Page 2 of 9 FirstFirst 1234 ... LastLast
Results 11 to 20 of 86

Thread: Last Security News

  1. #11

    Default Mac OS X in hackers' crosshairs, report says

    Mac OS X in hackers' crosshairs, report says
    Security vendor Symantec has warned that Apple's OS X operating system is increasingly becoming a target for hackers and authors of malicious software.
    In its seventh biannual Internet Security Threat Report, Symantec said over the past year, security researchers had discovered at least 37 serious vulnerabilities in the Mac OS X system. The company said that as Apple increases its market share with new low-cost products such as the Mac Mini, its user base is likely to come under increasing attack.

    "Contrary to popular belief, the Macintosh operating system has not always been a safe haven from malicious code," the Symantec report stated. "Out of the public eye for some time, it is now clear that the Mac OS is increasingly becoming a target for the malicious activity that is more commonly associated with Microsoft and various Unix-based operating systems."

    In the report, Symantec also said that Apple Computer had become a target for new attacks and pointed to the appearance of "a rootkit109 called Opener" in October 2004 as an illustration of the growth in vulnerability research on the OS X platform.

    "The various OS X vulnerabilities allow attackers to carry out information disclosure, authentication bypass, code execution, privilege escalation and (denial-of-service) attacks," the report said. "Symantec believes that as the popularity of Apple’s new platform continues to grow, so too will the number of attacks directed at it."

    On Monday, Apple released patches for flaws in its operating system. The company could not be immediately reached for comment.

    Symantec sells a range of security products designed to protect Macs, and the report, by stressing the threat to Apple systems, could encourage Mac owners to bolster their defenses.

    But Symantec's concerns were echoed by James Turner, a security analyst at Frost & Sullivan Australia, who said many of the people who bought Apple products were not concerned about security, which left them wide open to attack.

    "The iPod, PowerBooks and mini Macs are cool products," Turner said. "The byproduct is that people are buying these products for form over function. They say it looks pretty, and then buy it, but don't secure it. As Apple increases its market share, it will be a legitimate target."

    Adam Biviano, a senior systems engineer at security software company Trend Micro, said all complex operating systems had security flaws and the more popular the platform, the more likely it would be attacked.

    "All sophisticated platforms--Mac, Linux, Solaris or anything else--will have vulnerabilities," Biviano said. "The only reason Windows has had mass exploits written for it is the sheer number of connected devices that are present on most networks. As soon as you start seeing mass deployment of any technology, you are going to see exploits."

    While there have not been any mass outbreaks of viruses targeting the Mac, the potential does exist, Biviano said

    "You don't see Macintosh viruses in mass outbreaks, but you do see them in the labs as proof of concepts," he said "There aren't any outbreaks because there are simply are not enough (Macs) out there. For a virus to be successful, it needs a combination of an exploit and a large target audience."

    Biviano noted that among cell phones, writers target the most popular operating system, not Microsoft's platform.

    "Look at where mobile viruses are going, and they are not targeting Microsoft--they are targeting the market leader, which is Symbian," he said.
    source:news.com

  2. #12

    Default Panda Software reports the emergence of pharming as a serio

    Panda Software reports the emergence of pharming as a serious threat to users
    march, 23th, 2005 - Panda Software is now warning of the emergence of a new online fraud technique, sophisticated and dangerous: pharming.

    Pharming involves altering DNS (Domain Name System) addresses so that the web pages that a user visits are not the original ones, but others created specifically by cyber-crooks to collect confidential data, especially information related to online banking.

    Pharming attacks can be carried out directly against the DNS server, in such a way that the change of address will affect all users accessing this server while they browse the Internet, or they can be carried out locally i.e. in individual PCs. This second scenario is much more dangerous, not just because it is more effective, but because it is easier for attackers.
    They only need to take two actions: modify a small file, called hosts, which can be found in any computer running Windows and using Internet Explorer to access the Internet; and create a false web page. The host file stores a small table with the server and IP addresses most commonly accessed by the user, so that it is not necessary to access the DNS server to convert Internet addresses (URLs) into IP addresses. If this file is overwritten, for example, with false addresses for online banking pages, whenever a user types the name of this bank in the browser he will access the page created by the hacker which has exactly the same appearance as the genuine page. The unsuspecting victim could then enter confidential data unaware that it is really falling into the hands of the cyber-crook.

    The hosts file can be edited directly by the hacker (by accessing remotely to the system) or using malicious code, normally Trojans such as some variants of the Bancos, Banker and Banbra families. Pharming attacks can also be perpetrated by exploiting any software vulnerability that gives access to the system files.

    Panda Software is offering the following advice to users to help prevent them falling victim to pharming attacks:

    - Use anti-malware software combining proactive and reactive detection systems: the simplest way of manipulating a computer so that it becomes the victim of a pharming attack is by using malicious code, generally Trojans. It is highly advisable to use proactive protection systems that can pre-empt threats and block them simply by analyzing their behavior.

    - Install a personal firewall: this precaution will prevent a hacker from entering the computer through an unprotected communication port and modifying the system.

    - Frequently update the software installed on the computer or have automatic update systems enabled to ensure there are no vulnerabilities that can be exploited in order to launch these kinds of attacks.

    :!: shakhe.bizhat.com :!:

  3. #13

    Default The 5 viruses most frequently detected by Panda ActiveScan

    march, 23th, 2005
    The 5 viruses most frequently detected by Panda ActiveScan, Panda Software's free online scanner:
    1)Netsky.P; 2)StartPage.FH; 3)Mhtredir.gen; 4)Downloader.GK; 5)Shinwow.E.

  4. #14

    Default Vulnerability in Java Web Start

    Madrid, March 24, 2005
    Sun has reported a vulnerability in Java Web Start that could allow privilege elevation of a non-trusted application and indiscriminate permission to read, write and execute on the local system.

    Java Web Start is a platform that allows developers to deploy complete applications to final users accessible from any browser.

    By default Java applications run in a virtual environment, called "sandbox", to prevent security problems that indiscriminate access to system resources could imply. Read, write and command execution restrictions are imposed on a Java application to protect the system from possible attack.

    The vulnerability detected allows the files to be designed to prevent "sandbox" restrictions and take control of the system. The problem affects Java Web Start distributed with J2SE from versions 1.4.2 to 1.4.2_06, for Windows, Solaris and Linux platforms.

    To resolve the problem, users should update to J2SE version 1.4.07 or later, available from http://java.sun.com/j2se/1.4.2/download.html . As an additional preventive measure, until a vulnerable version is updated, we recommend disabling the execution of Java Web Start applications, removing support for JNLP files in browsers.

  5. #15

    Default Drag and drop vulnerability in Thunderbird and Firefox

    Drag and drop vulnerability in Thunderbird and Firefox
    March 25, 2005
    A vulnerability has been reported which affects both the Firefox browser and the Thunderbird mail client and which can be exploited by remote attackers to insert malware on a user's system.
    The problem is that images dragged and dropped from a web page to the desktop retain their name and extension. If the file has an executable extension, it could be run instead of being opened by the corresponding multimedia application.

    To exploit this vulnerability, an attacker would need to construct a valid image file which at the same time was executable. In Windows, this can be done using a hybrid of a GIF image and a batch file. The attacker then needs to trick the user into the dragging the image onto the desktop and double-clicking on it.

  6. #16

    Default Weekly report on viruses

    Weekly report on viruses
    March 25h, 2005 - This week's report on viruses and intruders looks at two worms (Mydoom.BH and Crowt.B) and a Trojan, Downloader.BHV.

    Mydoom.BH is an email worm which can also spread through the KaZaA P2P file sharing program. Once it has entered a computer and is run, it downloads a page from a website with code, which is saved to the Windows system directory as an executable file called TEMP1.EXE. It also displays a screen referring to an antivirus in order to distract users' attention.

    To spread via email it sends itself to all contacts in the Outlook address book, using its own SMTP engine. The name that appears as the sender of the email is false and the message includes an attachment with malicious code.

    In addition to using email, Mydoom.BH also creates a copy of itself in the shared KaZaA directory, which it obtains from the Windows registry. This copy has random file and extension names, selected from a list of names designed to attract KaZaA users.

    Other users of this program could remotely access this shared directory, and voluntarily download to their computer files created by Mydoom.BH, thinking that they were actually interesting programs, etc. They would in fact, be downloading copies of the worm to their computers. When they run the downloaded file, these other computers would become infected by Mydoom.BH.

    The second worm in this report, Crowt.B, has backdoor functionalities and sends itself by email using its own SMTP engine. It gets the addresses to which it sends itself from a list of contacts stored on the user's computer.

    It allows remote commands to be executed on the compromised computer and information to be extracted from it. It also carries an additional danger, as it acts as a keylogger, recording keystrokes and stealing passwords entered. In order to conceal itself, Crowt.B, injects its code into other programs.

    Finally, we will look at the Downloader.BHV Trojan. This malicious code downloads and installs adware programs on the infected computer.

    Downloader.BHV needs the intervention of an attacker in order to propagate and cannot spread by itself automatically. Various propagation channels are used, including floppy disks, CDs, e-mail messages with attachments, Internet downloads, FTP file transfers, IRC channels, P2P file-sharing networks, etc.

    When it is run, it downloads from a range of websites 5 executable files disguised as GIF files, which it runs on the infected system. To prevent detection, it uses some very basic techniques (some text strings are composed while the code is running).
    source:panda

  7. #17
    Join Date
    Mar 2005
    Posts
    34

    Default

    When a computer is infected, the worm sets up a backdoor into the system by opening TCP ports 3127 through 3198, which can potentially allow an attacker to connect to the computer and use it as a proxy to gain access to its network resources... i hope i will never become face to face with it :D

  8. #18

    Default

    Mar 28 2005
    In This Week's SecurityTracker Vulnerability Summary
    SecurityTracker Alerts: 40
    ================================================== =====
    Vendors: Apple Computer - betaparticle.com -
    birdblog.sourceforge.net - ciamos.com - Code Ocean - Czaries
    Network - digitalhive.com - exoops.info -
    filezilla.sourceforge.net - funlabs.com - GNU [multiple
    authors] - ImageMagick.org - Interspire - Kayako Web
    Solutions - KDE.org - Kimbrel, Josh - Lazurus - M.Dev
    Software - mathopd.org - mercuryboard.com - Microsoft -
    Mozilla.org - Nortel - OpenGroupware.org - Phorum.org -
    phpmyfamily.net - phpsysinfo.sourceforge.net - Ptirhiik -
    runcms.org - STADTAUS.com - ...
    ================================================== ====
    Products: Apple File Protocol (AFP) - ArticleLive -
    betaparticle blog - BirdBlog - Bluetooth Setup Assistant -
    Ciamos - CoreFoundation - CzarNews - DigitalHive - Download
    Center Lite - eSupport - exoops - FileZilla - FUN labs Games
    - ImageMagick - KDE - Mac OS X - Mailman - Mathopd -
    MercuryBoard - Mozilla Browser - Mozilla Firefox - Mozilla
    Thunderbird - Nortel Contivity - Ocean FTP Server - Phorum -
    phpmyfamily - phpSysInfo - RUNCMS - SOGo - Topic Calendar
    (for phpBB) - TRG News Script - Vortex Portal - ...

    ================================================== ===
    ================================================== ===
    Your SecurityTracker Vulnerability Alerts

    1. Topic Calendar (for phpBB)

    Vendor: Ptirhiik

    Several vulnerabilities were reported in Topic Calendar for
    phpBB. A remote user can conduct cross-site scripting attacks. A
    remote user can determine the installation path.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013554.html


    2. SOGo

    Vendor: OpenGroupware.org

    A vulnerability was reported in SOGo. A remote authenticated
    user may be able to access the information of another user.

    Impact: Disclosure of user information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013553.html


    3. Windows Remote Desktop Application

    Vendor: Microsoft

    A vulnerability was reported in Microsoft Windows Remote
    Desktop. A remote authenticated user can shutdown the target system.

    Impact: Denial of service via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013552.html


    4. ImageMagick

    Vendor: ImageMagick.org

    A format string vulnerability was reported in ImageMagick. A
    remote user may be able to cause arbitrary code to be executed on
    the target system.

    Impact: Execution of arbitrary code via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013551.html


    5. ImageMagick

    Vendor: ImageMagick.org

    Several vulnerabilities were reported in ImageMagick. A remote
    user can create an image file that will cause ImageMagick to crash
    or execute arbitrary code.

    Impact: Denial of service via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013550.html


    6. MercuryBoard

    Vendor: mercuryboard.com

    An input validation vulnerability was reported in MercuryBoard
    in the processing of private messages. A remote user can conduct
    cross-site scripting attacks.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013549.html


    7. BirdBlog

    Vendor: birdblog.sourceforge.net

    An input validation vulnerability was reported in BirdBlog. A
    remote user can inject SQL commands.

    Impact: Disclosure of system information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013548.html


    8. Mathopd

    Vendor: mathopd.org

    A vulnerability was reported in Mathopd in the processing of
    temporary files. A local user can modify files on the target system.

    Impact: Modification of system information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013546.html


    9. Vortex Portal

    Vendor: Kimbrel, Josh

    An include file vulnerability was reported in Vortex Portal. A
    remote user can execute arbitrary commands on the target system.

    Impact: Execution of arbitrary code via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013545.html


    10. ArticleLive

    Vendor: Interspire

    An input validation vulnerability was reported in ArticleLive
    2005. A remote user can conduct cross-site scripting attacks.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013543.html


    11. ZipGenius

    Vendor: M.Dev Software

    A directory traversal vulnerability was reported in ZipGenius.
    A remote user can create a zip file that, when uncompressed by the
    target user, will create files in arbitrary directories on the
    target user's system.

    Impact: Modification of system information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013542.html


    12. Download Center Lite

    Vendor: STADTAUS.com

    A vulnerability was reported in Download Center Lite. A remote
    user can execute arbitrary commands on the target system.

    Impact: Execution of arbitrary code via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013541.html


    13. phpSysInfo

    Vendor: phpsysinfo.sourceforge.net

    Maksymilian Arciemowicz from from SECURITYREASON.COM reported
    several vulnerabilities in phpSysInfo. A remote user can conduct
    cross-site scripting attacks. A remote user can also determine the
    installation path.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013532.html


    14. KDE

    Vendor: KDE.org

    A vulnerability was reported in KDE in the dcopidlng script. A
    local user may be able to obtain elevated privileges.

    Impact: Modification of system information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013525.html


    15. Mozilla Browser

    Vendor: Mozilla.org

    A vulnerability was reported in the Mozilla Suite in the
    processing of drag and drop operations. A remote user can open
    privileged XUL code with some user interaction.

    Impact: Execution of arbitrary code via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013522.html


    16. Mozilla Firefox

    Vendor: Mozilla.org

    A vulnerability was reported in Mozilla Firefox in the
    processing of drag and drop operations. A remote user can open
    privileged XUL code with some user interaction.

    Impact: Execution of arbitrary code via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013521.html


    17. Mozilla Firefox

    Vendor: Mozilla.org

    A vulnerability was reported in Mozilla Firefox in the sidebar
    panel feature. A remote user can execute arbitrary applications on
    the target user's system.

    Impact: Execution of arbitrary code via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013520.html


    18. Mozilla Browser

    Vendor: Mozilla.org

    A vulnerability was reported in the Mozilla Suite in the
    processing of GIF images. A remote user can execute arbitrary code
    on the target system.

    Impact: Execution of arbitrary code via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013519.html


    19. Mozilla Thunderbird

    Vendor: Mozilla.org

    A vulnerability was reported in Mozilla Thunderbird in the
    processing of GIF images. A remote user can execute arbitrary code
    on the target system.

    Impact: Execution of arbitrary code via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013518.html


    20. Mozilla Firefox

    Vendor: Mozilla.org

    A vulnerability was reported in Mozilla Firefox in the
    processing of GIF images. A remote user can execute arbitrary code
    on the target system.

    Impact: Execution of arbitrary code via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013517.html


    21. DigitalHive

    Vendor: digitalhive.com

    Benji Lemien reported two vulnerabilities in DigitalHive. A
    remote user can re-install the application. A remote user can also
    conduct cross-site scripting attacks.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013516.html


    22. XMB Forum

    Vendor: Xmbforum.com

    Benji Lemien reported an input validation vulnerability in XMB
    Forum in the 'Mood' parameter. A remote user can conduct
    cross-site scripting attacks.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013515.html


    23. Phorum

    Vendor: Phorum.org

    A vulnerability was reported in Phorum in 'search.php'. A
    remote user can conduct HTTP response splitting attacks.

    Impact: Modification of system information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013514.html


    24. FileZilla

    Vendor: filezilla.sourceforge.net

    Two vulnerabilities were reported in FileZilla. A remote user
    can cause denial of service conditions.

    Impact: Denial of service via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013513.html


    25. Nortel Contivity

    Vendor: Nortel

    A vulnerability was reported in Nortel Contivity in the VPN
    client software. A local user can obtain the password.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013512.html


    26. eSupport

    Vendor: Kayako Web Solutions

    An input validation vulnerability was reported in Kayako
    eSupport. A remote user can conduct cross-site scripting attacks.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013511.html


    27. betaparticle blog

    Vendor: betaparticle.com

    Two vulnerabilities were reported in betaparticle blog. A
    remote user can access the underlying database. A remote user can
    upload and delete arbitrary files.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013510.html


    28. Ocean FTP Server

    Vendor: Code Ocean

    A vulnerability was reported in Ocean FTP Server. A remote
    user can deny service.

    Impact: Denial of service via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013509.html


    29. Bluetooth Setup Assistant

    Vendor: Apple Computer

    A vulnerability was reported in the Bluetooth Setup Assistant
    for Apple Mac OS X. A local user may be able to bypass security
    restrictions.

    Impact: User access via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013506.html


    30. Mac OS X

    Vendor: Apple Computer

    A vulnerability was reported in Apple Mac OS X in the setting
    of permissions on several directories. A local user may be able to
    obtain elevated privileges.

    Impact: Modification of system information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013503.html


    31. Apple File Protocol (AFP)

    Vendor: Apple Computer

    Two vulnerabilities were reported in the Apple File Protocol
    (AFP) Server. A remote user can cause denial of service conditions
    or access Drop Boxes.

    Impact: Denial of service via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013502.html


    32. CoreFoundation

    Vendor: Apple Computer

    iDEFENSE reported a vulnerability in Mac OS X Core Foundation.
    A local user can obtain root privileges.

    Impact: Execution of arbitrary code via local system

    Alert: http://securitytracker.com/alerts/2005/Mar/1013497.html


    33. Mailman

    Vendor: GNU [multiple authors]

    An input validation vulnerability was reported in Mailman when
    processing error messages. A remote user can conduct cross-site
    scripting attacks.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013494.html


    34. phpmyfamily

    Vendor: phpmyfamily.net

    An input validation vulnerability was reported in phpmyfamily.
    A remote user can inject SQL commands.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013493.html


    35. FUN labs Games

    Vendor: funlabs.com

    A vulnerability was reported in several games from FUN labs. A
    remote user can cause the game service to crash or to stop
    accepting packets.

    Impact: Denial of service via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013492.html


    36. TRG News Script

    Vendor: Lazurus

    Frank 'brOmstar' Reissner from [In]Security Research reported a
    vulnerability in TRG News Script. A remote user can execute
    arbitrary commands on the target system.

    Impact: Execution of arbitrary code via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013487.html


    37. CzarNews

    Vendor: Czaries Network

    Frank 'brOmstar' Reissner from [In]Security Research reported a
    vulnerability in CzarNews. A remote user can execute arbitrary
    commands on the target system.

    Impact: Execution of arbitrary code via network

    Alert: http://securitytracker.com/alerts/2005/Mar/1013486.html


    38. exoops

    Vendor: exoops.info

    Majid NT from Iran Hackers Sabotage Team reported two
    vulnerabilities in exoops. A remote user can determine the
    database password and the installation path.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013485.html


    39. Ciamos

    Vendor: ciamos.com

    Majid NT from Iran Hackers Sabotage Team reported two
    vulnerabilities in Ciamos. A remote user can determine the
    database password and the installation path.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013484.html


    40. RUNCMS

    Vendor: runcms.org

    Majid NT from Iran Hackers Sabotage Team reported two
    vulnerabilities in RUNCMS. A remote user can determine the
    database password and the installation path.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2005/Mar/1013483.html

    ================================================== ======

  9. #19

    Default Mafia take advantage of the Internet through

    :arrow:
    March 28, 2005 - Malware creators have changed their aims and modus operandi. On the one hand, the trend detected over the last few months of creating malware for financial gain has been confirmed and on the other, instead of using just one malicious code capable of spreading rapidly across thousands of computer, they are now using many different variants. A very recent example is the Kelvir worms. Their tactic involves saturating cyber-space with a huge number of variants of the same code, seven in less than seven days. This makes it difficult for both security companies, who have to develop a large number of vaccines, and users, who hardly have time to update their security applications, to combat them. As a result, it is easy for a computer to fall victim to one of the new malicious code.

    The real aim of the Kelvir worms is to download other malware to the computer, more specifically, 'bots'. 'Bots' are automated Trojans that carry out actions, obeying external commands. A hacker can use these to carry out a wide range of actions on the affected computer, such as: stealing confidential data, launching attacks on other computers, generating spam anonymously, etc.

    'Bots' are a rapidly growing threat. Data compiled by Earthlink shows that 20 percent of computers could contain a 'bot'. What's more, an estimated 66 percent of spam circulating around the Internet is being sent through 'bot' networks. In fact, there is an underground 'bot' rental market to satisfy the demands of "professional spammers" who pay between three and four cents per 'bot' a week.

    'Bots' can also be used to carry out Distributed Denial of Service attacks (DDoS) against other computers. According to an article published by SecurityFocus, an executive in a US company confessed to having paid a group of hackers to launch DDoS attacks against three rival companies. What's more, the crash of website like Yahoo!, Microsoft and Google in 2004 was also attributed to DDoS attacks carried out through 'bots'.

    According to Luis Corrons, head of PandaLabs, "'bots' are a perfect tool for Internet mafias. They are extremely versatile, allowing all types of actions to be carried out which can do more than slow down systems or flood the Internet with infected messages. Their actions not only affect what is known as cyber-space, but can also hit the economy or image of users and companies. For example, a well-known US newspaper reported the hijacking of hundreds of computers in the Defense Department and the Senate, which were used as zombies to send out spam."

    When a 'bot' enters a computer, this represents a serious security risk for any user, although attacks from this type of malicious code have implications at many other levels, such as software piracy. There are, for example, 'bots' that detect passwords and content of programs that can then be distributed illegally.

    However, it is companies that suffer most due to attacks from this type of malware. The main damage that 'bots' can cause in corporate environments includes:

    - Corporate extortion. Some companies have been blackmailed by organized groups of hackers, threatening to block their IT systems if they didn't meet their demands, which are normally financial. This kind of action, mainly affects those companies whose activity is based around e-commerce or Internet services. The e-magazine Rense.com has reported a hacker mafia offering 'protection' to a range of websites in the UK in exchange for $50,000 a year.

    - Data theft. Some 'bots' download keyloggers, designed to capture keystrokes and send the information to a hacker. This allows them to access all kinds of corporate information that could be used for online bank fraud or hacker attacks. It could also damage the reputation of a company as stolen email addresses, could be used for sending all kinds of spam.

    - Damage to corporate resources. A large number of 'bots' installed on computers across the corporate network consume additional resources -bandwidth, administrator time, etc.- with negative consequences for productivity.

    -Infiltration of other malware in the network. Generally speaking, the entrance of a 'bot' in a corporate network is a prelude to the arrival of all kinds of malware: spyware, adware, other viruses, etc.

    A 'bot' is a malicious code that is dropped onto a system in a way that users can't see. Similarly, a single specimen installed on a computer is very difficult to detect. Although there are thousands of 'bots' identified and detected and eliminated by most anti-malware applications, new 'bots' are constantly appearing and are surreptitiously spread so that sometime may pass before security companies detect their presence and can generate the corresponding vaccine.

    According to Luis Corrons, "TruPrevent(TM), our proactive detection technologies, have blocked more than 2,700 new 'bots' -as well as a huge amount of other type of malware- since they were launched in August 2004. We currently have proactive detection systems that can identify malicious code alone. When we decided to develop our TruPrevent(TM) proactive detection technologies, we considered the growing threat of these and other malware. Reactive solutions continue to be the most effective against known malware, but proactive technologies are the perfect complement. For example, when the TruPrevent(TM) Technologies detect a new strain of malware, they immediately send it to PandaLabs. This allows us to head off the infection and prevent the damage that they can cause. What's more, we can generate a specific vaccine much faster than our competitors."

  10. #20
    Join Date
    Mar 2005
    Posts
    175

    Default

    thanks for all the updates :)

Page 2 of 9 FirstFirst 1234 ... LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •