Category Archives: malware

Have You Been Gooliganed?



Check Point LogoA quick public service announcement….at the end of November security firm Check Point and Google announced that a variant of Ghost Push malware called Gooligan had infected over million Google accounts, with numbers increasing every day. The malware is present in apps typically downloaded outside of Google Play and infects devices on Android 4 (Jelly Bean and KitKat) and 5 (Lollipop).

Gooligan
Courtesy of Check Point

If infected, the malware exposes “messages, documents, photos and other sensitive data. This new malware variant roots devices and steals email addresses and authentication tokens stored on the device.” so it’s not very nice.

Fortunately, the team at Check Point have developed a tool which checks if your Google account has been compromised. All you have to do is enter the email address associated with your Android device.

While we are on the subject, if you want to check if your email address has been garnered in any of the recent security breaches, check out haveibeenpwned.com which tells you who’s been sloppy with your details (thanks, Adobe and LinkedIn).


Superman Tops McAfee’s Toxic Avenger List



evil superman

With San Diego Comic Con quickly approaching, everyone is jumping on board the superhero bandwagon.

Today even McAfee has joined the hype. (The company, not the man, however, we’d love to see a comic book based on John McAfee!)

In a press release, the anti-virus company released its second annual list of superhero searches that lead to bad links, viruses, malware and sites containing malware.

Here’s the list of suspicious superheroes:

McAfee’s Top 10 Most Toxic Superheroes:

 1.       Superman, 16.50%

2.       Thor, 16.35%

3.       Wonder Woman + Aquaman (tie) 15.70%

4.       Wolverine, 15.10%

5.       Spiderman, 14.70%

6.       Batman, 14.20%

7.       Black Widow, 13.85%

8.       Captain America, 13.50%

9.       Green Lantern, 11.25%

10.   Ghost Rider, 10.83%

*% indicates chance of landing on a website that has tested positive for online threats such as spyware, adware, spam, phishing, viruses or other malware.


Mobile Malware Rises



With the rise of smartphones and tablets, it’s not exactly unsurprisingly that they’ve increasingly become a target for cyber criminals and other unscrupulous individuals. In the first half of this year, malware for portable devices increased by 273% compared with 2010.

Cross-platform Trojans are the main source of the growth and most of these viruses are designed to enable spamming or other criminal activities. “With mobile malware, cyber criminals have discovered a new business model,” explains Eddy Willems, Security Evangelist at G Data. “At the moment, the perpetrators mainly use backdoors, spy programs and expensive SMS services to harm their victims. Even though this special underground market segment is still being set up, we currently see an enormous risk potential for mobile devices and their users. We are therefore expecting another spurt of growth in the mobile malware sector in the second half of the year.

If you think that it’s just hyperbole, think again. Zsone, an Android app in the Google Android Market sent subscriptions to Chinese premium SMS numbers and then intercepted the confirmations. The only way the user knew they’d been scammed was when the bill came in.

PC malware is on the rise too with a nearly 16% rise in the last six months. The graph below shows the rise of new malware each year since 2006 and if the growth continues, there will be more new malware in 2011 than 2006-09 combined.

It’s a bad world out there, so be careful no matter what platform you are on. Just because it’s a phone and not a PC, it doesn’t make you invulnerable.


Malware Myths



GData has found that many people’s preconceptions about malware are wrong and are putting them at risk of malware infection. The vectors for viruses and trojans have significantly changed in the past couple of years and infections now mainly come from websites rather than emails and USB sticks. The growth of malware in the past five years has been phenomenal and since 2005, over 2 million malware threats have been identified.

GData surveyed nearly 16,000 web users in 11 countries regarding their views on internet threats. People are generally more knowledgeable now, with only 4% admitting to having no antivirus software on their computer, although 5% didn’t know. 48% of those questioned have free AV software and 41% have paid software. The survey is not entirely clear if it was Windows PCs only or any computer, including OS X and Linux.

GData identified 11 malware myths that can lead to a higher risk of infection. Here they are.

Myth 1: When my PC is infected, I will notice in one way or another (93%)
No, modern malware writers are smart and code their viruses and trojans to make sure that they work stealthily and unnoticed in the background.

Myth 2: Free AV software offers the same elements of security as paid for packages (83%)
Anyone who has bothered to compare the feature sets of free v. paid versions of security software from nearly any company will know that this isn’t true. Usually the free ones are missing features such as firewalls or anti-spam filters.

Myth 3: Most malware is spread through e-mail (54%)
As mail spam and antivirus filters have got better, malware in attachments has become rarer as it has become less effective. Consequently most spam / malware emails now only come with links to infected websites rather than payloads.

Myth 4: You can’t get infected just by loading an infected website (48%)
Sadly not true. Websites loaded with malware that take advantage of vulnerabilities in the browser and operating system can infect a PC even when the user is “just looking”.

Myth 5: Most malware is spread through downloads at peer2peer and torrent sites (48%)
Undoubtedly some malware is passed on via peer-to-peer but today websites are the prime source of infection.

Myth 6: It is more likely to encounter malware at a porn site that at a horseback riding site (37%)
Much as we might like this myth to be true, serious adult sites are professional and run to a high standard. The web site is key to their business and they make sure the sites are secured and up-to-date with patches. On the other hand, hobby websites are run by enthusiasts who are rarely IT experts and these websites are easily compromised by criminals who then upload malicious code to the site which subsequently infects visitors.

Myth 7: My firewall can protect my PC from drive-by-download attacks (26%)
Sadly, not true. Firewalls are a useful security component but because much malware is web-based and web traffic is generally allowed (because you couldn’t access websites if you didn’t), firewalls provide only limited protection against them.

Myth 8: I don’t visit risky sites, so I am safe from drive-by-downloads (13%)
This is much the same as Myth 6, but the point to take is that your trust in the website brand does not have a direct correlation to the likelihood of being infected. In the recent past, a couple of high-profile trusted sites have become vectors for malware without the owner’s knowledge.

Myth 9: If you don’t open an infected file, you can’t get infected (22%)
The emphasis in this myth is on the “you”. In a perfect world this might be true, but modern PCs and operating systems are so complex and do so much in the background that it’s possible for a malicious file to infect a PC regardless of what the user actually does.

Myth 10: Most malware is spread through USB sticks (13%)
In the past a large proportion of viruses and trojans would have been passed on using USB memory sticks and while they can still be a vector (Conficker!), now more malware is spread by websites.

Myth 11: Cyber criminals aren’t interested in the PC’s of consumers (8%)
As most people recognised, consumer PCs are definitely of interest to consumers, either to form part of a botnet or else to monitor for passwords for on-line services.

There is a natural assumption amongst Internet users that pornography sites are more dangerous than other leisure sites. This is a myth. Amateur hobby/leisure sites are often not professionally run like many pornography sites, making them much easier prey for hackers,” says Eddy Willems, G Data Security Evangelist. “In the past, malware was written by developers who wanted to show off their technical skills, meaning it was visible to infected users. Now cyber criminals design, sell and make use of malware that enables them to take control of PCs’ computing powers in such a way that users do not notice the infection. This covert approach not only puts users’ data at risk, but also allows cyber criminals to send spam e-mails and malware, and participate in DDoS attacks. Internet users must correct their misconceptions in order to stay safe online.

You can download the full report (.pdf) if you want more information on the survey itself and the myths.

So stay sharp out there. The bad guys are out to get you.


G Data Tackles Malware on Websites



G Data’s been busy. After releasing their malware protection for Android, they’ve also extended their safety net into the internet. G Data‘s CloudSecurity is a free browser plug-in designed to block phishing sites and protect against websites pushing malware. The plug-in can be used with Mozilla Firefox and Internet Explorer and it’s available as a free download from free-cloudsecurity.com.

CloudSecurity blocks dangerous websites before they can cause harm to your PC or steal your data. And the more people who use CloudSecurity, the better it gets. Users can report suspicious websites via the plug-in back to G Data, whose experts then check over the websites to see if they are dangerous or not. If they are, they get added to the black list.

If you are currently availing of some of the free AV solutions out, then this sounds like a useful complementary (and complimentary) product.

(This type of product seems to be flavour of the month as Todd also mentioned a similar product in GNC #652 last week – Web of Trust.)


G Data Offers Malware and Virus Protection for Android



The Android OS has already attracted the attention of malware and virus writers looking for new ways to extort money from unsuspecting victims. The BBC reported back in August of 2010 on a Russian media player that sent premium rate text messages, thus earning the virus writer hefty referral fees. More recently, the Geinimi trojan had been collecting personal info and passing it on to some Chinese remote servers.

G Data Software today announced their MobileSecurity solution for Android 2.0 and above to guard against malware and other fraudulent programs. By monitoring activity on the phone or tablet, it can detect unwanted sending of SMS text messages or web browsing in the background.

Using the security app on the smartphone, the user can authorise the activity of known apps but block those apps which start acting in an unexpected fashion. The security app will also maintain a blacklist of Android malware which is regularly updated with downloads from G Data.

Available from April 2011 for £9.99 from the Google Market Place or free to existing G Data customers from G Data’s website.


Sophos Security Threat Report 2011



Digital security firm Sophos today released their Security Threat Report for 2011, which reviews all the ways that the bad guys are out to get you. It’s a glossy 52 page report and is worth a quick read to understand the threats that are out there, especially in areas that you might not be familiar with.

The report covers the key threats from 2010:

  • Fake anti-virus software and scareware – through a warning dialog, users are scared into paying for and installing fake anti-virus software, which at best does nothing and at worst steals passwords and credit card information.
  • SEO poisoning – manipulating search engine results to point users to fake and rogue websites, which are loaded with browser exploits and malware.
  • Clickjacking or UI redressing – hiding malicious buttons underneath innocuous images, e.g. clicking on a “Like” or “Share” image actually emails out malware to all the users friends.
  • Survey scam – in order to complete a questionnaire that typically offers a non-existent but  sought-after prize, software has to be installed or access given to personal data. This information is then used to propagate the questionnaire onwards, earning affiliate revenue for the application developer.
  • Spam – not exactly a new entrant in 2010 but the rise of spam on social networking sites is an increasing problem.
  • Spearphishing – a variant on the original phishing but in this case the attack is well targetted and much more convincing and consequently more likely to succeed.
  • Stuxnet worm – a traditional vector but with a new target, the Stuxnet worm went after SCADA systems and industrial PLC controllers. Very sophisticated, leading to conspiracy theories involving industrial sabotage.
  • Malvertising – the infection of advertising on legitimate websites that links to malware or fake anti-virus software.
  • Compromised sites and accounts – Legitimate websites and typically celebrate accounts are hacked to serve infected webpages or link to malware sites.

The report briefly covers the threats posed to iOS, Android, Windows 7 and Blackberry smartphones before moving onto to review issues with Facebook, Adobe products, removeable media and USB drives. Windows 7 and OS X are also discussed.

The report continues with some of the success stories when the justice system has managed to catch up with the criminals before closing with advice and guidance on how to avoid getting hit.

Give it a read. Warning – 4MB .pdf download.