Microsoft Communicator vulnerable to DoS attacks

November 18, 2008 – 5:22 AM

According to a report by VoIPshield, a VoIP security service provider, Microsoft’s Office Communications Server (OCS), Office Communicator and Windows Messenger contain vulnerabilities that can be exploited for Denial of Service attacks. The applications can be crashed using specially crafted packets.

VoIPshield does not want to release more detailed information until Microsoft has fixed the flaw. The vendor has so far only revealed that the mentioned products crash when specially crafted RTCP receiver reports are received. Microsoft Communicator is also said to have an allergic reaction to receiving a large number of INVITE messages (INVITE flood), ceasing to respond for a certain amount of time as a result. In some cases the program even logs itself off the network.

Another flaw in Communicator’s memory management is said to allow large areas of memory to be occupied with parallel sessions, which degrades the desktop experience. Sending victims a large number of instant messages containing emoticons is said to be enough to exploit this flaw.

Source:
http://www.heise-online.co.uk/news/Microsoft-Communicator-vulnerable-to-DoS-attacks–/111987

Duplicating keys from a photograph

November 17, 2008 – 6:06 PM

Nowadays you don’t need a locksmith or even lockpicking tools to get past a locked door without a key–you can do it using software, a photograph of the key and a key-cutting machine.

Researchers from University of California, San Diego developed software called “Sneakey” that enables anyone to make duplicates of keys without needing a sample key.

At the Association for Computing Memory’s Conference on Computer and Communications Security three weeks ago, the researchers demonstrated the system using photographs from Flickr and photos taken as far away as 200 feet using a high-powered telephoto lens, according to an article in Scientific American.

“There is a five-digit number that represents all of the information in a standard key,” said U.C. San Diego computer science professor Stefan Savage. “You type that code into a key-cutting machine and it makes a perfect replica.”

Savage supervised the research conducted by graduate students Kai Wang and Ben Laxton. The software analyzes a photograph of a key and calculates the dimensions of the key’s grooves, known as the “bitting.” The system works best with keys made from common brands.

Source:
http://news.cnet.com/8301-1009_3-10099082-83.html?part=rss&subj=news&tag=2547-1_3-0-5

Vulnerability discovered in SSH specification

November 17, 2008 – 10:46 AM

According to the UK-based Centre for the Protection of National Infrastructure (CPNI), an error in the secure shell protocol (SSH) specification can in rare cases be exploited to reconstruct part of the plain text. According to their description of the error, the standard OpenSSH configuration allows 32 bits of plain text to be recovered from arbitrary points within the cipher text. In order to carry out a successful attack, the attacker must be able to observe the reaction of an SSH connection to various error states and be able to induce these error situations. The probability of a successful attack is, however, only 2-18. SSH connections are also generally torn down by attempts of this type.

The CPNI does not give more precise details, but the attack is reported to be rendered ineffective by switching SSH from cipher-block chaining mode (CBC) to counter mode (CTR). Counter mode turns a block cipher into a stream cipher.

Source:
http://www.heise-online.co.uk/news/Vulnerability-discovered-in-SSH-specification–/111977

FBI Notification – Another Email Scam

November 14, 2008 – 7:40 PM

I received another email today supposedly from an FBI Director claiming that I am the beneficiary for a $10.5 million sum.  Basically, it’s the newer version of the old Nigeria scam.  Here are the exact email contents, including the basic headers:

—–Original Message—–
From: Federal Bureau of Investigation [mailto:[email protected]]
Sent: Friday, November 14, 2008 5:20 PM
Subject: FBI Notification!!!
Importance: High

ANTI-TERRORIST AND MONITORY CRIMES DIVISION
FBI HEADQUARTERS IN WASHINGTON, D.C.
FEDERAL BUREAU OF INVESTIGATION
J. EDGAR HOOVER BUILDING
935 PENNSYLVANIA AVENUE, NW WASHINGTON, D.C. 20535-0001
DATE: 11/14/2008

Attention Beneficiary:

This is to officially inform you that it has come to our notice, the Federal Bureau Investigation ( FBI ), that the sum of $10.5 Million USD is contained is here in the United State Of America in your name. That is why we have decided to contact you directly to acquire the proper verifications and proof from you to show that you are the rightful person to receive this fund, because the above mentioned amount is quite a huge amount of money, that is why we want to make sure that money you are about to receive is legal and we need to verify that you are not involved in any terrorist movement and money laundering. It has already been confirmed in your name, but funds are right now in our custody waiting to be released to you,we have verified and investigated that you are the right beneficiary to claim the funds, all we need from you is verification and proof due to the huge amount of money involved.

As a matter of national security, we are to serve and to protect the UNITED STATES OF AMERICA. The only advice we can give to you as at this time is to try your best to provide the required document so that your funds will be release to you in your favor, this funds are rightfully yours. You can obtain the document from the FBI in Spain where the fund was transfered from, using the following information:

Agent Robin Scott
FBI Spain
E-mail: [email protected]

We have done our verification on your FBI Identification Record and checked your criminal records, the only document remaining now is the Diplomatic Immunity Seal Of Transfer(DIST) to satisfy us that the money you are about to receive is free from Terrorism and Money Laundry act. You are to forward the documents to us immediately if you have it with you, but if you don’t have it, you can get it from the country where the fund was transfered from, you are to contact the Federal Bureau Of Investigation Spain to obtain the above required
document.

You are here by advice to Contact the Fbi in Spain, through the email address above to enquire from them on how you are going to get the required document. Note that you are to do this immediately if you really want your fund to be released to you and also if you don’t want any legal action to be taken on you. We have already informed the FBI in Spain about the present situation, so go ahead and contact them immediately.

Your fund is now in our custody and will only be released to you upon the confirmation of the required document, After that the fund will be released to you immediately without any delay.

We currently have jurisdiction over violations of more than 200 categories of federal law. So you can see that we can track you down through Investigative programs. We have your address and the evidence and status of your wired funds, so we can arrest you anytime anywhere.

Note: We have asked for the above documents to make available the most complete and up-to date records possible for no criminal justice purposes.

FBI Director
Robert S. Muller

There are many variations of this hoax and often times the Agent name, Agent email address, country the funds are from, and the FBI Director name might be different per variant, but these are all scams so please do not fall for them.

Antivirus 2009: How to Remove Fake AV Software

November 13, 2008 – 7:10 PM

A new threat that comes under the guise of a genuine antivirus program has become increasingly prevalent over the past year. Offering to locate and remove malware from your PC, this rogue will actually install a Trojan on your unsuspecting system. The process is usually initiated when you click a link for what you believe is valid security software or its vendor’s site.

Such adverts are not only a nuisance when browsing online — fake ads appear on reputable sites that make use of third-party advertising — but they are designed to rip off consumers by tempting them to pay for a worthless program. Worse still, these rogue applications infect your PC with a problem they claim can only be ‘fixed’ by purchasing extra software.

If a fake antimalware app is installed on your PC, you will begin to receive fairly persistent warning messages that your system has been infected and be advised to visit a particular site and pay for the necessary protection. You’ll be told that you have a trial version of the software installed and need to upgrade to remove all threats.

Such has been the success of these scams that several of the fake programs have become infamous. WinAntiSpyware, Antivirus 2008 (recently updated to 2009), Antispyware Pro XP and AntiVirus Lab 2009 are all suspect — and no doubt others will soon emulate them.

With similar tactics having been previously used to perpetrate fraud such as phishing, the scammers have latched on to a very effective way to play on people’s existing security fears.

Source:
http://www.pcworld.com/article/153810/fake_antivirus_apps.html?tk=rss_news