Monday, December 20, 2010

Unraveling Malware Myths

     Computer Viruses throughout this era have evolved in a very complex manner that a lot of people have started to make their own perceptions of these creations. In this post we'll clarify some myths about computer viruses that most of our folks had spread in our neighborhood.

Throughout this post we'll refer to our subject as Malware, since we're not just referring to computer viruses but all sort of harmful software which is itself Malware. So here are some myths about Malware that either you've heard, or you already believe with.

1. Malware spreads in Hardware. This is entirely crazy for me. Malware are software, and they can only affect software. No malware can eat your GPU nor make your processor break its pins, so if your computer gets infected, transferring some of your hardware peripherals and parts won't matter. They cannot infect other computers, except for your hard disk drive, for this is where the malware is saved. Actually nowadays some malware developers have included their works of art in some specific hardware such as printers and other removable media. Now this rarely happens as those who do this aim on targeting only specific systems. They do not really intend to cause so much ruckus but mostly focus on breaking into systems.

2. Once you get infected, Malware will spread, even with your system off. Just as mentioned before, every malware is a piece of software, so it requires a functional operating system to propagate. It cannot run with just itself and infect your hard drives without your fake Windows operating systems installed and more obviously, it will not work if your computer's power is off. This is the same with your removable storage devices such as flash drives. The phase of infection starts when your device is plugged in. So no matter how fast you transfer your data into your device or into your computer, if the host computer is infected with a removable-media-spreading malware, it will get a copy of the malware even before you start what you will do. Moreover,  malware do not actually run on the flashdrive, but on the host computer itself. If you ever find your device attached with something like a malware and whenever you delete it, it just comes back, then you probably have that one running in your system.

3. I have one or more Anti-virus (AV) software, so I am protected. This is never true. No matter how expensive nor whoever created your AV, you still have a chance of catching a malware in some way. Everyday, tens of thousands of new variants of malware are created. Even if these AV companies get a hold with most of these, there are still some malware out there in the wild that are still unrecognized by your AV. Even installing all of those AVs that you know won't make you invulnerable and actually, that is a big waste of your computer resources. Practically, you only need one AV Software. These AV Software are almost the same with their services, though some of them offer some other feature that are not present with the other ones. So generally, if you want malware protection, grab only one AV software and always have it updated. No AV is good without an update.

4. Viruses can destroy any sort of file. Viruses, also known as file-infecting malware, are also coded or made by humans, not computers themselves, so they only have specific and limited features. Most viruses spread by infecting .exe, .com and .scr files in a system, while some target only specific files such as .doc and other ones. There is a very rare sort of malware that encrypt a lot of types of files, rendering them unusable without the aid of the creator of the malware itself. This sort of malware is also known as Ransomware, where the malware encrypts files, making it only reusable with the use of a certain password, which can only be obtained from the maker of the malware himself. However, these ransomware do not encrypt all sort of files

5. You cannot catch malware from image files. These malware folks have already made a way for you to catch their pets by just opening a simple image. These images, when opened, executes a set of commands which initiates the malware, or just downloads the malware itself.

6. AV Companies create malware. If you are in the Infosec industry, you probably already understand this. These companies are already busy coping up with the battalion of malware that are created every minute, and the developers of these malware already outnumber them. I do not work for any AV Company and this one may sound possible, but it is not.

7. You won't catch malware if you don't download or transfer files from removable storage devices. Another falsity. There are hundreds of ways on how you can catch malware, such as simply browsing webpages, or being connected over a local network or the internet itself, depending on your level of security.

     There are a lot of other funny myths out there that I might have possibly missed in this post. Whatever those are, it's up for you to decide whether they are true or not. Just always remember, Vigilance is the best protection.


Read more...

Securelist Malware Statistics as of August 2010

     Here comes Securelist's malware statistics as based on the infections and malicious activities last month of August.


Direct Link:

http://www.securelist.com/en/analysis/204792135/Monthly_Malware_Statistics_August_2010

     As usual, there are new comers in the top 20 and the malware developers are still harassing unpatched vulnerabilities. What actually caught my attention this time is CVE-2010-2568, a vulnerability in Windows LNK Shortcuts. Four of the malware in the top 20 list uses this exploit by creating a link inside directories. The malware is triggered when a user explores a folder that contains one of these nice shortcuts. Fortunately, I did not encounter any of these cute little pets in my system this recent month.

Read more...

Wednesday, December 15, 2010

Protecting your Passwords from the foolest of situations

     Your password is your most basic and first level of security. Protecting it is as important as maintaining your other credentials, may it be an email account, a systems guest account or whatever, name it. In this post, we will see some ways of securing our passwords and use a sample Java Password Generator for those who want a quick and and simple yet quite secure password.

One of the basic issues about passwords is simplicity. The simpler a password is, the more it is prone to being compromised. Imagine your password for example is a series of numbers, say 416352, normally you would type it in the numpad since it is easier there. With this, anyone with the intent of stealing your password does not have to memorize the sequence of characters, but instead look at the pattern of how you type them through the numpad. Now this seem too simple of a scenario, but it always happen, and some are even worse, where the victim's password is as simple as his nickname.
     Now to protect your password from visual spying, here are some tips that you might want to consider about your passwords:

1. Make it longer, not just long. A longer password is always better. Some experts suggest that a password should be at least 12 characters long, while some say only about 8 is enough. Well what's important here is the password's long, and it cannot be memorized in a quick and simple glance. For me, the standard length of a password should be 12 to 16 characters long.

2. Use Alphanumeric Characters. When deciding for a password, it is always a good idea to make it a combination of letters and characters. This makes it hard to memorize the pattern of how it is typed through the keyboard, especially when the characters are quite far from each other. It is also better to add symbols, but some password policies prohibit the use of symbols for some reason. As much as possible, use a combination of letters, numbers and symbols.

3. Irrelative. Your password MUST NEVER be composed of any series of characters or numbers that are somehow related to you. For example, your SSS number, birthday, anniversary or something like that. A lot of people have made a mistake with this, especially on their credit cards. With their credit cards stolen and their Facebook account exposing their birthdays which itself is their passwords, they had to pay for something they didn't even know.

4. Use Passphrase. If you find it tiring to memorize alphanumeric passwords, you may just use a Passphrase. Passphrase is the term used on passwords that are somewhat a phrase or a sentence itself. For example, "The Big Brown Fox kills". This is quite easy to memorize but is more prone to being known, but you can always do safety precautions just like using phrases that are not familiar to you, or a passphrase written in a foreign language. Take note that there is always a limit to the length of your password, so keep your sentences not too long, but not too short.

5. Constant change. If possible, change your password every other time. For example, every other month so you don't have to do the same pattern everytime. This also makes your password harder to be guessed, in case you'd still use short passwords after using this post.

     Be wary however, that there exists programs such as Keyloggers, which can record every keystroke that you do without your consent, so however long or whatever the combination of characters you choose, there is still and will always be a chance that you'll get compromised. To protect yourself from these Malware, I'd suggest you use the latest AV's and of course, be vigilant.

     Now if you are tardy enough to think of a safe password, here's a simple java password generator for you. It's an executable jar file and the source files are just inside in case you wanna make sure it's not backdoored.


Java Password Generator can be downloaded here.


Read more...

Wednesday, December 8, 2010

Wikileaks: Confidential information for everyone with a modem

     Wikileaks is an international organization that have been releasing confidential information from several anonymous sources. Lately, they had been on the hotspot (though I think they have been from the very beginning) after releasing more and more secret cables from the US. What's next in this string of events?

     Being on the news this past few weeks, Wikileaks sure had caught so much attention from different media, hacktivists and even common citizens. The organization have been releasing sensitive information about US operations on a daily basis. With this in action, several authorities had made their move against Wikileaks.
     For quite a few days, the main server of Wikileaks had been down, apparently due to DDoS attacks launched by some authority against its activities. The organization of course have several other sites to move to, but their hosting companies seem to have backed out on hosting these servers as the feds found ways of making it LEGALLY UNLAWFUL. Even top banks that were used on the donation processing for the site had their hands cleaned out of this trouble by cutting out any transactions in account for Wikileaks, including PayPal and Master Card.
      However, not only the feds seem to have been making their moves. Anonymous, a group of hacktivists, people who hack for a certain purpose (mostly politically concerned), made their step by aiming DDoS attacks on websites that "bowed" to the government. They also provided several backup links for Wikileaks.
     As a way of ensuring that these information be shared to everyone as much as possible, Wikileaks shared the files through P2P connections, making it much harder to suppress.
     With all these present events, what could possibly happen next? Will US actually be able to stop this information freedom revolution? You, where do you stand? Do you stand for freedom for information? Or will you support the ethical way of living?

Read more...

Wednesday, September 8, 2010

Securelist Malware Statistics as of August 2010

     Here comes Securelist's malware statistics as based on the infections and malicious activities last month of August.


Direct Link:

http://www.securelist.com/en/analysis/204792135/Monthly_Malware_Statistics_August_2010

     As usual, there are new comers in the top 20 and the malware developers are still harassing unpatched vulnerabilities. What actually caught my attention this time is CVE-2010-2568, a vulnerability in Windows LNK Shortcuts. Four of the malware in the top 20 list uses this exploit by creating a link inside directories. The malware is triggered when a user explores a folder that contains one of these nice shortcuts. Fortunately, I did not encounter any of these cute little pets in my system this recent month.

Read more...

Monday, August 16, 2010

Browsing Safety: Scanning hyperlinks

     Malware-spreading technology nowadays have become so innovative that even visiting a webpage can cause your machine to be infected. So how do we make sure the links and webpages that we visit do not contain something malicious? Here are some tips that you might want to take note for a safe browsing.

1. Use a Sandboxed Browser. This is one (if not the) of the most basic and safest way to ensure that no webpage can cause unpleasant changes to your computer. With a sandboxed browser, you are sure that any attempt to change the settings or copying files into your computer are blocked or filtered.

2. Stop and Look before clicking. How sure are you that the link you see in the webpage directs you to the page you are expecting? With simple HTML, a malicious coder can have you visit his webpage that contains a Drive-by or downloader that infects your computer. Here's an example:

http://www.google.com/cse?cx=002683415331144861350%3Atsq8didf9x0&q=online+link+scanner&ie=utf-8&sa=Search

     If you simply read the link above, you would assume that you are to visit a search result in google, But if you check your browser's status bar(bottom row in your browser that shows the status of a webpage), it actually points to my blog's URL. This may seem to be an easy trick, but if you are in some exciting read about something over the internet, you most likely don't give notice to this.

3. Believe in your Anti-virus' link scanner. When your AV says it is a blacklisted page or URL, believe it. Dont risk your crucial data and information over your wrong suspicions. IT Guys know what is harmful and what is not for your system.

4. Scan the suspicious link! If you got the seconds to do so, scan your links with online link scanners. There are lot of 'em out there in the wild. A good sample that I personally use is www.UrlVoid.com.*

5. Use a proxy website. This one may not be so convenient, but in case you are sure that the webpage you are to visit is unhealthy for your computer and you only need to read a few lines from it, use a Proxy website. Just like Online Link Scanners, there are lot of them and they are also free to use.

     There are a lot of other techniques to ensure safety when browsing that I did not happen to include here so just google 'em.

*TrendMicro Link scanner always report proxy websites as infected. I do not actually trust their report. XD


Read more...

Wednesday, August 11, 2010

Securelist Malware Statistics as of July 2010

     Here is Securelist's Malware statistics as based from the recent activities last month of July.

Direct link:
http://www.securelist.com/en/analysis/204792130/Monthly_Malware_Statistics_July_2010

The above link brings you to Securelist's offical statistics. I didn't bother posting it here since you'll most likely look at it. (And the image is too big for the width of my blog). Actually, I did encounter the one in the 2nd position just recently in my machine, though MSE just slapped it back. I'm hoping you didn't have a lot of these in your machines. :]

Read more...

Friday, August 6, 2010

Adobe on a rush patch!

     Adobe announced today that they are to release an emergency patch on the week of August 16-20 in accordance with a zero-day PDF vulnerability.

     Charlie Miller, an analyst from Independent Security Evaluation was the one who disclosed the bug using the open-source toolkit called BitBlaze that is said to accelerate vulnerability detection at about 10 folds. According to him, the bug is related to Adobe reader and acrobat's font parsing, that which successful exploitation can lead to arbitrary code execution.

Read more:
http://www.infoworld.com/d/security-central/adobe-confirms-pdf-zero-day-plans-rush-patch-006

Read more...

The End for Mariposa Botnet

     Last week, it was announced in Washington that the possible creators of the ever famous botnet, Mariposa Botnet, was caught at Slovenia.

     As almost everyone in the info-sec firm knows, Mariposa Botnet is one (if not the) of the biggest botnet ever; connecting over 12 million zombie computers. The three prosecuted operators last February, who controlled over 12 million zombies, were not actually the creators of Mariposa. It was stated that they only bought the botnet and just continued its daily maintenance. Now after 3 months of search, the FBI in coordination with the Spanish and Slovenian police has caught its perpetual creator, a man shortly known as "Iserdo"

     Mariposa botnet is capable of stealing crucial information such as credit card and bank accounts, distributing viruses (of course) to its infected computers and performing DDoS to servers. Its discovery up to its breakdown, including its creator, is an epic event in the IT industry, and will never be forgotten. I wonder which of the still-lurking botnets are going to be revealed next?

Read more...

Friday, July 9, 2010

Scanner Class bug?

     Recently, while doing my assignment and using the Scanner class, I stumbled upon an error that seem to be a bug with the said class. Read more to have your very own observation.

Attachments:
  ScannerBug.java

     The Program I attached above is supposed to check if the user is entering an invalid value for a supposed-to-be-integer input (which is actually just a segment of my program). If you check and read the src, you'd probably come up with the same conclusion, especially giving notion to the exception I used. I threw an InputMismatchException exception so that I would catch the scenery every time the faulty user inputs an invalid value. Take a look at the entire body of the program:



Scanner JInput=new Scanner(System.in);

int num=0;
boolean done=false;

while(!done)
{
try
{
System.out.print("Input Number: ");
num=JInput.nextInt();
done=true;
}

catch(InputMismatchException JExcept)
{
System.out.println("Enter a valid integer!");
}
}


     As you can observe, the program is supposed to throw an InputMismatchException exception everytime the user inputs an invalid value to the integer variable num and then repeat the input process until the users gets to input correctly. Unfortunately, the program just continues to loop, printing Input Number: and then throw the InputMismatchException.

     I read a few articles concerning this possible bug with the Scanner class and found out that some programmers have already encountered this situation (though mostly, their errors come up with the nextLine() method. Actually, I too had a lot of problems with that so I switched back to using BufferedReader). As for now, I won't be making any clear conclusion to this thing and will not clarify this a REAL bug to the Scanner class since it still not clarified. Anyway, I'll try to look for the real problem here and will post it here as soon as I catch something vital. Hope there would be a discussion of it somewhere...

Read more...