• We have updated the guidelines regarding posting political content: please see the stickied thread on Website Issues.

Online Hygiene News: Virus / Hacking / Spam Notes & Alerts

There's a lot of it about, at the moment. Make sure your Firewall and anti-virus applications are fully up to date. Do regular scans.

Avira, Malwarebytes, Spybot S&D, all good and well worth installing.
 
Dan Brown fans deserve this!

Da Vinci Code Fans Targeted By Real International Conspiracy
http://www.wired.com/threatlevel/2009/09/dan-brown/
By Kevin Poulsen September 9, 2009 | 3:58 pm | Categories: Crime, Cybersecurity

It’s the shocking mystery hidden for a millennium: What will Da Vinci Code author Dan Brown’s next book be about? But, beware, truth seekers: Chasing the latest clues to the upcoming novel The Lost Symbol could expose you to a vast and secret conspiracy that’s been manipulating Google search results to push malicious software.

On Tuesday, NBC’s Today show kicked off a week-long promotion for Brown’s Da Vinci sequel by airing the first of a series of clues to the thriller’s plot, in the form of a tour of a real-life biological research facility nicknamed the “Death Star” because it houses dead animal specimens. Host Matt Lauer challenged viewers to identify the research site and its location, and thereby acquire vital information about the novel. “Suffice it to say, that this facility is a big part of the book,” said Lauer. “So, if I’m in a place called the Death Star, where am I?”


A fake virus scan page awaits unwary Dan Brown fans pursuing the mystery of the Lost Symbol
But on Wednesday morning the top Google search result for “death star research” — the logical query — would bring you no closer to unraveling the Lost Symbol mystery. Instead, it produced a malicious website that uses pop-ups, mouse-trapping and a well-executed fake virus scan to trick you into installing a Windows executable that will screw up your computer pretty badly.

The software is a scareware product called Smart Virus Eliminator that pesters you with false virus reports and urges you to pay anywhere from $59 to $79 for a “registered” version of the program. The code does other bad things as well, and is a well-known scam linked to an Eastern European cybercrime group. What’s impressing experts is the rapidity with which those black hats are able to use search engine optimization techniques to plant their flag atop a trending search like “death star research.”

“They stay glued to the news — they’re quick,” says Sean-Paul Correll, a threat researcher at Panda Security, and an expert on the scam. “This gang is basically the biggest cybercrime organization on the internet right now.”

Correll says incidents like the Death Star attack have reached a fever pitch in the last two weeks. Searches on the California wildfires, Ted Kennedy’s death or Hurricane Danny, among others, have all turned up high or top-ranking scam pages delivering the same slick extortion code. Keeping up with the trends mean the attackers are rapidly setting up or reconfiguring networks of thousands of web pages that all link to one another — and the scam sites — using the hot keywords of the moment, thus gaming Google’s page rank algorithm. But apparently it’s worth the effort. A analysis by Panda concludes the rogue business is making as much as $34 million a month through the tactic.

Google, of course, has been working with StopBadware.org to try and warn users about malware-loaded sites. It also generally tries to counter rogue search engine optimizers of all stripes. But as it speeds up its indexing to keep pace with a real-time web, the countermeasures are clearly falling behind.

“These are real timely events,” says Correll. “So if it takes more than 24 hours to take care of, it’s not an effective means of blocking. People are searching today because they want to know what Dan Brown’s next book is going to be.” Tomorrow it’ll be something else.
 
Worm attack bites at Apple iPhone

The first worm to infect the Apple iPhone has been discovered spreading "in the wild" in Australia.

The self-propagating program changes the phone's wallpaper to a picture of 80s singer Rick Astley with the message "ikee is never going to give you up".

The worm, known as ikee, only affects "jail-broken" phones, where a user has removed Apple's protection mechanisms to allow the phone to run any software.

Experts say the worm is not harmful but more malicious variants could follow.

"The creator of the worm has released full source code of the four existing variants of this worm," wrote Mikko Hypponen of security firm F-secure.

"This means that there will quickly be more variants, and they might have nastier payload than just changing your wallpaper."

The picture of Rick Astley is believed to be a nod to the internet phenomenon known as Rickrolling, where web users are tricked into clicking on what they believe is a relevant link, only to find that it actually takes the user to a video of the pop star's song "Never gonna give you up".

The worm has so far only been found circulating in Australia, where the hacker - Ashley Towns - who wrote the program lives.

The 21-year-old told Australia's ABC News Online that he created the virus to raise the issue of security.

It only exploits jail-broken phones that have SSH installed, a program that enables other devices to connect to the phone and modify the system and files.

The worm is able to infect phones if their owners have not changed the default password after installing SSH.

"What's clear is that if you have jail-broken your iPhone or iPod Touch, and installed SSH, then you must always change your root user password to something different than the default, 'alpine'," wrote Graham Cluley of security firm Sophos.

"In fact, it would be a good idea if you didn't use a dictionary word at all."

After a phone becomes infected it disables the SSH service, preventing reinfection.

The code contains numerous comments from Mr Towns about his motivation.

One comment reads: "People are stupid and this is to prove it."

"It's not that hard guys. But hey who cares its only your bank details at stake."

The worm can be removed by changing the phone's password and deleting some files.

Some estimates suggest that up to 10% of all iPhones and iPod Touch are jail-broken.

The practice allows a phone user to install software and applications that have not been approved by Apple.

"Phone users may rush into jail-breaking their iPhones in order to add functionality that Apple may have denied to them, but if they do so carelessly they may also risk their iPhone becoming the target of a hacker," said Mr Cluley.

"My prediction is that we may see more attacks like this in the future."

http://news.bbc.co.uk/1/hi/technology/8349905.stm
 
FBI arrests 'mastermind' of Mariposa botnet computer code
International authorities have arrested a computer hacker believed responsible for creating the malicious computer code that infected as many as 12 million computers, invading major banks and corporations around the world, FBI officials have said.
Published: 7:00AM BST 28 Jul 2010

A 23-year-old Slovenian known as Iserdo was picked up in Maribor, Slovenia, after a lengthy investigation by Slovenian Criminal Police there along with FBI and Spanish authorities.

His arrest comes about five months after Spanish police broke up the massive cyber scam, arresting three of the alleged ringleaders who operated the so-called Mariposa botnet, stealing credit cards and online banking credentials. The botnet - a network of infected computers - appeared in December 2008 and infected more than half of the Fortune 1,000 companies and at least 40 major banks.

Botnets are networks of infected PCs that have been hijacked from their owners, often without their knowledge, and put into the control of criminals.

Jeffrey Troy, the FBI's deputy assistant director for the cyber division, said that Iserdo's arrest was a major break in the investigation. He said it will take the alleged cyber mastermind off the street and prevent him from updating the malicious software code or somehow regaining control of computers that are still infected.

Officials declined to release Iserdo's real name and the exact charges filed against him, but said the arrest took place about 10 days ago and the man has been released on bond.

"To use an analogy here," said Mr Troy, "as opposed to arresting the guy who broke into your home, we've arrested the guy that gave him the crowbar, the map and the best houses in the neighborhood. And that is a huge break in the investigation of cyber crimes."

Mr Troy said more arrests are expected and are likely to extend beyond Spain and Slovenia and include additional operators who allegedly bought the malware from Iserdo. Authorities would not say how much Iserdo supposedly charged, but said hackers could buy the software package for a certain amount, or pay more to have it customized or get additional features. Internet reports suggest the fees ranged from as much as $500 for basic packages to more than $1,300 for more advanced versions.

http://www.telegraph.co.uk/technology/7 ... -code.html
 
More here from SC magazine

http://www.scmagazineuk.com/botnet-sell ... le/175812/


Among those involved in the intelligence was Panda Security, whose technical director of its PandaLabs division Luis Corrons, had a personal encounter with the creators and described his experience to SC Magazine.

He commented that back in March, when the story went public, he had talked about the Spanish operators being arrested and that they had bought the bot, but the seller of the botnet had not been mentioned. He said: “This was not because we didn't know who was behind that, but because the FBI kindly asked us not to disclose that information, as they were chasing Iserdo. Who's Iserdo? As far as I know, he is a Slovenian guy, the main developer of the Butterfly bot and he was in touch with Netkairo and was who sold the Mariposa bot to Netkairo.”

Corrons commented that Iserdo's website is down. Panda Security said that the Butterfly kit sold online for between €500 and €1,500 and allowed people with limited computer skills to perpetrate cyber crime on a massive scale. The Butterfly kit has been used to create almost 10,000 unique pieces of malicious software and over 700 botnetsThe creators of the Mariposa botnet have been back in the news this week after a hacker was reportedly arrested in Slovenia.


At this point you are probably asking, who is Netkairo, well luckily for you The Register adds

http://www.theregister.co.uk/2010/03/03 ... _analysis/

However when the December shutdown operation happened, the gang’s leader, alias Netkairo, panicked in his efforts to regain control of the botnet. Netkairo made the fatal error of connecting directly from his home computer instead of using the VPN, leaving a trail of digital fingerprints that led to a series of arrests two months later.

A blog post by Panda Software explains what happened next.

Netkairo finally regained control of Mariposa and launched a denial of service attack against Defence Intelligence using all the bots in his control. This attack seriously impacted an ISP, leaving numerous clients without an Internet connection for several hours, including several Canadian universities and government institutions.

Once again, the Mariposa Working Group managed to prevent the DDP Team from accessing Mariposa. We changed the DNS records, so the bots could not connect to the C&C servers and receive instructions, and at that moment we saw exactly how many bots were reporting. We were shocked to find that more than 12 million IP addresses were connecting and sending information to the C&C servers, making Mariposa one of the largest botnets in history.
 
Fears of a 10.10.10 computer virus hit internet
Fears that a computer virus could be unleased on October 10 – 10.10.10 – are circulating on the internet, with experts warning users to be careful.
By Harry Wallop, Consumer Affairs Editor
Published: 6:00AM BST 08 Oct 2010

Sunday will be 10.10.10, a date whose symmetry has occurred once a year since 2001 and will do so until 2012.

The date has set off alarm bells with some superstitious people on the internet who fear it could cause their computer's internal clocks to either jam, or for a virus to be let loose.

A Facebook page has been set up with the title "Will my computer still work on 10/10/10 at 10.10am?", while other sites talk about the possibility of hackers unleashing viruses at that time.

Graham Cluley, computer safety expert at Sophos, said: "There's been a long history of virus scares related to specific dates, and it's not that surprising to hear people whispering about the possible risks looming on 10 October 2010.

"But with more than 60,000 new pieces of malware [malicious software] being discovered every day you should realise that you need to be careful about attacks every day of the year."

In the early 1990s computer users were often advised by experts to be particularly careful in the run-up to Friday the 13th, as the then prevalent Jerusalem virus could kick in. They also advised personal computer users should change their system clock to avoid their computer ever thinking it was Friday 13th, and leapfrog over to Saturday 14th instead. However, changing the clock could often just cause the equally damaging Durban virus to kick in.

The biggest computer fear over dates was in the year running up to the Millennium, when the majority of serious computer experts warned that digital clocks and equipment based on those clocks would fail to work. In the event all the equipment worked perfectly well.

The date is auspicious in many cultures including China where there has been a rush to book the date for weddings.

In Dubai, one hospital has allowed ten expectant mothers to elect the date for their caesarean section.

Dr Tarek Fathey at the City Hospital, Dubai Healthcare City, said: "People opt for special phone numbers or special car numbers, so why not special dates of birth?"

Midwives warned that mothers in Britain should not follow this obsession with dates. Sue Jacob, midwifery adviser at the Royal College of Midwives, said: "After the euphoria of a 10.10.10 birth, what happens next? The after care is so important.

"I'd like to think that any professional in Britain would advise against choosing a specific date for an elective caesarean. But we live in an age where choice is respected and there are private practitioners who may not object."

http://www.telegraph.co.uk/technology/n ... ernet.html
 
Tuning in to the background hum of the net
By Mark Ward, Technology correspondent, BBC News

Everything you do on the internet involves packets of data flying between your machine and whatever you are trying to do, be that bidding on eBay, using a search engine or watching video clips on YouTube.
And once you stop doing that thing, the two-way swapping of data ends.

Sadly, not all use of the internet is so tidy and well-mannered. As the net has grown so has this "background hum" of rogue data activity. It now generates about 5.5 gigabits of data every second. Not enough to swamp the net's pipes but a sizeable hum nonetheless.

Several sources contribute to that total. Misconfigured hardware and leaks from private networks form part of it but the majority is generated by computer viruses seeking new victims.
"We see a large number of machines, and they are typically machines running various versions of Windows, that are not just being infected but re-infected and are continuously trying to infect others," said Geoff Huston, chief scientist at internet address body APnic, who carried out one of the first large-scale investigations of this traffic.

What those infected machines are doing is generating an IP address - a unique code assigned to all machines on the net - and then sending out a few packets of data to see if there is a potential victim at that location. If not, then they generate a new address and try again. And again. And again.

The dumbest viruses start at net address 1.1.1.1 and work up from there. There are only 17 billion addresses in the current version of the net's addressing system, known as IPv4, so an aggressive virus has a good chance of scanning a big chunk of that before it is stopped.

Some viruses do not take such a crude approach.
One virus in particular, Conficker, is very aggressive about finding new victims and 70% of the hum that can be blamed on viruses is down to that piece of malware.

That figure would be higher, said Mr Huston, but for the poor coding skills of whoever created Conficker.
"They got one thing slightly wrong," said Mr Huston. "Instead of seeing the entire internet they see only half of it."
This is because one of the values in the chunk of code used to generate the random IP addresses is set to zero. This puts limits on the variety of IP addresses the virus can generate.

To a degree, said Mr Huston, some of the background hum was to be expected. Research in 2001 by University of Wisconsin-Madison computer scientist David Plonka showed that one of the biggest chunks of the IPv4 address space, which constitutes 17 million addresses, generated about 1mbps of rogue data.
"Today the figure is 50mbps," said Mr Huston. "The amount of background noise has grown by a factor of 50 in ten years but that's not so surprising."

What is curious, he said, are the sources of the traffic.
"Some plain and innocuous addresses that look like random numbers attract massive amounts of traffic," he said.

For instance, he said, research into one popular address revealed that all the traffic was coming from net-connected point-of-sale equipment (aka cash registers) sold to restaurants. Mr Huston speculated this came about because the default IP address in the hardware was not changed for the local one when the equipment was installed in a restaurant.

Another example is the range of DSL modems that had a hard-coded IP address they used to look up the correct time. As more of the gadgets were sold the amount of traffic they generated grew and grew.
"It's misadventure rather than malice," he said, "but there are a few addresses that attract megabits of traffic."

Mr Huston said the research into the background hum was carried out to check the health of IP addresses being handed out. The last thing that any regional network overseer such as APnic wanted to do was give out an addresses that was swamped with traffic.
"If you get a network that attracts megabits and you are down a DSL connection then not much is going to work," he said.

Thankfully, help is on the horizon. The move from IPv4 to a newer version known as IPv6 is underway and the new system has a vastly larger address space - 340 trillion, trillion, trillion by some estimates.
It's needed as more and more devices connect to the net, but will also limit the impact of the misconfigured equipment.
It is also so big, said Mr Huston, that it is effectively impossible for viruses to scan to find new victims.

That background hum may soon be reduced to a whisper.

http://www.bbc.co.uk/news/technology-11863294
 
Con artists targeting Falmouth residents
2:56pm Friday 18th February 2011

Conmen are targeting Falmouth residents in an attempt to gain access to their PCs.
Police in the town are warning people to be wary of phone callers claiming to be from Microsoft.

A spokesman said: “Recently there have been a number of people in Falmouth falling prey to scams that leave them £400 or more out of pocket after someone claiming to be from Microsoft phones you at home and tells you their logs are picking up an infection from your computer.
“To gain credibility, the phone scammer may give you easily discoverable information, such as your name, address, and phone number - information available to any random telemarketer or scam caller with the right contacts.

“Once they've gained your attention, this bogus Microsoft 'tech' then instructs you to open Event Viewer and says that any errors reflected in that log are 'proof' of a virus.
“The scammer then directs you to ammyy.com and tells you to run the tool and give them the ID it provides, after which they're now able to get complete remote access to your PC.

“Anyone can dial a number and claim to be someone else; the real Microsoft doesn't call their customers to report virus infections.
“Never run any unknown program or install any remote access tool for someone unless you are 100% certain of their identity and trustworthiness.”

They added: “Your best defence? Use the same trick you use with other unwanted callers - hang up the phone.

“If you feel that you are having problems with your computer, always use a local computer engineer and not someone calling from a withheld or international number.”

http://www.falmouthpacket.co.uk/news/fp ... residents/

Similar stories have been posted before, but it doesn't hurt to issue reminders to be wary.
 
rynner2 said:
Conmen are targeting Falmouth residents in an attempt to gain access to their PCs.
Police in the town are warning people to be wary of phone callers claiming to be from Microsoft.
...

http://www.falmouthpacket.co.uk/news/fp ... residents/

Similar stories have been posted before, but it doesn't hurt to issue reminders to be wary.

'Microsoft support centre' scam continues, and takes turn for worse
The scammers behind this scheme have now begun installing software that they buy with the victim's credit card - which might mean that police can now take action

The scam whereby people in Indian call centres ring up and insist that they are calling from "Microsoft Windows Support" and that they have been alerted - by Microsoft, or your ISP - that "your computer is running slowly because of viruses" - is still going on.

And they're still charging people for their fake "help", and people are still falling for it: I get a few emails a week confirming it (and that of course is only the people who realise they've been had). If you need confirmation, Microsoft's Answers system is stuffed with people asking about it

Until now, it has been a relatively harmless process: the call centre workers didn't leave anything (such as malware) on your computer, because that could involve the police internationally, and even in Kolkata (Calcutta as was), where the criminal gang that's behind this is based, the police might take notice. Nor have I seen any evidence that they steal details such as bank information. You got scammed for a couple of hundred pounds, but if you realised what had happened, you could get the payment reversed.

But something has changed: they seem to have started trying to install software. That takes the scam into new territory altogether, because it means that the scammers are now changing the setup of the computer, and while it's still fraud, it also now strays into fields such as the Computer Misuse Act.

The confirmation came in an email a few days ago from a man called Steven, based in Manchester, who was called from a company claiming to be "Windows Service Centre" based in East London (on the phone number 020 3318 3026).

"She advised that there were numerous error reports that had come through and that my computer was badly affected and running slow (which sounded true)," says Graham. "I was taken through various screens, which induicated numerous warnings and alerts and it was suggested that as my computer care warranties had expired, I should purchase a new one."

Being wary, he called them back in case the phone number was fake. But of course the phone number worked: it's a VOIP line back to India.

The cost? £199 - which included the installation of Kaspersky Antivirus. With tax, it came to £240.

The scammers were careful, though: they used his card details to make the purchase. It was only afterwards that Steven realised his mistake: "I received an Invoice from "SWREG" [Digital River, a download service in the US] for the service and thought nothing of it, until I checked the possible frauds page that you have. I phoned my credit card company, who confirmed that the transaction had gone through, so I immediately cancelled my card. A friend came round and uninstalled all of the Kaspersky and other applications. I do not know for sure that this is a scam, but strongly suspect that I have been conned."

Unfortunately it is a scam, and he has been conned. But he may be able to get the money back.

If you, or someone you know, falls victim to this scam, then do three things:
1) contact your card issuer and get the transaction reversed
2) report what happened to Action Fraud, the UK's national fraud reporting centre. It has its own page on Microsoft-related scams, as does Microsoft itself.
[What's the third thing?]

If you do a search on the phone number given, you find that it appears on a number of sites - including one calling itself YTech Solutions (ytechltd.com), which looks like another standard template for the scam; the sites are set up by the dozen, and as soon as police get one taken down, six more are ready to spring up - with similar mispellings, "privacy policies" and so on. YTechltd hides its ownership details behind a domain proxy - hardly what you'd expect from a reputable company.

People are still getting these calls - often multiple times. The clue though that there is a single gang behind all this - rather than multiple people trying their luck - comes from the fact that I've never come across anyone who has been phoned twice once they've taken out this "support". That suggests that they are keeping some sort of database - but the other question is, where do they get their database of people to call?

http://www.guardian.co.uk/technology/bl ... -continues
 
Well I had a little :shock: issue last week, not sure where from though, could have been an online game I use. Basically, my anti virus had been switched off, and so I found myself battling a couple of trojans. But as I had sensibly created restore disks with the laptop when it arrived last year, I rushed out and bought Kaspersky 2011, for a whopping £20, and restored my world. OK, it took me the best part of a week to get my world to rights, but hey, I now know lots about outlook connector :lol:

There's a moral in there somewhere, revolving around free anti virus software, being old fashioned about music and pictures, and realising that what sits quietly on your hard drive, could easily become a tangent on the Hoarders thread.
 
What OS are you running? If Windows, it should tell you if a security component isn't activated :?
 
I'm running windows 7, but I never got the notification that my Avast had switched off. Could have appeared, and 'faded' with me thinking it was just another definition update, or just not appeared. It did seem to occur following a request to re register my details as I'd been using Avast for a year, which seems true enough, as the preloaded McAffee was only a trial version that I activated first week of Jan last year and ran for about 60 days IIRC, so the timing is about right.

Ah well, live n learn eh?
 
I got infected with XP Internet Security virus the other week, it's the absolute nastiest one i've seen yet, figured it was probably malware quite early on (it pretends to be a Microsoft security product) then took about two hours to figure out how to get past the block it had put on my internet access.

It also crashes your browser if you try to download certain antivirus apps :( totally from hell to do a manual clean-up on, and most of the stuff that can shift it you have to pay for.
 
BlackRiverFalls said:
I got infected with XP Internet Security virus the other week, it's the absolute nastiest one i've seen yet, figured it was probably malware quite early on (it pretends to be a Microsoft security product) then took about two hours to figure out how to get past the block it had put on my internet access.

It also crashes your browser if you try to download certain antivirus apps :( totally from hell to do a manual clean-up on, and most of the stuff that can shift it you have to pay for.

Try SUPERAntiSpyware - that might shift it.
 
Could I suggest changing browser? For the last 6 months or so I have been using Comodo Dragon , which is built onto Google Chrome. It hasn't let anything in, nothing whatsoever.
If you like browsers with lots of features you might find it a bit skinny, but for security it's the best I've ever used.
 
Britons caught out by booby-trapped web ads

Tens of thousands of people could have been caught out by cyber criminals who put booby-trapped adverts on popular webpages.
The criminals racked up the victims by compromising the computers used by ad firm Unanimis to display adverts to popular websites.

The ads appeared on the websites of the London Stock Exchange, Autotrader, the Vue cinema chain and six other sites.
Unanimis said it moved quickly to pull the adverts once they were discovered.
It said it was now investigating how the criminals managed to inject their booby-trapped ads into its feed.

David Nelson, operations and IT director at Unanimis, told the BBC that security alerts revealed the existence of the booby-trapped adverts at 1800 GMT on 27 February.
Clearing out the adverts took about three hours, said Mr Nelson.
A preliminary investigation revealed that "unauthorised access" to the ad servers allowed the criminals to inject their malicious code.

Mr Nelson said Unanimis was still investigating how the criminals got access as the firm has security systems in place that check adverts are safe before they are distributed.
"The [adverts] they chose to modify were not being widely distributed," said Mr Nelson. This, coupled with the attack taking place on a Sunday evening, limited how many people fell victim.
"We have to count ourselves lucky in some respects," he said.

The bad ads exploited vulnerabilities in software used on Windows PCs to make it look like a machine had been hit by a virus.
Then it displayed a bogus diagnostic screen telling users that their PC was infected. It asked for payment to remove the "infection".
Mr Nelson said it was still trying to work out how many people had seen the booby-trapped ads.
He speculated that a "few percent" of Unanimis audience would have been hit. He declined to identify all the sites that had shown the adverts but said all those affected had been informed.

Patrik Runald, senior research manager at Websense, said its analysis suggested a lot of people had been caught out.
"We believe that quite a large number of sites were showing these adverts," he said, adding that the number of victims could be in the "tens of thousands".

The criminals behind the bad ads typically loaded their attack tools with code that exploited many different vulnerabilities in Windows programs.
Java and software from Adobe was become a favourite among hi-tech criminals, he said.

Mr Runald said cyber criminals liked to subvert advertising systems because it was a good way to get their malicious code put on popular sites with only a little effort on their part.
"Such malvertising is reasonably common," said Mr Runald. "It does not happen every day but it does happen every month or so."

http://www.bbc.co.uk/news/technology-12608651
 
BlackRiverFalls said:
I got infected with XP Internet Security virus the other week, it's the absolute nastiest one i've seen yet, figured it was probably malware quite early on (it pretends to be a Microsoft security product) then took about two hours to figure out how to get past the block it had put on my internet access.

It also crashes your browser if you try to download certain antivirus apps :( totally from hell to do a manual clean-up on, and most of the stuff that can shift it you have to pay for.

Nasty. I wonder if using a USB program like Revo Uninstaller Portable would let you get at it?
 
oddly enough, Rynner's post above may explain a number of things, it's been a mystery how that got on my machine but I had been on Vue's website around that time.

i've manage to neutralise it for now with Spyhunter. it wants payment for a full removal (and you only get a 6 month license) but it will quarantine it in order to run, and leave it quarentined after you uninstall. it's not much odds to me whether it's quarentined or not there at all if it can't do anything.

AVG antivirus and a few others I tried, oddly enough, couldn;t find it at all. Or maybe it's too new a varient to be in their definitions.
 
Seriously, give Revo a go - it's excellent at getting rid of all traces of installations (if it finds the program in the first place, of course).
 
BlackRiverFalls said:
...

AVG antivirus and a few others I tried, oddly enough, couldn;t find it at all. Or maybe it's too new a varient to be in their definitions.
AVG used to do a downloadable CD version which was based on linux. You have to have a wired connection to the internet, but once it's loaded and booted, it will do an update to the latest version and it does a pretty thorough search.

http://www.avg.com/us-en/avg-rescue-cd

Also, try Malwarebytes, install it, update it and let it run. Has been pretty effective on my machines in the past.

http://www.malwarebytes.org/

Good luck.
 
Cultjunky said:
I rushed out and bought Kaspersky 2011, for a whopping £20,

Rather than pay full price for Kaspersky, I buy a previous version (9 or 10) from ebay for around £6. These versions allow a free upgrade to the latest version 2011.

Of course when it comes time to renew, it means completely uninstalling the old Kaspersky and installing a new "old" version with a new serial number and then upgrading again.

Or you can look at online at computer retailers like aria.co.uk or ebuyer.co.uk and get an OEM version of Kaspersky 2011 (same thing, but no boxes or booklets) for around £10 for 1 user and £18 for 3 users for one year.
 
I was playing Spotify when I found this! :shock:

Spotify ads hit by malware attack

Spotify has apologised to users after an advertisement containing a virus was displayed to some users of the music-streaming service.
The advertisement, which appeared within Spotify's Windows desktop software, did not need to be clicked on in order to infect a user's machine.
The exploit would install a bogus 'Windows Recovery' anti-virus program.

"Users with anti-virus software will have been protected," Spotify said in a statement.
"We quickly removed all third party display ads in order to protect users and ensure Spotify was safe to use.
"We sincerely apologise to any users affected. We'll continue working hard to ensure this does not happen again and that our users enjoy Spotify securely and in confidence."
The vulnerability only affects users with free subscriptions.

Security research specialists Websense said it received the first report of "malvertising" on the service at 11:30GMT on 24 March, noting that it used the Blackhole Exploit Kit - a tool for hackers - to carry out the attack.

Malvertising is usually confined to content viewed through web browsers, but this instance was displayed within the Spotify software itself for people with a free membership.
"The application will render the ad code and run it as if it were run inside a browser," explained Websense's Patrik Runald in a blog post.
"This means that the Blackhole Exploit Kit works perfectly fine and it's enough that the ad is just displayed to you in Spotify to get infected, you don't even have to click on the ad itself.
"So if you had Spotify open but running in the background, listening to your favorite tunes, you could still get infected."

Avast! anti-virus said the majority of their users reporting infections were from Sweden (59%), while 40% of virus reports relating to the vulnerability came from the UK. The rest were from other countries.

One affected user told the BBC: "I hadn't clicked on any advert but it did appear to download itself at the same time as the first advert image popped up in the Spotify program.
"The virus then began popping up on my desktop, telling me that I had a critical hard drive failure and would need to restart.
"It won't stop me using Spotify but did cost me about six hours to figure out what had happened and restore everything back to normal."

Spotify, which is based in Sweden, has over ten million users, most of which use the free service.

http://www.bbc.co.uk/news/technology-12891182

I've had no trouble, so I guess my AV saved me.
 
Sites hit in massive web attack

Hundreds of thousands of websites appear to have been compromised by a massive cyber attack.
The hi-tech criminals used a well-known attack vector that exploits security loopholes on other sites to insert a link to their website.

Those visiting the criminals' webpage were told that their machines were infected with many different viruses.
Swift action by security researchers has managed to get the sites offering the sham software shut down.

Security firm Websense has been tracking the attack since it started on 29 March. The initial count of compromised sites was 28,000 sites but this has grown to encompass many times this number as the attack has rolled on.

Websense dubbed it the Lizamoon attack because that was the name of the first domain to which victims were re-directed. The fake software is called the Windows Stability Center.

The re-directions were carried out by what is known as an SQL injection attack. This succeeded because many servers keeping websites running do not filter the text being sent to them by web applications.
By formatting the text correctly it is possible to conceal instructions in it that are then injected into the databases these servers are running. In this case the injection meant a particular domain appeared as a re-direction link on webpages served up to visitors.

Early reports suggested that the attackers were hitting sites using Microsoft SQL Server 2003 and 2005 and it is thought that weaknesses in associated web application software are proving vulnerable.

Ongoing analysis of the attack reveals that the attackers managed to inject code to display links to 21 separate domains. The exact numbers of sites hit by the attack is hard to judge but a Google search for the attackers' domains shows more than three million weblinks are displaying them.
Security experts say it is the most successful SQL injection attack ever seen.

Generally, the sites being hit are small businesses, community groups, sports teams and many other mid-tier organisations.

Currently the re-directs are not working because the sites peddling the bogus software have been shut down.

Also hit were some web links connected with Apple's iTunes service. However, wrote Websense security researcher Patrick Runald on the firm's blog, this did not mean people were being redirected to the bogus software sites.

"The good thing is that iTunes encodes the script tags, which means that the script doesn't execute on the user's computer," he wrote.

http://www.bbc.co.uk/news/technology-12933053

Today I got an attack by the virus sent via Spotify (see earlier post).
Happily, being prewarned, I didn't click any links.
 
Millions hit by email hackers: Marks & Spencer warns online customers about cyber criminals
By Sean Poulter
Last updated at 8:46 AM on 7th April 2011

Millions of email addresses belonging to British shoppers have been stolen by criminal hackers.
Marks & Spencer yesterday sent warning messages to many online customers who have supplied the store with email addresses.
Britons who use Play.com and TripAdvisor have also been sent similar warnings.

Victims of the theft risk being targeted in spam and phishing scams. This could result in them logging on to bogus websites set up by criminal gangs.
Once on these websites, it is feared that personal information, including passwords and bank details, could be stolen.
There is also a danger that bugs and malicious spy software could be downloaded to victims’ home computers.

The alerts raise serious questions about security systems operated by major internet brands and their technology partners.
They will also shake consumers’ trust in online shopping – and could encourage shoppers to move back to the High Street.

The M&S security failure relates to a U.S. email company, Epsilon, which has been targeted in what has been called the ‘biggest data breach ever’.
Epsilon, one of the largest email marketing companies in the world, sends more than 40billion emails annually on behalf of more than 2,500 clients.
The unrelated thefts involving M&S, Play.com and TripAdvisor reflect a growing and lucrative black market in personal email addresses.

M&S sent an email to customers yesterday, warning: ‘We have been informed by Epsilon, a company we use to send emails to our customers, that some M&S customer email addresses have been accessed without authorisation.
‘We wanted to bring this to your attention as it is possible that you may receive spam email messages as a result.
‘We apologise for any inconvenience this may cause you. We take your privacy very seriously, and we will continue to work diligently to protect your personal information.’

M&S stressed that the theft was limited to names and email addresses, rather than other personal information and account details.
However, this is all that criminals need to launch targeted and personalised spam attacks, known as spear phishing.

Britain’s biggest retailer, Tesco, also uses Epsilon. However it categorically denied that its customer details have been hacked.

etc...

Read more: http://www.dailymail.co.uk/news/article ... z1IpJvwtaS
 
Religion riskier than porn for online viruses: study
http://phys.org/news/2012-05-religion-r ... ruses.html
May 1st, 2012 in Technology / Internet

Web wanderers are more likely to get a computer virus by visiting a religious website than by peering at porn, according to a study released on Tuesday.
Web wanderers are more likely to get a computer virus by visiting a religious website than by peering at porn, according to a study released on Tuesday.
"Drive-by attacks" in which hackers booby-trap legitimate websites with malicious code continue to be a bane, the US-based anti-virus vendor Symantec said in its Internet Security Threat Report.

Websites with religious or ideological themes were found to have triple the average number of "threats" that those featuring adult content, according to Symantec.

"It is interesting to note that websites hosting adult/pornographic content are not in the top five, but ranked tenth," Symantec said in the report.

"We hypothesize that this is because pornographic website owners already make money from the Internet and, as a result, have a vested interest in keeping their sites malware-free; it's not good for repeat business."

The report was based on information gathered last year by the Symantec Global Intelligence Network, which monitors cyber attack activity in more than 200 countries through its services and sensors.

Symantec said that it blocked 5.5 billion attacks in 2011 in an increase of 81 percent from the prior year.

In keeping with trends seen by other Internet security firms, Symantec reported surges in hacks aimed at smartphones or tablet computers and in attacks targeting workers in companies or government agencies.
 
Anti-virus software sucks up too much security cash claims study
http://www.bbc.com/news/technology-18456607

The report suggests some of the sums spent on cybersecurity are disproportionate to the threats faced

Related Stories

Cyber crime warnings for India Watch
Cybercrime threat 'on the rise'
Small firms 'easy targets' for cyber crime

Governments should focus more funds on policing the internet and less on anti-virus software, according to new research.

Computer scientists at the University of Cambridge carried out the cybercrime study after being approached by the UK's Ministry of Defence.

The report indicated that the UK was spending almost £640m annually on the problem.

It said less than £10m of that sum was spent on cybercrime law enforcement.

The team worked with colleagues in Germany, the Netherlands, the USA and UK to compile the study. They considered all the main types of cybercrime, including online payment and banking fraud.

Cybercrime swamp
Lead author Prof Ross Anderson also told the BBC that less government money should be spent on monitoring phone and internet communications.

He said that police in the UK were often months behind and too focussed on surveillance, because resources had been misallocated.

"Some police forces believe the problem is too large to tackle," he said.

"In fact, a small number of gangs lie behind many incidents and locking them up would be far more effective than telling the public to fit an anti-phishing toolbar or purchase anti-virus software. Cybercrooks impose disproportionate costs on society."

According to Prof Anderson it is mainly the US government - and the FBI in particular - that carry out the "heavy lifting" when it comes to pursuing cybercrime.

"Cybercrime has created a swamp," he added. "You need to drain the swamp by arresting people."

Protecting consumers
A Cabinet Office spokesman welcomed the report and said that the government believed the threat was serious and needed to be tackled.

"Our approach strikes the right balance between defending our interests and pursuing cybercriminals" he said.

The Cabinet Office pointed to extra investment of £650m over four years to fund more cyber-specialists in police forces across the country.

Prof Anderson also recommended improving consumer protection legislation for victims of credit card fraud.

He said that the fear of fraud by businesses and consumers was leading some to avoid online transactions, imposing an indirect cost on the economy.

He noted that consumers in countries like the Netherlands, Finland and Ireland enjoyed much stronger protection.
 
Could the internet really shut down?
Thousands of users around the world are likely to lose internet access on Monday thanks to a virus called DNS Changer – how bad could things get, asks Matt Warman, Consumer Technology Editor
11:46AM BST 06 Jul 2012

As viruses go, DNS Changer appeared fairly harmless – initiated in 2007, it simply generated fraudulent clicks on adverts, and made its Estonian creators something under £10million. Infected computers accessed the web slightly more slowly, but their users could be forgiven for not even noticing they had a so-called “botnet infection”, let alone realising that they were aiding a criminal gang.

In shutting down the virus, however, the FBI opened a can of worms that reveals what one analyst calls “a weakness in the internet’s infrastructure”. Dan Brown, director of security research at web firm Bit9, says that worse still the FBI’s “band-aid approach” mirrors how security as a whole has evolved on the web. “Generally,” he says, “it has preferred band-aids over real solutions”.

The problem arises because DNS Changer alters the directory that tells a computer the digital address to which intelligible sitenames refer: so rather than Amazon.co.uk leading you to the online bookshop, it redirects you to a fraudulent site, derives revenue from the invisible click and then passes you on to where you wanted to go. The FBI’s solution was simply to replace the criminal server, to tell people that something was wrong and to keep passing the traffic through. Now, however, it says that it can’t spend endless taxpayers’ money on maintaining that server. When it turns it off on Monday, some 350,000 people will lose their connections, of whom around 20,000 live in Britain.

“Security was not paid a great deal of attention while the Internet was first forming,” says Brown. “Now, years later, we’re stuck with the bill. It’s long been known what the fix for this particular problem is, but like kids eating vegetables, it’s something we put off as long as possible.”

It’s extremely unlikely that this could ever be repeated on the grand scale that would be required to make a major difference to the internet as a whole; but it is possible that the constant cat and mouse game of viruses versus security experts continues to cause a number of small problems that all add up to a decent sized headache. Even Apple has recently dropped the claim that its computers are immune from viruses. But nonetheless, the distributed nature of internet infrastructre lends itself to a secure, resilient network.

It’s worth emphasising, too, that those 500,000 affected by DNS Changer represent just a very tiny percentage of the 2 billion currently online. Even so, many of the 350,000 computers currently infected won’t know until Monday. And although preventable by any standard security software, there are still many users who aren’t sufficiently computer savvy to know how to keep themselves safe online. The “DNS Checker Page” allows users to see if they have the virus and to remove it, and has been largely responsible for the fall in the virus’s prevalence.

Brown suggests users should also limit future damage by using their computer’s “Guest” account for general surfing, so that any potential malware infections are confined and won’t have the ability to compromise individuals’ personal and sensitive data. But of course that would also deprive them of a host of the increasingly personalised features of modern computing. “Affected users will largely be relying on their ISPs or their technically-inclined nieces and cousins to help them figure out why they suddenly can’t access the Internet on July 9,” says Brown. For many, that basic technology advice is what keeps their increasingly vital computers online. In the future, more education than ever will be needed.

- Is your computer infected? Visit www.dcwg.org/detect/ to check and for links on how to remove the virus.

http://www.telegraph.co.uk/technology/i ... -down.html
 
I know something about computer security, but this leaves me scrambling for the door. Is this real? Or is it tin-foil-hat territory? I hope it is tin-foil-hat.

In Russia your Household appliance spams you :?

http://www.bbc.co.uk/news/blogs-news-from-elsewhere-24707337

Cyber criminals are planting chips in electric irons and kettles to launch spam attacks, reports in Russia suggest.
 
It's all a bit confusing. If the devices are sending out spam, why do they need a microphone? Are they tailoring the spam to snippets of our overheard lives?

Is that why shaved sloth porn is clogging my in-tray? :sceptic:
 
Back
Top