Tag Archives: hacker

USB generated infections on the rise.


IT security company Panda has announced that 25% of the new worms in 2010 were designed to be spread via USB device.

What does this mean?

A growing number of computer infections are taking place via USB devices such as thumb drives, external hard drives, mobile phones, portable music players, etc.  These infections take place silently when the device is plugged into the computer via the autorun process in Windows.  While computer worms are still mainly spread via email, this report indicates that a newer method for spreading malware is gaining significant momentum and once again gives us cause to remain vigilant when it comes to computer security.  Of course, before you can get infected by a USB device, that device first has to be infected somewhere else which means this is something that is much less likely to come from your phone or mp3 player (unless you loan it to someone) than it is from an external hard drive or thumb drive.

What should I do?

First, never trust a foreign device.  If you don’t know the origins of the device, consider it hostile.   USB thumb drives are extremely cheap these days.  So cheap that many are given away as schwag at trade shows and expos.  How easy would it be for a bad guy to accumulate a bunch of these, infect them, then ‘lose them’ outside of targeted businesses or homes?  When an unassuming employee comes along, they pick it up, plug it in, and suddenly there’s a corporate infection for the IT department to deal with.    If this is an as of yet unidentified piece of malware, a considerable amount of damage could be done by the time it is found out.  If you find a USB drive, throw it away or hand it in to your IT department.  If you absolutely must know what is on it, boot up from an Ubuntu Live CD and check it out.  That will keep you from getting the infection.  If you are in an environment that requires you to swap flash drives with people, downloading the free USB Vaccine from Panda is a good move.  This will disable the autorun feature for USB devices in Windows.  Just be warned, it will stop the autorn feature from working with external CD drives as well.  But, if you are in an environment that uses flash drives, it’s worth the inconvenience.   Of course, following these steps is essential as well. Above all, be vigilant.  If for instance, you loan the compact flash card from your camera to someone, it could come back with malware on it.  When you plug your camera back into your computer, you’ve got it.   Treat every USB device like it’s a flash drive.  Treat every flash drive that’s been out of your possession as suspect.

Return of Zeus. A New Wave of Malware that will Empty Your Bank Account.


Courtesy of Flickr

In a report by security company M86 Security, organized crime is using a new trojan variant called Zeus v3 to infect unsuspecting web surfer’s machines, then steal their online banking credentials.  Once the credentials are obtained, they are then used to drain your account.  This is a very sophisticated and organized attack.  It’s not something that the kid down the street who hasn’t come out of his basement in three years is capable of pulling off.  M86 has posted an in depth whitepaper on the matter which can be found here.   The report is both fascinating and disturbing.

For those who don’t wish to commit the time to understand all of the fine details about how the attack works, I’ll lay out the short version here.  First, the bad guys infect legitimate ad servers.  These are machines that serve the advertisements to websites you regularly visit.  From there, the infected servers start pushing out the trojan to computers visiting LEGITIMATE websites.  The trojan is delivered via advertisements through the infected ad servers.  That’s really the beauty of delivery.  They deliver the payload to infect your computer through regular websites because the advertising on them comes from somewhere else.  The ad servers are infected the same way your home computer gets infected.  Somewhere along the line, a vulnerability wasn’t addressed.  This can happen for a number of reasons.  The operating system wasn’t patched, a firewall rule wasn’t enforced, etc.  Once the trojan is delivered to the home users computer, it simply waits until the unsuspecting user logs into their bank account via a web browser.  That’s when it sends the credentials to a command and control (C&C) server.  Later, after it analyzes the information (bank name, country, etc) the C&C server communicates back to the victim’s computer and has it initiate a bank transfer.  It will drain the victim’s account, siphoning it off and covering tracks along the way.  Then, to put the cherry on top, when the victim logs back into their bank, the traffic is diverted to the C&C server where a fake statement is generated, thereby fooling the user into thinking they have money in their account.

This is a brilliant and complicated scheme.  The money trail is like following a single noodle through a bowl of spaghetti.  Thus far, attacks have primarily been on UK bank accounts, but don’t let that make those of you outside of the UK feel good.  This could very easily be perpetrated elsewhere.  To compound the matter, this particular attack seems to be very good at getting past the major virus scanners.

That’s the bad news.  The good news is, we can make it very hard to fall victim to this type of attack.  If you don’t bank online of course, you are immune.  If the benefits of online banking outweigh the risks, you can still protect yourself.  First, you should be following ALL of my advice in my recent post Lock Down!.  This alone will dramatically reduce your chances of infection by the trojan.  Another option is to switch to a Mac or use Linux.  While not immune, these operating systems are much more difficult to infect because of their Unix heritage and because they just aren’t as popular as Windows.  Windows is the low hanging fruit for virus writers.  Linux has become very easy to use and most versions of it are free.  I have my computer setup to give me a choice of booting to Linux or Windows.  That’s pretty easy to do.  Third, you could use a boot CD as I described in my post A Temporary Solution for your online banking activities.  While not as convenient, you won’t be at risk of infection.  This is the safest option next to just not banking online at all.

Lock Down! Security Basics for the Home PC User


Salvatore Vuono / FreeDigitalPhotos.net

If you’ve been keeping up to date with my posts, you’ve been noticing that I like to talk about keeping your data secure.  This post is a continuation of that.  Here, I’ll be outlining eight simple steps to keeping your data secure.  This is by no means a comprehensive list, nor does it venture into keeping your data safe online, which is an entirely different topic that  is expansive enough to warrant it’s own future post.  Instead, I am offering up a foundation on which to start.  So, let’s go.

  1. Don’t use an administrator account for your day to day operations.  I think every computer that has ever been brought to me has been setup this way.  It’s really kind of the fault of the operating system vendors.  Typically, the first account you setup is an administrator.  People normally setup the first account and start using it.  This is a problem because the administrator has the rights to do anything on the machine.  So, if you have a piece of malware that wants to install itself on your  computer and you are an administrator, there is nothing blocking it from installing.  If you are running an account that is not an administrator, you’ll have to supply the administrator’s password to install software or make global systems changes.  While this is less convenient, it makes it harder for ugly software to install itself onto your system without your knowledge.  It is also harder to inadvertently make unwanted changes to your computer.   So, what do I do?  If you are already running on an account with administrator privileges, you simply create a new account with administrative privileges, then modify your account to become a standard user.  Once done, installing software will require the administrator account password.  To install software under Windows XP when using a non-administrator account under Windows, simply right click on the application and select ‘Run as’.  A window will then popup allowing you to select your administrator account.  There are some cases where you will need to actually switch to your administrator account and log in to perform a task, but those are pretty rare and are mostly needed when you are setting up your computer.
  2. Use passwords.  Without a password, anyone can sit down at your computer and do whatever they would like.  When creating a password, make it a good one.  Don’t use ‘bob’.  Use something more secure like ‘BobL1nk40″.  Notice the use of a ‘1’ instead of an ‘i’.  This type of password is very difficult to crack.  The combination of capital, lowercase, symbols, and numbers should be standard procedure for you as well as keeping your passwords at least 8 characters long.  If you experiment a little bit, you can come up with combinations that are pretty easy to type.  As with using a non-administrator account, this will make your life less convenient, but how inconvenient is it to do something like having to fix your credit report after having your identity stolen?  These steps can play a part in preventing something like that from happening.  Once running as a non-administrator and using secure passwords become a habit, the really do not do much to impede your life.  This step should also carry over into your online life.  Use solid passwords for everything you do online.
  3. Make sure you have an antivirus / antimalware (spyware, adware, etc) package and make sure it is up to date.   While this is fairly self explanatory, it needs to be a high priority.   For more information, a read of my earlier post, A Temporary Solution can provide some additional information.  In addition to having real time protection, make sure that you setup a scheduled scan at least once per week to catch anything that may have slipped through.
  4. Use a firewall.  Firewalls are basically like a wall between your computer and the Internet.  It won’t allow data to flow back and forth except on specified open ports.  A port is similar to a gate in the firewall.  You allow traffic to flow through specific gates in order to manage traffic in an orderly fashion.  There are standard ports for web traffic, email, etc.  Windows has a built in firewall starting with XP.  There are other software firewalls available such as ZoneAlarm.  If you are using a laptop or netbook, you absolutely will want to be using a software firewall on your machine if you ever take it off of your home network.
  5. Use a router.   Routers serve as an additional layer of protection between your computer and the Internet and act as a hardware firewall.  Plugging a computer straight into a modem is bad practice.  Routers are cheap these days and easy to setup.  If you share an Internet connection with more than one device, you already have a router.  Even if you only have one device, invest in a router.  Unless of course you are in that tiny percentage of homes with dial up.
  6. Keep third party applications up to date.  I just covered this ground in my post Update All the Way, so I’m not going to beat that dead horse other than to say that third party applications such as Flash, Java, and Adobe Reader are subject to vulnerabilities just like Windows, OSX, and Linux.  A third party update tool like PSI can help you keep those up to date.
  7. Keep the operating system up to date.  Whether you run Windows, OSX, Linux, or something else, your operating system should be regularly updating as security vulnerabilities and bugs are found.  Most people should set updates to automatic.  While the updates will break things on rare occasions, the risks associated with not having them updated is much greater.
  8. Online backups.  As with the previous item, I’ve already covered this in Back it Up, I’ll Take it!.  Backing up your data automatically and offsite is the best way to protect your data in the event of hardware failure, theft, or home damage.  There are a lot of options out there for online backups, and some are even free.  Your data is critical.  Don’t risk it.

Remember, these are just the foundational elements for protecting your data.  If you don’t have these in place, your other efforts lose a lot of their luster.  By implementing these basic concepts, you can go a long way toward keeping your data yours.

Faceoff. Lessons from the Facebook Data Harvest


Facebook is hitting the news again in quite a few places for it’s supposed ‘hack’.   In case you haven’t heard, security consultant and long time programmer Ron Bowes effectively trolled Facebook, then cataloged and published the data of over keyboard 100 million Facebook users.  The data included names, addresses, and phone numbers.  While some are calling this a hack, it really is not.  Mr. Bowes merely gathered data that the users had already made public.  It was out there, he just gathered it, cataloged it, and distributed it.  We can debate about how ethical this was, but it really amounts to redistributing the white pages that are sitting in your desk drawer, only in this case the white pages weren’t for a small geographic region, it was Facebook users worldwide.  Only users that had allowed their addresses and phone numbers to be seen publicly were listed.   Names of course are essential to finding people on Facebook, so that’s kind of a given.  The point of this article is to make clear that you really have to consider everything you publish on the Internet to be public domain.  If you wouldn’t want to put it on a billboard on a busy interstate, then don’t put it on the Internet.  Sure, you can go into Facebook’s privacy settings and limit who gets your address or phone number, but you are only one mis-configured server away from having all of that information collected in a real hack.  The same goes for those very personal emails you thought were secure.  A poorly configured server, a server that was not properly patched, or an employee with an axe to grind can expose it all.  This is not an indictment of Facebook.  This goes for anywhere you store your data.  This includes your credit card numbers that are still stored by some online merchants, this includes your social security number that some websites require.  This includes everything.

No problem.  You’ll just go and delete those potentially embarrassing posts right?  Wrong.  Search engines cache pages.  That means they make a copy of that data that Facebook for instance, publishes and they keep a copy of it on their servers.   You may well delete the post from Facebook, but Google keeps it’s own copy, and you don’t own it.  In addition, you don’t know how many backups of that post Facebook has made or where they are kept.  The things a 16 year old says on Facebook now could well come back to haunt them down the road.  It’s all out there, and it’s all out there forever.  You need to be careful.

Photo by orangeacid/Flickr