Trojan can grab extra personal banking data

September 27, 2008 – 7:59 AM

A Trojan horse program now available to a growing number of fraudsters can add data entry fields to legitimate online banking sites and entice consumers to give up sensitive information such as bank card numbers and PINs (personal identification numbers).

The Limbo malware integrates itself into a Web browser using a technique called HTML (Hypertext Markup Language) injection, said Uri Rivner, head of new technologies at RSA Consumer Solutions, a division of EMC. Because it’s so closely integrated in the browser, it can operate even while the user is at the real bank site and can actually change the layout of that site, he said.

“Nothing tells you that something is wrong here, with one exception: You’re being asked to provide some information that you were never asked to do before,” Rivner said during a briefing for reporters and analysts earlier this week. “If you are convinced that you are now communicating with the bank, the fraudsters can get away with anything they like.”

Limbo can get onto a user’s computer through many paths, including both pop-up messages that ask you to download an add-on program and methods that are invisible to the user, he said. They sometimes get on to PCs in conjunction with other phishing attacks.

Source:
http://www.networkworld.com/news/2008/092608-trojan-can-grab-extra-personal.html?fsrc=rss-security

Off to Scotland

September 14, 2008 – 8:31 AM

Creating backups of the websites and databases, packing up the laptops, yanking the hard drives out of the desktops and storing everything offsite just in case.  I’ll be back from Scotland on the 30th and should have plenty of pictures to post.

See ya..

Troy

NoScript mitigates HTTPS cookie hijacking attacks

September 11, 2008 – 8:34 AM

The invaluable NoScript for Firefox plug-in just got a tad better.

According to Giorgio Maone, the developer behind the popular browser extension, a new experimental feature called “Forced Secure Cookies” has been added to NoScript v1.8.0.5 to mitigate the HTTPS cookie hijacking attack vector discussed at DEFCON 16 last month.

Source:
http://blogs.zdnet.com/security/?p=1882

CSRF vulnerability allows Twitter ‘follow’ abuse

September 11, 2008 – 5:53 AM

Last week, TechCrunch’s Jason Kincaid wrote about an obvious Twitter vulnerability that allowed a user called “johng77536″ to game the popular micro-blogging service to add thousands of followers (subscribers) in a short period of time.

The “johng77536″ account has since been disabled but a security researcher tracking Twitter security flaws and weaknesses has discovered a new vulnerability that lets users easily game the “follow” system.

Aviv Raff has launched a new Web site called TwitPwn.com with basic details of his discovery.

Source:
http://blogs.zdnet.com/security/?p=1611

NMap 4.75 now maps the network graphically

September 11, 2008 – 5:50 AM

Nmap, the popular network scanner and mapper, has been updated to version 4.75 and gained the ability to graphically display the network topology it scans and maps. The update also includes hundreds of new OS signatures and new scripting engine modules.

The mapping facility is incorporated in the Zenmap GUI for nmap. It lays out the detected nodes in concentric circles based on how many hops away from the scanning system that node is. Details, screenshots and a guide to reading the maps have been added to the nmap documentation.

After Fyodor spent the summer scanning tens of millions of IP addresses, the results of his work have provided empirical data which has been used in Nmap 4.75 to improve the effectiveness of scanning.

Source:
http://www.heise-online.co.uk/news/NMap-4-75-now-maps-the-network-graphically–/111507