Tag Archive for MSFT

Social Media Malware Launch Pads

Social Media Malware Launch PadsSocial networks’ role in the growth of the global virtual society has been well documented. What is not so well documented according to Help Net Security is the role social media has in spreading malware. The security and privacy mechanisms of social networking firms such as LinkedIn (LNKD), Twitter, and Facebook (FB) have proven insufficient to prevent exploitation.

Social networkThe article notes that “To Err is Human,” and human errors lead to exploitation and manipulation whether the social network is online or offline. Social media hold a plethora of personal information on the users that create the network. Individual connections between users collectively form a web of connections. To build each link between users an implicit trust is required between the two users and implicitly across the entire network. Any information provided by an individual user through chained connections becomes a part of the full network. When an attacker is able to exploit one user in the social network, they have the potential to be able to push malicious content into the network. The network’s connectivity enables the spread of exploitation. The blog explains that attackers exploit the weakest link in the chain.

The inability of users to determine the legitimacy of content flowing through the social media helps this exploitation process. Help Net Security says the biggest problem with online social networks is that they do not have built-in protection against malware. For example, current social networks do not scan the URLs and embedded content coming from third-party servers such as Content Delivery Networks. Therefore, there is no way to authenticate the URLs passed among the user objects in the social networks.

exploitation of human ignoranceThe infection process begins with the exploitation of human ignorance and followed by the spreading of the malware through the trust upon which the network is based.

The article further explains that to start the exploitation process, an attacker will pick an issue that affects human emotions to evoke a response so the social network user will do something the attacker wishes. Phishing and spam messages about weather calamities, politics, and financial transactions are used for starting infections. The author states that since social network exploitation begins by exploiting an individual’s ignorance common attack strategies have emerged.

FacebookOne of the simplest infection techniques is to put malicious URLs on a user’s Facebook message wall. When a user clicks on an illegitimate hyperlink it can result in the automatic download of malware through the browser. Some of the exploits used are:

  • Browser Exploit Packs (BEP) fingerprint the browser version and other software on the user machine. Based on this information, a suitable malware is served to the user which uses exploits for that particular browser.
  • Drive-by-Download attacks begin by visiting a malicious Malicious advertisementspage. They exploit vulnerabilities in browsers and plugins. Successful exploitation of the vulnerability causes a shellcode to run that in turn downloads the malware into the system.
  • Malicious advertisements (malvertisements) happen when an attacker injects a malicious link into a user’s Facebook wall to spread malware. The fake post is linked to a third-party website that has malicious advertisements embedded in it. These advertisements are linked to malicious JavaScripts which execute the malicious content in the browser.

Trojan horseHelp Net Security states that online social media is not harnessing the power of Safe Browsing API’s from Google (GOOG) or similar services to instantiate a verification procedure before posting a URL back to a user profile. Lack of such basic protections is a key factor in making the social networks vulnerable to exploitation.

Microsoft (MSFT) recently spotted a Facebook attack in the wild that exploited Facebook user’s trust in a social engineering campaign. The attack tries to trick Facebook users into installing a backdoor Trojan with keylogging capabilities according to the Help Net Security report.

MSFT says the Facebook Wall messages varied but they all lead to fake YouTube pages. Once there, the user is urged to download a new version of “Video Embed ActiveX Object” to play the video file. Unfortunately, the offered setup.exe file is the Caphaw Trojan.

The trojan bypasses firewalls, installs an FTP and a proxy server, and a key logger on the affected machine. Microsoft’s Mihai Calota says ” … has built-in remote desktop functionality based on the open-source VNC project.” MSFT says the Facebook attack can be used to steal money, “We received a report .. that money had been transferred from his bank account … The keylogging component, coupled with the remote desktop functionality, makes it entirely possible for this to have happened.

rb-

The articles correctly state that security and privacy mechanisms are indispensable for safe online social networking. Built-in security is necessary because attackers exploit the trust, curiosity, and ignorance of the social network customers to their own profit. Users should demand safe and secure transmission of the information and the user’s privacy. These should also be a focus of the social networking companies.

To protect themselves, users should:

  • What does thi do?Have up to date AV software running on their computers
  • Keep their browsers and operating systems fully patched
  • Change the passwords on all their sensitive accounts regularly
  • Warn friends and Facebook if an account seems to be hacked by using the Facebook “report/mark message as spam” option.
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Attackers Attack Emerging Technologies

Help Net Security reports that attackers continue to focus on social engineering attacks and circumventing legacy enterprise security systems according to a recent report by Zscaler. The Sunnyvale, CA-based firm reported shifts in the sources of enterprise web traffic, and that some popular sites attempt to improve user security. Here are some of the top findings detailed in the report:

  • Local apps are generating more direct HTTP and HTTPS traffic
  • Not all web traffic comes from browsers, and as this traffic shifts, web threats have a new attack vector
  • Internet Explorer 6 is on the decline in the enterprise. While this mitigates the security risks of the old browser platform, it could lead to a shift in attacks.
  • Google (GOOG) is actively attempting to thwart search engine optimization (SEO) spam and fake AV attacks, the topmost Internet threats today. However, most users remain exposed to these threats.
  • More sites, like Facebook (FB) and Gmail, are moving to HTTPS delivery. This is good for preventing sidejacking, but it allows savvy attackers a way to bypass traditional network-based security controls like IDS/IPS, which cannot decrypt traffic for inspection.

Internet of Things“Attackers know the limits of traditional security solutions,” says Michael Sutton, VP of Security Research at Zscaler. “But they are also very good at taking advantage of emerging technologies and new vectors for attack. Standalone user applications, social engineering attacks, and the move to HTTPS all have the potential to introduce new threats. Now more than ever, enterprise security solutions must inspect traffic in real-time, all the time, regardless of source, to provide true protection.”

RB-

I have covered IOT for a while here and here. I wrote about the big sites moving to HTTPS a while ago here and even wrote about HTTPS Everywhere here. And I am sure I don’t cost as much as an engagement with these firms.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

‘Personal Cloud’ to Replace PC by 2014, Says Gartner

‘Personal Cloud’ to Replace PC by 2014, Says GartnerMike Barton wrote on Wired’s Cloudline that there’s no doubting the cloud invasion. But the research firm Gartner (IT) believes the personal cloud will replace the PC as the center of our digital lives as soon as 2014.

Gartner logoSteve Kleynhans, research vice president at Gartner, said in a statement, “Major trends in client computing have shifted the market away from a focus on personal computers to a broader device perspective that includes smartphones, tablets, and other consumer devices.” He continues, “Emerging cloud services will become the glue that connects the web of devices that users choose to access during the different aspects of their daily life.”

cloud-happy futureIn the article, Mr. Burton writes that Google plans a cloud-centered future with Google (GOOG) Play and Android mobile OS. But the personal computer will also not miss out on the cloud, as Microsoft (MSFT) and Apple (AAPL) are planning to weave the cloud into the next generation of their desktop operating systems, Windows 8, and OS X Mountain Lion.

But a cloud-happy future will not be as easy as that, because Gartner says, “it will require enterprises to fundamentally rethink how they deliver applications and services to users.” Gartner sees a number of factors are converging to make for a perfect personal cloud storm by 2014.

Megatrend No. 1: Consumerization— Gartner says what corporate IT has seen so far been a precursor to the major wave that is starting to take hold across all aspects of IT as several key factors come together:

  • ConsumerizationUsers are more technologically savvy
  • The internet and social media have empowered and emboldened users.
  • The rise of powerful, affordable mobile devices changes the equation for users.
  • Through the democratization of technology, users of all types and statuses within organizations can now have similar technology available to them.

Megatrend No. 2: Virtualization — Virtualization has improved flexibility and increased the options for how IT organizations can set up client environments.

App-ificationMegatrend No. 3: “App-ification” — Apps change the way applications are designed, delivered, and consumed by users and it has a dramatic impact on all other aspects of the market.

Megatrend No. 4: The Ever-Available Self-Service Cloud
– The cloud opens a whole new level of opportunity for self-servicing users. Every user can now have a scalable and nearly infinite set of resources available for whatever they need to do.

Megatrend No. 5: The Mobility Shift — Wherever and Whenever You Want Today, mobile devices combined with the cloud can fulfill most computing tasks, and any tradeoffs are outweighed in the minds of the user by the convenience and flexibility provided by the mobile devices.

The Mobility ShiftGartner’s Kleynhans said. “In this new world, the specifics of devices will become less important for the organization to worry about. Users will use a collection of devices, with the PC remaining one of many options, but no one device will be the primary hub. Rather, the personal cloud will take on that role. Access to the cloud and the content stored or shared in the cloud will be managed and secured, rather than solely focusing on the device itself.”

Wired says that former Microsoft chief software architect Ray Ozzie made the same point recently, “People argue about, ‘Are we in a post-PC world?’. Why are we arguing? Of course, we are in a post-PC world.” Ozzie reportedly told a conference,  ”That doesn’t mean the PC dies; that just means that the scenarios that we use them in, we stop referring to them as PCs, we refer to them as other things.”

rb-

Goodie for Gartner, they get paid for codifying the obvious. Consumers are moving to the personal cloud. DVDs vs.Netflix streams. Files on your hard drives vs. some distant data center run by Dropbox. Photo albums vs. Flickr. Books vs. Kindles and Nooks.

Related articles:
  • Supermodels, Megatrends, and Ultra Big Paradigm Shifts to the Cloud

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Notes

Tablet computer ownership will lead the industry over the coming 12 months as all-in-one devices continue to grow in popularity according to the CEA.

Windows 8 Tablets in November

Windows 8 Tablets in NovemberExpect the first wave of Windows 8 tablets to land in retail stores in November, according to CNET. A secret source deep within Intel (INTC) says the Intel-based Microsoft (MSFT) Windows 8 tablets will use Intel’s upcoming Clover Trail Atom chip. DailyWirless says that Clover Trail is Intel’s first dual-core Atom design based on its 32-nanometer process technology.

The author says the tablets will fall into two basic sizes: pure 10-inch tablets and hybrid 11-inch designs with physical keyboards. Windows 8, like Windows 7 before it, will be powered by chips from Intel and AMD (AMD) and will be able to run older, so-called “legacy” applications.

A separate release from Microsoft, Windows RT, will land on devices powered by ARM (ARMH) chip suppliers NVidia (NVDA), Qualcomm (QCOM), and Texas Instruments (TXN). RT will not run older Windows applications.

Chinese Tablet PCs Peel Away at Apple

Chinese Tablet PCs Peel Away at AppleApple Inc may find it harder to keep market share in China because homegrown tablet PC brands will win over more customers says a report on China Daily.com. Sun Peilin with Analysys International, told China Daily, Apple’s (AAPL) market share will shrink to about 70 percent, “Chinese tablet PC makers are trying to form a stronger echelon behind Apple by taking over the market share that belonged to small copycat manufacturers.

Apple’s iPad and iPad 2 took 78.3 percent of the market share in China in Q1 2012, distantly followed by Samsung’s (005930) 5.1% and ErenEben’s 4.5% according to the article. AI’s data indicates tablet PC sales in China are expected to break 4.5 million units. Companies including Lenovo (LNVGY), Acer (ACEIY) and home appliance giant Haier Group, are releasing their own tablet PCs.

Sun from Analysys states in the blog the biggest obstacle Chinese brands face is how to come up with a different marketing angle against Apple, to avoid head-on competition with the iPad. “There are two separate markets for tablets: You can either go entertainment or business. The iPad is a big competitor in terms of entertainment, so Chinese companies should be different from iPad,” Sun suggested. Some Chinese companies have already differentiated their tablets. Beijing ErenEben Information Technology Co, a business tablet PC maker, won a government contract to provide tablets to the police department in the Guangxi Zhuang autonomous region.

According to Fang Liyong, COO of ErenEben, the company sold nearly 150,000 units of its first two generations of products in 2010, making it the biggest homegrown tablet PC brand by sales volume. “We are now selling nearly 30,000 units every month in 2011,” he said.

With a touchscreen developed by Japanese graphics-tablets maker Wacom Co Ltd, the ErenEben tablets were designed to offer an experience similar to writing on real paper. The COO boosts, “ErenEben has great growth potential, because China’s tablet market is so big, and Apple cannot take it all.”

iPad Suit

iPad SuitMohan’s Custom Tailors of New York is taking the boring and basic out of the word “suit” by designing a new and improved version for the modern man. According to their website, as men are dressing up and going out to dinner dates, museum galleries, and lounges in fine style, Mohan’s is creating contemporary and handsome designs to fit their needs. Mohan’s has introduced the fashion of the future with their new tech offerings, including pockets for your Research In Motion (RIMM) Blackberry, Apple (AAPL) iPod, iScribe, Bluetooth, and more. Most recently, they have revealed the first-ever iPad pocket in menswear, creating a fashion rush for “techies” around the world.

iPad Bacon Case

iPad Bacon CaseAt Antje Schmitt’s storefront at Etsy, the famous handcrafted Bacon Case for the Apple (AAPL) iPad 3 is now available. The Bacon Case is also available for older iPads, MacBooks, Netbooks, and Notebooks.

ZD.net – “The undisputed king of the weird category however, is the iPad bacon case ($59, pictured), which I’m ordering immediately.”

Gizmodo – “It’s $59, but who cares? Bacon iPad cases are what money was invented for, people. Well, that, and both actual bacon and actual iPads.”

Gearfuse – “Bacon and Apple products go together like peas and carrots. Or lamb and tuna fish. They’re both the perfect byproducts of their respective categories. Pimp your iPad with pork with the custom-made Bacon iPad case. It might not be actual bacon, but it’s realistic design is enough to make you wish you had a side of eggs to go with your balanced breakfast of pork and tablet.”

Clueful Scans Your iOS Apps For Privacy Behavior

Clueful by BitdefenderSecurity firm Bitdefender has introduced Clueful, an app that scans your Apple (AAPL) iOS apps lets you see what information other applications installed on your iDevice might have access to. Once downloaded and installed (iTunes), the $3.99 app scans your iPad 3, iPhone 4s or other iOS Apple products to see what’s installed and puts it in a list that can be filtered based on the various kinds of behavior. This includes things like:

  • Apps that can track location
  • Apps that can read the address book
  • Apps that might drain battery
  • Apps that use iPhone’s unique ID
  • Apps that display ads
  • Apps that gather analytics

These behaviors are listed in the results and explained on each app’s detail page. However, Clueful doesn’t log how often these behaviors happen. Clueful also notes if your data is encrypted, and if app makers anonymize you as a user, CNET News.Com reported.

Besides scanning what you have downloaded, the article explains that the software is designed to let you research what kinds of information an application wants to use before you buy it from the App Store. However, the author says, ” this appeared to be a work in progress, it is slow and unable to pick up a handful of big name games and apps.”

Bitdefender maintains all the data behind the privacy analysis, and users can ask to have apps that are not a part of that system analyzed. CNet states that Clueful comes some three months after Apple came after fire for the fourth time over how iOS and apps log and send user information to third parties.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Flip the Switch on IPv6

Flip the Switch on IPv6World IPv6 day (Which I reported on here) took place in June 2011. Google (GOOG), Facebook, Yahoo (YHOO), and Akamai (AKAM) were among the participants in last year’s new networking dress rehearsal. apparently, everything went well last June.

Internet SocietyNathan Ingraham at The Verge recently noted that IPv6 is now ready for prime-time. The Internet Society announced that the IPv6 switch will be permanently flipped on June 6th, 2012.

The article says a number of major ISPs, networking hardware manufacturers, and web companies pledged support from day one. For starters, four of the biggest web properties will all enable IPv6 permanently:

Cisco logoFrom a hardware perspective, Cisco (CSCO) and D-Link (2332) both committed to enabling IPv6 across their range of home products by June.

GigaOM reports that Akamai (AKAM) and Limelight (LLNW) will also recruit other websites to join the initiative, by implementing IPv6 throughout their content delivery networks.

Several leading ISP’s will enable IPv6 to enough of their customer base that at least one percent of their residential subscribers who visit IPv6 enabled websites;

rb-

The internet is quickly running out of IP addresses, the last addresses in Internet Protocol version 4 were officially distributed early in 2011 Which I wrote about here.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.