Phishing Revisited

Sunday, April 6th, 2008

As Chris mentioned in a previous post we used social engineering and phishing emails as an attack vector. The scope of the engagement prevented us from collecting any data that could be used to identify the user. The client was not out to make examples of their staff but to ...

Internet Fraud Dupes Men More Often Than Women

Sunday, April 6th, 2008

When it comes to being taken in by Internet fraudsters, men have a knack for losing cash, according to a new report from the Internet Crime Complaint Center. Data compiled from more than 206,000 complaints received last year by the U.S. Internet Crime Complaint Center (IC3) shows that men lost US$1.67 ...

Heads-up: Dangerous new customized IRS scam steals data

Saturday, April 5th, 2008

This afternoon, we got a highly customized email purporting to come from the IRS, which of course, does nothing more than load malware. The email is made out to a key financial contact here at Sunbelt (name obfuscated for this post). As you can see, it’s quite convincing. (Incidentally, “Sunbelt Software Distribution, ...

Analysis of a Win32.Delf Variant

Friday, April 4th, 2008

We have been noticing quite a few malware samples having references to or communicating with Google's SMTP servers. This post dissects one of these samples and in the process attempts to illustrate to the reader some reversing techniques and information gathering techniques, while explaining the behavior and impact of this ...

Snort 2.8.1 Released

Thursday, April 3rd, 2008

New Additions Target-Based support to allow rules to use an attribute table describing services running on various hosts on the network. Eliminates reliance on port-based rules. Support for GRE encapsulation for both IPv4 & IPv6. Support for IP over IP tunneling for both IPv4 & IPv6. SSL preprocessor to allow ability to not inspect ...