« Archives in May, 2010

Man infects himself with computer virus

This seems to be catching a lot of hype and I’m not sure why. The man implanted himself with a computer chip, then infected it. Once infected, he was able to show that it could propagate to another computer. I realize the ramifications of this and the potential issues it poses but how much of our tax dollars went to this research. Being a geek, I think this is cool but this is obviously an easy theory to prove in my opinion. Anyway, if you want to read the rest of the story, the story can be found here.

Warning for "Distracting Beach Babes" on Facebook

For the second Saturday in a row Facebook users have had to deal with Facebook malware in the form of what looks like sexy videos but are in fact malicious apps.

This time the scam is spread in messages like this:

Just like in the previous malware attack, what happens if you click on the link is that you’ll be taken to an application installation screen that requests access to your profile and access post on your wall. This allows the application to send its message to your friends and post it on their walls. Once the user clicks Allow a page is displayed asking them to update their FLV Player which prompts the download of the malicious file.

Read more…

Zeus is forwarding Adobe updates again

Websense® Security Labs™ ThreatSeeker™ Network has detected a new batch of malicious emails containing Zeus payloads. This campaign is very similar to another which Adobe reported on a couple weeks ago. The social engineering tricks on this campaign have gotten considerably better.

Click here to view an example of the email.

Be careful what you click on and remember vendors don’t send you updates by email.

Metasploit Framework 3.4.0 Released!

After five months of development, version 3.4.0 of the Metasploit Framework has been released. Since the last major release (3.3) over 100 new exploits have been added and over 200 bugs have been fixed.

This is the first major release under the Rapid7 label. This release includes massive improvements to the Meterpreter payload and it has support for generating malicious JSP and WAR files along with exploits for Tomcat and JBoss that use these to gain remote access to misconfigured installations.

Read more…

The Answer to Life, the Universe, and everything!

Robbie Williamson has just announced the new release date for Ubuntu 10.10 Maverick Meerkat will be October 10, 2010. To those that don’t know, 10.10.10 in binary is 42. Robbie even used the phrase “Don’t Panic” to stay with the theme in his post.

A Case for Modifying the Ubuntu Release Schedule

So Long, and Thanks for All the Fish

Google Street View Cams Collected Private Content From WiFi Networks

Google’s roaming Street View cameras have been doing more than snap pics of your neighborhood; they’ve also been collecting packets of information sent over private WiFi networks, the company acknowledged Friday.

The company said the collection was “a mistake,” the result of a programming error, and that it has now stopped collecting the data, according to a post on its blog.

But the revelation raises questions about whether the company violated federal wiretapping laws in collecting the information and could draw scrutiny from U.S. regulators.

Last month, regulators with the Data Protection Authority in Germany asked the search giant what information its Street View cameras collected and what it did with that information.

Google disclosed at the time that in addition to taking pictures, its camera system collected certain data about local WiFi networks set up in neighborhoods where the cameras traveled. That data included the SSID (the network’s name) and the MAC address (a unique number given to each WiFi router) and was collected to improve the location-based services it offers consumers.

Read more…

Twitter-controlled botnets cometh

A security researcher has unearthed a tool that simplifies the process of building bot armies that take their marching orders from specially created Twitter accounts.

TwitterNet Builder offers script kiddies a point-type-and-click interface that forces infected PCs to take commands from a Twitter account under the control of attackers. Bot herders can then force the zombies to carry out denial-of-service attacks or silently download and install software with the ease of their Twitter-connected smartphones.

Read more…


SANS Forensic Summit

SANS What Works in Forensics and Incident Response Summit 2010


If you’ve never visited carnal0wnage, you’re missing out! The blog brings you the latest and greatest in metasploit development and usage.

carnal0wnage can be be found here.

Feds seize $143m worth of bogus networking gear

Federal authorities over the past fives year have seized more than $143m worth of counterfeit Cisco hardware and labels in a coordinated operation that’s netted more than 700 seizures and 30 felony convictions, the Justice Department said Thursday.

Operation Network Raider is an enforcement initiative involving the FBI, Immigration and Customs Enforcement and Customs and Border Protection agencies working to crack down on the bogus routers, switches and other networking gear. In addition to costing Cisco and other US businesses millions of dollars, the scams could threaten national security by infusing critical networks with gear that’s unreliable or, worse, riddled with backdoors.

Read more…