STE WILLIAMS

Microsoft "failed update" phish might well sound believable

We get an awful lot of spam in our spamtraps.

So it’s easy to get inured to spam, if you spend lots of time looking at it for research purposes.

But from time to time we find spams that are interesting enough – or at least intriguing enough – to write about anyway, such as the time 30-year-old Alex (NS, ND, GSOH) from Ukraine tried to sell us his liver (or part of it, at least).

When spammers add sickening disrespect to their regular criminality, we sometimes can’t sit on our hands about it, as when crooks used the aftermath of the Boston Marathon bombings to spread malware.

And occasionally we find an attempt at phishing that we grudgingly have to admit shows a resourceful sense of occasion.

We don’t respect it, and we disapprove as much as ever, but we have to say, “That’s not so far-fetched that you’re bound to delete it without a second thought.”

→ Phishing, don’t forget, is where cybercrooks try to charm/trick/persuade/terrify you into logging in to verify/check/win/dispute something such as a username/setting/iPad/invoice… only for you to realise, once you’ve put in your username, password and other details and clicked [Submit], that you were on an imposter site all along.

As you’ve probably heard, and perhaps experienced first hand if you are a Windows user, Microsoft’s Patch Tuesday updates have suffered some clumsiness lately.

In September, some updates turned up over and over (or “over and over and over”, as one reader put it) until Microsoft pushed out updates to the updates and things settled down.

So this email, though not exactly expected, isn’t outrageously obviously bogus at first sight, and might even relate to problems you’ve experienced recently:

Windows Installer package update is required to automatically eliminate obsolete patches in your sequence of patches as a report on our server indicates an error code (0x700) as a result of a failed update

Every installer sequence patch is being linked to an email account. Fill in the error code and other details to automatically fix this error

The link you’re asked to follow should be outrageously obviously bogus, however, since it neither links to Microsoft, nor uses HTTPS (secure HTTP):

The lack of HTTPS is cast into harsh relief when what looks like an official Microsoft login screen appears, where you would expect a secure page:

In short, be careful with emails you weren’t expecting, and be sure to check that the details add up – in this example, the missing HTTPS and the curious domain name don’t add up at all.

If in doubt, leave it out!

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/gxaov44u6y0/

Facebook’s "Who can look up your timeline by name" privacy tool bites the dust

Facebook searchIn December 2012, Facebook announced a slew of privacy changes, one of which – the axing of the “Who can look up my timeline by name” feature – annoyed privacy aficionados.

The feature controlled whether someone could be found by typing their name into the Facebook search bar.

The setting was limited in scope and didn’t keep people from being found in other ways across the site, Facebook said at the time.

Facebook yanked the setting last year for people who weren’t using it.

For the minority of users still using the setting, the plug is now being pulled.

Facebook Chief Privacy Officer Michael Richter said in a blog posting on Thursday that the remaining ‘get the heck away from my timeline’ people will see reminders about its imminent death in the coming weeks.

Facebook message

Richter re-emphasized what Facebook said when it first warned of the feature’s demise: namely, that users are better off choosing the sharing status of individual postings:

Whether you’ve been using the setting or not, the best way to control what people can find about you on Facebook is to choose who can see the individual things you share.

For example, Richter wrote, the feature didn’t prevent people from navigating to your timeline by clicking your name in a story in News Feed, or from a mutual friend’s timeline, or by using Graph Search (for example, ‘People who live in Seattle’), thus making it “even more important to control the privacy of the things you share rather than how people get to your timeline.”

Oh yes, Graph Search is the super-duper find-you tool, for sure.

In fact, Facebook announced on 30 September that Graph Search can now paw through your posts and status updates – in other words, all public Facebook posts ever made since the dawn of Facebook time are now searchable.

As I said at the time, for those who haven’t cleaned up their more embarrassing tracks already, the time is ripe to lunge for the Activity Log.

In light of the most recent news about the who-can-find-me-on-timeline feature’s demise, some of us may need a refresher course on who can see what, as well as how to stay safe on Facebook.

Naked Security kicks it off with this list of 5 tips.

And since the Facebook safety saga tends to take on the epic scope of a TV mini series, here’s another 5 tips on staying safe on Facebook, plus, just because we live in tag-happy times, here’s how to check your photo-tagging settings.

Much as it did 11 months ago, the removal of this feature still seems like the wrong direction. If the original setting was limited in scope and failed to do what it purported – e.g., choose who can find you – why didn’t Facebook choose to rework it so as to actually protect people’s privacy and give them the right to not be found?

On the plus side, in the coming weeks, Facebook will send notices to people who share posts publicly, reminding them that the posts can be seen by anyone, including people they may not know. The notices will include reminders about how to change the audience for each post.

Hopefully, that will be a helpful nudge to groups such as, for example, single women who like men *and* who like getting drunk.

*And* who might not be aware that every little bit of that is public knowledge.

Are you on Facebook? Do you want to keep yourself informed about the latest Facebook developments? Join the Sophos Facebook page for news and tips.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/9ILGo3OtXdU/

Brazil whacks PRISM with secure email plan

5 ways to prepare your advertising infrastructure for disaster

A week after joining a consortium calling for the USA’s currently cold, dead, fingers to be pried off the internet’s internal machinery, Brazil has announced that it will develop a secure e-mail system to try and protect its government-level communications against American spying.

The nation’s President Dilma Rousseff used the secure messaging channel Twitter to make the announcement that she’s going to order SERPRO – that country’s federal data processing service – to implement a whole-of-government secure e-mail system.

A series of three Tweets depicted below said the Brazilian government needs “more security on our messages to prevent possible espionage”. The agency given the task is also responsible for developing systems for secure online tax returns, and issues passports.

Rouseff has already condemned the USA and Canada for allegedly spying against Brazilian government agencies.

Last week, the Internet Corporation for Assigned Names and Numbers (ICANN), the World Wide Web Consortium (W3C), the Internet Architecture Board (IAB), the Internet Engineering Task Force (IETF) and the Internet Society joined with all five regional address registries decided that ICANN and IANA functions should be globalised (which only a short while ago was the kind of suggestion that drew forth good Americans to scream about an ITU “takeover”).

ICANN president and CEO Fadi Chehadé met with Rousseff after the Montevideo meeting that issued the ‘net’s globalisation manifesto, apparently to seek her cooperation in internationalising Internet governance. ®

Email delivery: 4 steps to get more email to the inbox

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/10/14/brazil_waxes_lyrical_on_security/

Back door found in D-Link routers

Email delivery: 4 steps to get more email to the inbox

A group of embedded device hackers has turned up a vulnerability in D-Link consumer-level devices that provides unauthenticated access to the units’ admin interfaces.

The flaw means an attacker could take over all of the user-controllable functions of the popular home routers, which includes the DIR-100, DI-524, DI-524UP, DI-604S, DI-604UP, DI-604+ and TM-G5240 units. According to the post on /DEV/TTYS0, a couple of Planex routers are also affected, since they use the same firmware.


A Binwalk extract of the DLink DIR-100 firmware revealed that an unauthenticated user needs only change their user agent string to xmlset_roodkcableoj28840ybtide to access the router’s Web interface with no authentication.

The /DEV/TTYS0 researcher found the user agent string inside a bunch of code designed to run simple string comparisons. For one of those comparisons, “if the strings match, the check_login function call is skipped and alpha_auth_check returns 1 (authentication OK)”, the author notes.

Some commentards to that post claimed to have successfully tested the backdoor against devices visible to the Shodan device search engine.

The /DEV/TTYS0 author, Craig, says the backdoor exists in v1.13 of the DIR-100revA products.

At this point, there’s no defence against the backdoor, so users are advised to disable WAN-port access to the administrative interfaces of affected products. ®

Email delivery: Hate phishing emails? You’ll love DMARC

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/10/13/dlink_routers_have_admin_backdoor/

Hackers left Adobe source code sitting on unprotected server

Source code, image courtesy of ShutterstockAdobe’s source code – the code for flagship products behind an über nasty breach the company reported on 3 October – turns out to have been parked on an unprotected hackers’ server, open to the internet, IDG News Service’s Jeremy Kirk reports.

The breach involved 2.9 million encrypted customer credit card records.

(Whatever that means; see Paul Ducklin’s deep dive on what evils the breach might have spawned and what a low-information term “encrypted” actually is.)

Adobe was already looking into the breach when Hold Security’s Deep Web Monitoring Program independently discovered source code for the company’s flagship products – Reader, Publisher and ColdFusion – on the server of a hacker gang.

The hacker gang was previously known for breaching LexisNexis, Kroll, NW3C, and many other sites, as security journalist Brian Krebs reported on 13 September.

Hold Security says it found over 40GB in encrypted archives on the hackers’ server, containing what looked like source code of such products as Adobe Acrobat Reader, Adobe Acrobat Publisher, and the Adobe ColdFusion line of products.

Adobe had already confirmed on 2 October that its source code had, in fact, been breached.

Adobe reset all passwords after it reported on 3 October that customers’ data had been breached and that login and credit card data had probably been stolen.

When it posted about the discovery – also on 3 October – Hold Security said that the breach “poses a serious concern to countless businesses and individuals” and raises the possibility that the disclosure of encryption algorithms, other security schemes and possibility vulnerabilities in the source code might have opened “a gateway for [a] new generation of viruses, malware, and exploits.”

Maybe, maybe not, as Paul Ducklin’s deep dive into the new-gateway premise suggests.

Having the source code might save malicious types some time when it comes to disassembling executable files to find out what they do, particularly with the help of fully commented code, original variable names, and maybe even some helpful notes from programmers, Paul wrote, but gnarly exploits can be found without source code, and holes can gape for a long time before anybody notices, even in open source products.

Source code, image courtesy of Shutterstock At any rate, hopefully, given the lack of protection they put on the source code, the hackers who stole Adobe’s code won’t prove to be very adept at exploiting it.

Alex Holden, chief information security officer of Hold Security, told Kirk that the code “was hidden, but it was not cleverly hidden.”

Holden was able to analyze the server’s directory, he said, to find a directory with the abbreviation “ad.” It was filled with “interesting” file names, he told IDG, including encrypted .”rar” and “.zip” files.

In fact, the server was holding data stolen from other companies that have been notified that the gang may have victimized them. The gang was using the server to stash data stolen from the data aggregators – LexisNexis, Dunn Bradstreet, and Kroll Background America, for example.

Kirk reports that the gang speaks Russian, is still active, and hasn’t yet been named.

We may be looking at more announcements coming from the companies whose data was found on the server, Kirk reports, if the companies choose, or are compelled by legal requirement, to do so.

Image of program code and source code courtesy of Shutterstock

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/CifIQSRmMNQ/

Flaw In Chrome May Leave Users’ Personal Information At Risk

Security flaws in Google Chrome could enable attackers to capture personal data stored in the browser’s history files, researchers said Friday.

In a blog posted last week, researchers at security firm Identity Finder outlined methods for accessing personal data from Chrome’s History Provider Cache, even if the data has been entered on a secure website. Some data also may be accessible through Chrome’s Web Data and History databases, the researchers say.

The researchers found flaws in Chrome’s SQLite and protocol buffers, which sometimes store personal information such as names, email addresses, mailing addresses, phone numbers, bank account numbers, social security numbers and credit card numbers.

“Chrome browser data is unprotected, and can be read by anyone with physical access to the hard drive, access to the file system, or simple malware,” the blog states. “There are dozens of well-known exploits to access payload data and locally stored files.”

The vulnerabilities in Chrome have been known for some time, but the researchers say that their proofs of concept are the first to demonstrate the ease with which attackers could access and steal personal information.

“By connecting the dots, we hope to educate all Chrome users that Chrome stores sensitive data unencrypted, alert users of the risks of stored Chrome data, and encourage individuals and enterprises to engage in sensitive data management best practices,” the blog says.

Identity Finder has notified Google of its new research, but has not yet received a response, according to the blog.

Users can protect their personal data by taking simple steps to protect data in the history cache files, Identity Finder says.

“Anytime you enter a credit card number or other [personally identifiable information] into a form, be sure to “Clear saved Autofill form data,” “Empty the cache,” and “Clear browsing history” from the past hour, and the information you typed will be erased,” the blog says. “Alternatively, disabling Autofill or using Incognito mode will protect form data.”

Have a comment on this story? Please click “Add a Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/vulnerability/flaw-in-chrome-may-leave-users-personal/240162580

Destructive malware “CryptoLocker” on the loose – here’s what to do

SophosLabs has asked us to remind you about a destructive malware threat that calls itself CryptoLocker.

Sophos Anti-Virus detects it by the name Troj/Ransom-ACP, because that’s exactly what it does: holds your files to ransom.

Demanding money with menaces

Malware that encrypts your data and tries to sell it back to you, or else, is not new.

In fact, one of the earliest pieces of malware that was written specifically to make money, rather than simply to prove a point, was the AIDS Information Trojan of 1989.

That Trojan scrambled your hard disk after 90 days, and instructed you to send $378 to an accommodation address in Panama.

The perpetrator, one Dr Joseph Popp, was tracked down in the USA, extradited to the UK to stand trial, displayed increasingly shambolic behaviour, and was ultimately kicked out of Britain and never convicted.

Fortunately, his malware was similarly shambolic: it used simplistic encryption algorithms, and every computer was scrambled in the same way, so free tools for cleanup and recovery soon became available.

Sadly, the crooks behind the CryptoLocker malware haven’t made the same coding mistakes.

The malware seems to do its cryptography by the book, so there is no way to recover your scrambled files once it has triggered. (You could, I suppose, try paying the ransom, but I recommend that you do not.)

What CryptoLocker does

When the malware runs, it proceeds as follows:

1. CryptoLocker installs itself into your Documents and Settings folder, using a randomly-generated name, and adds itself to the list of programs in your registry that Windows loads automatically every time you logon.

2. It produces a lengthy list of random-looking server names in the domains .biz, .co.uk, .com, .info, .net, .org and .ru.

3. It tries to make a web connection to each of these server names in turn, trying one each second until it finds one that responds.

4. Once it has found a server that it can reach, it uploads a small file that you can think of as your “CryptoLocker ID.”

5. The server then generates a public-private key pair unique to your ID, and sends the public key part back to your computer.

→ Remember that public-key cryptography uses two different keys: a public key that locks files, and a private key that unlocks them. You can share your public key widely so that anyone can encrypt files for you, but only you (or someone to whom you have given a copy of your private key) can decrypt them.

6. The malware on your computer uses this public key to encrypt all the files it can find that match a largish list of extensions, covering file types such as images, documents and spreadhseets.

→ Note that the malware searches for files to encrypt on all drives and in all folders it can access from your computer, including workgroup files shared by your colleagues, resources on your company servers, and possibly more. The more privileged your account, the worse the overall damage will be.

7. The malware then pops up a “pay page,” giving you a limited time, typically 100 hours, to buy back the private key for your data, typically for $300. (The price point is suprisingly similar to what it was back in 1989.)

→ With the private key, you can recover your files. Allegedly. We haven’t tried buying anything back, not least because we know we’d be trading with crooks.

What we have seen

SophosLabs has received a large number of scrambled documents via the Sophos sample submission system.

These have come from people who are keenly hoping that there’s a flaw in the CryptoLocker encryption, and that we can help them get their files back.

But as far as we can see, there’s no backdoor or shortcut: what the public key has scrambled, only the private key can unscramble.

In the clumsy but categorical words of the criminals themselves:

The single copy of the private key, which will allow you to decrypt the files, located on a secret server on the Internet; the server will destroy the key after a time specified in this window. After that, nobody and never will be able to restore files.

And that’s why SophosLabs wanted us to write this article, since they’re faced with the sad job of telling the victims that their files are as good as deleted.

How the threat gets in

SophosLabs reports two main infection vectors: via email attachments and via botnets.

Email attacks are fairly easy to avoid: take care with attachments you weren’t expecting, or from people you don’t know well.

Infection via a botnet is a little different, since the crooks are using the fact that you are already infected with malware as a way to infect you with yet more malware.

That’s because most bots, or zombies, once active on your computer, include a general purpose “upgrade” command that allows the crooks to update, replace, or add to the malware already on your PC.

So take our advice: make it your task today to search out and destroy any malware already on your computer, lest it dig you in deeper still.

What you can do

Take this story as a warning, and don’t forget that there are many other ways you could lose your files forever.

For example, you could drop your laptop in the harbour (it happens!); a thief could run off with your computer (it happens!); or you could entrust your files to a cloud service that suddenly shuts down (it happens!).

The endgame is the same in all cases: if you have a reliable and recent backup, you’ll have a good chance of recovering without too much trouble.

Prevention, in this case, is significantly better than cure:

  • Stay patched. Keep your operating system and software up to date.
  • Make sure your anti-virus is active and up to date.
  • Avoid opening attachments you weren’t expecting, or from people you don’t know well.
  • Make regular backups, and store them somewhere safe, preferably offline.

Don’t forget that services that automatically synchronise your data changes with other servers, for example in the cloud, don’t count as backup.

They may be extremely useful, but they tend to propagate errors rather than to defend against them.

To the synchroniser, a document on your local drive that has just been scrambled by CryptoLocker is the most recent version, and that’s that.

Further information

For more information, including links to our support knowledgebase, our sample submission system, and how to find us on the IT social business network Spiceworks, please see this article on the Sophos corporate blog.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/62_gEqAbSR8/

Destructive malware "CryptoLocker" on the loose

SophosLabs has asked us to remind you about a destructive malware threat that calls itself CryptoLocker.

Sophos Anti-Virus detects it by the name Troj/Ransom-ACP, because that’s exactly what it does: holds your files to ransom.

Demanding money with menaces

Malware that encrypts your data and tries to sell it back to you, or else, is not new.

In fact, one of the earliest pieces of malware that was written specifically to make money, rather than simply to prove a point, was the AIDS Information Trojan of 1989.

That Trojan scrambled your hard disk after 90 days, and instructed you to send $378 to an accommodation address in Panama.

The perpetrator, one Dr Joseph Popp, was tracked down in the USA, extradited to the UK to stand trial, displayed increasingly shambolic behaviour, and was ultimately kicked out of Britain and never convicted.

Fortunately, his malware was similarly shambolic: it used simplistic encryption algorithms, and every computer was scrambled in the same way, so free tools for cleanup and recovery soon became available.

Sadly, the crooks behind the CryptoLocker malware haven’t made the same coding mistakes.

The malware seems to do its cryptography by the book, so there is no way to recover your scrambled files once it has triggered. (You could, I suppose, try paying the ransom, but I recommend that you do not.)

What CryptoLocker does

When the malware runs, it proceeds as follows:

1. CryptoLocker installs itself into your Documents and Settings folder, using a randomly-generated name, and adds itself to the list of programs in your registry that Windows loads automatically every time you logon.

2. It produces a lengthy list of random-looking server names in the domains .biz, .co.uk, .com, .info, .net, .org and .ru.

3. It tries to make a web connection to each of these server names in turn, trying one each second until it finds one that responds.

4. Once it has found a server that it can reach, it uploads a small file that you can think of as your “CryptoLocker ID.”

5. The server then generates a public-private key pair unique to your ID, and sends the public key part back to your computer.

→ Remember that public-key cryptography uses two different keys: a public key that locks files, and a private key that unlocks them. You can share your public key widely so that anyone can encrypt files for you, but only you (or someone to whom you have given a copy of your private key) can decrypt them.

6. The malware on your computer uses this public key to encrypt all the files it can find that match a largish list of extensions, covering file types such as images, documents and spreadhseets.

→ Note that the malware searches for files to encrypt on all drives and in all folders it can access from your computer, including workgroup files shared by your colleagues, resources on your company servers, and possibly more. The more privileged your account, the worse the overall damage will be.

7. The malware then pops up a “pay page,” giving you a limited time, typically 100 hours, to buy back the private key for your data, typically for $300. (The price point is suprisingly similar to what it was back in 1989.)

→ With the private key, you can recover your files. Allegedly. We haven’t tried buying anything back, not least because we know we’d be trading with crooks.

What we have seen

SophosLabs has received a large number of scrambled documents via the Sophos sample submission system.

These have come from people who are keenly hoping that there’s a flaw in the CryptoLocker encryption, and that we can help them get their files back.

But as far as we can see, there’s no backdoor or shortcut: what the public key has scrambled, only the private key can unscramble.

In the clumsy but categorical words of the criminals themselves:

The single copy of the private key, which will allow you to decrypt the files, located on a secret server on the Internet; the server will destroy the key after a time specified in this window. After that, nobody and never will be able to restore files.

And that’s why SophosLabs wanted us to write this article, since they’re faced with the sad job of telling the victims that their files are as good as deleted.

How the threat gets in

SophosLabs reports two main infection vectors: via email attachments and via botnets.

Email attacks are fairly easy to avoid: take care with attachments you weren’t expecting, or from people you don’t know well.

Infection via a botnet is a little different, since the crooks are using the fact that you are already infected with malware as a way to infect you with yet more malware.

That’s because most bots, or zombies, once active on your computer, include a general purpose “upgrade” command that allows the crooks to update, replace, or add to the malware already on your PC.

So take our advice: make it your task today to search out and destroy any malware already on your computer, lest it dig you in deeper still.

What you can do

Take this story as a warning, and don’t forget that there are many other ways you could lose your files forever.

For example, you could drop your laptop in the harbour (it happens!); a thief could run off with your computer (it happens!); or you could entrust your files to a cloud service that suddenly shuts down (it happens!).

The endgame is the same in all cases: if you have a reliable and recent backup, you’ll have a good chance of recovering without too much trouble.

Prevention, in this case, is significantly better than cure:

  • Stay patched. Keep your operating system and software up to date.
  • Make sure your anti-virus is active and up to date.
  • Avoid opening attachments you weren’t expecting, or from people you don’t know well.
  • Make regular backups, and store them somewhere safe, preferably offline.

Don’t forget that services that automatically synchronise your data changes with other servers, for example in the cloud, don’t count as backup.

They may be extremely useful, but they tend to propagate errors rather than to defend against them.

To the synchroniser, a document on your local drive that has just been scrambled by CryptoLocker is the most recent version, and that’s that.

Further information

For more information, including links to our support knowledgebase, our sample submission system, and how to find us on the IT social business network Spiceworks, please see this article on the Sophos corporate blog.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/lrPVUkNSRU0/

Busts, Bounties and Backdoors – 60 Sec Security [VIDEO]

Just the fax, ma’am: How hacktivists went on a mass web joyride spree

5 ways to prepare your advertising infrastructure for disaster

Web.com has promised to beef up its security and hire more staff after hacktivists hijacked the DNS records it manages and diverted visitors away from websites.

In at least one case it’s claimed the miscreants were able to alter the DNS settings simply by sending a fax. In effect, the wags were able to point web surfers at a server other than the one they were trying to access.


The websites for freebie antivirus firms AVG and Avira, computer security toolkit Metasploit, and mobile messaging outfit WhatsApp were all successfully targeted by a pro-Palestine hacking gang on Tuesday.

The KDMS Team successfully changed the DNS records of the aforementioned sites to redirect people to a website playing the Palestinian national anthem and displaying a political message under the title “You Got Pwned”.

The hacktivists’ web page is not thought to have been booby-trapped with malware to infect vulnerable computers stumbling by, all thanks to the restraint shown by the KDMS crew. Infiltrating the PCs of people looking for an antivirus product would have been particularly embarrassing for the software firms involved – even though they were let down by what turned out to be a basic security screw-up by their DNS services supplier.

Only a vigilant staffer was able to prevent antivirus firm Avast from suffering the same fate as its competitors. Other firms in the firing line included Alexa and hosting firm Leaseweb: netizens attempting to visit their sites were also sent to a wall of web graffiti instead of the legitimate sites – a surprise diversion that potentially dented any of the firms’ reputations. KDMS boasted that its tactics allowed it to get their political message to 850,000 surfers.

In a statement, Web.com – which owns Network Solutions that manages the DNS for AVG and others – promised to hire new staff and improve its security practices:

We have been in contact with the limited number of affected customers and have since resolved the issue. We value every customer, appreciate the trust they place in us for their online needs and continue to work hard to eradicate the attacks that harm our customers and the web ecosystem.

The company has taken measures to address the persistent threat of cybercrime, including increasing personnel, implementing best-of-breed front-line and mitigation solutions, regularly engaging third party experts and partners and reviewing and enhancing critical systems.

While no business is immune to cybercrime in today’s web environment, our goal is to create a safe, secure and reliable environment for all of our customers.

The owners of the joyridden websites blamed Network Solutions and Web.com for basic security blunders that led to their collective pratfall. Specifically, it’s claimed the hacktivists were able to exploit weak security procedures using social engineering tricks to pull off the hijack, rather than a sophisticated compromise of systems.

For example, HD Moore of the Metasploit project alleged metasploit.com was hijacked after the miscreants faxed a password-reset request to Web.com-owned Register.com, which manages the DNS for his website:

Having tricked Web.com’s subsidiaries into handing over control of the targeted accounts, the domain joyriders were easily able to change the websites’ DNS records to redirect anyone who attempted visiting these sites to a web server the hacktivists controlled instead.

Normality was restored in a matter of hours in all cases and no customer data was exposed, we’re told, but the multiple hijackings, which could easily have been prevented, were hugely inconvenient for all concerned.

A statement by WhatsApp is typical of those from the owners of the targeted websites:

Our website was hijacked for a small period of time, during which attackers redirected our website to another IP address. We can confirm that no user data was lost or compromised. We are committed to user security and are working with our domain hosting vendor Network Solutions on further investigation of this incident.

AVG issued a similar statement on its blog. Meanwhile a blog post by Avira provides the most detailed explanation of how hackers pulled off the attack and its impact on victims:

It appears that several websites of Avira as well as other companies have been compromised by a group called KDMS. The websites of Avira have not been hacked, the attack happened at our Internet Service Provider “Network Solutions”.

The DNS records of various websites, including those of Avira, were changed to point to other domains that do not belong to Avira.

It appears that our account used to manage the DNS records registered at Network Solutions has received a fake password-reset request which was honored by the provider. Using the new credentials the cybercriminals have been able to change the entries to point to their DNS servers.

Our internal network has not been compromised in any way. As a measure of security we have shut down all exterior services until we have all DNS entries in our possession again.

Our products were not affected at any point, including the update servers for product and detection updates. These servers are not registered at Network Solutions.

We can assure all our partners and customers that no data of any kind (customer data, source code, etc.) has been stolen during this incident.

No malicious code was delivered to the visitors of the website either by direct download or by drive-by downloads.

Avast only evaded the same problem by the skin of its teeth, as an update on the antivirus firm’s website explains:

“We ourselves received a notification from Network Solutions saying our email had been changed. We knew we had not requested that so we immediately took action and changed our passwords, which protected us,” said Vincent Steckler, Avast’s chief exec.

DNS hijacks in general are rare but far from unprecedented. Security watchers and inconvenienced customers previously criticised Network Solutions for poor crisis management in the wake of a distributed denial-of-service attack in July.

The provider came in for even stronger criticism this week. We can only hope Web.com follows through on its commitment to bolster security before another similar domain joyriding spree. ®

Email delivery: 4 steps to get more email to the inbox

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/10/12/dns_hijack_hack_analysis/