Saturday, May 19

Rise in Malware Threats

Malware danger and profitability rising

FBI reports show general increases in money-driven threats.

Two major new reports on computer security issues have shown a steady rise in just about every aspect of security risk, with increased danger from each vector in some way linked to financial motives.

According to Symantec's report on the threat landscape in the second half or last year, released last week, viruses, worms and trojans, exploitation of vulnerabilities, spam and phishing, spyware and data theft were all up on previous figures.

The report shows a decrease in volume of network worms, with a matching increase in the numbers of trojans seen, and also reckons that while half of the top ten malcode families are viruses and worms and half are trojans, the trojans have the edge in terms of potential to infect.

The US was again the major source of malware and spam, and although China has the lead in terms of machines infected with bots, most are controlled from the US, and the States is also home to most spam-sending bots.

Read more here

ID Data Theft by Trojan

Huge haul of ID data stolen by trojan

Smart Russian spyware gathered info 'unnoticed' for 54 days.

According to researchers at SecureWorks, a sophisticated trojan which spread through browser exploits, harvested sensitive data both from storage and by monitoring online activity, and uploaded this data to a server in St. Petersburg, went undetected by many AV products for over 50 days.

The trojan, dubbed 'Gozi' by researchers at SecureWorks, was first spotted by them in early January, and was apparently infecting users from early December 2006. A single seeding of one variant is thought to have infected over 5,000 individual machines and stolen data concerning over 10,000 accounts, netting credentials worth up to $2 million on the black market.

When first tested against 30 AV products, no specific identification was available, although several picked up on suspicious behaviour or the use of packers. By early February, several products were detecting the trojan under various names, while many more still had no detection at all.

Following up initial investigation into the behaviour of the trojan, SecureWorks researchers looked into the site storing the stolen data, and found the harvested information stored in a searchable format, which was then used to inform affected financial institutions, while attempts were made to have the server tracked and shut down.

Full analysis of the trojan, along with details of subsequent investigations into online data trading, can be found here.

Messenger pushes Rogue Antispyware

Rogue antispyware pushed by MSN Messenger

Microsoft IM tool carries ads for fake security product.

Microsoft's MSN Messenger, recently renamed MSN Live Messenger, was found last week to be carrying banner advertising for the WinFixer rogue anti-spyware product.

WinFixer, also known as ErrorSafe, uses fake warnings of malware infections to trick users into installing its software. Like many such rogue applications, installation may be limited to a low-grade malware scanner which blackmails victims into paying for a 'full version' to remove non-existent infections; more insidious rogue products also include downloader trojans to bring further unwanted adware and spyware onto compromised machines.

It is thought the advertising was sneaked past the MSN Messenger screening process by replacing a clean advertising stream. While some of the ads required the user to click on them to activate the attack, others are thought to have been capable of launching without user interaction. Microsoft has issued an official apology for the breach and has removed the ads from the Messenger product.

Internet Explorer expert Sandi Hardmeier has more details and screenshots at the SpywareSucks blog, here.

Friday, May 18

Microsoft Update under Scanner

Is Microsoft Update Infecting You?

Tens of millions of Microsoft users get their security updates from the Microsoft Update service. But a researcher at security firm Symantec (Quote) is alleging that users could potentially get something more than they bargained for.

A Symantec researcher said that Microsoft Update, which includes a component called Background Intelligent Transfer Service (BITS), could potentially be used by hackers to bypass security measures and attack users' PCs. BITS runs in the background on a Windows PC as an asynchronous download service for patch updates.

A Microsoft spokesperson confirmed to internetnews.com that Microsoft is aware of public reports that BITS is being used by TrojanDownloader:Win32/Jowspry to bypass policy-based firewalls in order to install additional malware.

According to Microsoft, the bypass relies on TrojanDownloader:Win32/Jowspry already being present on the system; it is not an attack vector for initial infection. The bypass most commonly occurs after a successful social-engineering attempt lures the user into inadvertently running TrojanDownloader:Win32/Jowspry, which then utilizes BITS to download additional malware.

Microsoft recommends that any users who believe they are affected by TrojanDownloader:Win32/Jowspry visit Windows Live OneCare safety scanner to scan their systems, determine if they are infected, and clean all currently known variants of this Trojan.

Using BITS to download malicious files is a clever trick because it bypasses local firewalls, as the download is performed by Windows itself, and does not require suspicious actions for process injection, Symantec researcher Elia Florio wrote on the Symantec Security Response blog.

Reard more here

Data Loss and Theft Prevention

Preventing data loss and theft

All kinds of organisation have been affected by data security breaches, from government departments to well-know financial institutions. And there is no indication that the problem is subsiding. Recent research found that there had been over 25 million exposures of personal records to potential theft and fraud over a 12-month period. This equates to the same number of households in the UK and highlights the enormous security challenge facing British public and private sector organisations in today’s data-rich society.

Organisations of every kind keep records on their clients and customers, which is vital for a whole array of business practices such as sales activity, marketing campaigns and customer service. Transactional processes such as billing, credit and finance requirements all involve maintaining detailed personal records. The need for more sophisticated methods of tracing fraudsters and data thieves has never been greater.

Most institutions have already put tight internal measures in place, but all too frequently these measures do not pay attention to the eventuality of a breach. Most companies would be appalled to find their customers were contacted inappropriately by rogue traders with, at worst, fraudulent intentions. Unfortunately, these breaches are all too often a result of human intervention.

A whole host of situations involving human interference might be to blame; from something as simple as an employee loosing their work laptop to a more sinister stimulus like an employee who is being blackmailed by criminal elements to obtain customer data. For larger list owners, the consequent recovery of client’s marketing communications would typically run costs into hundreds of thousands of pounds or Euros, not to mention the subsequent chaos for customers and employees alike.

The security and accessibility of data sets is frequently viewed as a purely internal issue. If an organisation were to admit that it had experienced a breach of its data security, that might open it up to potential legal liability as well as exposure of its reputation. So most keep quiet if it happens. Even the requirement of the Data Protection Act 1998 to keep personal data secure has tended to be viewed as an entirely internal process.

One consequence of this inward focus has been a lack of clear ownership and specified processes to deal with data security. Often the issue is handled within IT departments rather than as a standalone function.

Abuse of this “out of sight, out of mind” attitude has therefore been relatively easy. It is an uncomfortable fact that most breaches of data security are carried out by an organisation’s own staff, including its director and senior managers. Recent research by KPMG Forensic found that the typical company fraudster is a trusted male executive who gets away with over 20 fraudulent acts over a period of up to five years or more.

Significant changes in the broader culture across commerce and the public sector – and especially among data subjects – mean that “laissez faire” is no longer an acceptable attitude. Growing legal pressures, from industry-specific regulations to international laws, now mean that every organisation that has data needs to be sure it is holding on to it. Indeed, leading brands are becoming increasingly aware of the damage security breaches can do to their image. As a result, data security is moving from an IT discussion to the boardroom, not least because the brand is often the most highly-valued asset on the balance sheet.

Data security can never be 100 per cent. It is not possible to guarantee the total safety of any asset, whether physical or virtual, which needs to be in constant use. Certain measures will deliver a much higher degree of security, however, and are more likely to meet compliance requirements.

Perhaps most importantly, data security is being addressed almost exclusively from the point of view of stopping data leaving the organisation through, or to, an unauthorised party. Firewalls and encryption routines help prevent illegal access to sensitive information. The problem with this approach – whilst absolutely necessary – is that such measures cannot protect against computer theft, loss or theft of data on physical media, or loss/theft of physical records. Moreover, although escalation procedures once a breach has occurred can minimise the impact of identity fraud, it cannot help trace the fraudsters.

Therefore, there is a significant need to widely implement measures for tracking and tracing identity thieves and fraudsters once a breach has occurred. There are various means of doing so, whether electronic or physical. However, all involve the use – in one way or another - of “seed names”. Seed names are agents or identities that appear to be real customers, but have in fact been inserted into the database to obtain a view of any unauthorised use of record.

In a real life example, the direct marketing industry uses such ‘sleepers’ as standard practice to guard against unauthorised use of commercial mailing lists. Now corporations and government bodies are beginning to adopt the same approach in order to monitor data abuse. Even in the early stages of such techniques in the wider commercial and public sectors, there have been cases of pre-emptive discovery, where unauthorised data usage (in fact data theft) has been identified, which would have otherwise lain undiscovered.

Notification of data security breaches is likely to become a legal requirement. In the US, in 2002, California became the first state to pass a Notice of Security Breach law requiring any organisation that suffers a breach of its data security and the loss of personal data to disclose this fact and to offer assistance to the data subjects affected. A further 33 states have since implemented similar legislation.

Some European Union states have similar laws in place, though not currently the UK. However, the introduction of the E-Commerce Directive 2006 has created a new regulatory framework for electronic communications networks and services. The objective of this framework is to protect citizens and businesses within the EU when they are using e-commerce.

To meet the terms of the directive, the UK’s Information Commissioner drew up new proposals affecting Internet Service Providers and network operators. These require the notification, to the national regulator, of any security breaches involving the loss of personal data. The regulator must then decide whether it is in the public interest to inform the general public of the breach. Notification to the customer is also required where any breach of data security leads to the loss, modification or destruction of, or unauthorised access to, personal data.

While not yet implemented, these requirements are likely to come into force in 2007. They create a new climate of opinion and a legal background that is likely to lead to pressure for the same standards to be applied by all data owners, whether using electronic networks for data transmission or not.

Public and private sector organisations are holding an increasing volume of data on customers and citizens. If such organisations are to continue to be allowed to use this information to improve customer service, they also have to take on the responsibility of keeping it safe and secure. The exposure of 25.45 million personal records every year to potential theft and fraud is already unacceptable. In addition, individuals must become more savvy and responsible about the way they keep and dispose of their personal records.

For organisations to concentrate only on internal systems security is not enough. Equal attention needs to be given to ways of tracking and tracing abusers and fraudsters after a data breach has occurred, so that the perpetrators might more frequently be brought to justice. Only by removing the criminal element from the picture can the tidal wave of identity fraud be turned back.

by Adrian Gregory, Managing Director, DQM Group

Hacking Risks with Pirated Software

Pirated software increase hacking risks

Here's one more reason why pirated software should not be used.

New research from the Business Software Alliance (BSA) reveals that more than a third of PCs worldwide are running pirated software. According to the research, 35 percent of computers run at least one illegal program, with computer users in China and Russia the worst offenders (with over 80 percent of computers running pirated software).

However, counterfeit software programs running on company networks can generate significant security and productivity risks. Pirated software can leave business networks open to attack as cybercriminals are provided with an additional route to infection. Running pirated software on corporate networks can also have severe repercussions on the network infrastructure, hogging valuable bandwidth and network resources.

"Putting aside the obvious legal issues, piracy can have a real impact on a company in terms of security," said Graham Cluley, senior technology consultant at Sophos. "It's not enough to make sure that all PCs are running legitimate copies of Word, businesses must also control what programs their employees are downloading, installing and running. Patching against software vulnerabilities is key to any good IT security policy, but with pirated software this becomes near impossible. Pirated software downloaded from dodgy websites or bought from a man in an alleyway will not come with technical support, and may even be virus infected."

"Businesses simply cannot afford to ignore piracy," continued Cluley. "The corporate network is the backbone of any company and if you allow users to run anything they like on it, whether illegal or not, you shouldn't be surprised when it breaks."