Categories
Uncategorized

Phishers & Keyloggers: From Russia with Love (not)

All this talk of security and viruses, and what happens at home? We get stereo stomach flu (with both our kids down today with a virus).

 

So, while I take a brief break as they’re both asleep and I try to catch up on mail, here’s a quick note to say that I’ll finish off my week of posts this weekend on the different ways Microsoft is working on improving your computer experience.

 

But… I have to post this quick quote just IM’ed to me from a friend at the office, on the road way out east (‘though this was my favourite quote of the week). Turns out this friend at the office reads my blog.


“You need to check this article [on grabbing keystrokes]  out [from the Washington Post]. I saw the posts on your blog this week [about phishing, Trojan Horses and passwords] and then this morning I saw this!”

The article in the Washington Post is about how an unsuspecting web surfer who received an e-mail, alerting him that a fraudulent charge had been made to his credit card account. Little did he know that the email wasn’t from really his credit card company: when he clicked on the web link to help him get the charge off his credit card charges, the web site actually installed a Trojan horse on to his computer. Moments later, the app sent his personal info to someone that didn’t have his best interests in mind:


“(Graeme) Frost is just one of thousands of victims whose personal data has been stolen by what security experts are calling one of the more brazen and sophisticated Internet fraud rings ever uncovered. The Web-based software employed by ring members to manage large numbers of illegally commandeered computers is just as easy to use as basic commercial office programs.

 

“Frost’s data, along with information stolen from thousands of other victims, made its way to a Web site hosted by a Russian Internet service provider. The site is currently the home base of a network of sites designed to break into computers through a security hole in Microsoft’s Internet Explorer Web browser.”

As I mentioned earlier this week in my post on phishing, the Microsoft Phishing filter add-in for the MSN Search Toolbar provides offers access to a new dynamic online service, updated several times an hour, to warn you and help protect your personal information from these fraudulent Web sites. The add-in dynamically checks the web sites you visit and gives you a warning if the sites are suspicious. It blocks you from sharing personal information if a site is a known phishing web site. The online information in the add-in is regularly updated.

 

Good luck, stay healthy and wash your hands: the kids are bringing home viruses of their own.

 

Tags: , , , .

Categories
Uncategorized

Screen Scraping, Trojan Horses and passwords… oh, my

Once again, here’s today’s installment on some of the different ways Microsoft is working on improving your experience with your computer, with blog bits spent on OneCare, Windows Defender, spam, Windows Live Safety Center, and last on phishing.


Today it’s about screen scraping and Trojan horses, and how this can happen to you. 


Screen scraping attacks are becoming more common in scammer’s schemes to subvert sophisticated security systems. The Wikipedia defines screen scraping as “a technique in which a computer program extracts data from the display output of another program. The program doing the scraping is called a screen scraper.”


In plain terms, a screen scraper is a program that captures or records computer screen activity, such as key strokes, mouse clicks and movements across the screen. (In application and web development, screen scraping has a legitimate use to acquire and display information, a.k.a. presentation integration.) But there are surreptitious uses for this technique that are sometimes employed by hackers who ultimately want to gain control of your computer or your personal information.


In some cases a Trojan horse program lurks on your computer waiting for you to visit a web site (a bank, brokerage firm, retailer, epayment) and then captures your interactions with the site. This information can be sent to the bad guys controlling the Trojan horse, who can then use this information to access your accounts.


19th century etching of the Trojan Horse 


Trojan horses may enter your computer through the daily mail, attached as an innocent looking file, like “kids.exe” or some other benign name. And when file extensions are hidden, you may not know that a Trojan horse lurks in the attachment. (Here’s more information on how to view all hidden file types and file name extensions in Office, as well as a list of potentially blocked file extensions.)


Once you open or double-click on a bogus attachment, you may start a process that is hard to stop: the application may launch an application that infects your computer with a computer virus, change or add files to you computer or modify your settings to allow your computer to be used as an extension of the hacker to attack other sites or spread the infected attachment.


Now, back to screen scraping and ways to foil this trick.


When you consider that on average, most people can only remember between five and nine things of a particular kind (alphanumerical sequences, words, numbers), it’s tough to remember strong passwords. And if a screen scraper records your key strokes — and along with it, your passwords — this can be a problem. You have to change your passwords regularly (every few months or so) and be sure not to keep them in an easy-to-find place (you know, the text file on your computer named “passwords.txt”). For the most part, employing strong passwords that are changed regularly will help you foil most common security breaches.


But as attacks become more spohisticated by employing some of these methods, targeted companies (such as banks and brokerage houses) are bringing new technology online that combines the clicks and keyboard entries, user names and passwords with additional unique information. Some companies are taking steps to improve security without just adding the burdon of having to remember a laundry list of strong passwords. One such example from Bank of America:



Bank of America Corp. is deploying a program called SiteKey that uses technology from Passmark Security Inc. that requires customers to click on a preselected image in addition to entering their user name and password to log on to an account, said Betty Riess, a Bank of America spokesperson in San Francisco.


E*Trade is another firm that has implemented ways to step up their security. Through their deal with RSA Security, E*Trade makes available a SecurID key chain (RSA calls it an “authentication token”) to their retail customers to provide an additional layer of protection. I know several companies that use the SecurID system to allow employees to access their confidential and secure sites remotely, prividing an additional security layer with a random six-digit code that is generated by the SecurID token.


A few years ago, employees at Microsoft were issued smartcards to provide an additional layer of technology to access networks. Smartcards can be programmed to provide access to your personal accounts, mobile telephones, buildings and online systems.  


Then there’s the new InfoCard InfoCard technology that was shown at the RSA Conference should make it easier to provide an additional layer of security. As reported on CNET News…



Now, with Windows Vista, Gates feels he finally has the right weapons to supplant the password as a means of verifying who is who on computers and over the Internet.


The new operating system, due later this year, introduces a concept called InfoCards that gives users a better way to manage the plethora of Internet login names and passwords, as well as lets third parties help in the verification process. Vista will also make it easier to log on to PCs using something stronger than a password alone, such as a smart card.


On protecting aginast viruses: There are a number of things you can do to protect your computer against viruses (courtesy of the Security at Home page…): 



  1. Use an Internet firewall (Note: Windows XP with SP2 has a firewall already built-in and active).

  2. Visit Microsoft Update and turn on Automatic Updates.

  3. Subscribe to industry standard antivirus software and keep it current.

  4. Never open an e-mail attachment from someone you don’t know.

  5. Avoid opening an e-mail attachment from someone you know, unless you know exactly what the attachment is. The sender may be unaware that it contains a virus.

Additional resources:



Tags: , , , .

Categories
Uncategorized

I’ve been phished, but I didn’t bite

No sooner do I post about the ills of phishing this morning that I return home to find a lure in my personal email (my bold note below)…



Dear <name of large NY bank> & Co. user,

We recently have determined that different computers have logged onto your Online Banking account, and multiple password failures were present before the logons. We now need you to re-confirm your profile information to us. If this is not completed by October 16, 2005 , we will be forced to suspend your account indefinitely, as it may have been used for fraudulent purposes. We thank you for your cooperation in this manner.


To confirm your Online Profile records click here:

<official looking link that actually links to a phishing site removed>

Thank you for your patience in this matter.

<name of large NY bank> & Co. Customer Service


You would think that phishers would have some common sense, updating their old lures. Unfortunately for them, the October ’05 due date has long passed.


So it proves another point: phishers are not only bad people…


… they’re not very bright.

Categories
Uncategorized

bits: Making pictures with DNA for fun and… well, fun (for now)

Driving across campus this evening I heard a story on NPR, Fun with DNA



Imagine a yellow smiley face. Now imagine 50 billion smiley faces floating in a single drop of water. That’s what scientists have made using a new technique for building super-tiny shapes using the familiar double helix of DNA.


(from NPR’s All Things Considered)

Categories
Uncategorized

Phishing: Don’t get caught

OK, a poor title, I admit. Don’t filet me.


As noted, this week I am posting on some of the different ways Microsoft is working on improving your experience with your computer, with bits dedicated so far to OneCare, Windows Defender, spam and yesterday on Windows Live Safety Center.


Late last year I mentioned phishing and screen scraping, so let’s tale a closer look at…


Phishing: Have you ever gone to your email box and seen a message from a reputable, top company — perhaps a bank, popular web site or government office — and come across a message that asked you to confirm your personal identifying information (PII)? They’re actually emails featuring links to phony web sites that look like the real thing. Welcome to the world of phishing scams. (See “What is a phishing scam?” for more details.)


Phishing scams are a ruse to steal your PII, a valuable commodity that can help someone impersonate you and cause all sorts of problems. I get a few of these a month usually posing as messages from eBay or PayPal, or major banks where I don’t have an account. Once a phisher has your PII — which can be your name, account numbers, passwords, and Social Security numbers — you could easily find yourself with debts you never imagined, or your bank account wiped out.


According to Consumer Reports “State of the Net” survey in 2005, phishing scams cost consumers an average of $395 per incident in the United States. In 2004, CNET reported that these online cons cost US consumers a total of $500 million. Phishers use many tactics including creating and sending e-mail messages or links to fraudulent Web sites or that appear to be valid in an attempt to fool you into submitting personal, financial, and password information. MSN has a helpful page with more info on battling phishing.


The Microsoft Phishing filter add-in for the MSN Search Toolbar provides offers access to a new dynamic online service, updated several times an hour, to warn you and help protect your personal information from these fraudulent Web sites. The add-in dynamically checks the web sites you visit and gives you a warning if the sites are suspicious. It blocks you from sharing personal information if a site is a known phishing web site. The online information in the add-in is regularly updated. (Note that the Phishing Filter is a new feature in Internet Explorer 7.0.)


Screen scraping attacks are becoming more common in scammer’s schemes to subvert sophisticated security systems – I’ll tackle this one in my next post.


More information:



  • Microsoft’s page on Antiphishing
  • Read more about the improvements we’ve made in our Trustworthy Computing initiative. Some helpful links are noted on the page, including:
  • MSN Online Safety and Security provides helpful tips, information, interactive quizzes, and downloadable safety brochures. The site has information about privacy and e-mail protection as well as ways to keep kids safe online.
  • GetNetWise (getnetwise.com) is a Microsoft-supported site that offers ways to protect families from malicious threats on the Web.

Tags: , , , .