Отправляет email-рассылки с помощью сервиса Sendsay
  Все выпуски  

Naked Videos of Your Facebook Friends - Translation: MALWARE


Антивирусный "хостинг"

Клуб пользователей антивирусных услуг (Saas, Cloud)

добавить на Яндекс
Антивирусы и безопасность (SaaS, Cloud ...)
av-host.net

Naked Videos of Your Facebook Friends – Translation: MALWARE
2014-03-13 06:01

KMM поделился ссылкой

Naked Videos of Your Facebook Friends – Translation: MALWARE

A new Facebook malware scam uses one of the oldest advertising tricks in the book to infect user’s computers: Sex appeal.  According to initial reports, a series of provocative ads are circulating the social network and spreading malware.  The ads reel users in with promises like “See [Your Friend]’s Naked Video” and “[Your Friend]’s Private Video”, accompanied by actual profile pics.

How It Works

    1. You log onto Facebook, and an ad pops up.  It says something like “See [Your Friend]’s Naked Video” or “[Your Friend]’s Private Video.”  Ads also feature real profile pics from actual friends.
    2. Users who click on the ad are led to a fake Youtube webpage.  The page contains a warning about Adult Content and asks for age verification.  Meanwhile, an automatic, drive-by malware download begins.
    3. The downloaded malware is a malicious browser extension.  Once installed, it proceeds to hijack your Facebook account, accessing photographs and automatically creating a new “See [Your Friend]’s Naked Video” ad with your name and face.
    4. After verifying your age, the supposed video initiates – only to display a broken Adobe Flash notification.  Once again, this notification is a fraud.  Users who click UPDATE will initiate a second malware download, which can infect the computer with various types of spyware.

Preventing Infection: Cover Up with Emsisoft

Emsisoft Anti-Malware prevents both strains of malware involved in this scam as Trojan.FakeFlash.A.  Reports have also indicated that up to date versions of Firefox and Google Chrome will prevent infection of the malware involved in Step 3 above, but not Step 4.

Reports have also indicated that the Naked Friend Facebook Scam has already affected 2 million users.  No doubt part of this propagation has something to do with the scam’s worm-like component (Step 3), but social engineering also plays its part.  Internet scams tend to work best when they tempt the user to do something they know they shouldn’t, and naked is just one of those words that makes us click. 

More coverage on this emerging threat is sure to follow as soon as more technical details are revealed.  In the meantime, Have a Great (Malware-Free) Day!

 

 



WordPress Sites Used for DDOS Attacks
2014-03-13 06:24

KMM поделился ссылкой

WordPress Sites Used for DDOS Attacks

wordpress-blogHere’s an interesting one for you bloggers: Your favorite WordPress pingback feature can be used to carry out DDOS attacks.  This Monday, Internet security company Sucuri published a blog post detailing the technical specifics of a distributed denial of service attack on a client who runs a popular WordPress website.  After a bit of investigation, they found that the site had been incapacitated by “162,000 different and legitimate WordPress sites.”

What is a DDOS?

When you visit a website, you are essentially using your computer to request packets of information from another computer.  The computer that “serves” you those requested info-packets is called the server.  In essence, a distributed denial of service attack, or a DDOS, works by sending a server more requests than it can handle, until it is overwhelmed and breaks down.

Another good way to think about a DDOS attack is to compare it to an overwhelmed waiter at a restaurant.  For most waiters, handling a few tables at once is just fine; but, after a certain point too many customers and too many orders will inevitably overwhelm them.  Like the human brain, a computer can only handle so many tasks at once.   DDOS attacks intentionally take advantage of this limitation to incapacitate servers, and in turn shut down the websites they are serving.  This can be very problematic for owners of large websites that engage in eCommerce because every minute their website is down equates to a minute where they could have made a sale.

The WordPress Vulnerability

The DDOS attack reported by Sucuri leverages WordPress vulnerability CVE-2013-0235, which was first identified in July 2013.  Normally, WordPress pingbacks allow bloggers to generate cross references between websites.  These cross references allow bloggers to give credit where credit is due and also track who is referencing their own website.  All of this requires communication between the servers hosting each website involved and the transmission of data packets.  CVE-2013-0235 allows an attacker to create fake pingbacks from one website to another.   This means that Website A can be remotely commanded to ping Website B for a data packet.  Command Websites C-Z to do the same, and suddenly Website B is getting a lot of requests.  Command 100,000+ Websites to send requests as well, and now Website B is out of commission.

Preventing False Pingbacks

The problem with WordPress pingbacks is that they are vulnerable by design.  In fact, web developers have known that XML-RPC – the technology that allows for pingbacks – has been vulnerable to DDOS attacks for years.  As such, there’s currently a bit of debate over how to resolve the issue.

One potential solution posited by Sucuri is to disable XML-RPC entirely, by inserting a short bit of code into your WordPress website’s theme file.  While this will work, many developers have been quick to point out that it will also remove cross referencing from your blog entirely, which is an essential marketing feature for many business websites.  Many, including WordPress founder Matt Mullenweg himself, have also pointed out that “there are cheaper, easier, and more effective ways to DDOS sites” and that pingback pros far outweigh pingback cons.

The good news is that WordPress is a versatile CMS and that CVE-2013-0235 – and most other bugs – can usually be remedied through custom workarounds implemented by knowledgeable developers.  Accordingly, anyone with questions or concerns about this vulnerability is encouraged to comment below, as this very blog runs on WordPress and is maintained by a talented team.  The XML-RPC debate may be ongoing and officially “unsolved”, but if you’re running a website with WordPress and feel you may be vulnerable, Emsisoft is always here to offer support.

Have a Great (DDOS-Free) Day!



Стартует девятнадцатый аукцион ВебIQметра
2014-03-13 11:31

KMM поделился ссылкой

Стартует девятнадцатый аукцион ВебIQметра

13 марта 2014 года

В рамках очередного аукциона интерактивного образовательного проекта ВебIQметр созданы привлекательные условия для сертифицированных пользователей Dr.Web для Android, а для ставок на спецлоты принимаются только баллы.

Первый весенний розыгрыш состоится 26 марта 2014 года. В этот раз мы предлагаем побороться за множество приятных и полезных вещей — МР3-плеер, пылесос для клавиатуры, беспроводные наушники, подставки для мобильного телефона, ключницы и кружки. Все призы брендированы Dr.Web.

Компания «Доктор Веб» продолжает награждать сертифицированных пользователей Dr.Web для Android. Чтобы получить возможность делать ставки на спецлоты, нужно пройти курс DWCERT-030-12 «Dr.Web для Android» и сдать сертификационный экзамен. Для ставок на спецлоты в этом аукционе принимаются только баллы.

Специальными призами девятнадцатого аукциона станут внешний жесткий диск 1 ТБ, кожаное портмоне и настенные часы. И не забывайте про традиционный сюрприз! Уже совсем скоро будет известно, какой лот стал «котом в мешке» на этот раз.

Торопитесь! Делать ставки можно уже сейчас.



Братья по разуму: «Лаборатория Касперского» о том, связаны ли создатели кампаний кибершпионажа между собой
2014-03-13 16:42

KMM поделился ссылкой

Братья по разуму: «Лаборатория Касперского» о том, связаны ли создатели кампаний кибершпионажа между собой

«Лаборатория Касперского» проанализировала связь программы Turla, которая также известна как Snake или Uroburos, с другими известными кибершпионами.


В избранное