Explorer Exiled

There is a 0day exploit currently exploiting a critical flaw in Microsoft’s Internet Explorer.

If this is the first you’re hearing of this flaw, check out the link below to hear Defintel’s CEO, Chris Davis explain the situation:

CTV News – Exploiting Explorer

Researchers estimate that more than 10,000 sites are compromised. While in-the-wild exploits are currently targeting IE 7 on Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Windows Vista (including SP1) and Windows Server 2008, it’s important to remember that all versions of Internet Explorer, from IE5 all the way to IE8 Beta 2, are affected.
If a user visits a compromised site, malicious JavaScript code is injected into the browser, and Malware is downloaded onto the user’s computer. The Malware that gets installed on the user’s computer will likely remain nearly invisible to the average user. The goal of the attacker is not to disrupt a user’s online experience, but rather to remain inconspicuous for as long as possible. The Malware allows the attacker complete access to user’s computer and allows him to track everything you type into your keyboard.

Visit your legitimate online banking site and enter your user information? Now he’s got it.
Visit your favourite social networking site and chat with some friends? Now he’s got that too.

Microsoft intends to release a critical patch today, the second patch coming on Exploit Wednesday instead of Patch Tuesday in as many months. Back in October, Microsoft was forced to release an out-of-band patch to mitigate the extremely critical flaw in several Windows OS’.

In the meantime, users should use other browsers – FireFox, Chrome, Safari – whatever you like! Just not IE.

The general public is completely ill-equipped to deal with security events. Who knows how long it will be before the AV companies have signatures developed for this new exploit. And Microsoft surely isn’t losing any market share over yet another security debacle.

Why do we still treat online security as though the Internet only encompasses six guys at Berkeley? Everyone is online, from 5 year old girls to 95 year old men – they can’t all be expected to keep up to date with these vulnerabilities and exploits.

So, how do we help them?

The Enemy Within

Two weeks ago, users of AVG’s virus scanner awoke to a nasty surprise: their supposed security software had been updated to identify the file named user32.dll as malicious. Those people most keen to protect their computer systems followed the instructions as directed and deleted the file – only to find that they were now stuck in an endless cycle of reboots.

User32.dll is a core Windows file; and not, as identified by AVG, a Trojan Horse named PSW.Banker4.APSA or Generic9TBN. This is not the first time AVG has struggled with misidentifying Malware, nor is it the first time an Anti Virus company has recommended users remove core Windows files.

In December of last year, Anti Virus company Kaspersky Labs decided that a Virus existed within Windows Explorer, the graphical user interface for Windows itself. Thankfully, Kaspersky managed to catch the error before the damage was too widespread; though, I imagine the employees at the UK enterprise that was affected would tell a different story.

Even Microsoft is guilty of such casual coding. In 2007, Microsoft’s OneCare, an Anti Virus product, when used with Internet Explorer 7, was flagging Google’s Gmail as a Virus. Even Microsoft’s own product weren’t safe, with OneCare regularly quarantining or deleting all of the email in a user’s inbox.

AV companies tout their wares as the silver bullet for personal protection. You know this isn’t true. I know this isn’t true. So, why doesn’t everybody else?

It was bad enough that the generic, non-technical computer user didn’t know that his Anti Virus software is only protecting him from a small percentage of modern threats. Now we also have to let them in on the secret that their “protection” might sometimes do more harm than good.

Fun with Dick and Jane

Fail too fast in bed?

Looking to revive your sleep desires?

What is money in comparison to your potency?

To anyone with an email address those phrases might seem awfully familiar. I’m talking about spam: the scourge of system administrators, the friendly pharmacy to the misinformed. It arrives unrequested, unavoidable, unimaginably hilarious. Now, you too can get in on the game, spamming friends, family, and foes alike thanks to the user-friendly Set-X Mail Service, courtesy of the Set-X Corporation.

Straight from the press release announcing the service:

“- Flexible and convenient Web based interface, detailed statistics while sending, changing any settings (mail databases, texts, macros)

– User-friendly web based interface – start spamming from day one

– Automatic “spamming capabilities” assessments of the bot allowing you to think about your business and not about the technical details behind it

– Daily malware updates, four programmers allocated for every server, sending automatic ICQ notifications whenever the malware gets updated

– Automatic optimization of the spam campaign by first allocating the bots with clean IP reputation

– Optional is the option to chose whether or not a dedicated “spamming engineer” should be allocated to your server

– His responsibilities include introducing a higher number of bots if requested, ensuring that dead bots get disconnected from your server, and providing personal advice on optimizing your campaigns and bypassing anti-spam filtering through the built-in multi RBL checking feature

A brief description of the system:

1. The system is automatically harvesting the outgoing and incoming email addresses on the infected hosts and the associated accounting data, supporting the following clients :
– Mozilla Thunderbird
– Outlook Express
– MS Outlook
– The Bat
– Opera

2. The bot automatically defines its MX and PTR records, if they are present it switches to Direct SMTP mailing which means that it can send the spam directly to the recipients using the MX and PTR DNS records of the bot, enforcing direct sending even without MX and PTR records is also possible

3. The bot automatically defines its MX and PTR records, if they are present it switches to Direct SMTP mailing which means that it can send the spam directly to the recipients using the MX and PTR DNS records of the bot, enforcing direct sending even without MX and PTR records is also possible

4. The central control server automatically assigns different regional servers to the bots, and rotates them periodically for security purposes

5. All the information about the spam campaigns and the bots can be exported and syndicated with another regional server as requested, with the regional server dynamically establishing links with other regional servers so that it never really knows the address of the central command server

6. There are several different ways of sending spam using this service :

1) Direct spamming from the legitimate email accounts of the infected computers, with the system automatically syndicating all the available legitimate emails whose accounting data naturally stolen due to the malware infection is again, automatically integrated in a “unique legitimate senders” database. Full support for web based email accounts in the form of domain:username:password

2) Sending via Direct SMTP: send messages directly using the MX and PTR records of the infected host’s gateway

3) Sending to direct recipient

4) Sending through open relays and socks servers, both of which can provided at an additional cost

7. SET-X Mail System is highly modular, with unique features easily coded and implemented as requested by the customer

The average speed from one server is 5000/7000 emails per minute, over 1 million emails per day, and if requested you can purchase as many servers as you would like. The price of rent per month is $2000 with additional $1000 for each additional server if the servers are ordered at the same time.”

Capable of creating clever tag lines? Got a couple of thousand bucks lying around? Sign up now and you too can irritate millions of strangers every day.

Thanks to Dancho Danchev for translating the material from Russian.

Cyber Security Event for the Government of Canada and IT Industry

Dear Friends and Colleagues:

On behalf of the Canadian Internet Registration Authority (CIRA), I am pleased to invite you to attend a special Cyber Security meeting to be held at the Crown Plaza Ottawa, September 23, 2008.

Cyber Security is critical to ensuring the integrity of the network infrastructure of the federal government. This Cyber Security meeting offers an opportunity to discuss, share and learn what we can do and what we should do to respond to modern Cyber Security threats. It will be comprised of four sessions ranging from cyber-attacks, evolution of the modern malware, latest updates on the Kaminsky DNS Vulnerability and Electronic Espionage. Is the Government of Canada well safeguarded against these threats?

Topics include:

Update on the Kaminsky DNS Vulnerability

Christopher Davis, CEO Defence Intelligence

The Evolution of the Threat: From Fun to Profit

Christopher Davis, CEO Defence Intelligence

Meaghan Molloy, Threat Analyst Defence Intelligence

Information Protection Capability Gap

Aron Feuer/Wayne Boone, Cygnos IT Security

Cyber-Attacks: Experiences From the Trenches

Bill Woodcock, Packet Clearing House

We are delighted to welcome Mr. Bill Woodcockto this meeting. Bill Woodcock is research director of Packet Clearing House, a non-profit research institute dedicated to understanding and supporting Internet traffic exchange technology, policy, and economics. Bill has operated national and international Internet service provision and content delivery networks since 1989, and currently spends most of his time building Internet exchanges in developing countries.

This is a meeting not to be missed!

This CIRA Cyber Security event is limited to 60 participants. We urge you to register!


Norm Ritchie

Chief Information Officer
Canadian Internet Registration Authority (CIRA)

Web experts scrambling to patch security flaw

Code published that could allow hackers to direct surfers to fake websites
Jessey Bird
The Ottawa Citizen
Security experts are urging Internet server administrators to act quickly to head off what they are calling the “single largest threat to Internet security.”They say a critical flaw in the system used to route Internet traffic could let hackers redirect users to dangerous websites, and then steal their personal information.While the flaw was discovered six months ago, and a fix released two weeks ago, the exact nature of the problem was kept secret.That was until yesterday, when a program to exploit the flaw was posted on the Internet, allowing anyone around the world to simply download it and run it.According to Christopher Davis, chief executive of Ottawa-based Defence Intelligence, the “exploit” allows hackers to replace search engines, social-networking sites and even banking websites with their own “malicious” content.So far, government and Internet service provider officials say they are taking the threat to their domain-name servers seriously, but do not have any actual examples of the attack, which is called “DNS cache poisoning,” to report.The attack is aimed at how Internet addresses function, particularly the domain-name servers (DNS) that route Internet traffic.While websites are all identified by addresses using words that are easy for people to remember — like google.ca or facebook.com — they are also identified by addresses of just numbers. Domain-name servers serve as the translator in between — connecting a user that types in a web address to the correct computer.”DNS is kind of the 411 for the Internet,” said IOActive security researcher Dan Kaminsky, who discovered the flaw six months ago.What he realized was that in just seconds, a malicious hacker could poison a domain-name server and reroute users to different websites from the ones they are seeking. Hackers could also route people to copycat websites that would enable them to steal people’s personal information.”This attack works very, very well,” he said. “Any website that you trust is not necessarily the website that you are looking for. Every e-mail you send is not necessarily going where you think.” Even people who take precautions could be fooled.At the time of the discovery, Mr. Kaminsky and industry giants such as Microsoft and Cisco acted quickly to create a patch for the flaw, while keeping the exact nature of the problem secret. They released their fix two weeks ago.Mr. Kaminsky promised to discuss the problem at a technical conference in August, so other security experts could learn from his work; that would give Internet providers about a month to install the fix. But after another expert’s public speculation on the details of the DNS flaw hit too close to home on Monday and the details of the flaw were leaked, Mr. Kaminsky and Mr. Davis say they are worried hackers might know enough to cause problems — and service providers haven’t had enough time to install the patch.”The majority of DNS servers have not yet been patched,” said Mr. Kaminsky.”It is a serious vulnerability,” said Bruce Schneier, chief security technology officer for British Telecom. “It is one that can be used by criminals to steal identity.”Mr. Schneier also stressed that there is no need for the public to panic.”Kaminsky was hoping there would be a full month for people to patch their system,” said Mr. Schneier, adding that the leak has made Internet users “more vulnerable.””But let’s face it — you’re not going to die,” he said. “Money is stolen out of banks every day. This is another way to do that.”Is it a worse way than all the other ways? Probably not,” he continued. “Is it a serious way? Yes. Have there been other serious ways? Yes. Are we still here? Yes.””It is not armageddon,” he said. “We are not going to die.”Officials from Rogers Cable Inc., one of Ontario’s major Internet providers, said they haven’t detected any problems with their system.”Built into our network today are intrusion detection and prevention systems,” said Nancy Cottenden, director of communications for Rogers Cable, adding that Rogers monitors vulnerabilities on a “regular basis.”Ms. Cottenden also said Rogers is in the midst of installing Mr. Kaminsky’s patch.”It takes some time,” said Ms. Cottenden. “Any vendor will tell you it takes some time. The good news is, it is being loaded.”Bernard Beckhoff, spokesman for Public Safety Canada, said there have been “no confirmed incidences of the threat being applied in Canada or elsewhere.”The Canadian Cyber Incident Response Centre will continue to monitor the threat, said Mr. Beckhoff.Mr. Davis said that while the Canadian government has been quick to respond, many are still downplaying the issue.He urged Internet users to contact their service providers to find out whether they’ve patched their systems.”It scares the hell out of us,” said Mr. Davis. “And we know what we’re doing.”

Major Security Flaw Discovered: Internet Privacy Compromised at All Levels

OTTAWA, ONTARIO–(Marketwire – July 22, 2008) – Yesterday, details were leaked of possibly the single largest threat to Internet security. Earlier this year, Dan Kaminsky, director of penetration testing for IOactive, discovered a major flaw in how Internet addresses function. The issue is in the design of the Domain Name System (DNS) and is not limited to any single product. An attacker could easily take over portions of the Internet and redirect users to arbitrary and malicious locations to engage in identity theft. For example, an attacker could target an Internet Service Provider (ISP) replacing search engines, social networks, banks, and other sites with their own malicious content. Against corporate or government environments, an attacker could disrupt or monitor operations by rerouting network traffic, capturing emails and other sensitive data.

Kaminsky immediately reported the issue to major authorities, including the United States Computer Emergency Response Team (part of the Department of Homeland Security), and began working on a coordinated fix; a patch was released July 8th, 2008. Chris Davis, CEO of Ottawa-based Defence Intelligence, has been working in coordination with Kaminsky to brief key agencies in the Canadian government. Details of the vulnerability were to remain a closely held secret until Kaminsky’s public presentation on August 6th, 2008 in order to provide organizations with enough time to protect themselves. However, this window was drastically reduced due to the accidental posting of the details by an uninvolved party.

Defence Intelligence is determined to make Canadian companies fully aware of the flaw and the steps they can take to protect themselves. The general public should be particularly vigilant while conducting business online. Kaminsky is urging people to act quickly, “Patch. Today. Now. Yes, stay late.”

“This may be the worst information security vulnerability ever, and I’m very impressed at the speed and agility with which the Canadian government is responding,” said Davis. The common goal of all involved parties is the implementation of the patch and monitoring of networks to ensure security.