While most people are enjoying a long weekend off, others are busy hacking websites, writing malware, sending spam and monitoring the progress of their growing Botnet(s).
Microsoft has hardly announced Windows 8 and the first cyber-criminals are already on top of it. Below a copy of a curious email that is being spammed over the “Ascension holiday/weekend”:
From: Microsoft.com [mailto:email@example.com]
Send on: Wednesday 1 June 2011 21:40
Subject: Windows 8 released.
Microsoft R Corporation is proud to announce the latest and the best
operating system available yet. For more details, click here
When clicking on the link, a file called “8final.gif.exe” is downloaded from a hacked website.
File length: 1136678 bytes.
MD5 hash: b3babe1040d10ab4cbbc62ee2d986f85.
SHA1 hash: 096d5248144240097bc4eb398301a4d355713a09
Depending on your view settings you might not be able to see the second file extension (.exe)
The website (http://ed???ormer.com) which hosts the malware is an educational interest organization, which has unfortunately been compromised by criminals.
This malware is not installed by itself. You have to click on the download link AND double click the downloaded file to be able to infect yourself. One picture is shown you while in the background the malware is installed and started.
The currently downloaded malware is a Trojan which installs an IRC Backdoor which can be used to flood IRC channels. It talks to hxxp://irc.darkbit.info and sets up a connection to 184.108.40.206 and 220.127.116.11 on port 6667.
By adding itself to the Run section of HKLM\Software\Microsoft\Windows\CurrentVersion the malware will automatically load itself when restarted.
This malware was first reported on June the 1st around 10:50 (UTC) and was still available while writing this. More spam and malware will be using the upcoming Windows 8 to lure you into their net.
Don’t fall for this type of spam. Do not open suspicious emails and/or links. Keep your computer up-to-date and use common sense.
For more technical details see the Threat Expert Report: b3babe1040d10ab4cbbc62ee2d986f85
- Lucky H
A number of wireless banking applications for iPhone and Android phone users contain privacy and security flaws that cause the phones to store sensitive information in clear text that could be gleaned by hackers, according to a report.
The applications distributed by such top banks and financial institutions as Wells Fargo and Bank of America placed various types of information at varying degrees of risk. But at least one Android application, distributed by Wells Fargo, stored an account holder’s username and password on the phone in cleartext. The application also stored account balances on the phone, according to a security researcher who spoke with the Wall Street Journal.
The applications store the information in the phone’s memory, allowing it to be easily gleaned from the phone if an attacker were to trick the user into visiting a malicious website—for example, by sending the user a phishing e-mail containing a link to the malicious site.
An application by the United Services Automobile Association was found to store a mirror image of the bank webpage the phone user visited, which could reveal the user’s account balances and transactions as well as the bank account and routing numbers, which can be used to conduct electronic money transfers. The application didn’t store the accountholder’s username and password, but an attacker might obtain this information through a more targeted attack against the account holder’s phone if he determines the bank balance revealed on the phone makes the extra effort worth it.
Bank of America’s application also didn’t save usernames and passwords, but it did save the answer to a secondary security question in cleartext. An account holder is asked the extra question only if the bank’s website determines that the user is trying to log in from a device it doesn’t recognize—such as from a phone or computer she doesn’t normally use to conduct banking.
Andrew Hoog, chief investigative officer for viaForensics, said that only one of the seven applications his group examined contained no such security flaw. That application is distributed the Vanguard Group.
Both Wells Fargo and USAA told the Journal that they had fixed the problem in updated applications released on Wednesday. Bank of America said it would be tweaking its application in a new update distributed in a few days.
Separately, Hoog’s company had found another security flaw with PayPal’s iPhone application that would allow someone on the same Wi-Fi network as the user to obtain the user’s PayPal username and password. The security flaw exists because the application doesn’t try to verify the digital certificate of the PayPal website. Therefore a hacker on the same network could conduct a man-in-the-middle attack that delivers a bogus PayPal page to the user’s browser, stealing the username and password when the user enters it.
PayPal has since updated its application to fix this flaw.
(Source: Ars Technica)