58 posts • joined 19 Aug 2007
Re: Dalek Obsessive alert.
I specifically came to the comments section to see if I was the only one bothered by that.
As any kid who grew up in the 70s remembers, the Dalek is just a travel machine for the mutated Kaled within. Essentially, Terry Nation predicted Telsa and gave Elon Musk the name Davros.
> That Graham guy made an irresponsible disclosure.
I didn't disclose anything.
Kirk McElhearn wrote the blog post (I merely retweeted it, much to Namecheap's annoyance).
And Kirk didn't irresponsibly disclose anything either. He just reported that an unauthorised party had created subdomains for his domain via Namecheap, but he *didn't* (because both he and I simply don't know) explain how it was done.
As far as I can see Namecheap still hasn't informed affected customers.
Re: What info was given about the hack itself
It was a SQL injection attack, combined with failing to apply a database software patch released 3.5 years earlier, according to the ICO's investigation into the monumental cockup.
They had suffered other SQL injection attacks earlier in the year, but not done much in response apparently.
All pretty shameful IMHO.
You could always ensure that the password manager's database that you are syncing via the cloud is itself encrypted.
I would be surprised if the password manager isn't doing its own encryption, but I would recommend using a tool which automatically encrypts any data before it's shoved in your cloud-syncing folder anyway.
Tavis's next target
Last sentence reads:
"Ormandy will set sights on popular password vault Password1 after this audit."
I suspect you mean 1Password from AgileBits rather than Password1.
The confusion is probably caused by password1 being many people's password. :(
Support for Autism
Good to see autism getting support from TalkTalk.
After all, it's quite possible that it was someone from that spectrum who did TalkTalk's free penetration test for them in the first place.
Re: Reward for failure
I'm hardly a fan of Dido Harding and TalkTalk, but I believe the interview where she was infamously pictured in front of a creaky old computer and CRT monitor was filmed in a BBC office not TalkTalk.
Yes, I know that makes it less fun. Sorry about that.
Such horrible sad news. I only heard yesterday that he was seriously ill, and now the inevitable ghastly news that has followed.
Steve was a really nice chap. A truel gent. He always loved a natter on the phone, had time for everyone, and would love to tell stories of his escapades from the early 80s.
Can't believe he's gone. They don't make many of them like that anymore.
RIP Steve. We'll miss you mate.
The link works for me.
Or you can go straight to the technical paper (PDF) here: http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf
10,000 or 25,000
The explanation is that currently 10,000 Unix servers are compromised by the Windigo attack, but in the entire lifetime of the campaign up to 25,000 servers have been hit.
Hope that helps
Midnight is superb.
A fantastic piece of writing by Russell T Davies (just when I thought he'd run out ideas) and a terrific piece of acting by the small cast.
I would rate it above Blink personally - although my wife thinks Midnight is the most boring episode of Who ever. Different folks, different strokes I guess.
(Glad to see Girl in the Fireplace also make an appearance)
I believe him
In over 20 years working for anti-virus companies, I never once heard about any pressure being put on us by government agencies to not detect malware.
To be honest, I can't imagine a govt agency *trusting* an anti-virus company (and the variety of nationalities employed inside a typical security lab) to keep such a request secret anyway.
Not to mention, how exactly would an anti-virus company be expected to respond if a customer (who was being spied upon by the agency) sent in a sample, and asked why we weren't detecting it when - say - F-Secure was?
So, I don't think this is happening.
Rather than nobbling the anti-virus companies, I suspect govt agencies are writing malware (just like the bad guys) and working their damndest to avoid detection (just like the bad guys). The fact that any state-sponsored malware is likely to be designed for specific targeted attacks, helps their hand of course...
Re: Pot meet kettle
I never sawed a person in half on stage at Infosec.
I did once guillotine Janet "Blue Peter" Ellis's hand off. But that was at Networks 96. And I was working for Dr Solomon's at the time.
Sophos tended to be a fair bit more corporate in its trade show presentations than Dr Solomon's, but anything that breaks the monotony of presentations about virtualization, high wire gymnastics on the Symantec booth, and dollybirds handing out USB sticks has to be a good thing I reckon.
Onel de Guzman
Point of order. Onel de Guzman, creator of the Love Bug, did his dastardly deed back in 2000 - ten years before the Naked Security blog was written. So we wouldn't have that many articles about him other than the odd retrospective piece. :)
From VirusTotal's own website:
"Those who use VirusTotal to perform antivirus comparative analyses should know that they are making many implicit errors in their methodology"
In a nutshell, it ain't a real world test, as VirusTotal does not (and doesn't claim to) mimic the protection that users would experience in the real world where they may have multiple levels of protection, cloud-based lookup, runtime behavioural analysis etc etc..
Guy not wearing the mask
He's the host of one of the shows on the TV channel RT (Russia Today).
I don't think we should assume he's in any way connected with the rest of the vid.
Lest we forget..
Anyone else remember The Register's 2009 article: "'Cybercrime exceeds drug trade' myth exploded"?
It's clearly a publicity stunt
As I explain at http://nakedsecurity.sophos.com/2011/06/20/beautifulpeople this story has duped the likes of The Telegraph, The Daily Mail, The Guardian, Fox News, BBC Radio 4 and now The Register too!
It's clearly poppycock, dreamt up by BeautifulPeople's PR firm. If the Shrek virus exists, I look like Brad Pitt.
I'm not medically qualified so I can't give you a definitive answer on this one - but I feel fine, thanks.
Facebook's https option
As our letter makes clear, Facebook doesn't turn on https by default - and if you do turn it on they only use it "whenever possible".
What they mean by "whenever possible" is whenever it's convenient for them.
So not, for instance, when you visit the mobile version of their website. And not when you visit third party apps running on the Facebook platform.
It should be on, by default, all the time you're connected to Facebook. Period.
[ps. can we have a Zuck avatar?]
Don't use VirusTotal for detection comparison
VirusTotal itself says that you shouldn't use it to compare detection capabilities.
Those who use VirusTotal to perform AV comparative analyses should know that they are making many implicit errors in the methodology, the most obvious being:
* VirusTotal AV engines are commandline versions, so depending on the product, they will not behave exactly the same as the desktop versions: for instance, desktop solutions may use techniques based on behavioral analysis and count with personal firewalls that may decrease entry points and mitigate propagation, etc.
* In VirusTotal desktop-oriented solutions coexist with perimeter-oriented solutions; heuristics in this latter group may be more aggressive and paranoid, since the impact of false positives is less visible in the perimeter. It is simply not fair to compare both groups.
Sophos has been blocking the site linked to by the script on the BBC website since 20:42 GMT on 9 February 2011, for instance. But VirusTotal doesn't test that way so it won't know that we'd pick it up as Troj/ExpJS-BO and Mal/IFrame-F.
The difficulty in detecting hoaxes is telling the difference between
"Please watch out for emails about Ed Stewart - the so-called Crackerjack virus will turn your CPU into blancmange. Forward this warning to all of your friends - we need to stamp this one out!"
"There's a new hoax doing the rounds. It warns you to watch out for emails about Ed Stewart - claiming the so-called Crackerjack virus will turn your CPU into blancmange. Please forward this advice to all of your friends - we need to stamp this one out!"
And then there's the issue that virus hoaxes can spread via newspapers, fax, Radio 2, etc. or even as publicity stunts. (Read the story of the Irina hoax virus publicity stunt here: http://virusbusters.itcs.umich.edu//hoaxes/irina.html )
It must have been almost ten years ago. I was in a car, and Ed Stewart was pontificating on Radio 2 about some computer virus or other.
My ears pricked up, and I realised he was telling his loyal band of listeners a load of old nonsense - and was actually reading out a virus hoax.
I called the station, to try to get them to put out a correction, but they must have thought I was a nutter.
Which I probably was. For listening to Ed Stewart.
Need to correct that headline - it DOESN'T bypass virtually all AV
KHOBE can't be described as a way that malware can be installed on computers.
What Matousec describes is a way of "doing something more" **if** the malicious code manages to get past your anti-virus software in the first place.
In other words, KHOBE is only an issue if anti-virus products such as miss the malware. And that's one of the reasons, of course, why security vendors offer a layered approach using a variety of protection technologies.
How can that be bypassing?
There's a good write-up on this by my Sophos colleague Paul Ducklin:
Google is your friend..
Check out the image of the spam on the upset blogger's post.
The offending spam comment includes the commenter's name. Google his name, and you should be able to find out the name of the agency he works for pretty easily.
Sophos is no longer working with the company.
Rent-a-quote Graham's right here!
I'm right here - who do you think was the "spokesman" who spoke to The Register? :-)
My opinion - as you read in the article - is that what happened is appalling, and something that we're all mortified about here at Sophos.
We're not in the business of adding to the spam problem, and we are terribly sorry to those bloggers who received these inane messages from the marketing agency we hired.
Still no evidence that the Facebook app was malicious
Hi, I thought I'd just post a follow-up.
We've still seen no evidence that the Fan Check Facebook app which has got everyone scared witless is malicious. We can't be specific about what precisely "Fan Check" does to Facebook users as we're unable to access it.
What isn't in doubt, however, is that the bad guys have set up websites which have been optimised to appear high in Google search results for people hunting for info on Fan Check, but are designed to spread a fake anti-virus application instead.
So, even if it's true that the Facebook app is harmless - there is still a danger out there, that many Fan Check-fearing people are being directed to.
Graham Cluley, Sophos
Video of malware blocked by YouTube
For reasons best known to YouTube they've deemed the video of the malware attack "inappropriate content".
If you want to watch what the malware does, you can check it out at http://vimeo.com/5662308
Tim, I think you've interpreted how this works the wrong way because Pareto just posted a picture of the Windows payload on their blog.
The malware served up is different depending on whether you visit the site using Windows or Mac OS X.
We have a video demonstrating what happens if you visit on a Mac over at
We're seeing more and more of these two-pronged attacks - working out if you're visiting via Windows or a Mac, and serving up the appropriate flavour of malware.
What makes you think it only works on Internet Explorer?
We tried it on IE, Safari and Firefox using Windows and Mac OS X computers.
The attack is based around social engineering rather than a flaw in a browser - so any user with a hunger for porn may find themselves tempted into downloading the codec.
Klingon response to The Register
The page has been updated to mention The Register
(and some further explanations at http://www.sophos.com/blogs/gc/g/2009/05/19/klingon-antivirus-facts/ )
Some more information
That's a mightily impressive six times more infections than the tried and trusted malicious Iframe attack of Mal/Iframe-F.
I'd recommend that surfers check their protection is up-to-date and fighting this one.
*If* Mikeyy Mooney did make a sincere effort to warn Twitter (quite a big "if" to my mind, as it hasn't been suggested before) and they ignored him then his response should never have been to unleash the worm.
*If* they had ignored him, a better thing would have been to have gone to a security journalist, demonstrated the flaw to the journo, and allowed the journo (without publishing details of how to reproduce it) to write about it. You can be sure that would get the attention of Twitter's powers-that-be.
But the fact is that there's no suggestion that Mikeyy has ever contacted Twitter to work out a responsible way of disclosing the flaw. Instead he endangered many innocent Twitter users and disrupted the business.
And guess what the *latest* Mikeyy worm says
In case anyone missed it, shortly after it was revealed that Mikeyy had been offered this job, a new worm was spreading around Twitter.
One of its messages?
"I work for exqSoft Solutions now - http://www.exqsoft.com/ - mikeyy"
Not a good sign. The CEO of exqSoft says he did not ask for the worm to be written and has been unable to contact his latest recruit to ask if he is the originator.
The link is still there
Well, in the form of PDFs about the Technical Advisory Board anyway.
Thanks to the wonder of PDFs they are available as clickable hotlinks for anyone who is bored of technical advice..
Re: Cameron Colley's question about Gigabyte, the notorious female virus writer (real name Kim Vanvaeck)
She got arrested in Belgium in 2004 (http://www.sophos.com/pressoffice/news/articles/2004/02/va_gigabyte.html ) but ultimately was let off the hook by the cops with little more than a smacked wrist and a promise not to cause trouble again. As far as I know she followed their advice
I know a guy who met Gigabyte, and told me she was a rather cute-looking blonde. Bizarrely I was once invited to a security conference to sing a karaoke duet with her, but probably wisely turned down the opportunity..
Will USA want to extradite BBC reporter?
Do we know where the compromised PCs are based in the world?
What if some of those botnet computers were in the US military? The Pentagon? NASA?
Will the USA try and extradite the BBC's Spencer Kelly just like Gary McKinnon?
I'm running a poll on my blog if anyone wants to give their opinion on whether the Beeb were justified or not in what they did.
Graham Cluley, Sophos
And the malware authors are close behind..
It looks like the bad guys are up to their trick of jumping on the bandwagon again.
We're seeing evidence that websites containing malware are showing up in search engine results when people hunt for PIFTS. Sophos is picking up some of these sites as Mal/BadRef-A.
The Mal/BadRef-A script redirects to another malicious script (Troj/Reffor-A) which then itself redirects to a page detected as Mal/FakeAvJs-A.
That page leads to a fake anti-virus scan (scareware) designed to frighten you out of your hard earned cash.
Graham Cluley, Sophos
Why we don't install an anti-Conficker on those websites
I'm afraid that it would be against the law - under the Computer Misuse Act - for us to change the visiting infected computers without the owners' permission.
A new strain
Yes, there was a malware attack spammed out in the summer which was similar in its use of the airline ticket disguise (I refer to it in my blog entry on the Sophos website at http://www.sophos.com/blogs/gc/g/2008/12/04/email-malware-flying-high/), but this is a new campaign which has some new characteristics - and is spreading different malware.
Why are they using such a similar cloak of disguise? Well, a simple reason - it worked before, so they're banking that it will work again. :(
This isn't about believing that you've been sent air tickets you never ordered, but believing that either an airline has screwed up or (most likely) that someone else has used your credit card to make a purchase. Naturally people get so affronted that they open the attached file without thinking of the possible security consequences.
Who should have found the infection?
@Anonymous coward and @Steen Hive
I do believe it is impractical for the millions of websites out there to check every advertising link served up to them by a third party advertising company to check if it is legitimate. Can you imagine the resources required to do that? Sure, it would be nice if it happened - but is it realistic to expect it?
Didn't The Register itself serve up a malicious banner advert four years ago? As I recall, they responded the right way (as I would hope the Daily Mail would do) by pulling the ads and presumably asking tough questions and perhaps breaking the relationship with the advertising network.
The ad networks need to do a much better job of weeding out the malicious adverts - this is not necessarily easy to do of course.
The addition point I made to The Register, but which got left out of the report I think, is that everyone browsing the web needs to defend themselves. Many websites deliver ads via third parties, and most are not checking them for malicious links. If you have a decent anti-virus solution on your computer then that can help reduce the threat to you.
After all, that's how it all started...
It's time to go back to basics with Doctor Who.
When the show started in 1963 it starred a doddery old white-haired man and his granddaughter as his assistant.
Andrew Sachs, anyone?
Another Paris Hilton?
What I'm curious about is how was Sarah Palin's email account broken into?
Was her PC compromised with spyware? Did she carelessly connect to an unencrypted Wi-Fi hotspot? Did she choose a dictionary word for her password ("aardvark") that was easy for the hackers to crack?
Or did she fall for a similar trick as the one that caught out a certain Miss Paris Hilton back in 2005. If I recall correctly, Paris's mistake was making the name of her pet chihuahua (Tinkerbell) the secret question/answer to reset her Sidekick's password. Uh-oh.
I made a video comparing Sarah Palin's plight with Paris Hilton's experiences, which Register readers might like: http://www.sophos.com/blogs/gc/g/2008/09/18/paris-hilton-sarah-palin-video/
The SQL attacks *always* have been hitting the big sites as well as the little ones.
These attacks are automated - it's not as though BusinessWeek was specifically targeted. The bad guys use search engines to find vulnerable sites (big or small) and zap! infect them with their malicious scripts.
(Paris, in honour of The Reg bringing back the old icons)
11% of people who came to Sophos's website
The poll was run on our website. According to the marketroids, the typical make-up of people who come to our website are IT specialists and system administrators (as we don't have a consumer product).
I expect they know the difference between spam and "legitimate" marketing emails - but who knows..
We've published links and more information on the Sophos Spam Pledge page at http://www.sophos.com/pledge
Sophos's 95 percent spam stat @Gordon Fecyk
Sophos's figure of 95% of email is spam comes from our spam filtering software and appliances at companies worldwide. We count the amount of legitimate email they receive, and we count the amount of spam they receive. And then do the maths to get a percentage.
Of course, individuals may have varying experiences.
11 percent of people admit to having bought from spam
We polled 390 people in November 2007. 11% said that they had bought goods advertised via spam.
Hope that helps.
Why 30 years of spam? Because it works..
The sad truth of the matter is that we are blighted with spam because it works for the bad guys.
We may all roll our eyes at yet-another-letter-from-NIgeria, the endless waves of fake Rolex offers, weight loss pills, and unwanted mortgage loans.. but the only reason these things get sent is because *some* people *occasionally* respond to spam and make a purchase.
What we really need to do is educate more people to NEVER buy, try or reply to spam. The dudes at SophosLabs put a little video together today hoping to raise awareness of the need to never buy goods advertised via spam:
Maybe the readers of The Register are immune from the lure of spam emails, but can we say the same of everyone in our family? Is it our Aunty Hilda's innocent clicking and purchasing of penny stocks what is perpetuating the spam problem?