Отправляет email-рассылки с помощью сервиса Sendsay
  Все выпуски  

IE Zero Day Update: Microsoft Issues Emergency Patch, Even for XP


Антивирусный "хостинг"

Клуб пользователей антивирусных услуг (Saas, Cloud)

добавить на Яндекс
Антивирусы и безопасность (SaaS, Cloud ...)
av-host.net

IE Zero Day Update: Microsoft Issues Emergency Patch, Even for XP
2014-05-02 06:12

KMM поделился ссылкой

IE Zero Day Update: Microsoft Issues Emergency Patch, Even for XP

cve-2014-1776In response to the critical zero day vulnerability (CVE-2014-1776)  currently affecting Internet Explorer, versions 6-11, Microsoft has issued an emergency patch.

Users who have automatic updates from Microsoft enabled will receive the emergency patch automatically. This includes users running Windows XP, even though Microsoft cut support for the operating system on April 8th, 2014.

Microsoft’s announcement of the patch does not explain why they have chosen to issue it to an operating system they supposedly no longer support; however, reports from FireEye Labs indicate that there is currently a new variant of the attack actively and specifically exploiting the vulnerability on machines running Internet Explorer 8 with Windows XP.

Anyone running Emsisoft on Windows XP should know that we have chosen to support our software on the OS until at least April 2016. If you are still running XP, you should also know that this critical security vulnerability is likely only the first of many to come. For this reason, we recommend updating to a Microsoft supported OS as soon as possible.

Have a Great (Zero-Free) Day!

 

 



Warning: Don’t Get Vished
2014-05-02 14:18

KMM поделился ссылкой

Warning: Don’t Get Vished

6237941_s

If you’ve spent some time on the Internet, you probably know that if you aren’t careful you can get “phished” through a fraudulent email or a malicious website. But did you also know that you can get “vished” through an SMS text message sent to your mobile device?

A recent report released by researchers at PhishLabs has uncovered a large “vishing” campaign affecting an average of 250 people per day – potentially since October 2013. The financial institution utilized in this campaign has yet to be disclosed, but PhishLabs’ report indicates that it is of medium-size and based in the United States. The report also indicates that the campaign is just one of many others like it.

How to Spot a Vish

To spot this latest scam, watch out for an unsolicited SMS text message from your bank that states your card has been deactivated and includes a phone number to call for reactivation.

Vishing is the act of phishing through Voice over IP (VOIP) technology. Much like a phisher attempts to steal your personal information with a cheesy email or a fake website, a visher attempts to do so through a phone call or a text message. In order to do so, the visher – or gang of vishers – must first accomplish a few preliminary steps.

First: compromise a server unconnected to their name and install Interactive Voice Response (IVR) software onto it. Second: Hack a VoIP server (also unconnected to their name) that will allow them to send the vishing SMS texts. Third: Use the IVR to record an automated customer service voice assistance program that emulates the one used by the targeted bank and include a prompt to enter account and pin numbers. Fourth: Use the compromised VoIP server to disburse vishing text messages that include a phone number which connects victims who call it to the fake customer service IVR. Fifth: Wait for victims to enter their credentials. Sixth: Cash in.

The well documented, step-wise nature of vishing campaigns is reflective of the fact that this technique has actually been around for quite some time and that it is usually instigated by well organized groups of attackers – to whom many banks and individual customers fall prey.

Once credit or debit account credentials are compromised, they can be used to make fraudulent purchases both online and off. Vishers can either shop online using cardless transactions or create fake cards with the stolen numbers to cash out instantly at ATMs.

Preventing Psychological Malware (and actual malware too)

Malware isn’t always computerized. Though carried out through technical means, the impetus to each and every compromised account in this latest vishing campaign was a victim making a wrong decision – calling a fraudulent phone number and sharing financial information with an unknown party.  This is social engineering, and the only way to prevent it is through increased security knowledge. This is why we blog.

Financial malware is just as often computerized as it is psychological though – perhaps even more so. Most notorious of all is the use of financial Trojans like Zeus, which can perform man-in-the-middle attacks to steal user credentials. This is why we create anti-malware and submit it to testing organizations like MRG-Effitas – to make sure that it can protect you and your computer from 100% of the world’s most prevalent financial malware threats.

As this latest vishing campaign shows, financial cybercrime is also merging into the mobile world. This is why in addition to blogging and creating high performance anti-malware for the PC, we also offer Emsisoft Mobile Security. SMS texts like the one used in this latest vish campaign detailed by PhishLabs can also be used to link victims to more traditional but equally malicious phishing websites or drive-by websites that automatically install malware – as was done just one week ago with the Facebook iBanking rogue.

As always, if you even slightly suspect that you might have been vished by this latest campaign or by any campaign like it, you should keep a close eye on your financial accounts and consider contacting your bank. It’s not enough to play the odds and assume that you won’t be targeted! An attacker with your credentials can create a fake card and cash in on an ATM, can make unmitigated purchases online, can sell your credentials to other cyber-thieves, and can even go as far as falsifying your identity.

Have a great (Vish-Free) day!



Hack Your Facebook Friends? More Like Hack Yourself.
2014-05-02 14:19

KMM поделился ссылкой

Hack Your Facebook Friends? More Like Hack Yourself.

facebook-thumbs-down

What if you could hack your friend’s Facebook account simply by copying and pasting a piece of code into your web-browser’s console?

A recent Facebook scam promises just that.

Hack Any Friend’s Facebook Scam

False promises on Facebook: it’s a recurring theme adopted by spammers. This time, it’s a Facebook post that begins as follows:

UPDATE LINK FOR FACEBOOK HACKING
F.A.C.B.O.O.K —-H.A.C.K.I.N.G(ONLY FOR EDUCATION PURPOSES)

The content of the post includes a link to a Google document and written instructions on how to hack your friend’s Facebook account, as well as an instructional video. The instructions tell you to go to the Google document, copy its contents, paste those contents into your web browser’s console (found by hitting F12), hit enter, and wait 2 hours for the hack to kick in.

Users who follow these instructions will in reality hack their OWN account.

Self Cross-Site Scripting Hack

Rather than a magical code to hack your friend’s Facebook account, the contents of the Google Doc are actually a malicious JavaScript code that hijacks your account for spamming. While you sit and wait the prescribed 2 hours for the hack to kick in, your Facebook account is used to generate Likes on pages owned by the attackers. Furthermore, the code tells your account to tag all of your friends in its original post so that they can be lured to it too.

The copy-paste technique used in this scam is called Self Cross-Site Scripting, or Self XSS. Self XSS is about as simple as it gets: Attackers generate malicious code and then try to convince their victims to paste that code into their web console and execute it. This type of attack hinges on social engineering – like dangling the promise of being able to hack any friend’s account – and it has actually been around for quite some time. Reports indicate that this latest campaign has been active since early 2014 and that it has already generated as many as 100,000 fraudulent Likes.

Such success had indeed been noticed by Facebook and prompted the social media giant to issue a warning regarding this type of attack, which includes the option to enable or disable the web console while on Facebook: https://www.facebook.com/selfxss.

The warning jests at enabling the web console by stating “Allow my account to be hijacked if I paste malicious JavaScript” next to the setting’s check box. More importantly, the warning also points out that a Self XSS can be used to do much worse than generate Like spam. Beyond Facebook accounts, Self XSS hacks are used to execute a wide variety of malware, to commit all types of cybercrime.

Protect Yourself (from Yourself) with Surf Protection Technology

If you think you have fallen victim to the Hack Your Friend’s Facebook scam, you should review your Facebook activity log to see if your account has been used to generate fraudulent Likes: https://www.facebook.com/help/www/289066827791446. If it has, you can always Unlike them.

It’s also good practice to exercise caution when encountering any Internet offer dangling a virtual carrot just out of reach. Scams like these happen almost every single day, and are most often initiated through large social media networks where they can achieve the most exposure.

If you’d rather not have to worry about things every time you log on to your favorite social site to view pictures of your family and friends, we’d also suggest utilizing Emsisoft Anti-Malware’s Surf Protection Technology. It’s designed to prevent you from visiting malicious websites that contain copy-paste code used in Self XSS attacks. That way, you can protect yourself from yourself (and from malware too).

 

Have a Great (Malware-Free) Day!



В избранное