Security Corner


December 12, 2010  3:04 PM

InfoWar: Cyber Hactivist Group Anonymous Attacks WikiLeaks’ Founder’s Swedish Prosecutors

Ken Harthun Ken Harthun Profile: Ken Harthun

The Hacktivist group, Anonymous, has targeted WikiLeaks’ founder, Julian Assange’s Swedish prosecutors among other targets that have taken action against WikiLeaks. This is all a part of “Operation: Payback” which has now expanded into “Operation Avenge Assange.”  This poster has been being passed around the Internet:

The group’s website gives further information on what they intend to do:

  • Offer WikiLeaks an additional mirror and have it Googlebombed.
  • Create counter-propaganda, organizing attacks (DDoS) on various targets related to censorship (time, date and target will be published by that time).
  • Contact media entities, inform them that Operation:Payback has come out in support of Wikileaks, and has declared war on the entities involved in censoring there information; we will seek public support in a campaign against censorship.
  • We will find and will attack those who stand against Wikileaks and we will support WikiLeaks in everything they need.

At least one new term (at least, to me) has popped up in all of this: “voluntary botnet.” I’m going to explore this topic in a future post in more detail, but I have to assume it means joining an IRC channel voluntarily to effect DDoS attacks as a group.

December 11, 2010  3:23 PM

Walgreens Pharmacy Data Breach

Ken Harthun Ken Harthun Profile: Ken Harthun

Walgreens, the national drug store chain, reported a data breach where someone gained unauthorized access to customers’ email addresses. Since I’m a Walgreens customer, I received this message late yesterday:

Dear Valued Customer,

We recently became aware of unauthorized access to an email list of customers who receive special offers and newsletters from us. As a result, it is possible you may have received some spam email messages asking you to go to another site and enter personal data. We are sorry this has taken place and for any inconvenience to you.

We want to assure you that the only information that was obtained was your email address. Your prescription information, account and any other personally identifiable information were not at risk because such data is not contained in the email system, and no access was gained to Walgreens consumer data systems.

As a company, we absolutely believe that all customer relationships must be built on trust. That is why we believe it is important to inform you of this incident. Online security experts have reported an increase in attacks on email systems, and therefore we have voluntarily contacted the appropriate authorities and are working with them regarding this incident.

We encourage you to continue to be aware of increasingly common email scams that may use your email address to contact you and ask for personal or sensitive information. Always be cautious when opening links or attachments from unsolicited third parties. Also know that Walgreens will not send you emails asking for your credit card number, social security number or other personally identifiable information. So if ever asked for this information, you can be confident it is not from Walgreens.

If you have any questions regarding this issue, please contact us at 1-888-980-0963. We take your privacy very seriously, and we will continue to work diligently to protect your personal information.

Sincerely,

Walgreens Customer Service Team

I am happy to report that I haven’t seen any spam that I can identify as being related to the breach.

If you are a Walgreens customer, be sure to use caution and don’t blindly assume that a message you receive from them, especially if it asks for personal information, is valid. Here are several tips from US-CERT you should put into practice for ALL of your emails:

  • Filter spam
  • Don’t trust unsolicited email
  • Treat email attachments with caution
  • Don’t click links in email messages
  • Install antivirus software and keep it up to date
  • Install a personal firewall and keep it up to date
  • Configure your email client for security

Be careful out there!


December 2, 2010  9:26 PM

Hackers Target Holiday Trending Topics on Twitter to Spread Malware

Ken Harthun Ken Harthun Profile: Ken Harthun

PandaLabs just discovered that cyber-criminals are taking advantage of trending topics on Twitter to spread malware. Using methods similar to Black Hat SEO techniques, hackers are capitalizing on holiday-themed words and phrases to direct users to malicious websites.  From their press release:

As the holiday period has begun, topics such as “Advent calendar,” “Hanukkah” or even “Grinch,” are among the most popular subjects used by hackers to entice users.

Thousands of tweets have been launched using holiday-related phrases, such as “Nobody cares about Hanukkah,” or “Shocking video of the Grinch,” along with short URLs pointing to malicious websites. To see an example of a tweet like this, please visit:  http://www.flickr.com/photos/panda_security/5226147792/.

Here are some timely (and evergreen) tips on keeping your computer safe over the holidays, or any time, especially if you use social media like Twitter, Facebook and the myriad of other sites out there:

  1. Don’t click on links from non-trusted sources on any social media site or links you receive in email.
  2. Investigate shortened links using the tips I gave you in Shortened URLs Can Hide Malicious Sites.
  3. If you do click on a link and it arrives at a site you don’t recognize or asks you to download something, close your browser immediately. Do not accept any downloads you didn’t ask for.
  4. Patch your system and update your antivirus signatures.
  5. If you do download or install something and your computer starts acting strangely or launching pop-up messages and freezing up, check it with a free online scanner such as the one at www.activescan.com.
  6. Make sure you are protected with a good antivirus and anti-malware program.


November 30, 2010  11:50 PM

The Ultimate Security Toolkit Will Soon Be Live

Ken Harthun Ken Harthun Profile: Ken Harthun

Last year, I put together my Geek Toolkit which turned out to be very popular with readers of my Ask the Geek blog. This year, just in time for the holiday gift-giving season, I’m revising the security portion of the Geek Toolkit to include the latest versions of popular Open Source security tools as well as new arrivals where applicable.

The original Geek Toolkit is loaded with literally hundreds of security, system maintenance and productivity tools that have been part of my Geek arsenal for more than five six years. All of them are safe, proven, and malware-free. It would probably take you hundreds of hours to research and compile this collection on your own.

I’ve done all of that work for you. Here are just a few of the categories in the kit:

Web Servers
Useful Utilities
Spyware Killers
Security (major revision here!)
Disk Tools
Disaster Recovery Info
…and 11 more

The Geek Toolkit comes with lifetime updates, so you’ll always have the most current version available. (If you already have a copy, I will be giving you a new download link shortly, so you don’t have to do anything.)

I’m going to be giving away 10 copies of this compilation sometime between now and December 23, 2010, so stay tuned for details on how to register and the registration requirements.


November 30, 2010  7:43 PM

Why Will Some People Fall for Anything?

Ken Harthun Ken Harthun Profile: Ken Harthun

If you watch any amount of TV at all, you have probably seen this commercial. Microsoft set up a fake bank and then offered people $500 for opening an account. The catch? “We just need your most intimate personal information…” It’s rather amusing, but at the same time, scary.

[kml_flashembed movie="http://www.youtube.com/v/ZRbcJFe_rjA" width="425" height="350" wmode="transparent" /]

Money is a powerful incentive for many people and is the driving force behind deposit scams, 419 scams, advance fee fraud and numerous other ripoffs.

So, please, if you receive emails similar to the one below, or anything offering you money in any guise, report it. Joshua Long recommends, “…report it to the authorities and the e-mail provider of the Reply-To address…  For several major e-mail providers such as Gmail, Yahoo!, and Hotmail, the address for reporting fraudulent account activity is abuse@[provider's domain].com.  Reputable e-mail providers will suspend the offending account to ensure that nobody else can send replies to it. I also recommend forwarding such messages to depositscams@coldrain.net, operated by the anti-spam and anti-fraud organization KnujOn.”

Here’s an example email. Seems they all like that $10 million number–I see it frequently:

From: “Farouk Mohanla” {faroukmohanla @ gmail . com}
Reply-To: {faroukmohanla @ gmail . com}
Subject: Please read this message carefully.
Date: June 25, 2010
My name is Farouk Mohanla, I work as a manager for oil company here in Malaysia. I write to solicit your assistance and cooperative supports to enable us retrieve the balance of $10,000,000 which is for a contractor who executed a supply of Hi-Tec Crude Oil mini-refinery CDU Unit to my company, he passed on few months ago after completing his contract and left no beneficiary to his contract balance benefits upon completion. I need to know if you will stand as his beneficiary to receive his contract benefits.
I sincerely assure you this is absolutely risk-free and shall follow legal procedures in confirmation that there is no risk involved and with trust and understanding we would be able to collect these funds to our own mutual benefits. If you are interested reply me back.

Farouk Mohanla..


November 30, 2010  6:49 PM

Shortened URLs Can Hide Malicious Sites

Ken Harthun Ken Harthun Profile: Ken Harthun

There’s no question that URL shortening services like tinyurl.com and bit.ly are useful.  After all, it’s a lot easier for me to send “http://tinyurl.com/23gycsl”than it is to send “http://www.subscriberstronghold.com/freetraining/theanswersexposed.php?hop=jvrodger,” not to mention that it takes up less space. Using shortened links is not only convenient, it’s essential if you’re using micro-blogging services such as Twitter. But there is one big disadvantage to them: you don’t know where such a link is taking you. The destination could be a malicious site that hosts malware just waiting for you to arrive and get infected. How do you resolve that?

Almost all of the popular URL shortening services have some means of previewing the link before you actually visit it. TinyURL, for example, allows you to prepend “preview” onto the link, so the link I showed you above can be previewed by changing it to “http://preview.tinyurl.com/23gycsl.” That will take you to the TinyURL preview page and you see this message: “This TinyURL redirects to: “http://www.subscriberstronghold.com/freetraining/theanswersexposed.php?hop=jvrodger.”

Google’s URL shortener, goo.gl, allows you to add a “+” at the end of the link to preview it. Here’s a link to my other site: http://goo.gl/WXylu. Change that to “http://goo.gl/WXylu+” and you’ll see not only the long link, but statistics of how many times your shortened link has been visited.

You can also use any of the following services to get a long version of the short URL: Longurl, ExpandMyURL.com, or Long URL Please.com. You simply copy and paste the short URL and the service expands it for you.

Joshua Long, a computer security researcher from Southern California, has put together an excellent guide on his blog that takes into account how to use the preview features of all of the major URL shorteners.

So, before you blindly click on any shortened link that you’re not sure about, use one of the available preview methods to check its destination.


November 29, 2010  11:45 PM

Anti-virus Protection: It Isn’t Enough Anymore

Ken Harthun Ken Harthun Profile: Ken Harthun

If your business is still relying solely on an anti-virus program to protect you from all the bad stuff out there, then it’s vulnerable on several fronts. AV software is designed for one thing and one thing only: to protect systems from threats that are already known or those that are as yet unknown, but whose patterns mimic other threats. It isn’t intended to be used as an all-in-one solution.

Let’s say, for example, that you allow your employees to bring their laptops or other devices to the office and use them on your network. This puts you at risk in at least three ways:

  1. You have no control over whether or not the employee is current will all security updates or AV updates. They could easily bring malware with them. Keeping systems fully patched is a first line of defense. Use network access control to make sure that any computer you allow on the network is fully patched.
  2. A rogue application let loose on your network can degrade performance and cause no end of problems.
  3. An infected thumb drive or other USB device completely bypasses your firewall and other filtering. Exercise some control over what’s allow to be plugged in. It’s easy enough to do.

Sophos has released a whitepaper that outlines at least eight threats that get past conventional AV. I suggest you check it out.

High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes. This paper outlines eight common threats that traditional anti-virus alone won’t stop, and explains how to protect your organization using endpoint security.


November 29, 2010  4:18 PM

What the Heck are Intrusion Detection Systems?

Ken Harthun Ken Harthun Profile: Ken Harthun

A while back, a client heard some mention of Intrusion Detection Systems and naturally had to ask me, “What the heck are Intrusion Detection Systems.” (That’s where these “What the heck…” ideas all come from, you know.) I explained it as simply as I could at the time, but I like having something to point to with authority, something with some outbound links to more information; hence, this post.

CERIAS, The Center for Education and Research in Information Assurance and Security, who publishes an excellent list of IDS resources, gives this description:

The purpose of an intrusion detection system (or IDS) is to detect unauthorized access or misuse of a computer system. Intrusion detection systems are kind of like burglar alarms for computers. They sound alarms and sometimes even take corrective action when an intruder or abuser is detected. Many different intrusion detection systems have been developed but the detection schemes generally fall into one of two categories, anomaly detection or misuse detection. Anomaly detectors look for behavior that deviates from normal system use. Misuse detectors look for behavior that matches a known attack scenario. A great deal of time and effort has been invested in intrusion detection, and this list provides links to many sites that discuss some of these efforts.

There is a sub-category of intrusion detection systems called network intrusion detection systems (NIDS). These systems monitors packets on the network wire and look for suspicious activity. Network intrusion detection systems can monitor many computers at a time over a network, while other intrusion detection systems may monitor only one.

One common IDS misconception I run into all the time is that it is usually people outside your network who break into your systems and cause mayhem. The reality, especially for corporate workers, is that insiders can and usually do cause the majority of security breaches. The simplest and easiest way to break in is to let someone have physical access to a system. Despite preventive measures, it is often impossible to stop someone once they have physical access to a machine. If an attacker already has an account on a system, regardless of permission level, he can exploit security vulnerabilities to execute a privilege escalation attack. Finally, there are many ways to gain access to systems even if one is working remotely.

Open Source Intrusion Detection Systems

As you know, I’m a big advocate of Open Source. Below are a few of the open source intrusion detection systems:

AIDE (http://sourceforge.net/projects/aide) – Self-described as “AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire. It does the same things as the semi-free Tripwire and more. There are other free replacements available so why build a new one? All the other replacements do not achieve the level of Tripwire. And I wanted a program that would exceed the limitations of Tripwire.”

File System Saint (http://sourceforge.net/projects/fss) – Self-described as, “File System Saint is a lightweight host-based intrusion detection system with primary focus on speed and ease of use.”

Snort (www.snort.org) -  Self-described as “Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and approximately 300,000 registered users, Snort has become the de facto standard for IPS. ”

Commercial Intrusion Detection Systems

If you are looking for Commercial Intrusion Detection Systems, here are a few of these as well:

Tripwire – http://www.tripwire.com

IBM Internet Security Systems – http://www.iss.net

eEye Digital Security – http://www.eeye.com


November 28, 2010  5:59 PM

One-Third of All Malware Created in First 10 Months of 2010

Ken Harthun Ken Harthun Profile: Ken Harthun

On Wednesday, PandaLabs, Panda Security’s anti-malware laboratory, reported that one-third of all malware in existence was created in the first 10 months of 2010. The average number of malware threats created every day, including new malware and variants of existing families, has risen from 55,000 in 2009 to 63,000 in 2010 – a rate increase of 14.5 percent. The research lab also revealed that the average lifespan of more than half of all malware has been reduced to just 24 hours, compared to a lifespan of several months that was more common in previous years.

“Since 2003, new threats have increased at a rate of 100 percent or more. Yet so far in 2010, purely new malware has increased by only 50 percent, significantly less than the historical norm,” said Luis Corrons, technical director of PandaLabs. “This doesn’t mean that there are fewer threats or that the cyber-crime market is shrinking. On the contrary, it continues to expand, and by the end of 2010 we will have logged more new threats in Collective Intelligence than in 2009. It seems hackers are applying economies of scale, reusing old malicious code or prioritizing the distribution of existing threats over the creation of new ones.”

I look for this trend to continue. All you have to do is watch the new headlines to realize that malware attacks and data loss are on the rise.


November 25, 2010  5:15 PM

Happy Thanksgiving to All My Readers Who Celebrate the Holiday!

Ken Harthun Ken Harthun Profile: Ken Harthun

Whether or not you celebrate the American holiday known as “Thanksgiving Day,” I ask you to take a moment and reflect on things that you have to be thankful for. Me, I’m almost overwhelmed this year by the blessings I reflect upon:

  • A new, healthy grandchild (who was born premature, but doing fine). Welcome, Aayla!
  • My own and my wife’s good health.
  • My family’s good health.
  • Friends that I have made worldwide (many of whom I’ve never met, but they’re friends nonetheless!)
  • My readers whose support allows me to continue publishing this blog for TechTarget.
  • My clients who stick with me and listen to my security advice (Not a single major security incident in the last four years, yeah!)

There are so many more that it’s impossible to list them all. But, I want to extend one special holiday greeting to my AWESOME friend, Stuart Stirling (whom I’ve never met in person, but whom I hope to one day), for sending me this incredible video. Happy Thanksgiving, Everyone!

[kml_flashembed movie="http://www.youtube.com/v/Ek1iIOTsiRo" width="425" height="350" wmode="transparent" /]


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: