Saturday, November 13, 2010

Security pros fail to get a grip on meaty bot

Lethic spam package uses Stuxnet nuke nobbler cert ploy


A new variant of the Lethic botnet agent comes signed with a digital certificate from the same firm whose identity was abused by the infamous Stuxnet industrial control system worm.

Lethic is a spam-spewing botnet that ranks relatively low in terms of compromised machines but bears a disproportionately high responsibility for the world's dodgy pharmaceuticals and replica watch junk mail. Takedown efforts at command and control systems back in January only provided a temporary respite from the deluge.


Recent variants of the Lethic botnet come "signed" with digital certificates from Taiwanese manufacturer Realtek Semiconductor Corp, just like variants of Stuxnet that infected power plants in Iran, India and elsewhere back in summer. Stuxnet is capable of reprogramming SCADA-based industrial control systems.

Iranian authorities admitted the worm infected systems at its controversial Bushehr Nuclear Power Plant but denied this was the reason for subsequent delays in bringing the reactor online, blaming a mystery "minor leak" instead.
The digital Realtek certificate misused by the Stuxnet worm was verified by a certificate authority. Lethic's Realtek signature, by contrast, wasn't verified and is probably some sort of forgery.

Zscaler, the security firm that first noticed the abuse of the Realtek certificate, reckons this is evidence that malware authors are picking on the same organisation for convenience rather than because of any collusion between the unknown Stuxnet and Lethic gangs.

Mike Geide of Zscalar concludes a detailed and nicely worked analysis by concluding that even though the Realtek signature used in recent variants of Lethic was a counterfeit, the same tactic may have been applied by the same gang to other strains of malware. "While this is not a digital signature - it is still identifying info that may be able to tie certain malware samples to the same author / group / or binary builder,"

 

Wednesday, November 3, 2010

Microsoft Warns of Attacks on Zero-Day IE Bug

Microsoft Corp. today warned Internet Explorer users that attackers are exploiting a previously unknown security hole in the browser to install malicious software. The company is urging users who haven’t already done so to upgrade to IE8, which includes technology that makes the vulnerability more difficult to exploit.
According to the advisory Microsoft published, this is a browse-to-a-malicious-site-and-get-owned vulnerability. The company reports that the exploit code was discovered on a single Web site that is no longer online. But if past attacks against unpatched IE flaws are any indicator, it will probably not be long before the attack is stitched into plenty of other hacked and malicious Web sites.
Redmond says Data Execution Prevention (DEP) technology enabled by default in IE8 helps protect against attacks, and that the same protection is enabled on all supported platforms, including Windows XP Service Pack 3, Windows Vista Service Pack 1, Windows Vista Service Pack 2, and Windows 7. IE9 beta apparently is not at risk from this threat.

http://krebsonsecurity.com/2010/11/microsoft-warns-of-attacks-on-zero-day-ie-bug/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+KrebsOnSecurity+%28Krebs+on+Security%29#subscribe2

Google Extends Security Bug Bounty to Gmail, YouTube, Blogger

Google on Monday said it was expanding a program to pay security researchers who discreetly report software flaws in the company’s products. The move appears aimed at engendering goodwill within the hacker community while encouraging more researchers to keep their findings private until the holes can be fixed.


Earlier this year, Google launched a program to reward
researchers who directly report any security holes found
 in the company’s Chrome open-source browser project.

With its announcement today, Google is broadening the program to include bugs reported for its Web properties, including Gmail, YouTube, Blogger and others (the company says its desktop apps – Android, Picasa and Google Desktop, etc.  are not included in the expanded bounty program).

The program is unlikely to attract those who are looking to get rich selling security vulnerabilities, as there are several less reputable places online where critical bugs in important online applications can fetch far higher prices. But the expanded bounty may just win over researchers who might otherwise post their research online, effectively alerting Google to the problem at the same time as the cyber criminal community.

“We already enjoy working with an array of researchers to improve Google security, and some individuals who have provided high caliber reports are listed on our credits page,” Google’s security team wrote on the company’s security blog. “As well as enabling us to thank regular contributors in a new way, we hope our new program will attract new researchers and the types of reports that help make our users safer.”

http://krebsonsecurity.com/2010/11/google-extends-security-bug-bounty-to-gmail-youtube-blogger/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+KrebsOnSecurity+%28Krebs+on+Security%29

Ind. AG sues WellPoint for $300K over data breach

http://www.businessweek.com/ap/financialnews/D9J5JNK00.htm

The Indiana attorney general's office is suing health insurance giant
WellPoint Inc. for $300,000 for waiting months to notify customers
that their medical records, credit card numbers and other sensitive
information may have been exposed online.

The lawsuit filed Friday in Marion County accuses WellPoint of
violating a state law that requires businesses to provide notification
of data breaches in a timely manner.

State officials say the personal records were exposed for at least 137
days between last October and March. The suit says WellPoint learned
of the problem Feb. 22 but didn't start notifying customers until
June.

WellPoint has said 470,000 individual insurance customers might have
been affected.

Messages seeking comment were left with WellPoint spokespeople.

University Posts Info Of 40K Students

http://www.npr.org/templates/story/story.php?storyId=130903298

The Social Security numbers, grades and other personal information of
more than 40,000 former University of Hawaii students were posted
online for nearly a year before being removed this week, The
Associated Press has learned.

University officials told the AP that a faculty member inadvertently
uploaded files containing the information to an unprotected server on
Nov. 30, 2009, exposing the names, academic performance, disabilities
and other sensitive information of 40,101 students who attended the
flagship Manoa campus from 1990 to 1998 and in 2001. A handful of
students from the West Oahu campus were included in the security
breach.
[..]