Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

Alert

NEWS - August 16, 2012

Aug 16, 2012 2:05AM PDT
Ecuador Grants Assange's Request for Asylum, Defying UK Threats

The Ecuadorean government announced Thursday that it will grant WikiLeaks founder Julian Assange asylum, defying threats from the UK government that authorities would forcibly seize Assange from the embassy if Ecuador granted Assange's request.

"We have decided to grant asylum to Julian Assange," announced Ecuadorean Foreign Minister Ricardo Patino at a press conference in Quito, to the sound of cheers from spectators.

"The UK government should respect the decision of the Ecuadorian government," he said according to a live translation of his Spanish words, "and offer the necessary warranties so that both governments can act adequately and properly representing the international rights and the right of asylum. We also trust that the excellent relations that we have between the two countries will continue to be so and will remain intact, based on the principles and values that we have shared about democracy, peace, and life-quality that are only possible if you respect the fundamental rights of everyone."

Continued : http://www.wired.com/threatlevel/2012/08/ecuador-grants-assanges-asylum/

Also:
WikiLeaks' Assange granted asylum in Ecuador
Julian Assange Gets Ecuador Asylum, But Standoff Continues
Ecuador Says U.K. is Willing to Start International Incident Over WikiLeaks' Assange

Discussion is locked

- Collapse -
BKA trojan goes on an international holiday
Aug 16, 2012 2:44AM PDT

The family of malware known as the BKA trojan has increasingly established an international presence. In Germany, where the malware is also known as the Ukash or Paysafe trojan after its preferred methods of payment, the ransomware blocks a user's computer with a message purporting to be from the Federal Police and demands a payment to unlock it again. Variants in the UK have been rebranding essentially the same threat with the logo of the Metropolitan Police. Now the trojan has surfaced in the US, pretending to be a message from the FBI, and in Portugal with fake branding of the Policia de Seguranca Publica Portuguesa.

The French web site botnets.fr has collected screenshots (French language link) of the different versions of the malware, which it calls Reveton. The FBI has also issued a warning about the threat, saying that the government's Internet Crime Complaint Center (IC3) has received a large number of complaints about the malware. According to the FBI, many victims actually pay up and only call for help when the trojan does not unlock their computer.

Continued : http://www.h-online.com/security/news/item/BKA-trojan-goes-on-an-international-holiday-1668547.html

Related:
Online Scammers Using 'FBI message' to Demand Money
FBI Warns Users of New 'Reveton' Scareware Scam

See: Inside a 'Reveton' Ransomware Operation

- Collapse -
Phishing the 1% - keylogger spam aims at hedge funds
Aug 16, 2012 2:44AM PDT

From BarracudaLab Internet Security Blog:

If you were in the business of distributing malware that steals computer credentials, wouldn't you want to get your payload installed on the computers of people with money - LOTS of money? Barracuda Labs recently detected a spam campaign that tries to do just that by targeting hedge fund managers.

The pitch is in a short and simple spam that offers advice about carried interest fees. [Screenshot]

Carried interest is a topic of particular interest to hedge and private equity funds. It is an accounting mechanism used to return income to funds and it's tax status has been the subject of some debate. For this reason, any email purporting to have information about carried interest fees is likely to raise the curiosity of financial professionals. Spammers rely on that curiosity to get their malware installed.

Opening and running the attachment (never run attachments!) loads and displays a PDF file which is actually relevant. [Screenshot]

Continued : http://www.barracudalabs.com/wordpress/index.php/2012/08/14/phishing-the-1-keylogger-spam-aims-at-hedge-funds

- Collapse -
Tracking Email Malware Trojan.MyAgent
Aug 16, 2012 2:44AM PDT

From the FireEye Malware Intelligence Lab Blog:

At FireEye we have been tracking a particular piece of malware we call Trojan.MyAgent for some time now. The malware is currently using email as its primary vector of propagation. From looking at the data in the FireEye Malware Protection Cloud (MPC), we can see that the malware is currently targeting the following industries:

• Defense
• Chemicals
• Technology
• Aerospace

We have seen different versions of this malware arriving as an exe inside a zipped file or as a PDF attachment. In this particular sample, the exe once executed opens up a PDF file called "Health Insurance and Welfare Policy." In addition to opening up a PDF file, the initial exe also drops another executable called ABODE32.exe (notice the typo) in the temp directory. Both the dropper and the dropped executables have decent detection on VirusTotal (VT). Here are the detection links to both the binaries.

https://www.virustotal.com/file/dc79b2943ad797e39ea3830ada7dc33051b5c8c048653ed61e1ebdb8a0098f7d/analysis/ - Dropped (ABODE32.exe)

https://www.virustotal.com/file/d4d2814fbe94baca085392e44a5340370cf66738addb3f27860a2b539b148b41/analysis/ - Dropper

This is the PDF document that the executable opens: [Screenshot]

Continued : http://blog.fireeye.com/research/2012/08/email-malware-trojan-myagent.html

- Collapse -
Study: 7 of 13 Top Rated Antivirus Fail Against HTTPS
Aug 16, 2012 2:44AM PDT
.. Exploits

You don't hear about Texas-based NSS Labs as much as you do about such companies as AV-Test.org and AV-Comparatives.org. That isn't because the researchers aren't busy; it's because the vast majority of their research is commissioned by large companies for internal use.

From time to time they release findings to the public, notably their studies on how well browsers block Web malware . NSS researchers have a major test of consumer endpoint security in the works. In preparation for that, they've just released a mini-test that evaluates how well popular security suites handle Web-based exploits. The results will surprise you.

Exploits are attacks that attempt to gain control of victim systems through unpatched vulnerabilities in the operating system, the browser, or popular third-party applications. For this mini-test, the researchers started with two Microsoft vulnerabilities that were patched in June and July of 2012. Users who didn't apply those patches would be vulnerable.

Continued : http://securitywatch.pcmag.com/none/301478-study-7-of-13-top-rated-antivirus-fail-against-https-exploits
- Collapse -
World's largest oil company Saudi Aramco hit by malware
Aug 16, 2012 4:27AM PDT

Saudi Aramco, the national oil company of Saudi Arabia, reported a serious security breach which may caused major disruptions in their network. A piece of malware caused a large infection within their network - the consequences are still unknown.

The company stated the following on their official Facebook page:

On Wednesday, Aug. 15, 2012, an official at Saudi Aramco confirmed that the company has isolated all its electronic systems from outside access as an early precautionary measure that was taken following a sudden disruption that affected some of the sectors of its electronic network.

The disruption was suspected to be the result of a virus that had infected personal workstations without affecting the primary components of the network. Saudi Aramco confirmed the integrity of its electronic network that manages its core business and that the interruption has had no impact whatsoever on any of the company's production operations.

The company employs a series of precautionary procedures and multiple redundant systems within its advanced and complex system that are used to protect its operational and database systems.


According to some unconfirmed reports via Twitter and Pastebin, the situation is much more serious.

Continued : http://www.net-security.org/malware_news.php?id=2228

- Collapse -
Yahoo Is Deleting Inactive Accounts to Create Space for ..
Aug 16, 2012 4:27AM PDT
Yahoo Is Deleting Inactive Accounts to Create Space for Fresh Users, Phishing Alert

It seems that Yahoo! accounts are still valuable for cybercriminals, otherwise they probably wouldn't bother sending out fake emails that attempt to lure recipients to fake login webpages.

Two new variants have been submitted by users to millersmiles.co.uk. The first one involves the old "Yahoo! will delete your account" scheme:

'Dear Yahoo! Email User,

Due to excess abandoned Yahoo! e-mail account, Yahoo! Help Desk is currently
carrying out system clean up to delete inactive accounts, inother to create space for fresh users.

To verify that your Yahoo e-mail account is active, you are required to click on the link below or copy and paste in a new web page, then complete the form available for this process.

Failure to do this will result in account termination.
'

The so-called verification link leads to a webpage hosted on the compromised blog of a user from Malaysia. The cleverly crafter HTML file replicates the Yahoo! Mail login page in hopes that victims will fail to look at the site's URL and enter their usernames and passwords without giving it too much thought.

The second malicious email is much simpler. It pretends to come from "Yahoo Admin" and it only reads "Click here to update your account."

Continued : http://news.softpedia.com/news/Yahoo-Is-Deleting-Inactive-Accounts-to-Create-Space-for-Fresh-Users-Phishing-Alert-286729.shtml
- Collapse -
US telecoms giant AT&T hit by DDoS attack
Aug 16, 2012 5:57AM PDT

A distributed denial-of-service attack aimed at AT&T's DNS (Domain Name System) servers has disrupted data traffic for some of the company's customers.

The attack began Wednesday morning West Coast time and eight hours later, did not appear to have been mitigated.

"Due to a distributed denial of service attack attempting to flood our Domain Name System servers in two locations, some AT&T business customers are experiencing intermittent disruptions in service," an AT&T spokesman told IDG News Service by email. "Restoration efforts are underway and we apologize for any inconvenience to our customers."

The attack appears to have affected enterprise customers using AT&T's managed services DNS product.

"Our highest level of technical support personnel have been engaged and are working to mitigate the issue," AT&T said in a message on a service status page.

But it added there is "no estimated time" for restoring the service.

Continued : http://news.techworld.com/security/3376313/us-telecoms-giant-att-hit-by-ddos-attack/