Pages

Showing posts with label e-mail spam. Show all posts
Showing posts with label e-mail spam. Show all posts

Thursday, January 13, 2011

FACE THE DANGER

There is no reason to explain again that today’s computing is not possible without adequate protection against viruses, malware, botnets, and all other cyber “weapons”. You probably are overwhelmed with a number of articles, experts’ advices, webinars, and various tutorials about user awareness the same way as I am.
What I want to add to this is to describe the face of real danger, the danger that the majority of computer users are not aware about. The new hacking technique and tools will make your security protection tools like a toy for kids. In my March 2010 article I have suggested a set of software tools to protect your computers (perhaps from all known malware).
What I have learned that after Stuxnet cyberattack became known and was described in more-less details, many security professionals have revised the entire approach to the security protection. The common denominator for all opinions is the fact that our commonly accepted approach to IT security is not working anymore due to the new and highly sophisticated penetration tools that were developed recently. No, I am not going to discuss Stuxnet and similar, highly sophisticated software that was discussed on the Internet widely but rater down-to-earth penetration tools that is available today.
The goal of this article is to make more people aware that our poor antivirus programs may protect you from only 20 to 30% of today’s penetration software.  Disagree?
Just today, I got an e-mail from “Hakin9 Mewsletter newsletteren@hakin9.org” with the following content. As is (no spell correction):
“Russia Hackers are pleased to announce RH2.5 KIT ver 2011
that people can use to hack & secure computer systems by
knowing exactly how a hacker would break into it.

Collection of Advanced Hacking Guides & Tools.
PDF Guide:

1. Advanced Hacking Guide with MEtasploit
2. Malware Development (RATS, botnets, Rootkits)
3. Convert exe into PDF, XLS, DOC, JPG
4. Exploit development guide
5. Tech Tricks (Spoofing-Sms,email,call)
6. Download any Apple Apps Free of cost
7. Credit Card HAcking
8. Netbanking Hacking-bypass Virtual KEyboard
9. Spreading guide to Infect 100K/Victims per day
10. Advanced Email Hacking Tricks
11. SET(Social Engineering Toolkit) module
12. Links for other russian hacking sites
Hacking Marketplace

Tools/Services:

{Value more than 1500 USD}

1. Polomorphic Crypter's (to make Files undetectable- bypass all AV Scantime,runtime)
2. Java Driveby FUD (deploy your exe by URL on target)
3. Immunity Canvas (Hack remote pc with IP address)
4. Paid Botnets (Spyeye,etc)
5. IRC Bots(Ganga, niger,etc)
6. Yahoo messenger zeroday exploit (run exe on target)
7. Ice pack Enterprise (execute exe using php script)
8. Bleeding_Life_V2_pack /Other Packs
Service's:
1. One Linux Based VPS with Root access for Lab Setup (Safe & Secure)
2. VPN Double + Triple Encrypted (Hide your real Ip Address)
3. Fake Emailer with attachment
4. Email Bomber (Send 1 million emails into Inbox)
5. DDOS Attacks Shells
Hire a Hacker
for Offensive and Defensive services, Internal on-site penetration testing gives
the business the assurance it needs to conduct safely in the Internet and with business partners.

Email at: root@russiahackers.ru or russiahackers@mail.ru
Visit Site
First of all, I am a subscriber of Hackin9 IT Security Magazine, and I am getting the news about new development in the world of IT Security. Normally, the e-mail address field “FROM” looks like this:
Hakin9 Magazine newsletteren@hakin9.org
This time, it was slightly different:
Hakin9 Mewsletter newsletteren@hakin9.org
As you see above (and I have no doubts considering miss-spells and ignorance of normal technical English) , the content of e-mail was pure advertisement with a link to the live web site that offers the both sets of tools correspondingly for $100 and $250USD.
My guess is that my e-mail account was hacked along with many others, and the Russian hackers e-mailed the information about their “products”.
Let me be honest, I am not so worrying about hacking of my e-mail account but about the “products” offered on the web site.
Let’s review some.
Convert exe into PDF, XLS, DOC, JPG
This one is the most troubling “products”. Just imagine that you are getting the file attached to your e-mail with one of the named above extensions and are trying to open it. The file immediately executes the built-in code, and voila! Your PC is infected. Does anti-virus or firewall can prevent it? I honestly doubt…
Polymorphic Crypters (to make Files undetectable- bypass all AV Scantime, runtime)
No need to give an explanation – this code will bypass all Antimalware programs.
Spreading guide to Infect 100K/Victims per day
Tutorial on how to infect hundreds of thousands of PC users per day!
SET(Social Engineering Toolkit) module 
Welcome to infected Facebook and Twitter!
Netbanking Hacking-bypass Virtual Keyboard
Do you use online banking? I do, and most of my friends do, and most of their friends do, too! Now, imagine you have opened one of the infected e-mails (or e-mails with infected attachment), and you will be faced with a nasty surprise: your account has zero balance! It also could happen on-the-fly, while you are logging into your banking account.
Immunity Canvas (Hack remote PC with IP address)
If the hacker knows the IP address of your PC, it can be hacked with this tool. You are no longer a single Administrator of your computer. You will share it with “nasty boys” who can speak not only English but also Russian or Chinese! A simple IP scanner (like free LanSpy) will help to identify your computer’s hardware, operating system, many installed programs, computer domain and NetBios names, MAC address, remote control, time, discs, transports, users, global and local users groups, policy settings, shared resources, sessions, open files, services, registry and event log information. Nothing on the remote computer is hidden from them now…
Welcome to the hacking world!
Should I continue?
You may want to ask “what should I do?” I’d be very much glad and happy if I could give you a definite answer but I don’t have one. The minimum of what you can do is to EDUCATE – yourself, your family and friends, friends of your friends, and, of course, corporate users if you are responsible for secure computing at your organization. So, instead of reading stupid chain e-mails that try to scare you if you don’t resend them immediately to another 10 people (nice way to spread the malware!) your fellow citizens will read and forward the information about how to conduct the secure computing and not to become the victims of cyber-gangsters.
As for the tools that I have suggested in my previous article, they are still vital. It’s better to have some basic protection + knowledge of secure computing than to ignore it completely because those tools do not provide 100% security.
Happy and secure computing in 2011!

Friday, February 19, 2010

Should we be afraid of Chinese hackers? ...Or lost cyber war. (Part II)

PART I
PART II
PART III


Average PC user in China or were the hackers are growing...

Internet users in China aged below 25 spend on average 50 percent of their leisure time online, according to this survey. Those surveyed in China demonstrated high levels of social media activity. Nearly 9 out of 10 Chinese respondents indicated that they actively read or contribute to blogs and 85 percent said they participate in chat rooms.

New opportunities for self-expression, communication and interaction in China made the Internet a part of their everyday routines. The number of intelligent 20+ youngsters is increasing. Their computer skills reached sophistication allowing them to gain access to the world's most sensitive sites, including the Pentagon. In fact, some of them claim that they are sometimes paid secretly by the Chinese government -- a claim the Beijing government denies. There is a number that circulates the web (not confirmed data) that the Chinese government pays to up to 50,000 highly skilled military hackers to use the Internet for specific purposes that are defined by the government officials (cyber expert James Mulvenon told a congressional commission in 2008). Considering the population of China, this number may not seem threatening at first.

Sure they don't have a special facility with high-tech equipment; they operate from small apartments. Don't underestimate them - they are hardcore hackers who claim that "no web site is 100% safe". In spite of high level security, every web site has a specific weakness that can be exploited. Some of the hackers are self-educated programmers and some of them came from the People's Liberation Army, either way they know how to approach the task. Carefully studying the web pages, they determine the underlying programs used on a particular web site and then exploit the known weakness or test it to find the new one. The language differences are not the barriers for hacking. Many of them study English to the degree that serves them well in their activities. Young hackers are persistently trying to prove themselves against some of the most secure Web sites in the world.

There are many hacking tools are available on Chinese web sites for free and for a few bucks. For instance, for $150, youngsters can buy decent tools for hacking, design of Trojans or tool to evade anti-virus programs in addition to interactive tutorials and the support through chat or IM, i.e., the infamous software known as Grey Pigeon. Some days ago, the software was used for remote control (similar to GotoMyPC.com) but as it was discovered, it is an ideal tool for hacking that can easily be purchased in China.

Some experts believe many individual hackers are joined together to form small and large groups such as a civilian cyber militia that launch attacks on government and private web sites around the world. Some sites reach more than 10,000 registered users and offer special tutorials (sometimes even interactive) about hacking. There are hacker magazines, hacker clubs and online movie serials about hackers. About 43 percent of elementary-school students say they adore China's hackers and 33 percent say they want to be one! Imagine that future army of hackers.

As the Chinese economy improves, you can see more cars on the streets, plenty of construction sites, and numerous brand names ads and shopping centers. More and more citizens become wealthy, or at least move to the middle class level. Those who still can't find the way to make more money (and the young generation, in particular) try different methods utilizing the computer technology.

For instance, they build the web sites that are selling counterfeit items and attract customers by the low price. Usually, after getting money they either mail cheap imitations or nothing at all.

There is another side of hacking: not for money but to make a political statement.

The young generation knows how the government can suppress the democracy movements (Tiananmen Square), so rather than proceed on the road of democracy many young people (or China's Internet patriots) identify themselves in opposition to the West. These "red hackers" may not be acting on behalf of their government directly but the effect of their activities is the same.

If you'd knew the Mandarin language and tried to Google the word "hacker" using its characters, you'd find hundreds and hundreds web sites dedicated to the Chinese art of computer hacking. Some of the web sites are highly organized with detailed tutorials, history and logs of actual hacking, documentation, links, and even technical support. Some Chinese hackers are being trained at schools like the Communication Command Academy in Wuhan (the capital of Hubei province). Based on some research by the U.S. intelligence, the total number of registered hackers in China is approaching 400,000.

The hackers of all sorts can be found in the organized clubs whose members meet regularly. There are kid hackers, women-only hackers, hacker novices, and, of course, gurus. The most amazing and disturbing is the fact that most of them have the unifying characteristic: nationalism. Most of the Chinese hackers are not the individuals or anarchists but rather "tend to get more involved with politics because most of them are young, passionate, and patriotic." This stylish nationalism of hackers with laptops and Internet connection is dangerous for all countries but it is the most harmful to China itself since their government is inclined not to prosecute hackers unless they attack within the country.

These loose government restrictions are more frightening than state sponsored cyber-warfare. The government perhaps tolerates hackers and sometimes encourages them. Their government might task these hackers in turn gain control of them. Homegrown hackers might just as easily be recruited to write viruses or software for the People's Liberation Army.

If you are interested in learning more about the top Chinese hackers, check out the The Dark Visitor web site (in English).

In 2002, a scholarship student, Peng Yinan and two other hackers broke into the web site of Lite-On Corporation and replaced the Taiwanese firm's home page with the message "[F-ck] Taiwan's pro-independence!" In December 2003, similar message reemerged on the U.S. Navy Chartroom site. "[F%ck] usa.gov," read the defacement, which was signed by coolswallow and four others (the same Peng hacked the FoxNews web site after U.S. invasion into Iraq). In fact, they have not only defaced many web sites in the U.S. but also shared the hacking tool on the Internet.

Web site defacement is a very unpleasant thing when your web site is defaced! I remember when I got a call from California from a man who informed me about a U.S. teenager who hacked several web sites including my company's default web page (with a similar message about the U.S. government). It's good that I have the habit not to use the default page on the Microsoft Internet server (IIS) as a home page but rather any secondary. It saved my company from potential shame.

Based on Peng Yinan's following activities after 2003, I would compare him with infamous hacker Kevin Mitnick with the only a difference that Peng was somehow connected to the Shanghai government and since he was qualified enough, could be paid to do some freelance work. There are speculations that he was permanently hired by the Chinese government since he has disappeared from the hacker's world and that in itself is very disturbing.

The Chinese hackers became so experienced and recognized worldwide that MI5 hired Asian teenage hackers in fight against cyber terrorism in China, Russia and Pakistan.

In spite of the huge Internet activity in China, the country's Internet censoring is well known to the world (didn't KGB do the same with the phone calls and letters?). The government wants to have the control of the information flowing in and out of the country. It's not easy to do without sophisticated technology. It's a fact that Chinese entrepreneurs returning from working in Silicon Valley were requested to provide the filtering technology to China's Internet police. These police are actually very successful not only with censoring the communications but also with quick and effective shutting down the sites that they also do not hesitate to pursue for classified information inside of China or similar rogue sites.



How Microsoft armed Chinese hackers

When it comes to money, many (if not all) companies intend to forget about any possible consequences and lose conscience. Microsoft is not the exclusion. The prospect of a sweet piece of pie (e.g. China market) was reflected in the first move that Microsoft made in 2003 when Microsoft signed source code browsing agreement with China.

With the known weak security of Microsoft's operating systems and with the source code not open to the public, many countries, including China, adopt the open source code Linux operational system, a rival of Microsoft. To avoid it, Bill Gates signed an agreement with the Chinese government stating that the new Source Code Browsing Lab can browse the source code of the Microsoft operating system and engage in information security related research.

Almost 15 years of learning about how to do business with China, Microsoft decided to share the source code as a first significant step in penetration into Chinese market through the cooperation with the communist government. Liu, a member of the political bureau of the CPC Central Committee, said that China has great number of software talents and regarded software sector as one of its backbone industries. As a result, Microsoft offered China and later, 59 other countries the right to look at the fundamental source code for its Windows OS and to replace some sections with their own code. Now when China uses Windows in President Hu's office, or perhaps in its missile systems, it can install its own cryptography.

Let's look at this from another point of view. Microsoft makes money by selling its software to China and China has access to the source code of the operating systems that are used by the majority of the computer users around the world. Imagine that you are the computer hacker. What would you want most of all in order to break into the Windows PC?

You probably heard about "reverse engineering" used by hackers when the program they want to hack is taken apart into pieces in order to build the piece of code used for hacking. It is a very complicated and challenging process and not many hackers are able to do it. With the source code available as a gift from Microsoft, isn't it easier to hack Windows?

For instance, the latest report from Google is troubling: "Google detected a "highly sophisticated and targeted attack" last month which originated from China, and resulted in the theft of intellectual property from the search engine, according to Google's corporate development and chief legal officer David Drummond.

It later transpired that the attack was not limited to Google, but infiltrated 20 other large companies from a wide range of businesses - including the internet, finance, technology, media and chemical sectors." More.

Since the Chinese government directly or indirectly supports its own hackers, they might have access to the source code as well. Let's recall how many times Windows - based OS was hacked. In accordance to Shane Harris, who wrote an article about Chinese hackers, they "pose a clear and present danger to U.S. Government and private-sector computer networks and may be responsible for two major U.S. power blackouts." The U.S. government "officials believe that the intrusion may have precipitated the largest blackout in North American history. A 9,300-square-mile area, touching Michigan, Ohio, New York, and parts of Canada, lost power; an estimated 50 million people were affected."

Needless to say, Chinese hackers are surely in the state of war with the U.S. Do you need more proof? Just read the daily news.
"China's big goal in the 21st century is to become world number one, the top power," People's Liberation Army (PLA) Senior Col. Liu Migfu writes in a newly published book, "The China Dream." This dream could rapidly become America's nightmare.




A cyber-war in action?

The U.S. Defense Secretary R. Gates said in a recent speech to the Air Force Association: "Investments in cyber and anti-satellite warfare (by China), anti-air and anti-ship weaponry, and ballistic missiles could threaten America's primary way to project power and help allies in the Pacific - in particular our forward air bases and carrier strike groups." The Pentagon recently admitted that last year many computer networks in the United States, Germany, Britain and France were hit by multiple intrusions, many of them originating from China. However, U.S. officials have been cautious not to directly accuse the Chinese military or its government of hacking because it is difficult to prove.

Due to the nature of botnets (distributed networks of infected computers spread out across the globe) the cyber-defense experts are faced with a problem to prove the origin of a cyber attack. Another reason the U.S. hasn't made any claims against China is previously mentioned necessity to be politically correct. 

When David Sedney, the deputy assistant secretary of defense for East Asia mentioned, "The way these intrusions are conducted are certainly consistent with what you would need if you were going to actually carry out cyber warfare." Beijing hit back at that, denying such an allegation and calling on the U.S. to provide proof. "If they have any evidence, I hope they would provide it. Then, we can cooperate on this issue," said Qin Gang, a spokesman for the Chinese Foreign Ministry, during a regular press briefing... "I am telling you honestly, the Chinese government does not do such a thing".

India's security advisor said that Indian government network was attacked on December 15, 2009, the same day that some US companies reported having been attacked. The attack on the Indian computers came through a maliciously crafted PDF file that arrived from China as an attachment to an email. As always, the Chinese foreign ministry called their claim "groundless".

However, there is some evidence data about China as the base land of various attacks that have slowly come on to surface. For instance, a security researcher says he has found evidence linking the recent attacks on Google to China (January 2010). Analysis of the software used in the attacks revealed that it contained an algorithm from a Chinese technical paper that was published only on Chinese-language web sites. 

Some experts believe that those hackers are not agents of the Chinese state even if they claim to be paid by Chinese government. All of it is quite sensitive information and no one would openly publicize it. However, I believe that with China's goal to achieve world dominance, it fits the picture. Military and economic espionage are an integral part of these carefully planned actions. As our recent Nobel Prize winner Mr. Obama mentioned in his speech, "We must begin by acknowledging the hard truth ... There will be times when nations - acting individually or in concert - will find the use of force not only necessary but morally justified."
Recent events related to the Islamic fundamentalism proved, different people have different morals. In China's goal for world dominance, everything is "morally justified". Chinese communists can be trusted the same way we trust Russian leaders.

In May 2001, several U.S. government web sites were hacked or brought down with DDoS attack by the Chinese. The White House, U.S. Navy, the Interior Department's National Business Center, and more than 1,000 American sites experienced an unprecedented situation of massive offense.

As qualification of Chinese hackers grows, the successive attacks have become more serious. In the past two years, Chinese hackers have intercepted critical NASA files, breached the computer system in a sensitive Commerce Department bureau and launched assaults on the Save Darfur Coalition, pro-Tibet groups and CNN. Sadly, those are just the attacks that have been publicly acknowledged.

What was the cause of these massive and sudden attacks in 2001? As later discovered, it was a coordinated effort of Chinese hackers whose rising Internet-driven nationalism pushed them to declare an anti-American protest after the death of a Chinese pilot who was killed in an accident when a U.S. EP-3 reconnaissance aircraft flying off the southern coast of China had collided with a Chinese F-8 fighter jet. 

In its 2008 report to Congress, the U.S.-China Economic and Security Review Commission called Chinese cyber-espionage a major threat to U.S. technology. "China is aggressively pursuing cyber warfare capabilities that may provide it with an asymmetric advantage against the United States," the commission warned. U.S. defense officials called it "patriotic hacking". Hey, this patriotic thing presents real danger for the most vulnerable targets in our country such as air traffic control, the electric grid and waste facilities, banking and Social Security systems, and it cannot be taken lightly. Whether it was paid by the Chinese government or it was an act of hacker patriotism, our government should take this very seriously. We live in the digital age and all the information that is used in our networks and resides on the servers is at risk.

President Bush correctly understood this issue and before leaving the Oval Office authorized the creation of a National Cyber Security Center under the Department of Homeland Security. The current government proposed $355 million to secure private and public sector cyber-infrastructure.

James A. Lewis who helped develop cyber-security policy recommendations for the Obama administration, a senior member at the Center for Strategic and International Studies (CSIS), shared that concern. He said, "The U.S. government had a number of serious computer incidents in 2007, most of which were attributed to China," he says. "The focus in Washington is on what appear to be state-sponsored activities. That, of course, is only a part of what's going on in China." I wish the U.S. would take cyber-security in relation to China more seriously.

In reiteration for past failure when the U.S. military employed cyber-tactics in Iraq war, the insurgents recently hacked the US Military Drone Surveillance Video (RQ-1, MQ-1 Predator MQ-9 Reaper drones). As it was discovered, they have been doing it for a while (the U.S. military personnel found files on the detained Shiite militant's laptop in 2008). All they had to do is to use the Russian-made SkyGrabber, a program freely available on the Internet for less than $26. The event itself is so shocking that I hope it will be an eye-opener for those U.S. officials who are still blindfolded about cyber-terrorism.

There is a real war in the East region but it's not anymore the war with religious but uneducated mujahidin, but with highly sophisticated in computer technology enemy. I don't think it was done without any "outside" assistance from those who would love to bring the U.S. to the knees but the fact itself is disturbing.

Let me remind you that China's neighbor Russia is "singing the same song" with China pretty often when it comes to vote for sanctions against rogue governments. Generally, both countries veto almost every U.S. proposition and both countries hate the fact that USA is a major power in the world (perhaps, still the major). They are dreaming about shifting the axle of power to their own countries, away from Americans.

Unfortunately, they're not only dreaming but rather are taking multiple, carefully planned steps to overpower U.S. on the military front, economically, and financially by rising of own influence in all corners of the world. We learned from history that when the power players are in the battlefield of a global scale, all methods are good - don't expect that the players will play honestly, especially from the regimes ruled by current and former communists.

With kind permission of an author of the article "Marina Kalashnikova's Warning to the West", Jeffrey. R. Nyquist, I want to share with you the information below. Forgive me for inclusion of quite a large piece of this article but I consider this information is so important that I cannot squeeze it further. 

"Russia has built an alliance of dictators, what Marina Kalashnikova (mentioned above) calls an "alliance of the most unbridled forces and regimes." Extremists of all kinds serve the purpose of breaking the peace, damaging Western economies, and setting the stage for a global revolution in which the balance of power shifts from the United States and the West to the Kremlin and its Chinese allies. "Among the ideas that animate general staff analysts in the Kremlin, there is the idea of diffusion," says Kalashnikova, "It is not that the Kremlin should strive for territorial expansion and the dissemination of its [political] model. The critical thing is power and the fulcrum of an overall strategic context. In that case, even if the Americans appear influential in the post-Soviet countries, Moscow remains in charge. The [Russian] General Staff therefore has successfully expanded Moscow's position beyond and above the old Soviet position in Africa and Latin America." What prevails, she says, is Moscow's "assertiveness and determination without fear of a reaction from the West."

In other words, the West has already been outmaneuvered. The KGB and the Russian General Staff have taken our measure, and they are laughing at us. Our leaders [read the U.S. Government] do not realize the sophistication of their enemy. They cannot see or understand what is happening. They blink, they turn away, continuing to use concepts gifted to them long ago by Soviet agents of influence. As a nation we are confused and disoriented, believing that the world is beholden to the West's money power - and therefore, peace can be purchased.

"The Kremlin has activated a network of extremists in the Third World," wrote Kalashnikova. "[At the same time] Russia has managed to shake off nearly all international conventions restricting the expansion of its military power." In this situation, the only counter to Russian power is American power. Yet the American president is preparing to surrender that power in a series of arms control agreements that will leave the United States vulnerable to a first strike. Placing this in context, nuclear weapons are ultimate weapons, so that the West's superiority in conventional weapons is therefore meaningless. Whoever gains strategic nuclear supremacy will rule the world; and the Russian strategic rocket forces are in place, ready to launch, while America's nuclear forces are rotting from neglect.

The Russian historian sees that the West relies on the greed of Russia's elite to keep the Kremlin in line. But this is a foolish conceit... the Kremlin's logic is ironclad: Let the West keep its worthless currency. Moscow will have weapons, and in the end Moscow and its allies will control everything. The liberal may believe that protests and appeals to humanity are the ultimate trump cards. The financiers may believe that money makes the world go 'round. Let them try to stop a salvo of ICBMs with liberal sentiment and cash. As far as the laws of physics are concerned, their favored instruments cannot stop a single missile.

According to Kalashnikova, "It is clear that the [Kremlin] regime has no restraint and will commit any crime, break any rule, surpass any benchmark in order to consolidate its already illegitimate power..." Even the old KGB chief, Vladimir Kryuchkov, was appalled: "Putin and others have to answer for what they are doing today to the country," he said. But the West sleeps. The West doesn't want to hear about the danger that rises in the East - from the Kremlin and its Chinese allies."


Recent attack simulation by the Pentagon officials reveled that "The enemy had all the advantages: stealth, anonymity and unpredictability. No one could pinpoint the country from which the attack came, so there was no effective way to deter further damage by threatening retaliation. What's more, the military commanders noted that they even lacked the legal authority to respond - especially because it was never clear if the attack was an act of vandalism, an attempt at commercial theft or a state-sponsored effort to cripple the United States, perhaps as a prelude to a conventional war." (New York Times).

If you didn't believe in the cyber-wars and attributed them to the movies only, what else can convince you more?



Cyber-espionage

As you may guess, stealing sensitive information from U.S. corporations is a part of a big plan for many Chinese conglomerates and the government. Considering a long history of the economic and military espionage, cyber-hacking is relatively new one, and the U.S. government officials are worried about China plans and actions.

In accordance to Brenner, the U.S. counterintelligence chief, perhaps once the Chinese used the strategic information gathered by cyber-espionage about large the American company during business negotiations. "The delegation gets to China and realizes, 'These guys on the other side of the table know every bottom line on every significant negotiating point.' They had to have got this by hacking into [the company's] systems." Brenner mentioned that even one case like this proves that Chinese will work very hard when they need to achieve the goal. It surely puts the national security (and eventually prosperity of our country) at serious risk.

Chinese target any high-level official, senior officers of the large companies or strategic institutions. Even the contractor working abroad can be the target of cyber-espionage. The laptop, USB memory module, the smart phone or PDA - all of it is under risk. "China is indeed a counterintelligence threat, and specifically a cyber-counterintelligence threat" said Brenner.

The cyber-espionage attempts are very difficult to register and prove since today's cyber world includes botnets that can be easily used let's say by Russians who are masking as Chinese. However, several proven cases of cyber-espionage by Chinese should raise the awareness to a higher level and stop making friends with those who want to overrun us at every corner.

Try to "google" the key phrase "china hackers" in English and you will be surprised with a number of article like these:
  1. Britain could be shut down by hackers from China, intelligence
    Mar 29, 2009 ... China has the ability to shut down Britain's vital services, including food or power supplies, because its companies are involved in ...
  2. Hackers in China break into PCs of Dalai, Indian embassy
  3. International hackers, many from China, are attacking NYPD computers
    Apr 22, 2009 ... A network of mystery hackers, most based in China, have been making 70000 attempts a day to break into the NYPD's computer system, ...
  4. Hackers put China flag on Australian film site - Security- msnbc.com
    Jul 27, 2009 ... Hackers posted a Chinese flag on the Web site of an Australian film festival in an escalation of protests against the planned appearance by ...
  5. China's hackers stealing US defence secrets, says congressional ...
    Nov 20, 2008 ... Beijing's spending on rocket science turns outer space into 'commanding heights' of modern warfare and could chill relations with America, ...
  6. Block China Web Traffic IP Addresses and Chinese Hackers
    Protect your web site from Chinese hackers by preventing traffic from IP address ranges originating in China.
Based on 7 year study, Mandiant describes how Chinese cyber-gangsters launched sophisticated attacks and were able to penetrate the government and corporate computer networks while being practically undetected. They describe so-called advanced persistent threat (APT) model and reveal the fact that the majority of APT attacks attributed to China. The shocking truth: existing anti-malware software was able to detect just 24% of the malware used in the attacks. Mandiant describes several stages of APT attacks:
  1. Reconnaissance (getting the identify of individuals they will target in the attacks);
  2. Intrusion into the network using known methods like phishing;
  3. Establishing a backdoor through injection, registry modification, or scheduled services;
  4. Installing multiple hacking utilities; obtaining user credentials and escalation of privileged access up to the administration level;
  5. Data extraction, encryption, compression, storing on stage servers, and following deletion after successful upload to own network.
  6. Maintaining persistence by adjusting the malware.
While APT-type attacks are usually silent, low profile attacks designed for long-term espionage, the recent attack on Google and 20 other large companies is more like open-war type.


Continue to PART III
Back to PART I

Thursday, January 21, 2010

The cyber-gangsters' "weapons" and the state of Internet security

I wrote my first article about cyber crime related to Russian hackers. Writing an article about Chinese hackers (will be published soon) I had to explain why it's difficult to fight against them due to a wide range of tools, methods and existing vulnerability of operating systems and applications in addition to the specific political conditions in China. Since this material turned to more than 15-page information, I have decided to put it into a separate article. So, it's offered here.

 Cyber-gangsters
Before talking about hackers, let's define who are we dealing with? Who are the people or organizations that are motivated to dedicate their intelligence and skills to a dirty business of exploiting computer systems?


Andrew M. Colarik of the USA and Lech J. Janczewski of New Zealand state that, "In the context of information security, terrorists may come in many forms such as politically motivated, anti-government, anti-world trade, and pro-environmental extremists". They further state, "Cyber terrorism means premeditated, politically motivated attacks by sub-national groups or clandestine agents, or individuals against information and computer systems, computer programs, and data that result in violence against non-combatant targets".


Let's add the money-motivated hackers, and you see the picture of the enemy.


The goal of money-motivated hackers is to benefit from money inflow:
  •           with cyber espionage (to get the advanced technology secrets; to disrupt the competitors' networks; or to embarrass competitor and gain the advantage in the same field of business);
  •           by acting as a "cyberbully" and demand money by various methods of electronic blackmailing;
  •           by breaking into financial organizations' computer systems and transfer money to offshore accounts;
  •           by stealing the valuable information and re-sell it to those who wants to use it for own advantage (example: stealing credit card account information and reselling it);  
  •           by "building" the botnets for DDoS attacks and sell the right to use it;
  •           with identity theft by using stolen information to transfer money out of the bank accounts or to buy the goods from the Internet-based stores with newly opened credit cards;
I am sure there are few more methods but you got an idea.


According to a new study from McAfee, data theft and breaches from cybercrime may have cost businesses last year as much as $1trillion globally in lost intellectual property and resources for repairing the damage.


The goal of cyber-terrorists is to intimidate or force a government or its people to perform the changes that serve attacker's political and social objectives or political motivation. The goal also can be described as a disruption of major infrastructures of the country (e.g. nuclear plants, energy supply systems, defense infrastructure, and similar) in order to gain quick advantage in the pre-planned geo-political action.


Whether you want to call it "cyber terrorism" or only "information warfare", unfortunately, it's not the theory, it's the reality (read my blog about cyber attack on Estonia).


As you see, political views have various forms and can be the main motivational factor to be engaged in unlawful attacks or threats of attacks against computers, networks, and the information infrastructure.


I don't know if anyone assigned a name "cyber-gangsters" to all the people and organizations that are politically or financially - motivated to utilize multiple weaknesses of computer systems in order to achieve particular goals but I feel it's appropriate and I will use this term.


The cyber-gangsters' "weapons"
Neither definition-based anti-virus nor any other single solution is enough to block modern threats. Zero-day attacks, "mutating" viruses, or targeted attacks are all high-risk situations requiring an additional layer of protection. Our widely accepted security standards do not meet the needs either. In fact, the PCI standard for financial institutions and 3rd-party vendors involved into financial transactions that is considered pretty tough proved to be inefficient. The cyber-gangsters using the sophisticated sniffer software were able to penetrate into Heartland Payment System AFTER they passed their PCI DSS audit. The result of the breach and lost data for the company was disastrous.
"The number of crimeware-spreading sites infecting PCs with password-stealing crimeware reached an all time high of 31,173 in December, an 827 % increase from January of 2008." Source: Anti-Phishing Working Group, Phishing Activity Trends Report 


Let's look what the "weapons" that are used by cyber-gangsters against personal computer and computer network (not a complete list, for sure).
-         Zero-day attacks
-         "Mutating" viruses
-         Targeted attacks (DDoS) utilizing botnets
-         Application exploits (including SQL injection) due to OS and applications design problems
-         Cross-Site scripting
-         Social Networking site exploits
-         Browser exploits
-         Hosted site exploits
-         P-2-P networking infection
-         Smartphone attacks
-         Wi-Fi protocol weaknesses exploits
-         Social Engineering to collect the information for the following attack
-         Malicious e-mails and spam - based infections
-         Creating malicious underground organizations to assist in cyber exploits and attacks
-         Identity theft (which has also been linked to terrorist activity)
-         Keyloggers, mouse-loggers, etc
-         Rogue Blogs pollution
-         Search engine results manipulation to redirect user to malicious web sites
-         Two-factor authentication circumvention


Why do we loose a war with cyber-gangsters? Imagine that you are a network or security administrator. You will have to take care about a wide range of vulnerable spots in your network, computers, and applications. This range becomes wider every day. As for hackers, it's enough to find only ONE VULNERABLE SPOT and you are fried. Do you see the difference?



1. Infected with a virus
There are various virus-detection technologies, regular or more advanced; however, modern malware can successfully avoid virus detection attempts. None of the today's technologies are able to clean 100% of viruses. The number of various viruses and their variants is well over half of a million, and every day there more and more news about newly created and more sophisticated viruses, worms, and their "brothers"' variants.


As the software engineer pointed in the article (the link above), it is not easy to design the anti-virus software that will be able to detect new viruses since you don't know where to look and what to expect. So, no matter how the technology is advanced, we're still working in the reactive mode.


The "success" of newly-created viruses is obvious. In accordance to the confickerworkinggroup.org, the Conficker A+B virus has infected ~5.9 Millions of PCs, the Conficker C- ~290,000 PCs, and the last variant of Conficker A+B+C -~6.3 Millions of PCs. One in 7 computers infected with Conficker are hosted on Chinese Internet service provider (ISP) Chinanet. The number of infected PCs proves one more time that the most of the virus infections occur on the PCs that are not properly and timely managed. The protection could be achieved simply by installing patch MS8-067 or disabling AutoPlay on a Windows OS.


I don't need to point you to the numerous news about new infections happened almost every day on a large scale. In accordance to Norton Symantec anti-virus company, the top 100 infected sites had on average 18,000 threats and 40 per cent of the sites had more than 20,000 threats. An astounding 75 % of websites on the list were found to be distributing "malware" for more than 6 months. This is the world we live in.


I don't know if you heard anything about Zeus virus but this is the one that successfully avoids most of the anti-virus scanners available today. In fact, the effectiveness of an up to date anti-virus against Zeus is not 100%, not 90%, not even 50% - it's just 23%. Its popularity has also encouraged the opening of the Zeus Tracker which currently list 537 active cyber-gangsers domains, with the majority of them hosted in Russia, the U.S and China, followed by the Netherlands, Ukraine and Germany.


Does it mean we should not spend money and use the anti-virus programs since they don't guarantee 100% virus-free PC? Not at all, some protection is better than nothing. Ask any computer specialist, and every one of them has its own opinion which anti-virus program is better. I have also shared my experience in this blog after I have replaced all anti-virus and anti-spyware programs on my PC with the only one - VIPRE from Sunbelt. Follow the link and find out why I have chosen this product and more details with screenshots.


2. Applications and OS design problems
If the operating systems and applications were designed with a tough security in mind would you see the daily headlines like these?
-         Microsoft confirms 'detailed' Windows 7 exploit;
-         Typical weekly Security Vulnerability Alert (sans.org):
  •           Windows                                                                     4 
  •           Microsoft Office                                                          9 
  •           Other Microsoft Products                                            1 
  •           Third Party Windows Apps                                          4
  •           Mac Os                                                                      21 
  •           Linux                                                                          2
  •           BSD                                                                           1
  •           Solaris                                                                        4
  •           Aix                                                                              1
  •           Cross Platform                                                              9
  •           Web Application' Cross Site Scripting                             5
  •           Web Application“ SQL Injection                                      1
  •           Web Application                                                             8
  •           Network Device                                                              3
-         VMware has advised of a total of 93 vulnerabilities in several of its products, including ESXServer, VirtualCenter, and vCenter.
-         Secunia's typical report:
o        [SA37448] Internet Explorer Layout Handling Memory Corruption Vulnerability
o        [SA37318] Microsoft Windows Win32k Kernel-Mode Driver Multiple Vulnerability
o        [SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability
o        [SA35948] Adobe Flash Player Multiple Vulnerabilities
o        [SA37314] Windows Web Services on Devices API Memory Corruption Vulnerability
o        [SA37273] Google Chrome Two Vulnerabilities
o        [SA36983] Adobe Reader/Acrobat Multiple Vulnerabilities
o        [SA37313] Apple Mac OS X Security Update Fixes Multiple Vulnerabilities
o        [SA37277] Microsoft Office Word File Information Block Parsing Buffer Overflow
o        [SA37309] Microsoft Windows Win32k Kernel-Mode Driver Privilege Escalation


3. Web application security problems
There have been more than 250,000,000 customer record breaches since January, 2005. Each of those compromised records costs companies' on average $202 with the total cost of a data breach ranges from $613,000 to $32,000,000. There two options for compromising the web server: brute force password guessing and web application attacks. In accordance to Imperva, the most destructive attack techniques are: SQL Injection, Cross-Site Scripting, and Cookie Poisoning.

 SQL Injection
SQL Injection continues to be one of the most predominant Web application threats that affect commercial and custom web applications (83% of Enterprises Experienced a Database Breach Last Year). Considering the widespread availability of valuable data on the Web, the popularity of e-commerce and dependency on the web for all kinds of information, attackers are motivated to implement faster, more advanced SQL injection methods to launch high profile, widespread attacks on targeted web sites such as an automated SQL injection via search engines, SQL Injection for web site defacement, malware distribution for Denial of Service (DoS) attacks, and direct database SQL Injection that takes advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a back-end database.

Recent news: Another 1.5 million websites associated with the newest series of SQL injection attacks have been found by network security specialist eSoft.
          Cross-Site Scripting (XSS or CSS): attack that takes advantage of a Web site vulnerability in which the site displays content that includes un-sanitized, user-provided data.
          Cookie Poisoning: attack that modifies the contents of a cookie (personal information stored in a Web user's computer) in order to bypass security mechanisms. 
       Design flaw: Every application security problem starts with poor design. In addition to thousands of desktop/server operating systems vulnerabilities, when you run the application on a top of it, it adds more vulnerability since the initial design was performed by the programmers who are not savvy in application security. Poor design is a cause of many problems that are exploited by not-to-our-surprise savvy hackers. It is the reason why the number of application vulnerabilities greatly exceeds the number of operating systems vulnerabilities.


To mitigate this problem, SANS Institute began educating programmers in application design security and even introduced a new security certification targeting the army of programmers.


4. The problem of botnets
The new technology, Web 2.0, browser-based computing, and mobile platforms give rise to a new breed of threat: stealthy Web-borne malware used to build botnets of enterprise and consumer PCs to steal customer data, intellectual property, and user credentials.
There are between 4 and 6 million computers scattered across the globe that have been compromised by cyber-gangsters without the users' knowledge. Botnets contribute to more than 87% of all unsolicited mail, equating to approximately 151 billion emails a day.


Last September, a botnet research group Shadowserver was monitoring more than 3750 distinct botnets averaging 20,000 or more bots each, with some containing more than a million infected PCs (!). Bots are so inexhaustible because they install as Trojans from malicious websites, bypassing many of today's security controls.


There are millions of PCs that are unpatched with the latest security fixes from many vendors. All of them are easy targets for "botnet kings".


I want particularly discuss the so-called Fast-flux and Double-flux botnets because they are prime example of sophistication that the cyber-gangster have these days.
Fast flux (fluctuation) is a technique to continuously move the location of a Web, email, or DNS server from computer to computer on the botnet in an effort to hide its malicious activity (spamming or phishing) and make the detection more difficult. IP blacklists that I personally use against spamming of my e-mails are basically useless in finding fast flux-based botnets.


"Double-flux, as you may guess, is similar to Fast flux but with double trick. With Double flux, the DNS name servers that resolve the Web host names are moved from computer to computer, so you don't know where you are actually connected (and in many instances, you are connected to the proxy pointed to the web server but not to the actual web server. To add even more protection against investigators, many of these systems encrypt (!) their communications, which makes it even more difficult (and close to impossible) to track their activities.


With compromised computers issuing 83% of the 107 billion spam messages distributed globally each day, the shutdown of botnet hosting ISPs, such as McColo in 2008 and Real Host in 2009, appear to have made botnets re-evaluate and enhance their backup strategy to enable recovery in just hours. It is predicted that in 2010 botnets will become autonomously intelligent, with each node containing an inbuilt self-sufficient coding in order to coordinate and extend its own survival. (Source: MessageLabs Intelligence 2009 Annual Security Report)
Are you seeing what I'm seeing?  There is no light in the end of a tunnel, and so far, we are terribly losing the cyber war.


5. Social networking sites problems with uneducated users and security
As technology advances, the cyber-gangsters are on the leading edge. The "break-into-the-system" old methods still take place but now they build the web sites with malicious content, turn their greedy eyes to the social networking web sites, and employ the latest and sophisticated technologies to achieve own goal.

For instance, with over 350 million users (!) of Facebook, this social networking web site becomes a prime target for cyber-gangsters. I have no doubts that the FSB (former KGB) has a copy of all Facebook accounts coupled with scientific analysis software to filter down the most useful intelligence data on citizens of many countries, and especially, United States. Hey, it's almost free database with people who have no clue that their opinions, personal information, employment, personal preferences, and pictures are being thoroughly analyzed and stored in the mainframe computer. I would be surprised if China is not following the same plan, or, perhaps, Russians share their intelligence data with their partner? Thank you, Facebook!


Do you think I am speculating? If the U.S. Government officials reported that in-spite all the efforts to protect the network, they miss at least 20% of all attacks, what the Facebook security personnel can do better? Yes, now they might have enough cash to buy good equipment and security software but we all know that it's not enough. It is the case when "social networking" is being used for "social engineering".


There is a great Top Ten 2010 Social Networking Websites Review Comparison web site that also highlights the security measures applied on each site (Privacy Settings, Block Users, Report Spam, Report Abuse, safety tips). Most sites have information pages dedicated to educating users about the risks of Internet scams but what the chart is missing? One of the most important parameters is how the web sites are protected against phishing and malware attacks. And here is a "proof":
  • Beware: Spam on Facebook and Twitter has reached epidemic.
  • Koobface (social networking worm). It gains access to Facebook profile pages and directs you to view a video that then encourages you to update your Flash player. Malicious files such as flash_update.exe and bloivar29.exe are being downloaded and installed which results in a range of visible problems, including modifications to your Facebook profile, with the immediate result being an error message to contact support.
  • The attack that took down Twitter on 12/9/2009 used legitimate credentials to log in and redirect Twitter.com to a site purporting to be under the control of the Iranian Cyber Army. According to Twitter, the DNS (Domain Name System) settings for Twitter.com were hijacked, resulting in roughly 80 percent of the traffic from the site being redirected elsewhere from 9:46 p.m. to 11 p.m. PST.
  • Lost My Phone, Give Me Your Number!! Groups On Facebook Are A Spammer's Paradise
  • Facebook password-reset spam is Bredolab botnet attack
  • Sophos warns of Facebook 'Rubber Duck' identity theft. A Sophos Asia-Pacific recently installed the Facebook equivalent of a honeypot hacker and discovered how easy to steal an identity on Facebook.
Why the social networking sites became the targets of many cyber-gangsters? The answer is simple. According to FBI, those sites are "a gold mine of personal information" that can be stripped down redirecting users to malicious web sites through innocent link or video. Considering the average Facebook user, for instance, has about 120 friends, it's easy to imagine how the links are distributed and multiplied. Now consider the second number: 300 millions. It is the number of Facebook users. Doing a simple math calculation we are facing a nightmare situation with the security.

"The cyber-criminals are very adept to using social engineering," said Donald DeBold, director of threat research for CA, an Internet security company. "Your friend is in trouble traveling in another country, 'I lost my wallet. I need help.' They exploit the curiosity aspect out of human nature."

This information is distributed not only on social networking sites but also by e-mails harvested in advance. A friend of mine recently called me with a warning that I may receive e-mail with a request to send him money since "he is in London now, and someone stole his wallet but this is not true". I have explained him how the e-mail harvesting works and why his contact list may receive the "cry-help" e-mails. The first recommendation is to quickly change your e-mail address.

I don't say that social networking web sites are doing nothing to protect its users. For instance, Facebook has developed automated systems that detect compromised accounts. They spot and freeze accounts that are sending an unusually high number of messages to their friends.  However, this "business" is very attractive for cyber-gangsters and they become more and more creative.

The Internet Crime Complaint Center received more than 72,000 complaints about Internet fraud in 2008. These cases involved $265 million of financial losses averaging $931 of lost money per person.

6. Daily problems with Internet browsers
No matter how good today web browsers are, all of them are still vulnerable. Recent hacking of Google in China is a proof since it was attributed to a zero-day vulnerability of Internet Explorer (one of the most difficult vulnerability to fix). By the way, more and more people are discovering zero-day vulnerabilities sometimes existed for a long as 2 years. However, the most troubled is the fact that the core of browser security, Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, could be exploited.

Below are some headlines:
  • Security Pro Says New SSL Attack Can Hit Many Sites
  • Zero-Day Flaw in SSL and TLS Protocols (11/05/2009) A zero-day flaw in the secure protocols could be exploited to launch a man-in-the-middle attack.  The discovery of this authentication gap vulnerability means that all affected libraries will need to be patched.
  • Some Firefox extensions may be exploited to install malware.
  • Firefox hit by multiple drive-by download flaws
  • Typical week's vulnerabilities in browsers registered by Secunia service:

    • [SA37448] Internet Explorer Layout Handling Memory Corruption
    • [SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability
    • [SA37273] Google Chrome Two Vulnerabilities

    7. Malicious web sites with pre-built code
    Based on some observations, more than 75% of maliciously engineered web sites are actually legitimate destinations like BusinessWeek.com and MLB.com. As you understand, when employees visit those sites, they become the victims of so-called "drive-by downloads" hacking that automatically install some hacker's virus on your network. Attacks against web applications constitute more than 60% of the total attack attempts observed on the Internet. For instance, rogue on-line pharmacy sites, claiming to sell genuine medicine to naive shoppers, continue to be a problem.
The cyber-gangsters are extremely creative by covering the malicious code with innocent web page content. They use advanced knowledge of web design, programming, and security. I don't want to go into details but I was "impressed" with a hiding technique that is using regular cascading styles sheet (CSS) parameters. Since the style sheets allow creation of several layers of the texts combined with images on the same web page, the cyber-criminals used the CSS parameter that covers the malicious region of a page with innocent content (like advertisement). It could be social networking forum or regular web site that looks exactly like a brand-name counterpart. Looking at the web site, how do you know that that particular web page is infected with a malicious code? Close to impossible!

8. Weak security on most of the hosted sites
My web sites also witnessed the hacking. Apparently, my ISP was not aware but the hacker inserted the Google Analytics - like code into main pages of all web sites residing on that particular server and redirecting web surfers to the web site in China. When I contacted ISP's technical support they said it's my problem and they are not responsible for fixing or protecting against hacking. The hackers would hug and kiss this ISP for such an attitudeรข€¦ It leads to thousands of web sites getting compromised by redirecting to scareware, breaking trough the web servers and stealing data (Hackers hit leading UK climate research unit. Reports are coming in that hackers have breached the servers of one of the world's major climate research units (CRU), posting around 61 megabytes of emails and documents to an FTP server in Russia...).

9. P2P security problems
Most of the employers who are aware of danger to use the peer-to-peer network applications usually restrict any communications for BitTorrent, Kazaa, Gnutella, FreeNet, and Morpheous รข€“ the programs that allow the information exchange and uploading/downloading the files through P2P file sharing networking with higher port numbers.  A BitTorrent client, for instance, normally associates the TCP port number 6881. However, if this port is busy for some reason, the client will instead try successively higher ports (6882, 6883, and so on up to a limit of 6999).

In the view of recent events, these problems may seem not significant. However, these networks are still very much alive and serve the ground to plant if not the new but the known worms and viruses through the infected files being downloaded.

I don't know if you have a sin of downloading the program with a crack through BitTorrent or eMule network but I can give you almost 100% guarantee that the downloaded programs (especially most popular) have an infected file embedded into executable, serial number generator or cracking file.

The danger from the infected file can be quite real since the cyber-criminals (who usually are hidden with a fancy names or avatars) have many options for exploiting the computers. It can be not only the Trojans or viruses for backdoor access (to build the path from outside world to the trusted device) but even legitimate application but with the old, unpatched, and therefore vulnerable files that later can be exploited with any of the freely available hacking tools. Your confidentiality and authentication รข€“ the components of computer security - are no longer in a place since you don't know who actually distributed infected files and who actually gained access to your private folders.

One way to fight with this type of cybercrime is not use the P-2-P networking at all. It may seem obvious but for those who still want to use it, there is only one way to gain the trust is to assign a digital signature to each user, and based on the results and history of downloads or information exchange, assign a level of trust. I don't know if this idea will be implemented soon or it has some flaws but, perhaps, it make sense considering the bad reputation of peer-to-peer networking.

10. New technologies become new targets
  • Cloud computing.
A subscriber to the Amazon pay-as-you-use EC2 cloud computing has had their website hacked, and a command and control (C&C) system installed for the Zeus botnet, which continues to be a problem for PC users, despite the worm being almost two and a half years old.... More
  • Smartphones
As I mention in this article, the attacks on Smartphones will increase in volume. They have already started. The first iPhone was Worm Detected in November, 2009. Users, who have not changed their default Secure Shell (SSH) login password and have jailbroken their iPhones to allow third-party applications to run, are vulnerable to the malware. More and more hacking becomes associated with a "ransomware": iHacked: jailbroken iPhones compromised, $5 ransom demanded, New LoroBot ransomware encrypts files, demands $100 for decryption. Once malware-proof, Smartphones actually have enough security holes to be vulnerable to various hacking attacks. I am not surprised that most of the attacks target the most popular iPhone: Second iPhone worm behaves like botnet. It has been identified by security vendor F-Secure, which claims the new worm has botnet capability and is more threatening than its predecessor. SpyPhone appharvests personal data from stock iPhones.

  • RFID chips
New type of counterfeit credit/debit card fraud that is very disturbing: RFID chips vulnerability. The embedded into credit cards or U.S. passport chips can be hacked with under $100 kit. One simple question arises: how this presumably secure technology was approved for implementation with such a big hole in security?

11. Phishing/Identity Theft and Malicious e-mails / spam
The slogan for this paragraph could be the phrase: "Phishing is a major problem because THERE IS NO PATCH FOR HUMAN STUPIDITY" (Mike Danseglio, program manager at Microsoft). All phishing methods are based on presumption that the PC user is stupid enough to open e-mail, browse to the web site, or click on the offered link without second thought that it may be a phishing attempt. No software or hardware protection can fight with phishing unless the PC users are educated enough about security awareness, and this is the reason why identity and money theft online is so wide-spread.

This is a reason why all sort of online thieves are still ripping the money from naรƒ¯ve computer users.

Here is a list of the Top 10 complaints received by the FTC:
            1) Identity Theft - 32%
2) Shop-at-Home/Catalogue Sales -8%
3) Internet Services -5%
4) Foreign Money Offers -4%
5) Prizes/Sweepstakes and Lotteries -4%
6) Computer Equipment and Software -3%
7) Internet Auctions -3%
8) Health Care Claims -2%
9) Travel, Vacations and Timeshares -2%
10) Advance-Fee needs and Credit Protection/Repair -2%

Some recent headlines:
-       Phishing experiment sneaks through all anti-spam filters.
-        A recently conducted ethical phishing (New study details the dynamics of successful phishing) experiment impersonating LinkedIn by mailing invitations coming from Bill Gates, has achieveda 100% success rate in bypassing the anti-spam filters it was tested against.
-        RockYou has suffered a serious hacker attack that has exposed 32 million of its customer usernames and passwords, leading to possible identity theft.

The word spam is hated by every PC user. Spam now contaminates every form of electronic communication from IM to SMS and from blogs to tweets. The global spam rate for September 2009 is 86.4 %, but the rate for US businesses is reaching 93.8%!

Spam e-mails are used for various reasons but all of them present bigger danger than N1H1 virus that was predicted to overcome the human population quickly. Spam is more successful since e-mails travel across the globe in a matter of seconds and every e-mail box contains this, the most hated type of e-mails. Phishing, re-directing to malicious web sites, infected with a virus legitimate web sites, or faked web sites, e-mail attachments infected with a virus, or combination of methods “all of it“ is not a full list of online threats for PC users.

How do the hackers know your e-mail address? First of all, if you are an active social networking user your e-mail can be easily grabbed by the e-mail harvesting programs. Also, if the web site where you left your e-mail address was hacked, all the information is easily obtained by the hacker. The e-mail lists are being sold on the Internet legally and illegally. I have special e-mail addresses for mass e-mails where I don't care about spam. At the same time, I often resist to provide my e-mail address that I use for business to avoid spam.

With automated spam tools, flexible botnets, and targeted spam campaigns, the spammers constantly improve the technique to overcome any effort to stop them. I am sure that you are familiar with the CAPTCHA technology to verify that you are human when you are filling out the online form. This method helps to fight spammers who use the automatic "fill-out" programs to place the spam links into your online form. Needless to say, the spammers have the tool that can read the image of letters (no matter how distorted they are) and still can fill out the form automatically posting the links they would like you to receive. I design and use the Flash-based online forms for my web sites that are more difficult to circumvent. So far, I was successful and was getting only manually-filled form results.

 "Some of the high spam levels seen across the US can be attributed to the economic challenges experienced globally since the end of 2008 as well as Internet advancement including the high adoption of social networking," said Paul Wood, MessageLabs Intelligence Senior Analyst, Symantec."

Cyber-gangsters are tireless in finding new methods to spam. For instance, they have started preying on Verizon Wireless customers, sending out spam e-mail messages that say their accounts are over the limit and offering them a "balance checker" program to review their payments. Faking Verizon Wireless e-mails offer the balance checker that is actually a malicious Trojan horse program.

Did you receive the e-mail "notification" from IRS about your funds? I did. It is so wide-spread that the IRS has a special message for all taxpayers about being careful with those e-mails. In fact, on December 9, 2009 the Project Honey Pot (to learn more about spam and the spammers who send it, the largest community tracking online fraud and abuse) achieved a milestone: receiving its 1 billionth spam message - a United States IRS phishing scam. In accordance to the Project's report, the most significant highlights include:
- Malicious bots have increased at a compound annual growth rate (CAGR) of  378% since Project Honey Pot started 5 years ago;
- Over the last five years, you'd have been 9 times more likely to get a phishing message for Chase Bank than Bank of America, however Facebook is rapidly becoming the most phished organization online;
- Finland has some of the best computer security in the world, China some of the worst;
- It takes the average spammer 2.5 weeks from when they first harvest your email address to when they send you your first spam message, but that's twice as fast as they were five years ago;
- Every time your email address is harvested from a website, you can expect to receive more than 850 spam messages.


Spam levels continue to rise says Symantec. Around 9 out of 10 email messages now include links or information related to spam or phishing, a new study has indicated. I have posted the article about my method of fighting with spam but with today's botnetsthat are spread out across the globe, my method became less effective. At the same time, if you have the opportunity to configure your mail server I still suggest you to filter down all e-mails with the .CN domain extension.

The other folks' experiment in blocking IP addresses originating worm/virus attacks (that was similar to my method) ended up blocking:
-          China Anhui Province Network
-          China Beijing Province Network
-          China Fujian Province Network
-          China Guangdong Province Network
-          China Hangzhou Node Network
-          China Hubei Province Network
-          China Jiangmen Broadband Network
-          China United Telecommunications Corporation, Beijing
-          Oriental Cable Network Co, Shangha

I have seen so many spam e-mails originated from China that, perhaps, I can safely filter down all of them but I cannot do it if the spam from the Chinese spammers comes from the server located in Brazil or Canada.

12. A circumvention of two-factor authentication
As the online banking was growing in popularity and the security concern pushed the developers to create a two-factor authentication technique, more and more people began shopping and managing their finances online. I remember when in 2002 I have been working on implementing RSA Security solution for remote login to the front firewall. I had to activate the security fobs that generated every 30 sec a random number magically synchronized with the server where the RSA software resided.  In fact, I still use similar fob with PayPal by complementing my user ID and the password with random characters what surely provides additional layer of security.

Since then, this additional layer as well as two-factor authentication is slowly becoming not so bullet-proof. In fact, cybercriminals have successfully circumvented the authentication process. No, they did not break trough the both factors of authentication but rather, first of all, infected the targeted PC with a malicious program and then patiently waited for the crimeware-infected victim to authenticate himself in order to exploit the access in real-time. A recently published article at MIT's Technology Review, details a case where cybercriminals managed to steal $447K despite that two-factor authentication with a fob (similar to mine) was in place.

With banker malware clearly able to operate even on PCs with up-to-data antivirus product (read about Zeus virus above) how to fight it? Perhaps, timely alerts about online transactions could be sent issuing one-time passwords (OTP) over SMS to report a fraud to the report center in order to freeze the transaction and the account itself. The irony is that SMS alerts itself could be exploited due to "badly implemented processes within particular financial institutions allowing a customer to change the mobile number in any particular moment of time. For instance, a Chinese bank wouldn't accept U.S mobile number for SMS alert and one-time password services because cybercriminals are already using services offering to accept and forward any data sent to a particular mobile number within a country where they maintain local numbers for fraudulent purposes". Let's put simply, we cannot rely on two-factor authentication if the environment where we operate is already compromised.

Always in a "reactive" mode
Do you think Antivirus software will save your PC from infections? Consider this. The May 09 lab test of antivirus software from several known vendors reveals not very bright perspective on detecting new viruses:

It's actually a scary picture! Do you realize that on average your antivirus software can detect only 50% of new malware programs? I also found very interesting information about what the antivirus programs are being used by the PC users. About 47% of users use free programs, 23% spend money to buy the full-blown product, about 16% use cracked (!) versions of the commercial software, about 10% still use the evaluation copies, and about 4% either don't use it at all or have no clue what it is.

Frankly, after reading the report, I was pleased with the only one fact: I don't use any of the mentioned software. I have switched to VIPRE from Sunbelt Software that offers new detecting technology and the performance superior to other vendors. While I was among those who use the free versions of the software for many years, this time, after VIPRE detected 11 Trojans on my PC that neither Software Doctor, AVG, nor Adware together could not detect, I have purchased 3 licenses for my home PCs and laptop. I still don't regret. I am waiting for the next version of the software that will include not only Antivirus+Antispyware capabilities but also built-in desktop firewall that should be a free upgrade to the licensed users. I mentioned VIPRE in my blog in April 2009.

Let's get back to the facts.

2 years ago, the Dutch company Secunia released data demonstrating that 28% of all installed apps areinsecure. Recently released WorldMap shows a relatively high rate for insecure programs found on a single PC. The U.S has 3 insecure applications installed per PC on average. Now, I want to reveal another scary number. Considering the number of PCs functioning, U.S. - based PC users have more than 2.7 billion vulnerable programs installed. Yes, not millions but big "B"!

The latest version of Secunia software goes beyond simple discovery and elimination of malware and potentially undermining the usefulness of the antivirus programs in general by measuring the exploitability of cross-browser plug-ins such as Adobe Flash Player, QuickTime, or Sun's Java. I believe it's the first company that reveals the sad truth about wrong emphasis on the scanning technology only forgetting about other vulnerabilities and leaving PC users unprotected with a false sense of security.

I am familiar with this online software since I use it periodically to verify my PC (it's a free subscription). More comprehensive checkup would cost you a couple of bucks. The program does not remove the viruses but rather points to the outdated versions of the software and plug-ins that must be updated immediately. For instance, I found that for some reason my PC has 4 different versions of Adobe reader and all of them are outdated and had to be patched with security updates.

If you ever updated Java software on your PC and had curiosity to look at the listing of installed software, you would be surprised to find out that your PC contains several outdated versions of Java because the Java update software never removes the old versions. As you understand, the folders with the old versions might contain the files that are not patched and created the area of vulnerability.

So, the workstations, laptops, and now the notebooks must be patched as soon as possible not only for OS but also for many third-party programs and plug-ins. The failure to ignore it is like playing Russian roulette รข€“ even with a good luck, earlier or later your system will be compromised. It only takes a single unpatched application or a browser plug-in to exploit the PC by the cybercriminal. Next moment you lose the ownerships of your PC and the owner becomes someone in China. This time, it will not be the teenager who wants to prove own significance by taking over your PC but your PC will become the tool in the hands of cybercriminals to pursue more financially rewarded plans.

Recently, Secunia conducted comparative review of the detection rate of 12 different Internet Security Suites against 300 popular exploits. They found that even the top performer in the test is in fact performing poorly in general. They concluded:

"These results clearly show that the major security vendors do not focus on vulnerabilities. Instead, they have a much more traditional approach, which leaves their customers exposed to new malware exploiting vulnerabilities."


The table of results from Secunia clearly demonstrates that many of your favorite anti-virus products failed to sense the exploits.

Despite the fact that many applications' vulnerability has been already addressed, the end users are still living in the reactive response world. "Cybercriminals on the other hand, took notice, and following either common sense or publicly obtainable data indicating that end users remain susceptible to already patched vulnerabilities, started integrating outdated exploits into what's to become one of the main growth factors for web malware in the face of today's ubiquitousweb malware exploitation kits."

As you see, with all those tools, simple and quite complicated techniques and hacking methods the sophistication of the cyber-gangsters is growing day after day. They have penetrated into every facet of the Internet. Even Google is also not a proof against malicious software. Google is experiencing SEO (Search Engine Optimization) attacks through crafting custom rogue blogs designed to target the 'long tail' of difficult to understand Google searches to avoid having to compete with more popular searches in Google results, according to cyber intelligence company Cyveillance. The blogs redirect visitors that have found them via a Google search, taking them to Chinese domains that attempt to install fake anti-virus software on victims' computers.Yahoo also targeted by Chinese cyber attacks - similar to the one that affected Google.eSoft investigated the matter further and found over 800,000 active URLs acting as rogue blog middleman sites.

A "quality" of hacking software is often higher than the quality of countermeasures.  A recently conducted test by malware researchers exposed that 8 out of 10 malware samples used in the test, successfully bypassed Windows 7's default UAC (user access control) settings. And we are talking about the latest desktop operating software! Yes, we can change some parameters and make the OS more resistant but Microsoft favored the functionality and "likeability" of freshly installed software vs. security probably pursuing the sales goals.

A steady stream of security flaws in the Microsoft Internet Information Services (IIS) software is causing a stir in security researcher circles, with hackers reportedly issuing details of the flaws faster than Microsoft's R&D staff can patch them. Microsoft has warned about hackers starting to use DirectX-enabled files to give them remote access to users' PCs across the internet.
Are you following me? Faster than they can patch them! It is in addition to the fact that the new malware is not being detected in 30% of cases on average! Now, think about our electric grid that is vulnerable to a cyber attack or every other piece of U.S.> infrastructure.

Recently, 60 Minutes (CBS News) disclosed an attack on Brazil's grid. In short:
  • We're not ready for a cyber attack;
  • The hackers can move much faster than the U.S. government;
  • A lot of the worst attacks will revolve around the power grid since everything needs electricity.
"Director of the Center for Strategic and International Studies Jim Lewis spoke of a computer security breach at the CENTCOM network in which intruders managed to gain access to a highly sensitive US military computer system and stay inside for days.  The breach may have been made possible through planted, infected flash drives; the U.S. military has since banned the use of the portable memory devices."

In addition, at a congressional hearing last year in Washington, U.S. administration officials testified that the government's cyber initiative has fallen far short of what is required. Most alarming, the officials said, there has never been a full damage assessment of federal agency networks.

All of it is not so encouraging information, don't you think? And how many times I mentioned China?