Sunday, April 6th, 2008
As Chris mentioned in a previous post we used social engineering and phishing emails as an attack vector. The scope of the engagement prevented us from collecting any data that could be used to identify the user. The client was not out to make examples of their staff but to ...
Posted in Coding, Internet, Privacy, Security | No Comments
Sunday, April 6th, 2008
When it comes to being taken in by Internet fraudsters, men have a knack for losing cash, according to a new report from the Internet Crime Complaint Center.
Data compiled from more than 206,000 complaints received last year by the U.S. Internet Crime Complaint Center (IC3) shows that men lost US$1.67 ...
Posted in Internet, Privacy, Security | No Comments
Saturday, April 5th, 2008
This afternoon, we got a highly customized email purporting to come from the IRS, which of course, does nothing more than load malware.
The email is made out to a key financial contact here at Sunbelt (name obfuscated for this post).
As you can see, it’s quite convincing. (Incidentally, “Sunbelt Software Distribution, ...
Posted in Internet, Privacy, Security | No Comments
Friday, April 4th, 2008
We have been noticing quite a few malware samples having references to or communicating with Google's SMTP servers. This post dissects one of these samples and in the process attempts to illustrate to the reader some reversing techniques and information gathering techniques, while explaining the behavior and impact of this ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments
Thursday, April 3rd, 2008
New Additions
Target-Based support to allow rules to use an attribute table describing services running on various hosts on the network. Eliminates reliance on port-based rules.
Support for GRE encapsulation for both IPv4 & IPv6.
Support for IP over IP tunneling for both IPv4 & IPv6.
SSL preprocessor to allow ability to not inspect ...
Posted in Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments