2/15/10
13-Year Sentence for Hacker
2/12/10
Microsoft stops serving Windows patch blamed for blue screens
Firefox add-on malware false alarm
Russian botnet tries to kill rival
Google Buzz Makes Private Contact Info Public
2/10/10
Facebook Cash Scam
Facebook users may not mention all that personal information on their Facebook page, however, they may have it listed on a combination of networking sites. For example, a Facebook user will list their name and location along with photos on Facebook. The scammer can take that information and then look you up on LinkedIn and Twitter to find out your personal website, job, position, average income, number of years employed, education level and parlay all that information into a “cash scam.”
Fraudsters are using this information to set up “boiler rooms” and contact people on this master list. Boilers rooms look to employ high pressure sales tactics to push unwanted, over priced, or sometimes non-existent stock to unsuspecting buyers. Boiler rooms are nothing new, but using Facebook to gather leads and target people is becoming a serious problem.
The FSA is clearly trying to stay ahead of the scam, “By writing to people now, we can raise awareness of this type of fraud and help protect people from losing money to these criminals,” FSA said. While multiple efforts are being taken to stop these criminals, these cash scam continue to grow and more boiler rooms continue to operate off shore. It’s up to the individual to be aware of such fraud and report any phone calls that you suspect could be criminal.
In the mean time, keep your friends close, your Facebook account closed to outsiders, and don’t allow just anyone to view your personal details on your Facebook page.
iPhone users at risk of phishing attacks
When Apple introduced iPhone OS 3.0, it attempted to beef up the security of over-the-air enterprise management of iPhones by adding support for Cisco Systems' Simple Certificate Enrollment Protocol (SCEP). However, a flaw in the implementation of the standard could allow hackers to offer mobile configuration files that appear to be from a legitimate source, but may otherwise set your iPhone to access malicious servers.
Ars spoke with a mobile security expert who discovered the problem (who asked to remain anonymous because he did not have approval to talk about the issue). He told Ars that the issue is one of trust: "Who would you trust to change your iPhone configuration over the air? Your carrier? Your company? Your IT security admin?" he asked. Apple uses SCEP as a way for the iPhone to check in with a certificate server to verify that a mobileconfig file has been signed by a trusted source, but flaws in the set-up on the iPhone mean that the process doesn't always work as intended.
The problem stems from Apple's method of checking root certificate authorities. Apple added SCEP, which intended to be a protocol to securely verify trust relationships for closed systems, to iPhone OS 3.0. However, a mobileconfig file that uses the older protocol for verification must be sent to the iPhone to initiate SCEP, and this older protocol has a verified flaw in its implementation.
Certificate authorities are used to verify that mobileconfig files come from a trusted source. As long as the certificate used to digitally sign a mobileconfig file can be traced back to a known trusted authority, then it is considered "verified" and safe to install. Unfortunately, the iPhone uses Safari's list of certificate authorities instead of a much more narrowly defined set for authorizing OTA mobileconfig files. Furthermore, it only requires that certificates used to sign mobileconfig files be signature only, instead of a more secure type of certificate that specifies how it can be used.
"The very fact that Apple would confuse a browser keychain and an OTA trust management issue shows that they have not really given any thought about it," the researcher told Ars.
Our source was able to obtain a temporary, signature-only test certificate from VeriSign with the name "Apple Computer." VeriSign issues such certificates for testing only, and are not configured for use for serious security purposes. As such, these certificates only require a verified e-mail address to obtain. Using this certificate, however, he created and signed a fake mobileconfig file that appeared to come from Apple. A user that downloaded this configuration file OTA might easily believe that it came from Apple and click install. That's where the really bad stuff can happen.A mobileconfig file can change quite a few settings on an iPhone. Some changes would be merely annoying, such as blocking access to the App Store or Mobile Safari. Others could be far more serious, such as replacing your VPN settings to connect to a hacker's server, where all the supposedly secure network traffic could be monitored. Or e-mail settings could be changed to route all outgoing e-mails through a malicious server, and a user would be be none the wiser.Another serious potential problem is that a mobileconfig can be used to install additional root certificate authorities. This would allow SSL connections to phishing sites with names that are similar to real websites appear to be legitimate. Even easier, our source said, would be to reroute the traffic to a real website, like a bank, and merely capture login credentials or rewrite transactions to send money to a hacker's account.A mobileconfig file can also be set to not let the user uninstall it; the only way to get rid of bad settings in that case would be to wipe the iPhone and restore it to factory settings.
This problem isn't limited to enterprise users either; less-savvy consumers could be tricked into downloading a malicious mobileconfig file from the Internet just as easily as the average business user. Thankfully, the problem only affects OTA mobileconfig files, and not those downloaded via USB using iPhone Configuration Utility or those that come via iTunes. However, Apple will need to seriously reconsider its implementation of trust verification and SCEP if it expects enterprises to feel secure deploying OTA management.
2/8/10
Twitter p2p scam
Twitter has identified a scheme that uses compromised file-sharing sites to steal the log on information of users.
The service said it had discovered a number of compromised torrent sites that include code used to skim usernames and passwords.
Torrent sites acts as indexes of links to TV, film and music files.
Scammers were then able to use the data to gain access to Twitter and other sites because many people use the same logon for multiple services.
The firm has reset the accounts of affected users.
The conclusion is echoed by security researchers who say it is a particular problem for banking websites.
A survey of millions of people conducted by the security firm Trusteer, suggests that 73% of people share the passwords which they use for online banking, with at least one nonfinancial website.
Around 47% of users share both their user ID and password with at least one nonfinancial website, it found.
Twitter said that it had discovered the scam after seeing unusual activity on the site.
After doing some digging the firm found a network of compromised torrent sites that included code that could be used to harvest logon information.
The sites also contained security exploits allowing the person to steal usernames and passwords.
Twitter said that it hadn't identified all of the affected torrent sites but had reset the passwords of compromised accounts.
The information comes as security firm Sophos launched its annual report.
One of its findings that spam and attacks on social networks - such as Twitter and Facebook - had risen 70% in the last year.
Facebook was branded the riskiest network, although the firm also pointed out that it was also the largest and would therefore attract the most attention form cybercriminals.