‘Long-Term’ Phishing Attack Underway

Monday, April 28th, 2008

The notorious Rock Phish gang has added a new twist to its phishing exploits that doesn’t require its victim to visit a malicious Website -- instead, it just loads a malicious keylogging Trojan onto the victim’s machine that steals information or credentials. Both Trend Microand F-Secure over the past few days ...

Rock Phishers Up the Ante with More ‘Digital Certificates’

Monday, April 28th, 2008

Our friends from RSA have recently reported about the latest one-two punch employed by the infamous Rock Phish gang (also reported here and here ). Best known for their easy-to-use kits that yield professional looking phishing pages, Rock Phish now adds information-stealing malware — dubbed as the Zeus Trojan — ...

YubiKey – One-time Password and Authentication Device

Saturday, April 26th, 2008

It works seamlessly with any hardware and operating system combination supporting USB keyboards such as Windows, MacOS, Linux and others. The Key generates and sends unique time-variant authentication codes by emulating keystrokes through the standard keyboard interface. The computer to which the Key is attached receives this authentication code character ...

Lateral SQL Injection

Saturday, April 26th, 2008

How can an attacker exploit a PL/SQL procedure that doesn’t even take user input? Or how does one do SQL injection using DATE or even NUMBER data types? In the past this has not been possible but as this paper will demonstrate, with a little bit of trickery, you can ...

WordPress 2.5 Cookie Forging Explained

Saturday, April 26th, 2008

WordPress 2.5.1 came out recently. It includes a critical security fix for a cookie integrity bug that would allow an attacker to impersonate other users, including WordPress admins, by manipulating the contents of an HTTP cookie. Whenever I read about a vulnerability predicated on the user identity being embedded ...