntu.com/community/Wine&quot;&gt;Installing Wine&lt;/a&gt; on Ubuntu.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://help.ubuntu.com/community/InstallingInternetExplorer&quot;&gt;Installing Internet Explorer&lt;/a&gt; on Ubuntu.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://help.ubuntu.com/community/SeamlessVirtualization&quot;&gt;Seamless Virtualization&lt;/a&gt; with Ubuntu.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://help.ubuntu.com/community/KVM&quot;&gt;Kernel Virtual Machine&lt;/a&gt; on Ubuntu.&lt;br /&gt;&lt;br /&gt;Hope this information has been useful.&lt;br /&gt;Happy Ubuntu-ing... :)&lt;br /&gt;&lt;br /&gt;&lt;command&gt;&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot;  &gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;/command&gt;&lt;/div&gt;</description><link>http://fightmalware.blogspot.com/2008/01/fun-with-ubuntu.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQkzFnBE1Nn7q_5PZYQuHpY3Dr7IOxhHhNaf6tArUzWqP3w_2_E4U2zFwQhAPYVa43Chii1fzfeO3LL7p_v_bmxKQy-Ao174IngnqAz7hySfJc8nkz2ZivM7be2WoveoeWZhDBA4ra8ws/s72-c/ubuntu-logo.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-3603903875618152243</guid><pubDate>Sun, 06 Jan 2008 17:47:00 +0000</pubDate><atom:updated>2008-01-08T01:02:10.584-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Threats</category><title>Moderating Blogger Comments</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;Today I noticed a strange comment to one of my blog posts that I hadn&#39;t approved. At first I thought my blog has been hacked and some spammer or malicious writer posted this comment or inserted malicious links/IFrame tags into my posts. I quickly checked all my posts for these (by clicking on &quot;edit post&quot;, then &quot;edit Html&quot;, and checking each &quot;http href&quot;and searching for &quot;iframe&quot;) and found everything to be clean. I then looked at the comment...&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifnhayTM_CfHz-ta7CwLUcicl4gHTlwJvoS8NFfKAUfwJveSdxap0I9gQSMrTajRoevXh3dJeywBXwmHxUGpySURsKioMWzP4ayhGDbNrta4LnFdOJsV0jVUGXsJ2tzDf5OysVfe-wCcw/s1600-h/comment.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 272px; height: 171px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifnhayTM_CfHz-ta7CwLUcicl4gHTlwJvoS8NFfKAUfwJveSdxap0I9gQSMrTajRoevXh3dJeywBXwmHxUGpySURsKioMWzP4ayhGDbNrta4LnFdOJsV0jVUGXsJ2tzDf5OysVfe-wCcw/s320/comment.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5152428066810215586&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;While hovering my mouse cursor on the hyper link &quot;here it is&quot;, I see the URL &quot;hxxp://www.yourtypingbiz.info/billion-dollar-market.php&quot; in the status bar at the bottom of my Firefox browser window. Clearly, this is a case of SPAM.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Now how did this comment get into my post without me approving it first? Well, I found out that my comments were actually &quot;NOT moderated&quot;! I thought I had turned on moderation of comments, but apparently I didn&#39;t. So some spammer simply posted such a comment (with a link to their phishing website) to all blogger blogs that do not have comment moderation turned on. They probably do this via a script in order to reach a multitude of blogs.&lt;br /&gt;&lt;br /&gt;My next step was to simply delete the comment and turn on moderation of comments.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHavcy-FrhLBIGfY01RKUcd6CzPAf-pH9T_CuTSrT14KjbffKbDCULGUGwztxg-eaWlMKcweFz0HXokNTlaDIzCIByyNdv5PJuJsjcG8lIlCSxfr1zcpUm6eI6UiJOYhsii8bx1WVaRJo/s1600-h/comment2.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHavcy-FrhLBIGfY01RKUcd6CzPAf-pH9T_CuTSrT14KjbffKbDCULGUGwztxg-eaWlMKcweFz0HXokNTlaDIzCIByyNdv5PJuJsjcG8lIlCSxfr1zcpUm6eI6UiJOYhsii8bx1WVaRJo/s400/comment2.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5152432619475549426&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;</description><link>http://fightmalware.blogspot.com/2008/01/moderating-blogger-comments.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifnhayTM_CfHz-ta7CwLUcicl4gHTlwJvoS8NFfKAUfwJveSdxap0I9gQSMrTajRoevXh3dJeywBXwmHxUGpySURsKioMWzP4ayhGDbNrta4LnFdOJsV0jVUGXsJ2tzDf5OysVfe-wCcw/s72-c/comment.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-3618167572873377764</guid><pubDate>Sat, 01 Dec 2007 14:00:00 +0000</pubDate><atom:updated>2008-01-06T12:59:27.138-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Threats</category><title>Malware via exploits</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUK0GqswifebrstnF_mb4YUgn4aJ6w5-Zjpw3tV7d5S3xtJd0FAYBCZ0CWz6tacq0rNkc1y7Bq2MjLferzU-DXnFaqmyiabv5OOMWPBmkmGrPUP7-055IuacGjxuswkcVdc3WcZTJmHeQ/s1600-h/Exploit.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5133306280462804722&quot; style=&quot;margin: 0pt 0pt 10px 10px; float: right; width: 148px; cursor: pointer; height: 143px;&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUK0GqswifebrstnF_mb4YUgn4aJ6w5-Zjpw3tV7d5S3xtJd0FAYBCZ0CWz6tacq0rNkc1y7Bq2MjLferzU-DXnFaqmyiabv5OOMWPBmkmGrPUP7-055IuacGjxuswkcVdc3WcZTJmHeQ/s200/Exploit.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Malware authors are constantly banking on the &quot;next-big-thing&quot; in order to deliver their malicious payload/content onto un-suspecting user machines. Due to its huge user base, the Windows is un-undoubtedly the most targeted of operating system platforms.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;Source of image: &lt;a href=&quot;http://www.horsehats.com/images/hats/ExploitFront.jpg&quot;&gt;HorseHats.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Malware delivery mechanisms have constantly been evolving from the old floppy disk days to the fast spreading Internet worms (attachments via e-mail). Today&#39;s malware delivery mechanisms are shifting more and more toward web technologies. Instead of directly delivering malicious content to user machines via e-mail attachments, malware are being hosted on a myriad of web servers world wide. Users are then enticed into somehow visiting these websites either by spamming out an e-mail with a link to a malicious website or by tainting search results to obtain a higher ranking to their malicious website. Such malicious links are also delivered via IM (Instant Messaging), bulletin boards, forums, etc.&lt;br /&gt;&lt;br /&gt;Usually malicious websites also host recent (or in some cases older) browser/application/system exploits along with malware. An unsuspecting user who visits such a malicious website with an un-patched system or browser application is easily exploited and malware is delivered onto their system (&lt;a href=&quot;http://en.wikipedia.org/wiki/Drive-by_download&quot;&gt;drive-by-downloads&lt;/a&gt;). In case of fully-patched systems, all it takes is to entice the user or fool them into downloading and executing the malware. Such malicious web servers could be made accessible via HTTP or FTP and malicious code (HTML, JavaScript, PHP, CGI, etc.) embedded within web-pages. Malware authors could hack legitimate websites and redirect visitors to a host of malware via invisible &lt;a href=&quot;http://en.wikipedia.org/wiki/IFrame&quot;&gt;IFrame&lt;/a&gt; tags. With the birth of &lt;a href=&quot;http://en.wikipedia.org/wiki/Web_2&quot;&gt;Web2.0&lt;/a&gt; technologies, and mobile platforms, newer avenues are being explored in terms of malware delivery.&lt;br /&gt;&lt;br /&gt;In regards to Windows related vulnerabilities, with Microsoft scheduling its patch release on every second Tuesday of each month popularly known as &quot;patch Tuesday&quot;, hackers and malware authors have coined the term &quot;&lt;a href=&quot;http://www.theregister.co.uk/2007/10/11/exploit_wednesday/&quot;&gt;exploit Wednesday&lt;/a&gt;&quot; where they exploit an un-patched vulnerability the day after Microsoft has released its patches for that particular month.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Information Gathering - Vulnerabilities and Exploits&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Malware authors are constantly looking to find vulnerabilities in software in order to exploit them. The software they target could be Operating system libraries, application software, kernel mode drivers, etc. They either hack these up themselves or obtain them from published material on &lt;a href=&quot;http://archives.neohapsis.com/archives/fulldisclosure/&quot;&gt;Fulldisclosure&lt;/a&gt; mailing list, or from published material via blog posts of vulnerability researchers and enthusiasts, or from a community of hackers, etc. There is also the open source vulnerability database (&lt;a href=&quot;http://osvdb.org/&quot;&gt;OSVDB&lt;/a&gt;) where detailed vulnerability information is published on or before the same day that a vendor patch is released.&lt;br /&gt;&lt;br /&gt;Information and advisories about vulnerabilities can also be obtained from from the following sites listed below:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.sans.org/newsletters/risk/?portal=c18b9e771f6bc133d97ba2f623d44e86&quot;&gt;@Risk&lt;/a&gt;: The Consensus Security Alert&lt;br /&gt;&lt;a href=&quot;http://www.securityfocus.com/archive/1&quot;&gt;Bugtraq mailing list&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://archives.neohapsis.com/archives/bugtraq/&quot;&gt;Bugtraq archives at neophsis&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.cert.org/advisories/&quot;&gt;CERT&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://cirdb.cerias.purdue.edu/coopvdb/public/&quot;&gt;CERIAS&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ciac.org/ciac/index.html&quot;&gt;CIAC.org&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://cve.mitre.org/&quot;&gt;CVE&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://research.eeye.com/html/advisories/published/&quot;&gt;eeye advisories&lt;/a&gt; and &lt;a href=&quot;http://research.eeye.com/html/alerts/zeroday/&quot;&gt;ZeroDay tracker&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.finjan.com/Content.aspx?id=566&quot;&gt;Finjan Vulnerability List&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.frsirt.com/english/&quot;&gt;FrSIRT&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.governmentsecurity.org/exploits.php&quot;&gt;GovernmentSecurity&lt;/a&gt; (&lt;a href=&quot;http://www.governmentsecurity.org/forum/index.php?showforum=26&quot;&gt;forum1&lt;/a&gt;, &lt;a href=&quot;http://www.governmentsecurity.org/forum/index.php?showforum=40&quot;&gt;forum2&lt;/a&gt;)&lt;br /&gt;&lt;a href=&quot;http://xforce.iss.net/xforce/search.php&quot;&gt;IBM ISS (X-Force)&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://labs.idefense.com/intelligence/vulnerabilities/&quot;&gt;IDefense advisories&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://lwn.net/Vulnerabilities/&quot;&gt;LWN.net&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.microsoft.com/technet/security/current.aspx&quot;&gt;Microsoft security bulletin&lt;/a&gt; - List of vulnerabilities fixed since 1998&lt;br /&gt;&lt;a href=&quot;http://www.milw0rm.com/&quot;&gt;milw0rm&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://nvd.nist.gov/&quot;&gt;National Vulnerability Database&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.net-security.org/vulnerabilities.php?d=20&quot;&gt;Net-Security&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.nist.org/news.php&quot;&gt;NIST.org&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ntbugtraq.com/&quot;&gt;NTBugtraq&lt;/a&gt;&lt;br /&gt;NTSecurity.net archives at &lt;a href=&quot;http://archives.neohapsis.com/archives/win2ksecadvice/&quot;&gt;neohpsis&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.rapid7.com/vulndb/&quot;&gt;Rapid7 vulnerability database&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.wiretrip.net/rfp/adv.asp&quot;&gt;Rain Forest Puppy Advisories&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.sans.org/top20/&quot;&gt;SANS top20 list&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://secunia.com/&quot;&gt;Secunia&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.securiteam.com/&quot;&gt;SecuriTeam&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.sans.org/newsletters/sac/&quot;&gt;Security Alert Consensus&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.security-database.com/view-all.php?date=All&amp;amp;sev=All&amp;amp;type=All&quot;&gt;Security-database&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.securityfocus.com/vulnerabilities&quot;&gt;SecurityFocus&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://en.securitylab.ru/nvd/&quot;&gt;SecurityLab&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://securityreason.com/&quot;&gt;SecurityReason&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.securitytracker.com/startup/index.html&quot;&gt;SecurityTracker&lt;/a&gt;&lt;br /&gt;Security Threat Watch archives at &lt;a href=&quot;http://archives.neohapsis.com/archives/stw/&quot;&gt;neohpsis&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://securityvulns.com/&quot;&gt;SecurityVulns&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://secwatch.org/&quot;&gt;SecWatch&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.us-cert.gov/cas/techalerts/index.html&quot;&gt;US-Cert&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://lists.virus.org/&quot;&gt;Virus.org&lt;/a&gt;&lt;br /&gt;VulnDiscuss archives at &lt;a href=&quot;http://archives.neohapsis.com/archives/vulndiscuss/&quot;&gt;neohapsis&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.vulnwatch.org/&quot;&gt;VulnWatch&lt;/a&gt; archives at &lt;a href=&quot;http://archives.neohapsis.com/archives/vulnwatch/&quot;&gt;neohapsis&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.xdisclose.com/&quot;&gt;Xdisclose&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.zone-h.org/content/blogcategory/&quot;&gt;Zone-H&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.zerodayinitiative.com/&quot;&gt;Zero Day Initiative (TippingPoint)&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;A unique blog-roll of &quot;month of vulnerability disclosure&quot; was also started by certain people who decided to find vulnerabilities in various software and simply disclose them via independent blog posts. Listed below are a few:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://projects.info-pull.com/moab/&quot;&gt;MOAB&lt;/a&gt; - Month of Apple bugs&lt;br /&gt;&lt;a href=&quot;http://projects.info-pull.com/mokb/&quot;&gt;MOKB&lt;/a&gt; - Month of Kernel bugs&lt;br /&gt;&lt;a href=&quot;http://browserfun.blogspot.com/&quot;&gt;MOBB&lt;/a&gt; - Month of Browser bugs&lt;br /&gt;&lt;a href=&quot;http://websecurity.com.ua/category/moseb/&quot;&gt;MOSEB&lt;/a&gt; - Month of Search Engine bugs&lt;br /&gt;&lt;a href=&quot;http://moaxb.blogspot.com/&quot;&gt;MOAxB&lt;/a&gt; - Month of ActiveX bugs&lt;br /&gt;&lt;a href=&quot;http://websecurity.com.ua/category/mobic/&quot;&gt;MOBiC&lt;/a&gt; - Month of bugs in CAPTCHAs&lt;br /&gt;&lt;br /&gt;Before the details of a vulnerability gets into Fulldisclosure, OSVDB, or such independent open blog-rolls, the researcher or hacker has several options as what he or she can do with the discovered vulnerability:&lt;br /&gt;&lt;br /&gt;- Responsibly disclose the entire details of the vulnerability to the software vendor alone, for free.&lt;br /&gt;&lt;br /&gt;- Sell it to certain companies that buy vulnerabilities such as &lt;a href=&quot;http://labs.idefense.com/&quot;&gt;IDefense&lt;/a&gt; (now part of VeriSign), &lt;a href=&quot;http://digitalarmaments.com/index.shtml&quot;&gt;Digital Armaments&lt;/a&gt;, &lt;a href=&quot;http://www.argeniss.com/&quot;&gt;Argeniss&lt;/a&gt; (now acquired by &lt;a href=&quot;http://www.gleg.net/&quot;&gt;Gleg Ltd&lt;/a&gt;), &lt;a href=&quot;http://www.netragard.com/index.php&quot;&gt;Netragard&lt;/a&gt;, &lt;a href=&quot;http://www.tippingpoint.com/&quot;&gt;TippingPoint&lt;/a&gt; (now a part of &lt;a href=&quot;http://www.3com.com/&quot;&gt;3com&lt;/a&gt;), and &lt;a href=&quot;http://www.immunitysec.com/&quot;&gt;Immunity&lt;/a&gt;, that gives the buying company exclusive rights to the vulnerability.&lt;br /&gt;&lt;br /&gt;- Place the vulnerability for an auction at &lt;a href=&quot;http://www.wslabi.com/wabisabilabi/home.do?&quot;&gt;Wabisabilabi&lt;/a&gt; and sell it to the highest bidder.&lt;br /&gt;&lt;br /&gt;The ethics behind disclosing vulnerabilities has always been a subject of debate. Microsoft has coerced a few software vendors to join their Organization for Internet Safety (&lt;a href=&quot;http://www.oisafety.org/adopters.html&quot;&gt;OIS&lt;/a&gt;) that strives to actively suppress vulnerability disclosure within their organizations.&lt;br /&gt;&lt;br /&gt;The number of vulnerabilities have been increasing since 2006. Here are some stats:&lt;br /&gt;&lt;a href=&quot;http://www.cert.org/stats/fullstats.html&quot;&gt;Full stats&lt;/a&gt; from CERT.&lt;br /&gt;&lt;a href=&quot;http://www.theregister.co.uk/2007/01/21/2006_vulns_tally/&quot;&gt;A post&lt;/a&gt; on &quot;The Register&quot;.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Windows Libraries - a haven for malware exploits&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A large number of Windows applications leverage Windows libraries (modules that contain functions and data) as dynamic-link libraries (DLL) or OCX (libraries containing ActiveX controls). Such libraries allow their functionality to be updated and reused easily while reducing significant memory overhead when several applications use the same functionality synchronously. Thus, the discovery of a critical vulnerability in a library usually affects a wide range of applications from Microsoft and other third-party vendors that use that library. Hackers and malicious authors then try to find multiple attack vectors in order to exploit the vulnerability. For instance, a vulnerability in an image processing library could be exploited via Internet Explorer, Microsoft Office and Image Viewing software. Considering the massive base of Windows users, such an exploit ensures huge deployment.&lt;br /&gt;&lt;br /&gt;Several such vulnerabilities have been discovered in the recent past, for which, many had exploit codes either made available or discovered before patches were released. This scenario is also known as &quot;zero-day&quot;. Listed below are a few:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;VML Exploit&lt;/span&gt; - (&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4868&quot;&gt;CVE-2006-4868&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms06-055.mspx&quot;&gt;MS06-055&lt;/a&gt;) - a vulnerability in Vector Graphics Rendering engine (vgx.dll) could allow remote code execution via a specially crafted Vector Markup Language file. The vulnerable library is used by applications such as Microsoft Outlook and Internet Explorer which can be used as attack vectors.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;WebViewFolderIcon Exploit (via setSlice method)&lt;/span&gt; - (&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3730&quot;&gt;CVE-2006-3730&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms06-057.mspx&quot;&gt;MS06-057&lt;/a&gt;) - a vulnerability in Windows Shell, due to improper validation of input parameters when invoked by the WebViewFolderIcon ActiveX control via setSlice method, could allow remote code execution.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;WMF Exploit&lt;/span&gt; - (&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4560&quot;&gt;CVE-2005-4560&lt;/a&gt;, &lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2124&quot;&gt;CVE-2005-2124&lt;/a&gt; &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms06-001.mspx&quot;&gt;MS06-001&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms05-053.mspx&quot;&gt;MS05-053&lt;/a&gt;) - a vulnerability in the graphics rendering engine (GDI32.DLL) could allow remote code execution while handling a specially crafted Windows Metafile (WMF) image.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;EMF Exploit&lt;/span&gt; - (&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2123&quot;&gt;CVE-2005-2123&lt;/a&gt;, &lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0803&quot;&gt;CVE-2005-0803&lt;/a&gt;) - a vulnerability in the graphics rendering engine (GDI32.DLL) could allow remote code execution via a heap-based buffer overflow or cause a application crash while handling a specially crafted Enhanced Metafile (EMF) image.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;ANI exploit&lt;/span&gt; - (&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0038&quot;&gt;CVE-2007-0038&lt;/a&gt;, &lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1049&quot;&gt;CVE-2004-1049&lt;/a&gt;, &lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1305&quot;&gt;CVE-2004-1305&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/ms07-017.mspx&quot;&gt;MS07-017&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms05-002.mspx&quot;&gt;MS05-002&lt;/a&gt;) - a vulnerability in Cursor and Icon format handling could allow remote code execution or denial of service (kernel or application crash).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Web View exploit&lt;/span&gt; - (&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1191&quot;&gt;CVE-2005-1191&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms05-024.mspx&quot;&gt;MS05-024&lt;/a&gt;) - a vulnerability in Web View DLL (webvw.dll) could allow remote code execution.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;PNG exploit&lt;/span&gt; - (&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1244&quot;&gt;CVE-2004-1244&lt;/a&gt;, &lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597&quot;&gt;CVE-2004-0597&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms05-009.mspx&quot;&gt;MS05-009&lt;/a&gt;) - a vulnerability in PNG Image Processing (by Windows Media Player 9 or via libpng 1.2.5 and earlier) could allow remote code execution.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;JPEG exploit&lt;/span&gt; - (&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0200&quot;&gt;CVE-2004-0200&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms04-028.mspx&quot;&gt;MS04-028&lt;/a&gt;) - a buffer overflow vulnerability in JPEG (JPG) parsing engine in GDIPlus.dll could allow remote code execution.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;iPhone exploit&lt;/span&gt; - H.D. Moore (creator of the Metaspoilt Framework) has several blog entries consisting of step-by-step descriptions of how to exploit the Apple iPhone. Here, he exploits a vulnerable version of the &lt;a href=&quot;http://www.libtiff.org&quot;&gt;libtiff library&lt;/a&gt; that is shipped with the latest update to the iPhone.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;URL handling exploit&lt;/span&gt; - (&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3896&quot;&gt;CVE-2007-3896&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/943521.mspx&quot;&gt;MSA-943521&lt;/a&gt;) - a URL/URI handling bug in Shell32.dll with Internet Explorer or Mozilla Firefox installed could allow remote code execution. Attack vectors could be applications such as mIRC, Outlook, Adobe Reader, Skype, etc.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Microsoft Office file formats&lt;/span&gt; - have always been a target for digging out vulnerabilities that could be exploited by malicious authors. The &lt;a href=&quot;http://www.sans.org/top20/2006/#w3&quot;&gt;SANS 2006 list&lt;/a&gt; and &lt;a href=&quot;http://www.sans.org/top20/#c2&quot;&gt;SANS 2007 list&lt;/a&gt; of office file format vulnerabilities provides information about a number of these bugs. &lt;a href=&quot;http://www.securityfocus.com/infocus/1874&quot;&gt;This&lt;/a&gt; Security Focus article discusses the extent of vulnerabilities in Microsoft&#39;s Office documents in recent months, while &lt;a href=&quot;http://www.symantec.com/enterprise/security_response/weblog/2006/09/the_microsoft_office_vulnerabi.html&quot;&gt;this&lt;/a&gt; blog entry by Symantec discusses about malware exploiting such vulnerabilities. Ryan Naraine&#39;s &lt;a href=&quot;http://blogs.zdnet.com/security/?p=225&quot;&gt;blog&lt;/a&gt; also talks about malware authors creating tools to exploit vulnerabilities in Microsoft Word document format, while Microsoft itself &lt;a href=&quot;http://blogs.zdnet.com/security/?p=226&quot;&gt;releases a tool&lt;/a&gt; called MOICE with an intent to isolate potential exploitable elements.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Vulnerabilities in Applications&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Vulnerabilities or un-patched bugs in commonly used applications such as image viewers, media players, browsers, file readers, etc. are also sought to be exploited by malicious authors. Listed below are a few examples:&lt;br /&gt;&lt;br /&gt;- A vulnerability in &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Windows Media Player&lt;/span&gt; (&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0006&quot;&gt;CVE-2006-0006&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS06-005.mspx&quot;&gt;MS06-005&lt;/a&gt;) while processing of a specially crafter BMP image could allow remote code execution.&lt;br /&gt;&lt;br /&gt;- A vulnerability in &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Windows Media Player plugin&lt;/span&gt; (&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0005&quot;&gt;CVE-2006-0005&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS06-006.mspx&quot;&gt;MS06-006&lt;/a&gt;) for non-Microsoft browsers could allow remote code execution.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;- A recent vulnerability in &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Adobe Reader&lt;/span&gt; for Windows (&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5020&quot;&gt;CVE-2007-5020&lt;/a&gt;) while processing a specially crafted &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;PDF file&lt;/span&gt; could allow remote code execution via another vulnerability in Shell32.dll (&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3896&quot;&gt;CVE-2007-3896&lt;/a&gt;). Adobe has already released a patch for this &lt;a href=&quot;http://www.adobe.com/support/security/bulletins/apsb07-18.html&quot;&gt;here&lt;/a&gt;. This vulnerability was discovered by Petko D. Petkov of &lt;a href=&quot;http://www.blogger.com/www.gnucitizen.org/blog/0day-pdf-pwns-windows&quot;&gt;gnucitizen&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;- Several vulnerabilities in Adobe Reader (&lt;a href=&quot;http://secunia.com/advisories/23483/&quot;&gt;SA23483&lt;/a&gt;) could allow remote code execution or aid &lt;a href=&quot;http://www.cgisecurity.com/articles/csrf-faq.shtml&quot;&gt;CSRF attacks&lt;/a&gt;. Improperly handled input passed to a hosted PDF file via a vulnerable &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Adobe Reader browser plugin&lt;/span&gt; could allow remote code execution. Improperly sanitized returned values by a vulnerable Adobe Reader browser plugin, when input is passed to a hosted PDF file, could allow remote code execution. Improperly sanitized input values to a hosted PDF file via a vulnerable Adobe Reader browser plugin could allow requesting of arbitrary URLs and hence facilitating a vector for CSRF attacks.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;- A vulnerability in &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Adobe Photoshop&lt;/span&gt; for Windows (&lt;a href=&quot;http://www.frsirt.com/english/advisories/2007/1523&quot;&gt;FrSIRT-1523&lt;/a&gt;) while processing specially crafted BMP, DIB, RLE files could allow remote code execution.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;- A vulnerability in &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Apple QuickTime&lt;/span&gt; (&lt;a href=&quot;http://www.frsirt.com/english/advisories/2007/3155&quot;&gt;FrSIRT-3155&lt;/a&gt;) while processing the &quot;qtnext&quot; parameter withing QuickTime Link Files (.qtl files), could allow remote code execution by tricking a user into visiting a specially crafter webpage or opening a malicious file. This vulnerability was discovered by Petko D. Petkov of &lt;a href=&quot;http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox&quot;&gt;gnucitizen&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;- A vulnerability in &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Apple QuickTime&lt;/span&gt; (&lt;a href=&quot;http://www.kb.cert.org/vuls/id/659761&quot;&gt;US-CERT-659761&lt;/a&gt;, &lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6166&quot;&gt;CVE-2007-6166&lt;/a&gt;) while processing a specially crafted RTSP (Real Time Streaming Protocol) stream could allow remote code execution. Since QuickTime is a component of Apple iTunes, all such installations are vulnerable to the attack on all supported Windows and Mac operating systems.&lt;br /&gt;&lt;br /&gt;- A vulnerability in &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Adobe Flash Player&lt;/span&gt; (&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3456&quot;&gt;CVE-2007-3456&lt;/a&gt;, &lt;a href=&quot;http://www.adobe.com/support/security/bulletins/apsb07-12.html&quot;&gt;APSB07-12&lt;/a&gt;) could allow remote code execution due to a &quot;input validation error&quot; (buffer overflow) via a specially crafted FLV or SWF file. Another recent vulnerability (&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3457&quot;&gt;CVE-2007-3457&lt;/a&gt;) due to insufficiently validating HTTP referrer headers, could allow remote attackers to conduct a &lt;a href=&quot;http://www.cgisecurity.com/articles/csrf-faq.shtml&quot;&gt;CSRF attack&lt;/a&gt; via a specially crafted SWF file.&lt;br /&gt;&lt;br /&gt;- A vulnerability in Database Component in MPAMedia.dll in &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;RealPlayer&lt;/span&gt; (&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5601&quot;&gt;CVE-2007-5601&lt;/a&gt;, ) could allow remote code execution via certain play-list names via the import method to the IERPCtl ActiveX control in ierpplug.dll. RealNetworks has released a patch for this &lt;a href=&quot;http://service.real.com/realplayer/security/191007_player/en/&quot;&gt;here&lt;/a&gt;. Malicious authors have known to be &lt;a href=&quot;http://www.symantec.com/enterprise/security_response/weblog/2007/10/realplayer_exploit_on_the_loos.html&quot;&gt;exploiting&lt;/a&gt; this vulnerability.&lt;br /&gt;&lt;br /&gt;- A vulnerability in RPC on &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;DNS server&lt;/span&gt; (&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1748&quot;&gt;CVE-2007-1748&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms07-029.mspx&quot;&gt;MS07-029&lt;/a&gt;) could allow remote code execution.&lt;br /&gt;&lt;br /&gt;- Multiple vulnerabilities in Microsoft &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;PowerPoint&lt;/span&gt; (&lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms06-058.mspx&quot;&gt;MS06-058&lt;/a&gt;, &lt;a href=&quot;http://secunia.com/advisories/22127/&quot;&gt;SA22127&lt;/a&gt;) could allow remote code execution.&lt;br /&gt;&lt;br /&gt;- A vulnerability in the &lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;cPanel software&lt;/span&gt; (control panel software that is widely used by hosting providers such as Apachi web-hosting), could allow a remote attacker to &lt;a href=&quot;http://news.netcraft.com/archives/2006/09/23/hostgator_cpanel_security_hole_exploited_in_mass_hack.html&quot;&gt;gain access&lt;/a&gt; to the web servers and taint web-pages with malicious iFrame links.&lt;br /&gt;&lt;br /&gt;- A vulnerability in &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Winamp&lt;/span&gt; could allow the execution of malicious code via a specially crafter MP4 file. &lt;a href=&quot;http://www.theregister.co.uk/2007/05/02/winamp_0-day/&quot;&gt;Here&lt;/a&gt; is a post on &quot;The Register&quot; about it.&lt;br /&gt;&lt;br /&gt;- A myriad of &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Anti-Virus products&lt;/span&gt; as well were reveled of vulnerabilities, according to a blog post &lt;a href=&quot;http://blog.info-pull.com/2006/12/flawed-antivirus-products.html&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;- A blog post by Aviv Raff &lt;a href=&quot;http://aviv.raffon.net/2007/08/16/VistaGadgetsGoneWild.aspx&quot;&gt;here&lt;/a&gt;, details the vulnerabilities discovered in &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Gadgets&lt;/span&gt; (script-able applications) on Vista.&lt;br /&gt;&lt;br /&gt;- A post &lt;a href=&quot;http://www.theregister.co.uk/2007/06/03/google_vulns_stack_up/&quot;&gt;here&lt;/a&gt; describes a myriad of security issues with &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Google&lt;/span&gt; such as a vulnerability in Google desktop and an &lt;a href=&quot;http://en.wikipedia.org/wiki/Cross-site_scripting&quot;&gt;XSS&lt;/a&gt; error in Gmail, among many others.&lt;br /&gt;&lt;br /&gt;- A recently &lt;a href=&quot;http://docs.google.com/View?docid=ajfxntc4dmsq_14dt57ssdw&quot;&gt;discovered&lt;/a&gt; XSS vulnerability in common &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Shockwave Flash&lt;/span&gt; files.&lt;br /&gt;&lt;br /&gt;- A &lt;a href=&quot;http://www.theregister.co.uk/2007/08/10/ati_driver_snafu/&quot;&gt;vulnerability&lt;/a&gt; in an &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;ATI driver&lt;/span&gt; allows malicious code to be loaded into Vista&#39;s kernel, in spite of its latest security measures (such as PatchGuard and only allowing signed drivers to be loaded).&lt;br /&gt;&lt;br /&gt;And the saga continues...&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void&quot; phase=&quot;2&amp;amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&amp;quot;&quot;&gt;Digg This&lt;/a&gt; &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void&quot; url=&quot;+encodeURIComponent(window.location.href)+&quot; ei=&quot;UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&amp;quot;&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;</description><link>http://fightmalware.blogspot.com/2007/11/malware-via-exploits-and-saga-continues.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUK0GqswifebrstnF_mb4YUgn4aJ6w5-Zjpw3tV7d5S3xtJd0FAYBCZ0CWz6tacq0rNkc1y7Bq2MjLferzU-DXnFaqmyiabv5OOMWPBmkmGrPUP7-055IuacGjxuswkcVdc3WcZTJmHeQ/s72-c/Exploit.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-3391960680967553101</guid><pubDate>Sun, 18 Nov 2007 03:27:00 +0000</pubDate><atom:updated>2007-11-17T22:28:53.953-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Threats</category><title>Emerging Malware Trends</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjChM-pQ2kt3EiX0eOuZmNRu2GASB3f1OHexDW98vIrvEq9C_qERramputHYrhL2fWr4qGDs8x7GCaYsiimc-ex6mcXwK7bdI3a6Ap1nFdGsZ25o3Of27dNy937vjitB5G9k_Y_zmP4clw/s1600-h/iphone.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjChM-pQ2kt3EiX0eOuZmNRu2GASB3f1OHexDW98vIrvEq9C_qERramputHYrhL2fWr4qGDs8x7GCaYsiimc-ex6mcXwK7bdI3a6Ap1nFdGsZ25o3Of27dNy937vjitB5G9k_Y_zmP4clw/s200/iphone.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5133710458360194818&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Mobile Malware&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;With the growth in modern mobile platforms and devices, newer avenues are being explored in terms of malware delivery.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Source of image: http://iphonic.tv/iphone.jpg&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Here are a few resources that show the introduction of malware in the areas of mobile platforms:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.viruslist.com/en/analysis?pubid=170773606&quot;&gt;An overview of mobile device security&lt;/a&gt; by Kaspersky Labs introduces recently discovered worms and viruses on the Symbian, Windows CE, Palm OS and Linux platforms for devices such as PDAs, Pocket PCs, Windows Mobile, Cell Phones, SmartPhones, Handhelds, etc.&lt;br /&gt;&lt;br /&gt;McAfee has an interesting white paper as well about &lt;a href=&quot;http://www.mcafee.com/us/local_content/white_papers/threat_center/wp__malware_r2_en.pdf&quot;&gt;mobile malware - threats and prevention&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;/span&gt;An interesting presentation by &lt;a href=&quot;http://www.people.frisk-software.com/%7Ebontchev/&quot;&gt;Dr. Vesselin Bontchev&lt;/a&gt; at the Virus Bulletin 2007 conference is about the &lt;a href=&quot;http://www.virusbtn.com/conference/vb2007/abstracts/Bontchev.xml&quot;&gt;Virusability of modern mobile devices&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Another interesting paper by &lt;a href=&quot;http://www.peterszor.com/&quot;&gt;Peter Szor&lt;/a&gt; (security architect at Symantec Security Response) in June 2007 edition of Virus Bulletin magazine introduces to &lt;a href=&quot;http://www.virusbtn.com/virusbulletin/archive/2007/06/vb200706-ipod-attacks.dkb&quot;&gt;attacks on Linux iPod&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;It is also worth mentioning of a &quot;quality control process&quot; gone bad on part of Apple Inc. that shipped a small number of its &lt;a href=&quot;http://www.apple.com/support/windowsvirus/&quot;&gt;video iPods with an old Windows virus&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.symantec.com/avcenter/reference/threats.to.wap.devices.pdf&quot;&gt;Threats&lt;/a&gt; and &lt;a href=&quot;http://www.itsec.gov.cn/webportal/download/2000%20WAP.pdf&quot;&gt;viruses&lt;/a&gt; on WAP (Wireless Application Protocol) enabled devices have already been predicted quite a few years ago. Viruses have also been found on the &lt;a href=&quot;http://www.pcworld.com/article/id,18582-page,1/article.html&quot;&gt;PalmOS&lt;/a&gt; (such as &lt;a href=&quot;http://vil.nai.com/vil/content/v_98836.htm&quot;&gt;Phage&lt;/a&gt; and &lt;a href=&quot;http://vil.nai.com/vil/content/v_98837.htm&quot;&gt;Vapor&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;There are quite a few security companies offering anti-malware solutions for mobile platforms. Prominent among them are:&lt;br /&gt;&lt;br /&gt;- Symantec&#39;s mobile security for &lt;a href=&quot;http://www.symantec.com/press/2004/n040406.html&quot;&gt;handhelds&lt;/a&gt; (&lt;a href=&quot;http://www.symantec.com/norton/products/overview.jsp?pcid=pf&amp;amp;pvid=sms40symb&quot;&gt;Symbian&lt;/a&gt; and &lt;a href=&quot;http://www.symantec.com/norton/products/overview.jsp?pcid=pf&amp;amp;pvid=smavwm&quot;&gt;Windows mobile&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;- McAfee&#39;s &lt;a href=&quot;http://us.mcafee.com/root/package.asp?pkgid=249&quot;&gt;VirusScan mobile&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;- Trend Micro&#39;s &lt;a href=&quot;http://us.trendmicro.com/us/products/enterprise/mobile-security/index.html&quot;&gt;PC-cillin for mobile&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;- &lt;a href=&quot;http://mobile.f-secure.com/downloads/trial/index.html&quot;&gt;F-secure&#39;s mobile anti-virus&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;- &lt;a href=&quot;http://www.kaspersky.com/productupdates?chapter=207716169&quot;&gt;Kaspersky&#39;s mobile anti-virus&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;- &lt;a href=&quot;http://www.airscanner.com/&quot;&gt;Airscanner&lt;/a&gt; - is freely available for personal and non-commercial use.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;</description><link>http://fightmalware.blogspot.com/2007/11/emerging-trends-mobile-malware.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjChM-pQ2kt3EiX0eOuZmNRu2GASB3f1OHexDW98vIrvEq9C_qERramputHYrhL2fWr4qGDs8x7GCaYsiimc-ex6mcXwK7bdI3a6Ap1nFdGsZ25o3Of27dNy937vjitB5G9k_Y_zmP4clw/s72-c/iphone.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-6632568710626307348</guid><pubDate>Mon, 29 Oct 2007 07:23:00 +0000</pubDate><atom:updated>2008-01-06T13:02:32.880-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Ramblings</category><title>About Computer Security &amp; the Average Computer User</title><description>&lt;div  style=&quot;text-align: justify;font-family:verdana;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The fact of the matter is, &quot;the average computer user could care less about computer security if everything seems to be working fine&quot;. Largely attributed to ignorance and their naive reliance on security software, a typical user would choose ease of usability over security. Adding to their ignorance are the people who market security products as &quot;perfect solutions&quot; or as the &quot;silver bullet&quot;. Some of these so called &quot;marketing geniuses&quot; tend to claim unrealistic and ridiculous statements of how their product can protect users from every piece of malware out there, thus giving them a false sense of security.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;Who is the average computer user?&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Recently I had the chance to visit an older couple who complained of having trouble using their computer. Their computer was previously infected with malware, but has since been cleaned up by another so called &quot;computer expert&quot;, essentially reinstalling the OS and wiping out their data. The couple mentioned that the person who cleaned up their computer did not give them an option of backing up personal information or data. It could be possible that the malware on their system had encrypted their data (ransom-ware). Because everything was installed from scratch and things changed around (probably a newer OS version, newer software updates, etc.) they could not find their way around since things did not &quot;look&quot;, &quot;feel&quot;, and were not &quot;located in the same place&quot; as before! They had a hard time comprehending the change, which is no surprise since they did not seem very computer literate. They simply could not figure out how to browse the internet now, or open, receive and send e-mail, which is what they mostly used their computer for. A quick look at their computer revealed that it was clean of any malware (as of now!) and they simply needed help with using it. So I had to go over with them a basic computer-101 course demonstrating how to open, read, send e-mail and how to browse the internet. During the course of this session I tried my best to explain to them some of the security implications of being logged on as a admin-user. I also explained the dangers of browsing the internet, opening spam messages, clicking on links and clicking the &quot;yes&quot; pop-up-box, etc., (obviously due to my inclination towards computer security). No wonder, they had a hard time comprehending or following the things I was telling them.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;Security vs. Usability&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;The whole experience made me realize - the average computer user simply wants usability. Most people simply want to use the computer for their purpose, get the job done, and move on... Security? - they are either ignorant about it or just do not get it or just do not care as long as their computer seems to work fine...&lt;br /&gt;&lt;br /&gt;Where does this place the average user? - An easy target for identity and personal information theft.&lt;br /&gt;&lt;br /&gt;Where does this place the malware author? - Easy money-making off of the average user especially due to todays&#39; shift in intent to develop and deploy malware for monitory gain.&lt;br /&gt;&lt;br /&gt;Where does this place the anti-malware community? - Fighting a loosing battle...&lt;br /&gt;&lt;br /&gt;In my case of visiting the couple, they obviously did not know much about computer security and unfortunately these are the vast majority of computer users, who are un-wittingly contributing to the rise of a plethora of malware on the internet today. Such users are potential zombies or waiting to become part of a huge botnet spewing spam or unknowingly partaking in a&lt;a href=&quot;http://en.wikipedia.org/wiki/Denial-of-service_attack&quot;&gt; DDoS&lt;/a&gt; (Distributed Denial of Service) attack. Sadly, it is only a matter of time when their computer will be compromised again and this time they may never ever know, even with the best of the breed of security solutions installed. This is because, by nature, security solutions are defensive, and all it takes is for that one &quot;undetected&quot; malware to get past through due to that &quot;one click&quot;. It is just like a typical real world virus that attacks the human body. The doctors cannot come up with a vaccination for it until first a few people get sick due to the virus. This leads to the awareness of the existence of the virus in the first place and then the doctors are able to analyze it and come up with a vaccination for it. This vaccination will then protect all other human beings from that particular strain of virus if taken before hand. Same is the case with anti-malware software.&lt;br /&gt;&lt;br /&gt;Given the well know fact about the trade-off between &quot;ease of use&quot; verses &quot;depth of security&quot;, the average user is most inclined to choose &quot;ease of use&quot;. Deeper security comes with a price - loss of the ease of use. A typical example of this is the innovativeness of growing Internet today. The growing technologies in the Web2.0 world that are banking on Java-Script, AJAX, IFrames, etc. in order to make life easier, render richer user experience, and to bring usability and abstraction. These technologies have been exploited since their inception by malware authors in order to deliver malware to benign users. One way of overcoming this is by giving up the usability features effectively cutting off malware delivery paths. For example: Using &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/722&quot;&gt;NoScript plugin&lt;/a&gt; extension with &lt;a href=&quot;http://www.mozilla.com/en-US/firefox/&quot;&gt;Firefox browser&lt;/a&gt;  will not allow &lt;a href=&quot;http://en.wikipedia.org/wiki/JavaScript&quot;&gt;Java-Script&lt;/a&gt;  or &lt;a href=&quot;http://en.wikipedia.org/wiki/ActiveX&quot;&gt;ActiveX&lt;/a&gt; content to run on a user machine, effectively blocking a wide range of malware exploits such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Drive-by_download&quot;&gt;drive-by-downloads&lt;/a&gt;. But then, it comes with a price - loss of ease of usability. Some web-pages (even legitimate ones) will not function properly or up to their full potential, without Java-Script or ActiveX support in the web-browser. An analogy to this is the use of &quot;condoms&quot;. With modern day education and marketing, more people use condoms today than years ago in order to protect themselves from Sexually Transmitted Diseases (&lt;a href=&quot;http://en.wikipedia.org/wiki/Sexually_transmitted_disease&quot;&gt;STD&lt;/a&gt;). But still some people do not use condoms and are willing to take the risk for the sake of convenience, comfort and ease of usability. Similarly, in the case of computer security, most people would rather have all the good stuff and ease of usability while willing to take the risk by not having all security solutions &quot;turned on&quot;. Having to maintain the newer and richer features of the Internet that are still susceptible to malware, pushes the limit of security software to come up with complex but efficient solutions that are good at providing complete protection while not hogging up the machines processing power and memory.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;The crutch to computer security&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;The biggest hole, glitch or crutch to the world of computer security (anti-malware) is the average computer user.&lt;br /&gt;&lt;br /&gt;There are three facets to an average computer user that I would like to mention here:&lt;br /&gt;&lt;br /&gt;1. The user who knows or has vaguely heard about computer viruses and threats but just doesn&#39;t care. They are either not very interested in educating themselves about existing computer threats or are not too worried about it. They are the people who just do not want to be bothered with such things.&lt;br /&gt;&lt;br /&gt;2. The user who just doesn&#39;t get it. Such a user usually does not know any better and lives in a world of &quot;ignorance is bliss&quot;, thinking somehow they would never get infected with malware and there is no need to practice safe computer-usage habits or pay and maintain an updated security solution. An analogy to this is the typical human mind-set to think they can go and have all the sex they want and whomever they want and nothing will happen to them. These people are knowingly choosing to take the risk reasoning somehow in the possibility of all things they will not get a STD, which is obviously an unintelligent assumption.&lt;br /&gt;&lt;br /&gt;3. The user who cares but naively relies on promised security solutions (usually a victim to hyped marketing) living under the assumption of complete protection.&lt;br /&gt;&lt;br /&gt;A typical user perspective is - &quot;if I have a security solution installed (such as an anti-virus software, a firewall, etc.), then I should be protected, right?&quot; They tend to treat security software as perfect defenses. But what they fail to understand is that security software are not any better than other computer software and are far from being perfect. They are what they are - &quot;software&quot; - buggy, vulnerable and exploitable. There is no &quot;silver bullet&quot; and there are no &quot;perfect solutions&quot;. But again, the average user is not entirely to blame for such a mind set. The so called &quot;marketing geniuses&quot; of security products have not done a good job either in educating the average user or providing them with facts. An analogy to this is &quot;birth control pills&quot;. They help prevent a woman form getting pregnant but does not protect her from various STDs. While it is the doctor&#39;s responsibility in letting know the limitations of the pill to a patient, it is also the patients responsibility to ask and know about it themselves. It is sad to notice that in order to survive and stay in business, companies that sell/market security products as an add-on to their own products, aid the average computer user to remain ignorant by giving them a false sense of security. The average user believes and assumes that they have the best security product installed, and since they pay good money to keep it updated, they should be safe and protected at all times from all threats out there. This unfortunately is a naive assumption. I personally think that if people who market security products were to be more honest about their strengths and weaknesses it will actually get them a long ways and do greater good to users and the community as a whole, making the Internet a safer place to enjoy.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;What needs to be done&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The only way to overcome malware is by overcoming ignorance. Needless to say, the average computer user stands as the weakest link in maintaining computer security. Empowering the user with knowledge and education about computer security, instead of making them (totally) rely on security software to protect themselves, is the only way to gain an upper hand in the fight against malware. As it is rightly said &quot;Knowledge is Power&quot;, and when this power is vested in the hands of the average computer user, they will make intelligent choices and employ safer practices in turn reducing the amount of malware traffic on the internet. Users should be taught to practice safer browsing habits, apply commonsense, and install &quot;&lt;a href=&quot;http://en.wikipedia.org/wiki/Defense_in_Depth_%28computing%29&quot;&gt;defense in depth&lt;/a&gt;&quot; strategies. &lt;a href=&quot;http://www.virusbtn.com/conference/vb2007/abstracts/Jarvis.xml&quot;&gt;Here&lt;/a&gt; is a paper from VB2007 on user education  for computer security and &lt;a href=&quot;http://searchwindowssecurity.techtarget.com/originalContent/0,289142,sid45_gci1166182,00.html&quot;&gt;here&lt;/a&gt; you will find a learning guide for end-user education. Microsoft too has an online user education guide &lt;a href=&quot;http://www.microsoft.com/technet/security/guidance/disasterrecovery/malware/default.mspx&quot;&gt;here&lt;/a&gt; and an anti-virus defense in depth guide &lt;a href=&quot;http://www.microsoft.com/technet/security/guidance/serversecurity/avdind_0.mspx&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;But again, people can only be taught if they are teachable, i.e. willing to be taught, and sadly, the fact of the matter remains that most people in general do not take computer security seriously. For most of them, it is not the need of the hour. They will only take it seriously when one day they wake up and realize that they are in deep trouble. Until then, the average user could care less about computer security. Although most of them obviously do care about personal privacy, they still fail to understand their role in protecting themselves from exposure. This type of attitude will only worsen the situation. This is because of the shift in intent of the malware authors who are now employing stealth techniques and tending to hide their malicious activity. They prey on unsuspecting users by committing identity theft, compromising accounts and personal information, with the use of stealthier techniques to accomplish their task. Hence, the average user who doesn&#39;t take computer security seriously will never know about their compromised status and will never really learn to avoid it or care to avoid it. They would reason - &quot;well, everything seems to be working fine, I can still use my computer for music, movies, dating, games, e-mail, information-search, create a document, print, read the news, check the weather, buy stuff on-line, check my accounts, chat, etc. I have an anti-virus software, and it keeps me safe and good.&quot; This is purely naive thinking!! Because of the nature of malware on the Internet today, an infected user might not known about about their infected status for a long time to come. Even though everything might &quot;seem&quot; to be working fine on the outside, the malware has already carried out its malicious activity behind the scenes. The only way an infected user might know that they are actually infected is if the user had chosen to install and maintain a frequently updated anti-malware solution and if eventually their installed anti-malware software has detection and disinfection available for that particular piece of malware. But what people need to understand is that having such defenses and protection alone is not enough. They still need to use commonsense in order to avoid malware and infection.&lt;br /&gt;&lt;br /&gt;Some of the safer computer-usage habits that need to be practiced are:&lt;br /&gt;&lt;br /&gt;1. Not downloading or viewing attachments from unknown sources/senders.&lt;br /&gt;&lt;br /&gt;2. Not opening e-mails or clicking on links embedded within e-mails from unknown sources/senders.&lt;br /&gt;&lt;br /&gt;3. Using a safer browser such as the freely available &lt;a href=&quot;http://www.mozilla.com/en-US/firefox/&quot;&gt;FireFox browser&lt;/a&gt;  with &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/722&quot;&gt;NoScript plugin&lt;/a&gt; installed.&lt;br /&gt;&lt;br /&gt;4. Not logged on as an Administrator while browsing the Internet.&lt;br /&gt;&lt;br /&gt;5. Maintaining fully updated security solutions (notice the plural).&lt;br /&gt;&lt;br /&gt;6. Actually taking time to read what a certain pop-up message is about and making a intelligent (or at least a semi-intelligent) decision.&lt;br /&gt;&lt;br /&gt;7. Not installing software you do not actually need or from unknown sources.&lt;br /&gt;&lt;br /&gt;8. Keeping the system fully updated/patched by installing all released security updates by frequently checking for them.&lt;br /&gt;&lt;br /&gt;9. Frequently checking for updates to your favorite application softwares.&lt;br /&gt;&lt;br /&gt;10. Getting familiar with a process monitoring tool such as the freely available and very efficient &lt;a href=&quot;http://www.microsoft.com/technet/sysinternals/utilities/processexplorer.mspx&quot;&gt;Process Explorer&lt;/a&gt; that allows you to know the process name of each process running on your computer. It is a good practice to frequently check the process names on your computer and then use &lt;a href=&quot;http://www.google.com/&quot;&gt;Google&lt;/a&gt; to verify that each process name is either a legitimate system process or belongs to a legitimate application.&lt;br /&gt;&lt;br /&gt;11. Last but not the least, I would advocate completely avoiding browsing of porn websites because 90% of these websites host malware. Porn websites are the biggest source of malicious software and exploits. But no matter what I advocate about porn, I know most people will turn a deaf ear to me because statistics have shown that pornography in the biggest industry today (it is larger than the revenues of the top technology companies combined: Microsoft, Google, Amazon, eBay, Yahoo!, Apple, Netflix and EarthLink: stats are &lt;a href=&quot;http://internet-filter-review.toptenreviews.com/internet-pornography-statistics.html&quot;&gt;here&lt;/a&gt;) and is one that generates the most amount of traffic on the Internet today (you will find stats &lt;a href=&quot;http://healthymind.com/s-porn-stats.html&quot;&gt;here&lt;/a&gt;). So even if you are &quot;compelled&quot; and &quot;your arm twisted&quot; to browse porn, please do so with caution and avoid downloading and installing any offered software from such type of websites (especially ActiveX components or browser plugins).&lt;br /&gt;&lt;br /&gt;12. Educating yourself about the things I just mentioned above if you do not have a clue about what I am talking.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Nonetheless, having a security solution installed is highly recommended along with &quot;defense in depth&quot; strategies. It is always better to have some protection rather than nothing.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;For what it is worth, some people will argue that end-user education does not solve the problem with today&#39;s malware. Their argument is it simply doesn&#39;t work. You will find some interesting articles here: &lt;a href=&quot;http://www.useit.com/alertbox/20041025.html&quot;&gt;link-1&lt;/a&gt;, &lt;a href=&quot;http://www.avertlabs.com/research/blog/index.php/2007/10/02/user-education/&quot;&gt;link-2&lt;/a&gt;, &lt;a href=&quot;http://www.news.com/2100-7350_3-6125213.html&quot;&gt;link-3&lt;/a&gt;, &lt;a href=&quot;http://www.techknowbizzle.com/2006/06/is-user-education-answer-for-computer_07.html&quot;&gt;link-4&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;I personally think having some user education is better than no user education.&lt;br /&gt;&lt;br /&gt;An interesting analogy of user education to automobile safety education can be found &lt;a href=&quot;http://securityretentive.blogspot.com/2007/02/user-education-computer-safety-and-auto.html&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;A point and counter-point debate about user education: &lt;a href=&quot;http://www.ranum.com/security/computer_security/editorials/point-counterpoint/users.html&quot;&gt;Point&lt;/a&gt; and &lt;a href=&quot;http://www.schneier.com/blog/archives/2006/08/educating_users.html&quot;&gt;Counter-Point&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;Final thoughts&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Until people take security seriously, the anti-malware industry is only fighting a loosing battle. For those few people who do take security seriously, regardless of what the marketing hype teaches them about security products, only their self interest in protecting themselves along with basic knowledge and practice of safer computer-usage habits can actually really protect them.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot;  &gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;</description><link>http://fightmalware.blogspot.com/2007/10/average-computer-user-and-computer.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-8184304253432593067</guid><pubDate>Tue, 23 Oct 2007 01:59:00 +0000</pubDate><atom:updated>2007-10-24T21:26:16.722-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Technology</category><title>Bashing-up a BACKLOG of Malware - ASGS (Automated Signature Generation System)</title><description>&lt;div  style=&quot;text-align: justify;font-family:verdana;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Having to deal with a &quot;backlog&quot; of malware samples is nothing new for a typical AV-company.  A backlog typically comprises of malware samples that are considered &quot;not-so-important&quot; at the moment or have not made it into the priority samples set. Each AV-company typically assigns its own priority levels to incoming malware samples. It is also well known that AV-companies co-operate with each other and exchange known malware samples with each other (personally, I think this type of co-operation is of utmost importance in order to fight the battle against todays&#39; malware). Hence, it is not uncommon for an AV-company to treat a certain malware sample with higher priority while for another AV-company to treat the same malware sample with lower  priority. Hence, while certain malware samples might be detected by a certain AV-company, the same malware samples might be awaiting to be processed (as backlog) by another AV-company. Typically for any AV-company, their current customer base and the prevalence of particular malware in their region determine their backlog collection.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;Adding to the backlog&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;My recent visit to the &lt;a href=&quot;http://fightmalware.blogspot.com/2007/10/virus-bulletin-conference-2007-vienna.html&quot;&gt;Virus Bulletin conference 2007&lt;/a&gt; in Austria, helped establish relations with other AV-companies who are now partnering with us in exchanging malware samples. These are reputed AV-companies based in India, China, Finland, Austria, Spain, etc. further diversifying our malware collection.&lt;br /&gt;&lt;br /&gt;Apart from exchanging samples, there are a multitude of trusted sources and customer base from where we obtain malware samples each day. The numbers have been constantly growing within the past two years, contributing to an enormous backlog of malware samples. On a typical day, we could be receiving anywhere from 2,000 to 3,000 samples.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;The need for Automation&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;The rate at which malware are being &quot;thrown at us&quot; is much greater than we (a few malware analysts) can manually analyze and add detection for them. Hence, instead of throwing more individuals at the problem, there is a definite need for &quot;Automation&quot;, more so today.&lt;br /&gt;&lt;br /&gt;The first step in the automation process is to be able to identify samples from the bulk (waiting to be processed) as &quot;malware&quot; (as reported by other scanners), and then automate the &quot;signature&quot; generation for detection of these malware samples. This takes away a huge chunk of human interaction or manual work, speeding up the process. A huge challenge in such a procedure is generating &quot;safe&quot; signatures, i.e. signatures with the probability of &quot;close-to-zero&quot; false-positives.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;Enter ASGS (Automated Signature Generation System)&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;The ASGS took a few months for me to implement that involved quite a few iterations in improvements and testing. I implemented the system using two of my favorite scripting languages - &lt;a href=&quot;http://www.jpsoft.com/&quot;&gt;4nt&lt;/a&gt; and &lt;a href=&quot;http://aspn.activestate.com/ASPN/Downloads/ActivePerl/&quot;&gt;Perl&lt;/a&gt;. Most of the iterations were about improving efficiency and minimizing false positives by incorporating extra checks. The system is now fully functional and  sits as a Window&#39;s-XP Virtual Machine image processing the backlog once a week. As of now, the ASGS automatically generates signatures for only Window&#39;s PE files (the most prevalent of malware types on today&#39;s Internet, and the larger chunk of existing backlog), but the intent is to eventually automate signature generation for other file types as well. The system is completely automated and takes extreme care in NOT generating signatures that could cause potential false-positives. A typical scenario would be where a malware analyst simply executes a single command line program and the rest is taken care of. Once the signatures are ready, the malware analyst is notified via e-mail and a complete false-positive test is carried out before the signatures are released.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;Bashing-up the backlog&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Since my initial work developing the ASGS in Nov 2006, followed by several months of tweaking/improvements and testing, the results produced are quite impressive and satisfying. Initially it was sporadically being used to generate signatures for a few thousand samples each week, but was still not fully automated. An initial &quot;automated&quot; first version of the ASGS (by April 2007) tackled about 20,000 malware samples. By June 2007 I had the second version of ASGS tackle another 25,000 malware samples and by August 2007 the third version of ASGS was able to tackle about 27,000 more malware samples. It was exciting to be able to come in and have &quot;safe&quot; and &quot;ready&quot; signatures to be tested and released, detecting thousands of pieces of malware. By September 2007 the final version of ASGS went into production that automatically generated signatures for an astounding 35,000 malware samples. The backlog has since been declining. As of today, the backlog stands at a more manageable number as most of the malware samples left are non-PE files (such as text, scripts, html, Microsoft office documents, *NIX files, etc.).&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;Future work&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;1. Automating signature generation for non-PE files.&lt;br /&gt;2. Automating the analysis process and generate an initial report for suspicious files (or those that are not detected by any other scanners).&lt;br /&gt;3. Integrate &quot;automated analysis&quot; and &quot;automated signature generation&quot; with e-mail honeypots and high-priority alert systems to fight todays&#39; growing threats in real-time.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a style=&quot;font-family: verdana;&quot; class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt; | &lt;/span&gt;&lt;a style=&quot;font-family: verdana;&quot; class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt; | &lt;/span&gt;&lt;a style=&quot;font-family: verdana;&quot; class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;</description><link>http://fightmalware.blogspot.com/2007/10/bashing-up-backlog-of-malware-asgs.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-4740122066973875352</guid><pubDate>Wed, 17 Oct 2007 02:42:00 +0000</pubDate><atom:updated>2007-10-19T10:02:41.067-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Threats</category><title>Detecting the &quot;Storm Trojan&quot; botnet - network traffic anomalies</title><description>&lt;div  style=&quot;text-align: justify;font-family:verdana;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Since its first appearance in early January 2007, the &quot;Storm Trojan&quot; has aggregated an astounding number of infected hosts or bots (about &lt;a href=&quot;http://blogs.zdnet.com/security/?p=493&quot;&gt;1 million to 10 million computers&lt;/a&gt;). The botnet is of command-and-control (C&amp;amp;C or C2) nature over a peer-to-peer (P2P) network and implements the e-donkey or Overnet protocol to communicate data and actions to its nodes. Such a botnet is extremely difficult to track and take down owing to its de-centralized nature.&lt;br /&gt;&lt;br /&gt;According to a &lt;a href=&quot;http://blogs.technet.com/antimalware/archive/2007/09/20/storm-drain.aspx&quot;&gt;blog post&lt;/a&gt; from Microsoft&#39;s Anti-malware team, their Malicious Software Removal Tool (MSRT) - which is updated and shipped once a month on Patch Tuesday - disinfected a large number of computers (about 2.6 million Window&#39;s machines) from variants of the &quot;Storm Trojan&quot;.&lt;br /&gt;&lt;br /&gt;Latest developments in researching the &quot;Strom Trojan&quot; have revealed that certain anomalies or spikes in network traffic can be used to detect hosts (or nodes) belonging to its botnet.&lt;br /&gt;&lt;br /&gt;An interesting blog post about this is from eset. It shows the nature of spike in network traffic whenever a new node joins the &quot;Storm Trojan&#39;s&quot; de-centralized botnet. You can find the blog post &lt;a href=&quot;http://www.eset.com/threat-center/blog/?p=87&quot;&gt;here&lt;/a&gt;.&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There is also an article by SRI on the Storm Trojan. You can find the article &lt;a href=&quot;http://www.cyber-ta.org/pubs/StormWorm/SRITechnical-Report-10-01-Storm-Analysis.pdf&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;There is also a post on &quot;The Register&quot; about &quot;Storm Trojan&#39;s&quot; new encrypted traffic being used to detect its botnet. You can find that post &lt;a href=&quot;http://www.theregister.co.uk/2007/10/15/storm_trojan_balkanization/&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Bleeding Edge research posted more info about this as well. &lt;a href=&quot;http://www.bleedingthreats.net/index.php/2007/10/15/encrypted-storm-traffic/&quot;&gt;Encrypted storm traffic&lt;/a&gt; and &lt;a href=&quot;http://www.bleedingthreats.net/index.php/2007/10/15/storm-side-cc-channel/&quot;&gt;Storm side CC channel&lt;/a&gt;. They also maintain a list of &lt;a href=&quot;http://doc.bleedingthreats.net/bin/view/Main/CompromisedHosts&quot;&gt;compromised host IPs&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;According to a &lt;a href=&quot;http://blogs.zdnet.com/security/?p=592&quot;&gt;blog post by Ryan Naraine&lt;/a&gt;, the creators of the &quot;Strom Trojan&quot; are now partitioning their botnet in order to make it available for sale to spammers and denial of service attackers. This discovery was done by Secure Work&#39;s researcher Joe Stewart who has been &lt;a href=&quot;http://www.secureworks.com/research/threats/storm-worm/?threat=storm-worm&quot;&gt;tracking the Storm botnet&lt;/a&gt; for a while.&lt;br /&gt;&lt;br /&gt;A very interesting blog post by Websense, detailing the chronological appearance of the &quot;Storm Trojan&quot; can be found &lt;a href=&quot;http://www.websense.com/securitylabs/blog/blog.php?BlogID=147&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Frank Boldewin recently posted a nice writeup on the internal workings of the &quot;Storm Trojan&quot; based on the variant Peacomm.C. You can find that &lt;a href=&quot;http://www.reconstructer.org/main.html&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;font-size:100%;&quot; &gt;Note:&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; &quot;&lt;a href=&quot;http://en.wikipedia.org/wiki/Storm_Worm&quot;&gt;Storm Trojan&lt;/a&gt;&quot; (a.k.a. Nuwar, Tibs, Peacomm, Zhelatin, Fathom, Storm Worm, Dorf, Trojan.Peed, Trojan-Downloader.Win32.Small.dam, CME-711, etc.)&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;</description><link>http://fightmalware.blogspot.com/2007/10/detecting-storm-trojan-botnet-network.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-863457971218598998</guid><pubDate>Thu, 27 Sep 2007 03:00:00 +0000</pubDate><atom:updated>2007-10-14T16:56:41.823-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Conferences</category><title>Virus Bulletin Conference 2007, Vienna</title><description>&lt;div  style=&quot;text-align: justify;font-family:verdana;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;I had the privilege of attending the &lt;a href=&quot;http://www.virusbtn.com/conference/vb2007/index.xml&quot;&gt;Virus Bulletin 2007&lt;/a&gt; conference in Vienna, Austria and witnessing it first hand. Although this was my second attendance to a security conference (the first one being the &lt;a href=&quot;http://www.aavar.org/avar2006/index.html&quot;&gt;AVAR conference&lt;/a&gt; in Auckland, New Zealand in Dec 2006 where I presented a paper abo&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;ut &lt;a href=&quot;http://ericuday.googlepages.com/knowledgebase&quot;&gt;Rootkits on Windows&lt;/a&gt;), this was my first time attending the Virus Bulletin conference. It has truly been a pleasurable experience. Apart from enjoying the beautiful music, art, monuments and palaces of Vienna, the conference itself was very informative and interesting. The best part was to be able to meet some of the best minds in the AV-industry, as &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;well as to connect with some of the well know and well respected figures in the AV-community.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;AVPD and Wild List&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;I also had the opportunity to attend the AVPD (Anti Virus Product Development Consortium) &amp;amp; &lt;a href=&quot;http://www.wildlist.org/&quot;&gt;Wild List&lt;/a&gt; meetings that were held prior to the actual VB conference. Both of these organizations are supported and sponsored by &lt;a href=&quot;http://www.icsalabs.com/icsa/icsahome.php&quot;&gt;ICSA labs&lt;/a&gt; that are known for their certification testing of AV-products (among other security products). Andrew Hayter, who led the AVPD meeting, introduced the current methodology used for testing and proposed some future improvements. The Wild List meeting led by Peter Chung had interesting ideas floating around in order to improve the quality of current Wild List.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Good ole Wild List&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;ICSA labs publishes its AV-product testing results in buyer’s guides for security products. Such results clearly influence buyers’ decisions toward AV-products. Another such influential AV-product testing results is published by &lt;a href=&quot;http://www.av-test.org/&quot;&gt;AV-Test.org&lt;/a&gt; which is maintained by Andreas Marx and his team. It is worth mentioning here about Andreas Marx conference presentation on “&lt;a href=&quot;http://www.virusbtn.com/conference/vb2007/abstracts/MarxHabicht.xml&quot;&gt;death of the Wild List&lt;/a&gt;&quot; where he emphasized upon known limitations and shortcomings of the current Wild List that render it irrelevant and misleading for AV-product testing. In other words Andreas states that the Wild List collection is non-dep&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;endable &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;and trivial. Even though Andreas is quite right in stating so, my personal opinion is that the Wild List has potential. It is supposed to be a diverse collection of self-replicating pieces of malware that are actually prevail&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;ing “in the wild”. The quality of the Wild L&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;ist is only as good as the quality, quantity and consistency of its reporters (malware researchers from reputable AV-companies – the chosen ones). This heavily requires more “active” reporters to respond and submit samples that are found in the wild, more frequently.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;An interesting presentation…&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;An interesting, well versed and technically rich &lt;a href=&quot;http://www.virusbtn.com/conference/vb2007/abstracts/Bontchev.xml&quot;&gt;presentation&lt;/a&gt; was by Dr. Vesselin Bontchev from FRISK Software. His presentation introduced various points of susceptibility in modern mobile platforms that would allow virus (or self-replicating code) to thrive. He also gave some predictions a&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;bout the future of viruses on such platforms.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Building relations…&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;I also had the privilege of connecting with a diverse group of people: from prominent researchers, tech junkies, and marketing personal to people from the acad&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;emia. I was also able to build relations with representatives from globally know AV-companies as well as with those from localized AV-companies. Some of these localized AV-companies are actually very well known and thriving in their local geographical regions.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;br /&gt;A sense of community in the AV-industry&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Any AV-company, while always striving to improve its technology, also tries to diversify its malware collection and rely on reputable sources to contribute to an ever-growing set of samples. Attending conferences such as these and building relations helps&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; any AV-company to establish a base line of trust allowing the exchange and influx of newer malware samples from other AV-vendors. This also helps them to see the bigger picture in terms of newer evolving threats. This in turn, also h&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;elps the AV-community as a whole, to work and fight as a team against today’s commercialized malware crime.&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;&lt;br /&gt;&lt;br /&gt;The Feds need our help…&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Finally the conference was commenced with a &lt;a href=&quot;http://www.virusbtn.com/conference/vb2007/abstracts/Panel.xml&quot;&gt;panel of international law enforcement representatives&lt;/a&gt; chaired by David Thomas (FBI special agent, Cyber Crime division). The discussions &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;provided insight into workings of the world police &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;in fighting Internet crime. The panel described that they really take cyber crime very seriously and that the Internet is actually “killing people”. They also admit that they cannot fight this battle all by themselves and require help from the AV-community. Their plea was for partnership and co-operation from the AV-community in providing information about organized computer crime that we might come across on a day-to-day basis. They also acknowledged that as a business, we still have to provide s&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;ervices to our customers and appreciate any time we spend in helping out law enforcement officials. The representatives in the panel admitted that they are limited in their resources and man-power to fight this &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;battle, and that sometimes, reported incidents might seem like un-noticed by them, but those m&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;ight later be re-surfaced to build up a case against the bad-guys. Hence no information is useless information. My personal opinion: as a community we should be able to, as time and res&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;ources permit, provide useful information to law enforcement agencies to help curb this scum of internet crime.&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-size:100%;&quot; &gt;&lt;br /&gt;&lt;br /&gt;The fun part…&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Conferences such as these are specifically geared toward the AV-community (also popularly known as “white hats”), in an attempt to exchange information &amp;amp; technol&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;ogy, educate each other of the types of threats being dealt with, and prepare for emerging threats. The conference was a perfect combination of technology, passion, and fun. The gala dinner on the second day of the conference was profoundly entertaining, presented with good food, and Viennese waltz performance.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;They also arranged for a complete casino set for those post dinner partiers. Free chips were given away for those who wanted to try their luck, and needless to say I happened to try my hand as well.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:100%;&quot;  &gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAyDdtY4MjUJndy0VOkoxqIwcLEgC3u7-okAe5xgoIZnOBiQ_8J1ijqa8o7yEQ6vQXMAG1PRrRnRW3arJoIMVWU6uD0YIvzzgl1YczyfoOVbjAR_3YLj9Rhyphenhyphen15wrBDMc2pcFprgAwDI70/s1600-h/101_1606_1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAyDdtY4MjUJndy0VOkoxqIwcLEgC3u7-okAe5xgoIZnOBiQ_8J1ijqa8o7yEQ6vQXMAG1PRrRnRW3arJoIMVWU6uD0YIvzzgl1YczyfoOVbjAR_3YLj9Rhyphenhyphen15wrBDMc2pcFprgAwDI70/s320/101_1606_1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5119975898071163522&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;div  style=&quot;text-align: justify;font-family:verdana;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Surprisingly, I won a whole stack of chips (not too bad for a first timer) until in the end I put it “all in” and lost it all!! (a mixture of over confidence and greed I suppose). Oh well! “easy come, easy go”. If only I had followed my wife’s advice and stopped at that moment I might have won her an ipod (which was the first prize to be given away to the person who won the most number of chips). All in all, the conference was a great experience in every respect.&lt;br /&gt;&lt;br /&gt;Me and my wife, Amy, at the gala dinner.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf8IrUoP3XdHoxkOPeo-kzQ8ZhAb2cV9chKDgNamicsvE2HPEpw8TnJltbh75RB7Td8LFf1CQCSgYLxOmWmXGJ0-g3nyUflGQ6ttKOm83Xhtl0Ltr9yVeoZnXswxHvb5rpaklS9rpq3Ek/s1600-h/Amy_n_Me.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf8IrUoP3XdHoxkOPeo-kzQ8ZhAb2cV9chKDgNamicsvE2HPEpw8TnJltbh75RB7Td8LFf1CQCSgYLxOmWmXGJ0-g3nyUflGQ6ttKOm83Xhtl0Ltr9yVeoZnXswxHvb5rpaklS9rpq3Ek/s320/Amy_n_Me.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5121063847646978754&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;</description><link>http://fightmalware.blogspot.com/2007/10/virus-bulletin-conference-2007-vienna.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAyDdtY4MjUJndy0VOkoxqIwcLEgC3u7-okAe5xgoIZnOBiQ_8J1ijqa8o7yEQ6vQXMAG1PRrRnRW3arJoIMVWU6uD0YIvzzgl1YczyfoOVbjAR_3YLj9Rhyphenhyphen15wrBDMc2pcFprgAwDI70/s72-c/101_1606_1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-4166987952198324980</guid><pubDate>Fri, 13 Apr 2007 02:00:00 +0000</pubDate><atom:updated>2007-10-14T16:55:51.108-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Threats</category><title>The Eye of the Storm</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The recent massive spam ru&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;n by the makers of&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; the infamous&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; &lt;em&gt;“St&lt;/em&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;em&gt;orm Troj&lt;/em&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;em&gt;an”&lt;/em&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;em&gt;&lt;/em&gt; resu&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;lted in&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; numerous variants hitting our honey pots. Dynamic re-packing and server-side&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheN3Yzk7XmiFTBreJaP_CqIjPMul4ex_dtz6zSG5wY7Lyrf2HeabacZprE54sCQnG0B-R3VfeEsH44TYYQH1OgyZNJr2n2ze8n6Wv8hgCxHCB5nRccHgk1aXrFsgcbcEsx57EhzLH9a14/s1600-h/ANW2E2(1).jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheN3Yzk7XmiFTBreJaP_CqIjPMul4ex_dtz6zSG5wY7Lyrf2HeabacZprE54sCQnG0B-R3VfeEsH44TYYQH1OgyZNJr2n2ze8n6Wv8hgCxHCB5nRccHgk1aXrFsgcbcEsx57EhzLH9a14/s200/ANW2E2(1).jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5121072437581570802&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; p&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;olymorphism allows the creators of the &quot;Storm Trojan&quot; to create new binaries eve&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;ry few &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;minutes. The variants are then spammed out using the &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;strong de-centralized botnet they have&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; created in an attempt to thwart signature based detections. The &quot;Storm&quot; botnet is severa&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;l &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;million computers strong, m&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;ost of which are un-suspecting users who have become victim to the trojan&#39;s social engineering tactics.&lt;br /&gt;                        &lt;/span&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;( Source of the picture: &lt;a href=&quot;http://www.sro.hse.gov.uk/article_images/ANW2E2%281%29.jpg&quot;&gt;sro.hse.gov.uk&lt;/a&gt; )&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot; class=&quot;entry&quot;&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;em&gt;&lt;strong&gt;Newer attack vector…&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The most recent variants are being spammed as encrypted zip file attachments via spoofed e-mails. The password for the encrypted zip is included as a GIF image within the e-mail. The GIF image also includes a message posing as a security patch being offered by some arbitrary Customer Support Center. This new variant employs numerous anti-debugging techniques in order to thwart analysis. It is also packed with a polymorphic packer.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;em&gt;&lt;strong&gt;The Intent…&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The Trojan displays tactical use of social engineering techniques arriving as an attachment to an e-mail. The goal is to lure an un-suspecting user to execute the Trojan which would render the victim machine part of a huge botnet. The primary purpose of the botnet being to send out penny stock spam (also called pump-and-dump penny stock) or to initiate Distributed Denial of Service (DDoS) attacks. Subsequent versions of the Trojan were distributed by means of embedding it within an open source e-mail worm.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;em&gt;&lt;strong&gt;Shying away from IRC!!&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The botnet that is being created communicates over a peer-to-peer network (P2P) for its Command and Control (C&amp;amp;C) rather than the traditional IRC communication. This ensures creation of a “headless” botnet that is not bogged down by a single point of failure. The Storm Trojan’s implementation of Web HTTP and P2P methods of communication are indicative of the shift toward stealthier means of building a botnet. Such a de-centralized network allows for data and information to be &quot;sync-ed&quot; among each of the nodes of the botnet and to any of the newer nodes that are being added to the botnet. Each of the infected nodes will also carry a &quot;peers list&quot;.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;em&gt;&lt;strong&gt;What drives the Storm?&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;When the Trojan is executed, it drops a kernel mode driver (&lt;em&gt;wincom32.sys&lt;/em&gt;) that it registers as a service via the Service Control Manager (SCM). Initial versions of this driver did not attempt to hide any files or registry entries but did include stealth in order to execute its payload. Subsequent versions of this driver program started to incorporate more and more rootkit like functionalities in order to hide registry entries, files, and active communication ports.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;This driver program is instrumental in executing the Trojan’s payload. The payload is an embedded executable within the driver program. In order to execute the payload the driver employs stealth techniques. The payload is injected from kernel space into the user space of “services.exe” and scheduled for execution by queuing an Asynchronous Procedure Call (APC) for it. Due to this, there is no “visible” process executing the payload if we were to use tools such as Window’s Task Manager or Process Explorer. Initial versions showed significant network activity via newly opened ports (UDP traffic). Subsequent versions of the driver program incorporated rootkit techniques in order to hide files and registry keys (by hooking the Service Descriptor Table) as well as any active communication ports (by hooking IRP_MJ_DEVICE_CONTROL of the ‘\Device\Tcp’ object). &lt;/span&gt;&lt;/p&gt;     &lt;/div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;</description><link>http://fightmalware.blogspot.com/2007/04/eye-of-storm.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheN3Yzk7XmiFTBreJaP_CqIjPMul4ex_dtz6zSG5wY7Lyrf2HeabacZprE54sCQnG0B-R3VfeEsH44TYYQH1OgyZNJr2n2ze8n6Wv8hgCxHCB5nRccHgk1aXrFsgcbcEsx57EhzLH9a14/s72-c/ANW2E2(1).jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-4060682950510671213</guid><pubDate>Wed, 04 Apr 2007 00:00:00 +0000</pubDate><atom:updated>2007-10-14T16:54:22.091-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Threats</category><title>ANI Exploits, NX-bit, DEP, Protected Mode… jargon</title><description>&lt;div style=&quot;text-align: justify;&quot; class=&quot;entry&quot;&gt;      &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Since its discovery in the wild, there are now hundreds of specially crafted websites that host malicious ANI files that exploit the “&lt;a href=&quot;http://fightmalware.blogspot.com/2007/03/new-zero-day-vulnerability-in-windows.html&quot;&gt;Windows Animated Cursor Handling&lt;/a&gt;” vulnerability. This vulnerability is exploitable on fully patched Windows XP SP2 and Vista running Microsoft’s Internet Explorer 7 or Mozilla FireFox 2. Simply visiting such a rigged website will render a victim machine infected. The malicious ANI files can also be embedded within specially crafted e-mails or attachments within e-mails. When such an attachment is viewed or opened with Outlook or Outlook Express the victim machine will be infected by a host of malware. Also, if a malicious ANI file is viewed using Explorer (file extension matters in this case), the exploit will be triggered.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Speaking of browsers, the damage is mitigated if Internet Explorer 7 is running in Protected Mode. This will still permit the malware to have read-only access to a user’s files, allowing it to steal and copy personal data, but will not be able to alter or delete any data. UAC (User Account Control) in Vista might only be able to prevent installation of persistent malware, but won’t prevent damage to user’s data unless the browser is running in Protected Mode. FireFox does not have Protected Mode under Vista, and if exploited using the ANI file vulnerability, will allow malicious code to execute with similar privileges as the logged on user allowing complete disk read and write. Do not get confused with “&lt;a href=&quot;http://support-stage.mozilla.org/kb/Safe+Mode&quot;&gt;Safe Mode&lt;/a&gt;” in FireFox which is purely for debugging purposes.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The ANI exploit is preventable by enabling DEP (&lt;a href=&quot;http://en.wikipedia.org/wiki/Data_Execution_Prevention&quot;&gt;Data Execution Prevention&lt;/a&gt;) in Windows XP SP2 or Vista. When enforced with &lt;a href=&quot;http://en.wikipedia.org/wiki/NX_bit&quot;&gt;hardware NX/XD support&lt;/a&gt;, DEP will prevent the exploit from being triggered. Beginning with Windows XP Service pack 2 and Windows Server 2003 Service Pack 1, the NX features were implemented for the first time on x86 architectures. The NX bit (as termed by AMD which stands for No eXecute) or XD bit (as termed by Intel which stands for eXecute Disable), is a technology used in CPUs to separate areas of memory for storage of processor instructions (i.e. code) and for storage of data. The section of memory designated with the NX attribute indicates it to be used for storing data. Hence, even if processor instructions reside in such a section of memory, they cannot be executed. This prevents malicious programs from executing their own code which they might have inserted into another program’s data storage area. This is precisely what the ANI exploit does, and DEP (OS feature) combined with NX/XD (CPU feature) can prevent this from happening.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;But Microsoft ships most of its Window’s operating systems with DEP turned off by default. It is on the user to turn DEP “on” for all applications. This might render a few applications not functioning properly, but I believe this is a price well worth the bargain. This should also teach application developers to adhere to safe programming practices.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Microsoft will be releasing an out-of-cycle patch for this vulnerability today.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;     &lt;/div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;</description><link>http://fightmalware.blogspot.com/2007/04/ani-exploits-nx-bit-dep-protected-mode.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-3227354631682213977</guid><pubDate>Sat, 31 Mar 2007 01:15:00 +0000</pubDate><atom:updated>2007-10-14T16:53:26.857-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Threats</category><title>New “Zero Day” Vulnerability in Windows Animated Cursor Handling</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;A new zero day vulnerability has been discovered in the way Microsoft Windows handles animated cursor files (.ANI files). The &lt;a href=&quot;http://en.wikipedia.org/wiki/ANI_%28file_format%29&quot;&gt;ANI file format&lt;/a&gt; is based on Microsoft&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/RIFF_%28File_format%29&quot;&gt;RIFF file format&lt;/a&gt;. There have been reports of specially crafted ANI files being hosted on websites that exploit this vulnerability. When an unsuspecting user visits such a &quot;rigged&quot; website, using any of the popular browser applications such as IE7 or Mozilla Firefox, the vulnerable Window&#39;s code will be invoked in order to parse/render the specially crafted ANI file which in turn will invoke the exploit code. Resulting this, malware will be silently downloaded and launched on the victim machine (drive-by downloads). Remote code will be executed with the privileges of the logged on user.&lt;br /&gt;&lt;br /&gt;The malicious ANI files can also be embedded within specially crafted e-mails or attachments within e-mails. The exploit works independent of file extensions making it useless to simply block .ANI files on e-mail gateways. Simply configuring Outlook or Outlook Express to read mail in plain text will still parse the ANI file and hit the exploit. Simply &quot;viewing&quot; such a malicious ANI file using Window&#39;s Explorer will allow the exploit code to be triggered.&lt;br /&gt;&lt;br /&gt;Microsoft has released a security advisory regarding this: &lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/935423.mspx&quot;&gt;http://www.microsoft.com/technet/security/advisory/935423.mspx&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;A &lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0038&quot;&gt;CVE-2007-0038&lt;/a&gt; has been assigned to this vulnerability.&lt;br /&gt;&lt;br /&gt;It seems like the vulnerability is already exploited in the wild:&lt;br /&gt;&lt;a href=&quot;http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/&quot;&gt;http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;</description><link>http://fightmalware.blogspot.com/2007/03/new-zero-day-vulnerability-in-windows.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-7564389735046727659</guid><pubDate>Fri, 15 Dec 2006 03:30:00 +0000</pubDate><atom:updated>2007-10-14T16:52:02.571-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Conferences</category><title>Back from New Zealand (AVAR2006 Conference)</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;I am back from the AVAR2006 conference in Auckland, New Zealand.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; This was my first security conference while pursuing my first professional job as an Anti-Virus Research Engineer. I am delighted to have been able to attend the conference. It was also a great experience to be able to present at the conference as well. I surely had a wonderful time.&lt;br /&gt;&lt;br /&gt;You can access my &quot;Rootkits on Windows&quot; presentation and paper from my website: &lt;a href=&quot;http://ericuday.googlepages.com/knowledgebase&quot;&gt;Anti-Malware Research&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The best part of the conference was being able to meet and connect with some the well renowned researchers in the AV-industry, many of whom I hi&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;ghly revere and respect. Prominent among them are Peter Ferrie, Peter Szor, Dr. Vesselin Bontchev, Dr. Igor Muttik, Joe Telafici, Andrew Lee, Randy Abrams, and Tony Lee, to name a few.&lt;br /&gt;&lt;br /&gt;Here is a picture of me just before delivering my presentaion :)&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6we01yyfI92oZQ3BYdVtPxZz7HqQMLcNYC9hivZKVXlBJDIuraqcRUXN4NyZsx2xjGNpllcAy92XygB1kvue_5775GtTOO0Otw-15aJU5cZcP7wDRGHXVQo7ewpGVHQcp-o_oaVGuJNg/s1600-h/AVAR2006.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6we01yyfI92oZQ3BYdVtPxZz7HqQMLcNYC9hivZKVXlBJDIuraqcRUXN4NyZsx2xjGNpllcAy92XygB1kvue_5775GtTOO0Otw-15aJU5cZcP7wDRGHXVQo7ewpGVHQcp-o_oaVGuJNg/s320/AVAR2006.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5120306236890800802&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;You can find some more of the pictures taken at the conference on the &lt;a href=&quot;http://www.aavar.org/2006photo/framepage3.htm&quot;&gt;AVAR2006 website&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;I was fortunate to be able to bring my wife with me on the trip as well. After the conference, we spent a few days vacationing in the North Island of New Zealand. A truely amazing and beautiful place I must say. We both had a great time. The people are very nice and laid back. There is so much fun and adventure stuff to do with such beauty surrounding, it w&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;as absolutely amazing!&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxxXGx1xR2E4ImPxxqtsCkM39ajYjzsYjAbglpeQozvN3TK2tagZJcYyTVwbl44Rfd-8gBbYxowAXtuzRUDHKzu3P8KlgY5fezotNcvGL-iFeFw1x6VC75y5t6itUW7W7LS_1f1PMeeno/s1600-h/Zorb.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxxXGx1xR2E4ImPxxqtsCkM39ajYjzsYjAbglpeQozvN3TK2tagZJcYyTVwbl44Rfd-8gBbYxowAXtuzRUDHKzu3P8KlgY5fezotNcvGL-iFeFw1x6VC75y5t6itUW7W7LS_1f1PMeeno/s320/Zorb.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5120309595555226290&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;My kind of adventure: &quot;Free Flying&quot;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;We highly recommend visiting New Zealand for all those who love to travel. As for us, we will have to go back and visit the South Island next time, which the New Zea-landers say is much more awesome...&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;</description><link>http://fightmalware.blogspot.com/2007/10/back-from-new-zealand-avar2006.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6we01yyfI92oZQ3BYdVtPxZz7HqQMLcNYC9hivZKVXlBJDIuraqcRUXN4NyZsx2xjGNpllcAy92XygB1kvue_5775GtTOO0Otw-15aJU5cZcP7wDRGHXVQo7ewpGVHQcp-o_oaVGuJNg/s72-c/AVAR2006.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-2196602406999198811</guid><pubDate>Thu, 30 Nov 2006 03:42:00 +0000</pubDate><atom:updated>2007-10-14T16:50:23.554-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Conferences</category><title>Presenting at AVAR2006, Auckland, New Zealand</title><description>Exciting news to share!!&lt;br /&gt;I am preparing for my visit to Auckland, New Zealand for the &lt;a href=&quot;http://www.aavar.org/avar2006/index.html&quot;&gt;AVAR2006 conference&lt;/a&gt; (Association for Anti-Virus Asia Research) to be held from 3rd Dec through 5th Dec. I will be doing a presentation about “&lt;a href=&quot;http://www.aavar.org/avar2006/Program/erickumar.html&quot;&gt;Rootkits on Windows&lt;/a&gt;”. This is about the &quot;rootkit-like&quot; techniques used by today&#39;s Window&#39;s based malware to “subvert” the kernel and about the co-evolution of anti-rootkit techniques. The presentation will extensively cover the well-known tricks to the latest developments in the rootkit area. Apart from the long flight journey (24 hrs), I am looking forward to visit the beautiful land of New Zealand :)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;</description><link>http://fightmalware.blogspot.com/2006/11/presenting-at-avar2006-auckland-new.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5452717410626050541.post-6890702487008999152</guid><pubDate>Fri, 13 Oct 2006 03:00:00 +0000</pubDate><atom:updated>2007-10-14T16:43:58.740-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Threats</category><title>Rootkit techniques in today’s Windows based Malware</title><description>&lt;div style=&quot;text-align: justify;&quot; class=&quot;entry&quot;&gt;      &lt;p&gt;Recent Malware trends on Windows NT based platforms are adopting more and more Rootkit like techniques, i.e. employing cloaking and stealth. Such techniques are either embedded within the malware itself or simply assist the malware while existing as a third-party application. Two such proliferating malware that embed &quot;rootkit-like&quot; functionalities within them are W32/Haxdoor and W32/Goldun. The wide range of today&#39;s Window&#39;s based malware such as Trojans, Mass-mailers, Backdoors, Spyware &amp;amp; Adware Programs, use stand-alone/third-party rootkit programs in order to cloak files/folders, processes, registry entries, memory modules, handles, TCP/UDP communication ports, logins, log files, and any other resource used of the Operating System to conceal their malicious activity.&lt;/p&gt;&lt;p&gt;There are two types of rootkits: the ones that operate at Window&#39;s kernel level and the ones that stay at the user level. Kernel-mode rootkits are more powerful and much harder to detect, disinfect or de-activate. But these are more complicated to implement and require administrator privileges to be installed on a machine. A kernel-mode rootkit is usually a kernel mode device driver program which is loaded by the malware. User-mode rootkits are less powerful but still very efficient and much easier to implement and deploy. The most popular among the publicly available rootkits are the FU-rootkit (Kernel-mode rootkit) and Hacker Defender (User-mode rootkit).&lt;/p&gt; &lt;p&gt;The wide usage of rootkits in today’s malware is attributed to their ease of availability via the web. They are downloadable as ready to use rootkits or as source code for those who want to compile custom rootkits. Ther are online resources for both rootkit developers and security professionals who could use this information to educate themselves and learn the ways of the attacker in order to develop anti-rootkit techniques. Most advances in Windows based rootkits are posted on the internet in the form of discussion groups, news reads, blog posts etc.&lt;/p&gt; &lt;p&gt;Another reason to which the use of rootkits can be attributed is “a shift in intent of writing malware”. Viruses and worms are no longer written to prove skill or to draw attention but rather as a means to bank the green bucks! This shift in intention or rather the commercialization of malicious intentions has greatly increased the creation and proliferation of “crime-ware” (or snoop-ware such as spyware, keyloggers, backdoors, Trojans, etc.). These applications demand the use of stealth in order to &quot;own the box&quot; for as long as possible without being detected and without being able to be traced back to.&lt;/p&gt; &lt;p&gt;In order to combat today’s rootkits we require more of a pro-active approach rather than the traditional reactive approach. Merely adding signatures to definition files (i.e. if we are lucky enough to get our hands on the rootkit in the first place), is only “pushing the problem under the rug”. More wide-spread use of rootkits among malware is predicted in the near future and so will co-evolve the sophistication of rootkit detection tools and methods. &lt;/p&gt;   &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Digg This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;http://slashdot.org/submit.pl&quot; target=&quot;_blank&quot;&gt;Slashdot This&lt;/a&gt; | &lt;a class=&quot;comment-link&quot; href=&quot;javascript:void window.open(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(window.location.href)+&#39;&amp;ei=UTF-8&#39;,&#39;popup&#39;,&#39;width=520px,height=420px,status=0,location=0,resizable=1,scrollbars=1,left=100,top=50&#39;,0)&quot;&gt;Add to del.icio.us&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;  &lt;/div&gt;</description><link>http://fightmalware.blogspot.com/2006/10/use-of-rootkit-techniques-in-todays.html</link><author>noreply@blogger.com (Eric Uday Kumar)</author><thr:total>0</thr:total></item></channel></rss>