STE WILLIAMS

IE security hole sewn up for Patch Tuesday

IE security hole sewn up for Patch Tuesday

  • alert
  • comment

It’s that time of the month. Again

Free whitepaper – King’s College LondonUses IBM BNTRackSwitch for HPC

Microsoft is planning eight security updates next week – two critical – as part of its regular Patch Tuesday programme.

The obvious highlight of the batch is a critical update for Internet Explorer that affects all supported versions of Microsoft’s ubiquitous web browser, including IE 9. The second critical update covers flaws in Microsoft .NET Framework and Microsoft Silverlight that create a possible mechanism for miscreants to inject hostile code onto vulnerable systems.

The remaining six updates address lesser Windows vulnerabilities in Microsoft Forefront and Host Integration server. All six of these updates are rated as “important” and not all of them apply to all configurations. “IT administrators will have to evaluate to what degree they affect their networks, servers and workstation,” according to Wolfgang Kandek, CTO at security services firm Qualys.

As usual, more details on the flaws will emerge once Microsoft has published its patches on Tuesday. In the meantime all we have to go on is Redmond’s pre-release notice here. ®

Free whitepaper – Centre Hospitalier d’Avignon Secures Patient Records

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/10/07/ms_patch_tuesday_oct_pre_release/

IE security hole sewn up for Patch Tuesday

IE security hole sewn up for Patch Tuesday

  • alert
  • print
  • comment
  • tweet

It’s that time of the month. Again

Free whitepaper – King’s College LondonUses IBM BNTRackSwitch for HPC

Microsoft is planning eight security updates next week – two critical – as part of its regular Patch Tuesday programme.

The obvious highlight of the batch is a critical update for Internet Explorer that affects all supported versions of Microsoft’s ubiquitous web browser, including IE 9. The second critical update covers flaws in Microsoft .NET Framework and Microsoft Silverlight that create a possible mechanism for miscreants to inject hostile code onto vulnerable systems.

The remaining six updates address lesser Windows vulnerabilities in Microsoft Forefront and Host Integration server. All six of these updates are rated as “important” and not all of them apply to all configurations. “IT administrators will have to evaluate to what degree they affect their networks, servers and workstation,” according to Wolfgang Kandek, CTO at security services firm Qualys.

As usual, more details on the flaws will emerge once Microsoft has published its patches on Tuesday. In the meantime all we have to go on is Redmond’s pre-release notice here. ®

Free whitepaper – Centre Hospitalier d’Avignon Secures Patient Records

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/10/07/ms_patch_tuesday_oct_pre_release/

SpyEye banking trojan: now with SMS hijacking capability

The SpyEye banking trojan has acquired the ability to reroute one-time passwords sent to victims’ cellphones, a measure that bypasses protections more and more financial institutions are adopting.

According to a blog post published Wednesday by a researcher from security firm Trusteer, SpyEye was recently observed trying to trick victims into reassigning the cellphone number they use to receive one-time passwords from their banks by SMS, or short message service. The social-engineering ploy is contained in fraudulent pages injected into their online banking sessions that falsely claim they have been assigned a unique telephone number dedicated for that purpose and a special SIM card will be received in the mail shortly.

Warning injected by SpyEye into online banking session

SpyEye injects this message (translated from Spanish) into some victims’ online banking session.

“Now the fraudsters can receive all future SMS transaction verification codes for the hijacked account via their own telephone network,” Trusteer researcher Amit Klein wrote. “This allows them to use the SMS confirmation system to divert funds from the customer’s account without their knowledge, while not triggering any fraud detection alarms.”

As the cost of online banking fraud has skyrocketed, many financial institutions have embraced the use of out-of-band authentication to reduce the effectiveness of SpyEye, ZeuS, and other trojans that steal online banking credentials entered into infected computers. The protections work by requiring customers to enter a one-time password sent by the bank to her phone before a large transaction is completed. The additional step often foils bank fraud even if a crook has the victim’s user name and password.

In true cat-and-mouse fashion, malware developers have responded by building new features that bypass these countermeasures.

SpyEye, which recently merged with the ZeuS codebase, has been one of the leaders in figuring out new ways to defeat such countermeasures. Last month, SpyEye operators began bundling the it with malware that intercepts one-time passwords sent by SMS. SpyEye has been observed doing much the same thing to BlackBerry users, as well.

The fraudulent message claiming the cellphone number must be reassigned is injected into victims’ online banking sessions by the SpyEye malware infecting their machines. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/10/06/banking_trojan_steals_sms/

Thai prime minister Twitter hack suspect charged

Thai police have arrested a man suspected of hijacking the Twitter account of the Asian country’s newly elected prime minister, Yingluck Shinawatra.

thaiprimeminister_Yingluck_Shinawatra

Twitter sister: New Thai

Prime Minister Yingluck Shinawatra

Aekawit Thongdeeworakul, 22, an architecture student, allegedly broke into Shinawatra’s account to post tweets accusing her of cronyism and failures in office. The hapless prime minister has only been in office for two months.

The prime minister’s account – @PouYingluck – was reportedly hacked via a mobile phone. Bullish ministerial pronouncements that police were confident of quickly apprehending a suspect came just hours after the 2 October attack. This would suggest that any attempt to disguise the origin of the attack was ineffective at best. The hacked @PouYingluck account was suspended in the aftermath of the outrage.

The final post read: “If she can’t even protect her own Twitter account, how can she protect the country?”

Police arrested Thongdeeworakul just days after the attack. The student was subsequently charged with computer hacking offences punishable by up to two years’ imprisonment. To add to his indignity, Thongdeeworakul – who has been charged but not yet found guilty – was wheeled out like a prisoner for a news conference. He was seated next to Information and Communication Technology Minister Anudith Nakornthap at the news conference, presumably quickly called together after his arrest.

The student remained silent while the minister said: “He told me his act was innocent as he didn’t realise it would be a big deal,” the BBC reports. ®

Bootnote

Yingluck Shinawatra, leading of the Pheu Thai party, is the sister of controversial former Thai prime minister Thaksin Shinawatra, who was ousted from office in a military coup five years ago. Thaksin Shinawatra, who made his fortune in the mobile telecomms business, bought Manchester City Football club a year later, turning a huge profit when he sold the club to its present owners, the Abu Dhabi United Group.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/10/06/thai_twitter_hack_suspect_cuffed/

LibreOffice fixes virus-friendly Word import flaw

LibreOffice fixes virus-friendly Word import flaw

  • alert
  • print
  • comment
  • tweet

Free and clear

Free whitepaper – VMready

LibreOffice users ought to update their software: a security hole has been discovered in the code used to import Microsoft Word documents into the open-source productivity suite. The latest version of the software contains a fix for the problem.

A memory corruption-related vulnerability in the import code creates a possible mechanism for virus writers to inject hostile code into vulnerable systems, developers at The Document Foundation warn. The bug was discovered by RedHat security researcher Huzaifa Sidhpurwala and fixed with version 3.4.3 of the package.

LibreOffice 3.4.3 also addresses lesser security problems involving loading Windows Metafile (.wmf) and Windows Enhanced Metafile (.emf) images into documents.

An advisory from LibreOffice on the vulnerability can be found here. ®

Free whitepaper – ASCI uses 10 GbE grid computing and hi-def media streaming

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/10/06/libreoffice_flaw_fix/

Facebook scammers exploit Steve Jobs’ death

Facebook scammers exploit Steve Jobs’ death

  • alert
  • print
  • comment
  • tweet

Offer of non-existent iPads lures thousands

Free whitepaper – Data Progression:

Facebook scammers have wasted little time in exploiting news of the death of Apple founder Steve Jobs as a theme for survey scams.

The conmen’s marks are told that an unnamed firm is giving away 50 iPads in memory of Cupertino’s billionaire gadget baron. Applicants are invited to complete an online survey to “qualify” for the fondleslab prize.

The offer is, of course, entirely bogus. Even so, more than 15,000 people have already clicked through to the bogus survey site, net security firm Sophos reports.

Survey scams work by conning punters into handing over personal details and completing questionnaires in exchange for non-existent offers. In some cases marks are induced to sign up for premium-rate text messaging services of dubious value (eg, daily horoscopes). Those peddling the scam earn affiliate revenues from unscrupulous marketing firms.

A full write-up of the ghoulish skullduggery – complete with screenshots of the bogus invite and jump page – can be found on Sophos’s Naked Security blog here. ®

Free whitepaper – Fluid Data: enterprise storage that redefines the data center

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/10/06/jobs_death_facebook_scam_lure/

Attack on Apache server exposes firewalls, routers and more

Maintainers of the open-source Apache webserver are warning that their HTTP daemon is vulnerable to exploits that expose internal servers to remote attackers who embed special commands in website addresses.

The weakness in 1.3 and all 2.x versions of the Apache HTTP Server can be exploited only under certain conditions. For one, they must be running in reverse proxy mode, a setting often used to perform load balancing or to separate static content from dynamic content. And even then, internal systems are susceptible to unauthorized access only when certain types of reverse proxy rewrite rules are used.

Nonetheless, the vulnerable reverse proxy configurations are common enough that Apache maintainers issued an advisory on Wednesday recommending users examine their systems to make sure they’re not at risk.

“When using the RewriteRule or ProxyPassMatch directives to configure a reverse proxy using a pattern match, it is possible to inadvertently expose internal servers to remote users who send carefully crafted requests,” the advisory stated. “The server did not validate that the input to the pattern match was a valid path string, so a pattern could expand to an unintended target URL.”

The vulnerability was reported by Context Information Security, an information security consultancy with offices in London, among other cities. In a blog post, researchers with the company said the weakness can be exploited to gain unauthorized access to a highly sensitive DMZ, or “demilitarized zone” resources inside an organization that should be available only to validated users.

“We can access any internal/DMZ system which the proxy can access including administration interfaces on firewalls, routers, web servers, databases etc.,” they wrote. “Context has had plenty of success with this attack where credentials are weak on the internal systems allowing for full network compromise e.g. uploading Trojan WAR files on to JBoss servers.”

In a press release, Context said the researchers believe other webservers and proxies may be susceptible to similar exploits.

Apache issued a patch for those who compile their own installations of the webserver. It wouldn’t be surprising to see Linux distributions release their own security updates in the next few days. Apache’s advisory also contains suggestions for writing proxy rules that prevent the attack from working.

Adding a simple forward slash to certain configurations, for example, will go a long way to protecting sensitive systems. The line is “RewriteRule (.*).(jpg|gif|png)” could expose internal servers, while the line “RewriteRule /(.*).(jpg|gif|png)” (note the extra “/”) will ensure they remain protected.

Security researcher Dan Rosenberg echoed the warning that the damage resulting from a poorly configured proxy server could be catastrophic and that the risk could extend well beyond those who use Apache.

“In the worst case, this could result in a remote attacker being able to read sensitive contents from internal web resources,” he wrote in an email. “I wouldn’t be *too* surprised if reverse proxy mechanisms in other web servers are affected, but the bug is fairly implementation specific, so there’s no way to know without testing.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/10/06/apache_webserver_attack/

Android malware under blog control says Trend Micro

Trend Micro is reporting a Chinese Android malware that operates partly under the command and control of a blog.

The ANDROIDOS_ANSERVERBOT.A malware is disguised as an e-book reader offered on a third-party Chinese app store. It uses two command and control servers, one of them served out of a blog with encrypted posts. Posts to the blog identify the URL of the primary CC server.

This presumably gives the malware’s makers a handy way to move their CC server around to avoid detection. The blog also hosts new copies of ANDROIDOS_ANASERVERBOT.A which are downloaded when the software connects (see Trend Micro’s flowchart for the process).

The security company also notes that upon installation, the supposed e-book reader asks for an unreasonable number of permissions – should the user be foolish enough to allow installation after reading the permission requests, the malware can access network settings and the Internet, control a device’s vibration alert, disable key locks, make calls, read low-level logfiles, read and write contact details, restart apps, wake the device, and use SMS.

Targeted at Chinese users, the app also disables security software from Qihoo360 and Tencent, among others.

Android security has been increasingly under a cloud, with HTC scrambling for a fix after turning its phones into data-spewing monsters; a banking Trojan designed to intercept security texts; a security researcher discovering a dozen malicious apps on the official Android market; and earlier this month, Google was criticized as ignoring a bug that allowed malware to be installed without warning.

Trend Micro’s post is here. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/10/06/trend_discovers_more_android_malware/

Crooks beat anti-fraud cops with old-school bank scams

Payment card and banking fraud losses fell this year against a rise in cash pilfered through old-school cheque and telephone banking fraud, according to figures released today for the UK.

Total fraudulent losses dropped to £169.8m between January and June 2011, down 9 per cent from £187m in the same period last year. Losses fell to their lowest in 11 years, according to banking industry group the UK Cards Association.

The association credits improved fraud detection software and the rollout of updated chip and PIN technology outside the UK for the decline. Lost and stolen card fraud losses, by contrast, rose from £21.3m to £24.7m.

Online banking fraud losses reached £16.9m during the first half of 2011, down 32 per cent on the same period last year.

However, phone banking fraud losses rose to £8.6m during this period, a 48 per cent rise on figures from the first six months of 2010. Most of these losses arise as a consequence of simple con tricks, according to the UK Cards Association.

“As with card fraud, criminals are focusing on the straightforward crime of duping a customer into believing they are dealing with a bank or police representative and getting them to disclose their financial security details – such as PINs, passwords and login details – which the criminal then uses to access the customer’s bank account over the phone,” the association said in a statement.

Cheque fraud losses increased to £16.4m during 1H2011, up from £14m in 1H2010. A further £254m of attempted cheque fraud was spotted and stopped before losses occurred.

DCI Paul Barnard, head of the Dedicated Cheque and Plastic Crime Unit – the special police squad that is sponsored by the banking industry – said consumers need to be on their guard against the return of “old fashioned” scams.

“Losses are appreciably lower than they were a few years ago and everyone involved in tackling fraud has reason to be encouraged by this – and that includes bank customers who, as their own frontline of defence, have certainly played their part too,” DCI Barnard said.

“However, there has been an increase in old fashioned scams – criminals using distraction techniques and social engineering methods to get hold of people’s cards or phone banking details. We are urging everyone to be on their guard.

“Your bank or the police will never cold call you or email you and ask you for your login details, cards or PINs. If anyone does, they are probably a criminal, so hang up the phone or delete the email.”

The UK Cards Association has a full breakdown of the figures – along with a series of top tips on avoiding fraud – in a statement on the losses here [PDF]. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/10/05/uk_banking_fraud_losses/

The security mistakes users make

Live broadcast Social networks, local admins, unpatched software, missing USBs: the causes of security problems in your business are often not just the big stuff that tries to get inside the firewall, it’s the little problems that are already on the inside.

On October 13th at 16:00 BST/11:00 EDT, our latest live Regcast questions-

  • Could your traditional security architecture be solving the wrong problems?
  • Would a new approach to your current security plug the gaps more efficiently?
  • How much do we need to trust and train our users?

The Reg‘s Tim Phillips is joined by security specialist Mike Rothman from Securosis, Paul Zimski from security specialist Lumension, and Andy Buss from Freeform Dynamics, who will reveal the results of the latest Register reader research that addresses these security dilemmas.

If you can relate we’d love to hear your security experiences via our live QA.

Join us for this free event here. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/10/05/security_mistakes_event/