Christopher Boyd: May 2008 Archives

I was wondering where I'd seen the website my colleague wrote about last week - turns out one of my fellow security researchers had posted a link (in a hidden forum) to a series of Youtube videos where the website was being promoted. Of course, you can't make videos clickable on Youtube, so an interesting tactic currently employed is to do this with your video instead:

darrow1.jpg

Click to Enlarge

Nothing says "Download me now" like a great big arrow pointing to the download link in the description. Interesting use of visual cues, there. It didn't save our enterprising file pusher though, because Google quickly whacked his account and removed his videos.

There's a group of individuals firing out emails at the moment that bear all the classic hallmarks of a typical "Money Mule" scam. For those who don't know what a Money Mule scam is, the following extract from this page will be useful:

As most of the fraudsters behind these scams are located overseas and it is not possible to make cross-border transfers out of UK online bank accounts overseas, a "money mule" or "money transfer agent" is required to launder the funds obtained as a result of phishing and Trojan scams. After being recruited by the fraudsters, money mules receive funds into their accounts and they then withdraw the money and send it overseas using a wire transfer service, minus a certain commission payment.

What is the scam in question, I hear you ask? Well, it seems someone is currently targeting restaurant owners - first, making a general enquiry with regards the price for a large party to come and have a meal. Once they have the confidence of the victim (and offering to pay in advance with a card that is likely stolen), they then mention that there is a problem with the travel agent they're using to fly out. Typically, the payment system is "broken" and so the only way they can still make it over is if the helpful restaurant owner handles the travel payment themselves (with the tempting offer of a cut of the cash).

You know it's all going to end in tears if you get sent an email with the following:

However, the prepaid agent has just informed us that their credit card merchant/terminal is faulty and is currently undergoing online upgrading and therefore cannot charge credit cards.So, we kindly solicit that once you are in receipt of my credit card details.

You are required to charge ? 7000.00 in  your account ,then deduct ? 2000.00 as initial deposit , And the transfer ? 5000.00 to the prepaid flight/travel consultant, whose information I will forward to you once this is confirmed
.

Sounds too good to be true, and of course, it is. What will happen here is that the police (and bank) will investigate the transactions made on the stolen card, only to find 2,000 Euros sitting in the bank account of the restaurant owner, a further 5,000 Euros that have been forwarded on to a third party (posing as a "Travel Consultant") by the restaurant owner (which isn't going to go down too well with the police) and a fake reservation that they cannot fulfill (though that'll be the least of their worries at this point).

Read on after the jump to see the dialogue that took place between the scammers and the person who forwarded warning of this scam onto me...


A warning for those rummaging around on EBay looking for retro videogame bargains. I happened to see this up for sale:

r71.jpg

Click to Enlarge

A rare limited edition Dreamcast console called the R7. Time for a little history lesson? You bet.

"This version of the console was previously used as a network console in pachinko parlors in Japan. "R7" stands for "Regulation #7" (2nd provision, 1st section, number seven in the Japanese Penal Code), which regulates businesses that are deemed to affect public morals.

Originally the Black R7 Dreamcasts were Ltd Edition Japanese Dreamcasts that were used as prizes in pachinko parlors in Japan, and were previously only avaliable through pachinko parlors. The R7 relates to the ruling in Japanese law (regulation 7) of no legal gambling! Hence they are rare to find even in Japan".

As a collector of hard to find Dreamcast consoles, I found this listing particularly interesting as it shows Belgium as the location of the item (usually, these machines don't pop up in Europe too often) and the price was extremely cheap (though the shipping cost was unusually high, which was my first clue something wasn't quite right here). I wonder how many others would have immediately gone racing for the "Buy it now" button, without bothering to notice that the seller is listed as a seller "since 28-Dec-03 in Japan".

Huh? But it gets worse. Wade through the listing and eventually you see this:

" Sega - Console Dreamcast japonaise Regulation 7 - NOIR

La boite comprend la console sega, 1 manette, et les cables.

Tr?s bon ?tat g?n?ral et complet.

Article collector.

Livraison EMS depuis le jais le japon : 55,00?"


That last part? EMS shipping from Japan. The item location is listed as Belgium, but the item itself is actually located in Japan. In all likelyhood, the seller lives in Belgium but is currently staying in Asia - I actually contacted the seller about this, and amazingly they were quite happy to admit that the item is NOT in Belgium but didn't bother to update any details.

Currently this individual is selling 72 items - how many people in Europe will buy these items not expecting horrendous amounts of Import Tax and handling fees added on to their purchases? I doubt the seller would take any responsibility for paying the fees - if the buyer refuses to pay up, they're then liable for the cost of shipping the item back to Japan.

I myself have bought many items from Japan via people who live elsewhere but ship the items over - in those cases, the listings are correct and you know you're going to pay import fees. This, however, seems faintly deceptive - especially as the seller has been alerted to this problem. I can't help but think they're going to start getting an awful lot of bad feedback about this...

ddosattack.jpg

Click to Enlarge

The owners of this site about hacking must have some confidence in their hosts if they're under a DDoS attack but are still allowing their registered users on the forum. Perhaps they should consider sending out "BRB DDoS Attack" messages via Twitter to all their members...
A new one to watch out for - a random friend request which turns out to be a page littered with horrendous spelling mistakes and the promise of getting rich quick:

kayla.jpg


Click to Enlarge

Some of the better ones include "Ah Now Dont Give Me that Griny Smile huh ..!", "I was Enving him" and my personal favourite, "Look Here i am sharing this with all Myspacian's".

..........oh-kay. Clicking the link takes you to a paid survey site, which throw up a popup saying "
I will NEVER share your information with ANYONE! I hate spam as much as you do."

Someone should tell that to whoever signed up to their affiliate program...
"He claimed to *work* for a charity that runs homeless hostels. It turned out he was a 'guest' there and was thus breaking the hostel's rules by trading from his accommodation.

The charity have been helpful and rung me several times to resolve the issue and have issued him with a warning.

I don't want him made homeless over this, though. I just want my money back and steps made by eBay to ensure that no one else has to go through the same hassle."

Strap yourselves in and take some time to read all 19 pages(!) of what has to be one of the worst EBay experiences I have ever seen. Just when you think it can't get any worse for the buyer - it does. Spectacularly. As a starting point, you may want to digest this blog entry to get a general overview of what caused this mess. It should be said, the EBay "Customer Service" on display here is absolutely dreadful - I hope it's not like this every time something goes wrong with a purchase...
Comic writer and commentator Kevin Church notes a particular kind of spam attack over at a well known comics blog. Hadn't actually seen this in action before...

All Change

| | Comments (0)
As you might have noticed, the SpywareGuide Blog has had a facelift - we're still tweaking a few things so please let us know if you see anything weird happening!

The fake Windows Update popup has been doing the rounds on Myspace for a long time (we're talking at least June 2007). Every now and again it returns, usually varying the payload. Well, here we have an example where Phishing is involved and a sneaky imitation of a well known security program is thrown in for good measure. Find out more after the jump...

Scare Tactics

| | Comments (0)

Here's a curious file that relies on the power of a shock to the system for anyone wanting to indulge in some hacking and cracking action. Namely: stealing MSN Messenger passwords.

Upon firing up the "program" (which is actually a batch file, giving some hint as to the actual nature of the payload), the user sees this:

famsn1.jpg

Seems to good to be true, doesn't it? Sure enough, a few seconds later and...

famsn2.jpg

At this point, the end-user silly enough to run this file is probably thinking their PC is going to go up in flames - however, nothing actually happens and your PC will continue to function as normal. Has someone created this to deter wannabe hackers from jumping on the "steal everything" bandwagon? Or is this just a gag by hackers at the expense of noobish newcomers?

(Additional Research: Deepak Setty, FSL Senior Threat Research Engineer)

If you got this in your mail, would you be curious?

Subject: UN Diplomatic Passport & Swiss Private Bank Accounts

Union Privacy Ltd

Union Privacy group is the world's largest provider and expeditor of global travel documents and passports. We service people, companies of all sizes, from small neighborhood businesses, to large tour and cruise ship operators, to most of the FORTUNE 500. Union Privacy has the unique advantage of offering clients the best of all worlds - highly trained visa and passport professionals combined with attention to flexible, responsive service.

We offer Comprehensive guide to obtaining second passports and citizenships, camouflage passports, new identities, legal residency and more.

Through our long time reliable and trusted contacts at governmental level, we are finally able to offer a genuine United Nations Diplomatic appointment and passport from a respected UN member country. Also you can take apart in our Passport Programs for your Second Passport (even with New Identity).

I certainly was. Find out what happened after the jump...

As you might imagine, I'm registered on a lot of social networking sites - a lot of the time, just to see what's coming through in terms of hijacks, adverts, scams etc. I've been registered on Wayn.com for a long time, but never seen anything strange come through. Until this morning, that is, when I found out I had a message waiting from Janet Jackson.

As you do.

baham1.jpg

Something tells me this isn't Janet inviting me to sing with her at the next Superbowl...

http://blog.spywareguide.com/upload/2008/05/baham2-thumb.jpg
Click to Enlarge

....whoops. I doubt this is the start of an endless barrage of ringtone spam and free iPods, but it'll be interesting to see if I get anything else like this. Have spammers worked out a way to game Wayn? Have I just been lucky so far? Or have they only just started targeting the site? No idea. I'm still up for singing at the Superbowl though...

Here's another fake Instant Messaging application from the creator of the fake Google Talk program currently in circulation. This time round, the victim is MSN Messenger:

http://blog.spywareguide.com/upload/2008/05/fakem1-thumb.gif
Click to Enlarge

Clicking the "Sign In" button opens up a smaller popup - asking you to fill in your .NET Passport details. Of course, filling in your details will result in a fake "Service could not be found message". Once you leave the PC, the attacker happily wanders over, browses to the C Directory and steals your login details.

These programs seem to be flavour of the month at the moment...

We're still trying to pin down exactly how new this is, but it seems someone has released a fake Google Talk application into the wild.

Compare the fake application on the left with the real thing on the right, and note the differences:

fakereal.jpg

Immediately, we can see that the real thing has a rounded curve at the top - the fake is blocky, and looks like a regular Windows application box. There's an "Inbox" link at the top when you start up the fake application - there isn't a link like that when firing up Google Talk for the first time. The Username / Password box is much lower down on the fake application, and (again) the real "Sign In" button is curved on the real application. Finally, you'll see "Forgot your account / Don't have an account" on the genuine Google Talk program - not so on the fake.

How does this work?

Well, the program doesn't connect to the Internet - for this attack to be successful, the hacker needs physical access to a PC that lots of people use. Could be a workplace PC, could be in a school, library, Net Cafe - anywhere where it's possible to run an executable file then retreat to a safe distance while the potential victim sits down and thinks "Just need to check something on IM..."

Assuming the victim enters their login details into the fake application, they will immediately see a fake error message, and probably think no more of it:

fakegoog2.jpg

Once they've finished whatever they were doing and left the PC, the attacker only has to sit down and browse to the C Drive where they'll see this:

fakegoog3.jpg

As you probably guessed, any all login details typed into the fake application will be stored in this text file:

fakegoog4.gif

We detect this application as Fake Googletalk.

Research Summary Write-Up: Chris Boyd, Director of Malware Research
Additional Research: Chris Mannon, FSL Senior Threat Researcher

We did fix it - but something went horribly, horribly wrong somewhere and the comments broke again.

*cough*

Anyway, the fresh deluge of Viagra spam in my mailbox tells me the comments are now 100% up and running once more. I'm now going to sit in the corner and cross my fingers...

Memehacks

| | Comments (0)

Hackers are not only harnessing the power of memes in a big way, they are (in some cases) having their creations dictated to them by whatever the passing fad happens to be at the time. A pretty strange turnaround, but it's all down to the popularity of various warring factions on the web that are increasingly attracting a hacking community. Witness the rise of Anonymous, Project Chanology and a host of others, many of whom "borrow" Memes from sites such as 4Chan, then argue over who created what meme first.

Well, read on to see an example of a DDoS tool riddled with memes just so it'll gain acceptance from the target audience (complete with built in radio and chat functionality, just to keep the "Partyvan" mentality going a little longer) after the jump. By the way, there's no getting around this - many Internet memes are (by their very nature) cruel, vile and offensive. This makes the nature of explaining some of these memes slightly tricky, and (as this is a safe for work blog) kind of makes it difficult to link to source material without making you go blind. As such, anything that might cause you boss to yell at you has been labeled not safe for work. And with that out of the way....

It's A Trap!

| | Comments (0)

I had this waiting for me in my Myspace friend request box today:

zoespace1.jpg

...uh. I had pegged this as a standard fake profile, but the addition of the personalised "Why, hello there" message wasn't something I'd seen before with one of these fake profile requests. A look at the profile, and...

http://blog.spywareguide.com/upload/2008/05/zoespace6-thumb.JPG
Click to Enlarge

.....strange - not the usual fake profile hurling adverts for ringtones, Adware and who-knows-what at me. It's a bit arty, a bit daring - certainly in your face, but for once, it's not adverts and scams in your face, and that's a refreshing change. Could it all go wrong with the "About Me" text though?

zoespace3.jpg

Apparently not. There's no mention of the latest Viagra pills or even a webcam. This is weird. It's almost too good to be true.

Almost.

Click anywhere on the page, and (courtesy of an invisible overlay)....

http://blog.spywareguide.com/upload/2008/05/zoespace5-thumb.jpg
Click to Enlarge

Doh! And we were doing so well for a while there...

There seems to be an odd case of dubious phonecalls taking place in the UK at the moment, but nobody can quite work out if the calls are coming from a legitimate company in need of some customer service training or a scam outfit who simply want to match your details to those on a list before selling it on to the highest bidder.

Alternatively claiming to be a representative of Halifax Bank (or First Assist, an accident insurance company), they cold call their "target" and immediately start quizzing them for personal details, apparently without prompting.

There's three whole pages of puzzled individuals here, and another extremely interesting writeup about it here.

A new hacking program is in circulation that lets hackers create executable files easily and with no fuss. When the victim is tricked into running the infection file, a connection is made to the attacker's PC and they can steal any MSN login details stored on the PC. Here's what the attacker sees in his newly created directory after installing the infection creation tool:

msnhxr1.jpg

Note the selection of text files that accompany the program. We've seen a growing trend for hackers to leave copyright warnings on their programs, and messages of a similar nature elsewhere. Well, the all-out branding assault continues here:

msnhxr2.jpg

....Belgium Power? Once they're done impressing you with the technical specs of the programs creation, they continue to hit you around the head with more information:

msnhxr3.jpg

Once you fire up the Client, you can't help but be impressed by the clean, logical layout (very reminiscent of a spreadsheet, actually):

http://blog.spywareguide.com/upload/2008/05/msnhxr4-thumb.jpg
Click to Enlarge

Even better, the desire for being properly credited for their work runs wild here:

http://blog.spywareguide.com/upload/2008/05/msnhxr7-thumb.jpg
Click to Enlarge

According to that screenshot, they consider their Crew name to be a Trademark, and and program itself seems to be Copyrighted (All Rights Reserved). Creating the infection file is as simple as hitting the "Build It" button - when you see this, you're ready to start pushing your infection file to the masses.

Once the attacker has sent the infection file to the victim and convinced them to execute it on their PC, the attacker will be notified like so:

msnhxr12.jpg

At that point, the attacker simply opens up the "spreadsheet" page and sees this:

msnhxr10.jpg

The message says "Ready for action" - so very, very true. At this point, the attacker simply opens the "Passwords" tab, hits the "Get MSN Passwords" button and is presented with all the login details stored on the PC:

msnhxr11.jpg

We detect this as PassHax.

Research Summary Write-Up: Chris Boyd, Director of Malware Research
Additional Research: Chris Mannon, FSL Senior Threat Researcher

There have been a few discussions on security lists and forums regarding a wave of spam comments on Facebook that (for the most part) mention a site called Pinont.com. There were some theories that this might be some kind of worm attack - however, one of my researchers told me last night that a relative was apparently phished and (not long after) comments such as these started appearing from the relatives account:

fbfsh.JPG

As the title states, no need to panic - it's highly unlikely this is anything other than somebody harvesting accounts the old fashioned way then promoting an endless deluge of pill websites. Yes, Phishing sucks - but for now, it doesn't look like Pinont.com is the Herald of the End of Days or anything equally dramatic..

In January, everything went a little crazy because of a Facebook application that (if you believed the hype) force installed Zango, hijacked your PC, set fire to your house, killed your pets.....well, you get the idea. In actual fact, the truth of the matter was a little more convoluted. All I could see was that this application opened up a popup, which (every now and again) would just happen to be an advert for Zango. Hardly Earth shattering, but of course it did switch people on to the fact that they needed to be careful which applications they gave permission to access their data while on Facebook.

Well, a few months on and it looks like the BBC had a coder create an application (in three hours or less) that could swipe a whole pile of data on both you and your friends, before mailing it back home to base. I can't stress enough - when it comes to social networking sites, NEVER post anything you wouldn't feel comfortable posting on an otherwise open and accessible site such as your blog, personal website, whatever. I have pages on Myspace, Facebook, Orkut and a whole bunch of others - and there is NOTHING on them that you couldn't find elsewhere. There is no hidden treasure trove of data to mine, and so I don't care what happens to it because it's all out there in the public domain anyway. This is what I've been telling people for the longest time, and it works.

A few days ago, I talked about the oddly intrusive chat attack I experienced, and how FaceTime products can control / lock down / fire into orbit Facebook applications where necessary. To date, there haven't been any applications out there that have gone in and done all sorts of horrible and malicious things to end-users on Facebook. Personally, I've been more concerned about applications that allow people to post a seemingly endless and imaginative array of body parts in various comical situations. Nobody really wants that all over their desktop in a regular workplace environment, right? However, this seems to me to be a warning shot of sorts - a warning that we not only need to consider locking down applications that cause annoyance and embarrassment, but also to keep an ear to the ground as we await the inevitable arrival of the "I BREAK STUFF" application.

Coming soon to a Web 2.0 site near you...

Today I received an interesting phish that only caught my eye purely because of a chance circumstance involving my credit card. What I ended up with was three websites (at least one of which has likely been hacked), two phishes and a collection of screenshots for you to look at after the jump...

About this Archive

This page is a archive of recent entries written by Christopher Boyd in May 2008.

Christopher Boyd: April 2008 is the previous archive.

Christopher Boyd: June 2008 is the next archive.

Find recent content on the main index or look in the archives to find all content.