Exploit unleashed for Windows plug-and-play flaw

March 8, 2008 – 6:00 PM

Exploit code was published on Friday for a Windows flaw similar to the vulnerability that led to the Zotob worm that wreaked havoc in August.

The code takes advantage of a bug related to plug-and-play technology in Windows 2000 and Windows XP. Microsoft provided a patch for the flaw on 11 October in security bulletin MS05-047, along with fixes for 13 other Windows flaws. The software maker rated the issue “important”.

The plug-and-play exploit code is not the first to surface for a flaw that was fixed in Microsoft’s October patch cycle. Other exploits have been published on the internet or reported privately. Release of such code is typically a prelude to an attack. However, while some experts have raised the worm alarm, attacks have yet to appear.

The exploit causes a vulnerable system to crash but it’s unlikely to be used for a worm, a Symantec representative said. “It does not gain local access to machines,” the representative said.

A Microsoft representative said on Friday the company is aware of the latest exploit code but noted that no attacks were reported. “Microsoft is actively monitoring this situation to keep customers informed,” the representative said in an emailed statement.

The vulnerability lies in the same Windows component that Microsoft provided a patch for two months ago. That flaw led to the spread of the Zotob worm, which took down systems across the US, including at television network ABC, cable news station CNN and The New York Times.

Microsoft urges users to apply the MS05-047 patch. Users who updated their system with the MS05-039 fix delivered in August are somewhat protected against this flaw as well, the company said. However, if that patch is not installed, the latest flaw could be exploited remotely by an anonymous user on Windows 2000 systems, the company said.

http://software.silicon.com/malware/0,3800003100,39153583,00.htm

Threat Alert: Spear Phishing

March 8, 2008 – 6:00 PM

“After three unsuccessful attempts to access your account, your Online Profile has been locked. This has been done to secure your accounts and to protect your private information. You may unlock your profile by going to: …” Sounds like a normal phishing e-mail, right? But what if the e-mail seemed to come from the head of IT at your small business, warning about your company account? Would you click the link?

Today’s phishers hope so. In fact, the excerpt above didn’t appear in the usual global barrage of e-mail sent out to catch recipients with eBay or PayPal accounts. Instead, it went exclusively to students and faculty of the University of Kentucky as part of a directed, or “spear-phishing,” attack against the small, 33,000-member university credit union this May. Another widely reported incident involved an Israeli company that used spear-phishing techniques to install spyware on PCs at the office of one of its competitors.

According to Peter Cassidy, secretary general of the Anti-Phishing Working Group, spear phishers act much like marketers, crafting a message and then directing it to just the right people.

These targeted attacks make better use of social engineering to trick people who are tuning out the widespread spam of typical phishing attacks, Cassidy says, but who might not expect an e-mail aimed at a smaller company or organization.

Expect it: According to IBM’s Global Security Index report, intercepted spear-phishing attempts exploded from a mere 56 instances in January to more than 600,000 cases in June.

http://www.pcworld.com/news/article/0,aid,122497,tk,spx,00.asp

Endless Gmail Accounts?

March 8, 2008 – 5:59 PM

Not really, but Gmail does offer a nice way to have as many temp accounts as you feel like creating.  This is great for registering at sites that might end up spamming you.

Let’s say I have a Gmail account of [email protected].  Gmail lets you append a “+” at the end of your username and type whatever you want after that.  So if I want to register at a questionable site, I would register the email address of [email protected] or [email protected], etc.

All of the email will go to your main account (in the case above [email protected]) no matter what comes after the “+”.

This also gives you the ability to do some pretty accurate filtering on the account too.  I’m not sure how the Gmail filtering is structured, but you could now filter out anything that includes a “+” in your username followed by any number of characters and throw them right into the trash bin.

I think this is a very cool idea and could be very useful to all Gmailers.

Way to go Google.  Once again.

Stealth Mode Malware

March 8, 2008 – 5:59 PM

Makers of antispyware and antivirus programs, pay attention to this article.

An ugly trend is developing in the world of antispyware. It is my belief that, very soon, all current tools and methods used to detect and remove malware will become obsolete. Very soon, malware will be able to load at start up and run on the computer without being detected by any existing scanner.

It is starting to happen already. More and more often, browser hijackers today use rootkit technology to protect themselves. I have run into it myself on my test computer and it was all I could do to remove it.

A rootkit-protected hijacker uses any of various methods to alter how Windows operates. Once the rootkit is operational, it is able to monitor system queries and filter out anything that mentions itself. For instance, let’s say that file abcxyz.exe hijacks all browser home and search settings, keeps them from being changed back and pops up advertisements every 90 seconds. If it is protected by a rootkit and you open the folder containing the file, the rootkit will prevent Windows Explorer from displaying the file. If you open the Task Manager, abcxyz.exe will not be shown as a memory process.

This is how it works today and it gives us plenty of trouble when trying to help someone fix it. However, the tools we use today allow us to spot the existence of abcxyz.exe. It has to load when the computer starts, so HijackThis will show us the registry entry that causes it to be loaded. We can find the infection. We just have a hard time explaining to someone how to find it and remove it.

I see trouble ahead. It is only a matter of time before some miscreant designs a better rootkit. I believe that rather than simply hiding a file from Windows Explorer and the Task Manager, future rootkits will be able to provide malware designers with true stealth mode.

Imagine this for a moment. A flaw is discovered in Internet Explorer which allows any piece of software to be executed. Exploiting this flaw, the installer for a truly clever malware is downloaded and executed. The first thing that happens is the installation of an advanced rootkit. This rootkit injects itself directly into the Windows kernel, bypassing all higher-level functions.

A registry entry is written which loads abcxyz.exe as a Windows Service. A service will load whether anyone is logged onto the computer or not and is more difficult to remove than a program installed normally. The abcxyz.exe file is loaded into memory. Every 90 seconds afterward, ads begin to pop up. Realizing that something is wrong, the user goes looking for the culprit. This is where he is going to run into trouble in the near future.

The first thing he does is to perform a scan with his antispyware program. All antispyware programs look for spyware in the same manner. They search the hard drive looking for files known to belong to malware. They ask Windows for a list of processes running in memory, then look to see if any of those are bad guys. They look at the registry to see what is loading at start up and to check for toolbars or BHOs installed into Internet Explorer. This is where they are going to fail when confronted with an advanced rootkit and a stealthed malware.

The rootkit is sitting in memory, monitoring every system query that passes through the kernel. When the antispyware scanner asks Windows for a list of running processes, the rootkit filters out abcxyz.exe. When the scanner asks for a listing of files, it filters it out again. When the scanner is looking at the registry, the rootkit filters out the entry that shows abcxyz.exe loading as a service. Seeing nothing suspicious, the antispyware scanner reports that all is well.

The user goes to our message board and asks for help. He is told to download HijackThis, run a scan and post the contents of his log file. He does this and waits for a response.

The advantage of HijackThis over antispyware scanners is that anything not installed as part of Windows will be shown, whether it is malware or not. However, it depends on Windows to give it this information. With the advanced rootkit running at the kernel level, no information about the malware is passed onto HijackThis. The user’s log file will be perfectly clean.

This is the threat we soon will be facing. No matter how good a scanner may be, it depends on receiving accurate information from Windows to detect malware. With the advanced rootkit running, Windows is made to lie. Windows itself cannot be trusted to deliver accurate information about the contents of memory or of the hard drive. The malware is running in true stealth mode. Ask Saddam how well his air defenses fared against US Air Force stealth fighters and you see the problem. Or, more accurately, you don’t see it.

So, if Windows cannot be trusted to provide the information we need, how are we going to track down malware? The answer to this, thankfully, is very simple. You need to look at the hard drive from another operating system.

No, I am not saying that the poor user has to set up his computer to dual boot Linux and Windows. There is a small program out there called BartPE that already does exactly what we need.

What is BartPE and PE Builder?

Bart’s PE Builder helps you build a “BartPE” (Bart Preinstalled Environment) bootable Windows CD-Rom or DVD from the original Windows XP or Windows Server 2003 installation/setup CD, very suitable for PC maintenance tasks.

It will give you a complete Win32 environment with network support, a graphical user interface (800×600) and FAT/NTFS/CDFS filesystem support. Very handy for burn-in testing systems with no OS, rescuing files to a network share, virus scan and so on.

Run BartPE, along with a plug-in that allows BartPE to load any registry hive found on a hard drive, and we are back in business. With BartPE running, you are not using the infected copy of Windows which sits on the hard drive. That means that any scanner used to search the hard drive will be receiving accurate information. Now, when our user runs his spyware scanner or HijackThis, the rootkit will not be able to hide itself or the malware.

So, this is my message to the antispyware and antivirus vendors out there: you need to rewrite your scanner programs to provide the ability to run in a “non-Windows environment”. Your scanners need to have the ability to edit the file system and load the registry without Windows itself having been loaded. Pretty soon, you will not be able to depend on Windows giving your scanners accurate enough information to be of any use.

BartPE can be licensed for commercial use. Or you can build something similar yourself. BartPE basically is just an offshoot of the Windows Preinstallation Environment. Someone already in the business of writing software should have no problem creating a custom version of the Windows PE.

When your software is installed, you simply prompt the user to insert a CD, DVD or flash drive and copy the files needed to run the “non-Windows environment”, as well as your scanner. You even might be able to boot it up right from the hard drive, the same way disk imaging and partitioning software do. Scanning in this way can be an additional option, right next to “Quick Scan” and “Full Scan”.

I am going to be playing with BartPE in the near future to see how well it works with HijackThis and some of the other tools regularly used at the SpywareInfo forums. We may well end up having to ask people to download BartPE and run HijackThis from outside of Windows. Before much longer, that may be the only way to find the more clever malware out there.

http://www.spywareinfo.net/oct1,2005#stealth

Phishers Try New Tactics

March 8, 2008 – 5:58 PM

Phishing is hooking more victims as the e-mail fraud attacks become more sophisticated and prevalent.

According to market researchers at Gartner, the number of phishing e-mail recipients has grown 28 percent in 2005. Because fraudulent e-mails negatively impact consumer confidence, the research firm’s recent study predicts phishing and other security breaches will inhibit three-year U.S. e-commerce growth rates by 1 percent to 3 percent.

New Technique

Evidence of the growing cunning of the attacks came Friday from threat protection vendor SurfControl, which said it discovered a new “Secured Phishing” technique capable of displaying the trusted padlock security icon on a fake site.

SurfControl rated the new phishing method as high risk because the padlock icon displayed at the bottom corner of a browser is a widely accepted symbol of a safe and secure Web site.

The “Secured Phishing” method uses self-signed digital certificates to use the HTTPS security protocol, which triggers the padlock icon, on spoofed Web sites. Typically, Secure Sockets Layer digital certificates are issued by a certificate authority. Windows generates a warning when it encounters a self-signed certificate, but many Web users don’t understand the warning or ignore it, according to SurfControl officials.

To protect against the new phishing method, individuals visiting financial sites that ask for personal information should look for a valid SSL certificate issued by a Trusted Certificate Authority. These sites will not prompt an alert dialog box, according to SurfControl.

New Safeguards

Stepping up the technology fight against phishers, e-mail security company Iconix this week rolled out visual e-mail identification software to help Web users identify trusted e-mail senders. The company also introduced the Iconix Truemark service, which allows businesses to mark their e-mail messages as secure.

To combat phishing, technology solutions need to go beyond authentication, said Lance Tokuda, chief technology officer and vice president of engineering at Iconix.

For example, “Yahoo Mail already does domain key authentication, but you can’t tell what’s authenticated,” he said.

Iconix displays a businesses’ real logo on an e-mail message, which provides consumers with a visual indication of a legitimate e-mail.

“For Iconix to display an icon next to a message, the sender’s logo has to be a registered trademark,” Tokuda said. “This is not something that phishers can spoof.”

In particular, the mapping between the e-mail address and the logo is not spoofable, he said.

“If you are not a real business the identity call will fail,” said Jeff Wilbur, vice president of marketing for Iconix.

Iconix technology supports both the Domain Keys and SenderID authentication standards.

The Iconix e-mail ID software will be available for many popular e-mail formats. It now supports Yahoo Mail and Microsoft Internet Explorer. In coming weeks and months support for Hotmail, Outlook and Outlook Express will be added. Support for Firefox, Gmail, Comcast, Earthlink, and AOL is also planned.

http://www.pcworld.com/news/article/0,aid,122691,tk,wb092605x,00.asp