And yet more rogue AV software - Virus Protector

A brand new fake AV program Virus Protector is doing the rounds.
Hopefully by now you'll know never to install or run (or click) anything that pops up on your screen telling you there's a problem
File Changes:
RegistryEntries 
Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Value: Shell
Data: C:\WINDOWS\system32\agaz17mgx.exe
Posted on March 8, 2010 .

Facebook Scam

There's a new Facebook scam that is being sent as a private message from a friends account (now compromised) saying "Did you forget about me?" with a link attached.
Need we remind you not to click links in messages if they look in any way suspicious?
We would always say don't click any links at all that arrive in IM's,emails, tweets etc

There's also another scam on Facebook asking for money to be wired to a friend who has "just been mugged" and had all their money etc stolen. You will normally know this person, and therefore it should be relatively simple to know if this is suspicious, which for the security aware amongst you, it will be.
Safe surfing

Posted on March 6, 2010 .

New Rogue Software

It's hard to keep up with all the latest rogue-ware that pops up like a Whack-a-Mole game these days.

The latest is called DrGuard, and like all the other rogues, will do a fake scan of your PC and alert you to all sorts of problems that don't really exist.

Please be wary of ANY software that pops open to alert you of a problem.

Posted on March 5, 2010 .

Microsoft Security Update

A new Microsoft security update is due for release on Tue 9th March

Microsoft has issued a Security Bulletin Advance Notification,
indicating that its March release cycle will contain two bulletins.
These bulletins will have a severity rating of Important and will be
for Microsoft Windows and Microsoft Office. 

Please keep an eye out for these updates

Posted on March 5, 2010 .

Yet More Twitter Spam

We've received a number of DM's this morning from followers saying:

"hi, i'm 24/female/horny... i have to get off here but message me on my windows live messenger name Paris545love@hotmail.com"

As always, please don't click any links. This is far too obvious to be a real threat we imagine, but some people might be caught out.

People sending out these DM's need to change their Twitter passwords and run anti-spyware scans on their computers.

Posted on February 26, 2010 .

Twitter Phishing Scam Continues

We're still getting DM's from people who are the victim of a recent phishing scam, whereby they inadvertently send out DM's say " hahah This you??" with a link attachment.

Do not click this link, as it takes you to a fake Twitter login page which steals your information (if you type it in!) and then sends the same link to all the people you're following.

If you're the victim of this, we recommend changing your Twitter password immediately, and running an anti-spyware and anti-virus (from a reputable manufacturer) to check that there's no infection on your system.

Please read our Pop Up Scams page to make sure you don't download a rogue fake anti-virus program.

Read our first post about this.

As a side note, if you're running Google Chrome (or possibly Firefox with NoScript, although we've not checked) then this link attack would have been blocked.

 

Posted on February 25, 2010 .

Adobe Download Manager Exploit

Adobe has announced that a critical vulnerability has been identified in the Adobe Download Manager. This vulnerability (CVE-2010-0189) could potentially allow an attacker to download and install unauthorized software onto a user's system.

Users who have downloaded Adobe Reader for Windows from http://get.adobe.com/reader/ or Adobe Flash Player for Windows from http://get.adobe.com/flashplayer/ prior to the release of this Security Bulletin on February 23, 2010, can verify they are not vulnerable to this Adobe Download Manager issue by following the instructions below.

  • Ensure that the C:Program FilesNOS folder and its contents ("NOS files") are not present on your system. (If the folder is present, follow the steps below to remove).
  • Click "Start" > "Run" and type "services.msc". Ensure that "getPlus(R) Helper" is not present in the list of services.

If the NOS files are found, the Adobe Download Manager issue can be mitigated by:

  • Navigating to Start > Control Panel > Add or Remove Programs > Adobe Download Manager, and selecting Remove to remove the Adobe Download Manager from your system.

OR

  • Clicking "Start" > "Run" and typing "services.msc". Then deleting "getPlus(R) Helper" from the list of services.
  • Then delete the C:Program FilesNOS folder and its contents.

 

Posted on February 24, 2010 .

Malware - Desktop Security 2010

And yet another rogue 'security' program appears on the net.

Desktop Security 2010 adds to the long list of rogue software scams.

It scans your system and then 'finds' a number of bad files that it's just previously installed.

If you're unfortunate to have this software installed, it probably slipped in un-noticed whilst you were visiting a bad website, downloading files from a peer to peer network, or installing some other nasty freeware.

It can be removed with a number of legitimate anti-spyware programs, such as Ad-Aware or manually here:

411-spyware.com which also has a great write up on the whole nasty program.

As ever, please please be wary of the sites you visit, the files that you download, and the links that you click.

Posted on February 22, 2010 .

Twitter Phishing Attempt

The latest Twitter phishing scam involves a DM reading “lol, is this you”,  "you look funny", "haha this is funny" and linking to a site called “bzpharma”, do not click the link.

If you do click the link and then enter your details (but why would you!?) then your Twitter account will be used to send out more rogue DM's.

If this has happened to you, we suggest you log in to your Twitter account and change your password immediately.

In fact we recommend you change you password frequently anyway (a pain, but a safer option)

It seems as though these DM's have been around for a while now, but have suddenly re-surfaced in large numbers recently.

SNS TIP:

AS ALWAYS: Be very wary and suspicious of any links sent to you, especially if the grammar is slightly odd.

Be even more careful with links that have been shortened, and therefore obscured.

We recommend using Sucuri which shows the real location of a shortened url.

 

Posted on February 20, 2010 .

Mozilla Vulnerabilities - Firefox, Thunderbird & SeaMonkey

The Mozilla Foundation has just released a number of security advisories concerning vulnerabilities in Mozilla Firefox, Thunderbird, and SeaMonkey. These vulnerabilities if exploited might allow a remote, unauthenticated attacker to execute arbitrary code or bypass security restrictions.

We recommend updating your current versions of any of the above products as soon as possible.

We would also recommend you set your software to automatically update. In Firefox for Mac, go to Preferences, Advanced, Updates tab and select the check box to automatically check for updates: Firefox, Add-Ons and Search Engines.


http://www.mozilla.org/security/known-vulnerabilities/

 

Posted on February 18, 2010 .

Adobe releases security update for Reader & Acrobat

This new bulletin, APSB10-07, is a security update for Adobe Reader and Acrobat. These updates address two
critical vulnerabilities. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code, make unauthorised cross-domain requests, or cause a denial-of-service condition.

We advise you to update Adobe Reader and Acrobat (all platforms)

Please see our previous post for updates to Adobe Flash

Relevant Url:
http://www.adobe.com/support/security/bulletins/apsb10-07.html

Posted on February 16, 2010 .

Rogue Antivirus 'Security Tool' targets Facebook users

Facebook users are currently being spammed with a bogus email asking them to review their agreement (by downloading an attached file)

We really hope that if you've visited our site, you won't get caught out by what is clearly a fake email.

The email reads as follows:

"Dear Facebook User,

Due to Facebook policy changes, all Facebook users must submit a new, udpated account agreement, regardless of their original account start date.

Accounts that do not submit the updated account agreement by the deadline will have restricted.

Please unzip the attached file and run "agreement.exe" by double clicking it.

Thanks

The Facebook Team"

Firstly anything addressed to Facebook User will be bogus.

Secondly, we really hope you'd be suspicious after being asked to double click an exe file

Thirdly, the use of language within the message is suspect.

If you unzip the file, you'll become the proud owner of a rogue malware anti virus called Security Tool.

Please do not respond to this message if you get it, and pass this post on to all your friends and family.

Please, always be suspicious of such emails.

Safe surfing.......

 

Posted on February 16, 2010 .

Security Essentials 2010 - Malware, beware!

There's a piece of supposed security software doing the rounds called Security Essentials 2010.

This is an infected piece of malware and should NOT be downloaded or installed.

It normally arrives by way of an email informing you that you have a virus, and to clean your system you need to download and install Security essentials 2010. It can also appears as a pop-up on a web page.

This is not to be confused with the excellent Microsoft Security Essentials, which absolutely should be downloaded and installed (for Windows)

 

More details: (notice the inconsistent lower case 'e', but by this time, it's probably too late!)

Known System Changes:

Files 
%System%\warnings.html
%System%\helpers32.dll
%System%\winlogon32.exe
%System%\smss32.exe
%System%\41.exe
%Temp%\250904.exe
%StartMenu%\Security essentials 2010.lnk
%Desktop%\Security essentials 2010.lnk

%ProgramFiles%\Securityessentials2010\SE2010.exe


Folders
 
%ProgramFiles%\Securityessentials2010

RegistryEntries
 
Key: HKEY_CURRENT_USER\Software\SE2010
Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Value: Security essentials 2010
Data: C:\Program Files\Securityessentials2010\SE2010.exe
Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Value: smss32.exe
Data: C:\WINDOWS\system32\smss32.exe

 

REMOVAL INSTRUCTIONS:

Delete Security essentials 2010 files:

%Program Files%\Securityessentials2010\SE2010.exe
%System%\warnings.html
%system%\winlogon32.exe
%system%\smss32.exe
%system%\41.exe
%system%\helpers32.dll

 

Delete Security essentials 2010 registry entries:

HKEY_CURRENT_USER\Software\Security essentials 2010
HKEY_LOCAL_MACHINE\SOFTWARE\Security essentials 2010
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Security essentials 2010″

SNS TIP

Sadly, if you do get yourself infected, the absolute safest and best way to rid your system is to completely re-format your hard drive and re-install Windows from fresh. A pain, but pretty much the only guaranteed way to safely remove all malware (some of which will have hooked itself so deep to your OS that you won't even know it exists).

This is why it is ESSENTIAL to have a current and viable backup system in place.

Posted on February 15, 2010 .

Another Adobe Update (Windows and Mac)

Adobe has released updates for Flash Player with a Tue 16th Feb release of Acrobat and Reader.

As Adobe products seem to be the target of an awful lot of exploits recently, you are urged to update those products as soon as possible.

Remember, we advise you to turn OFF javascript within Reader as a matter of course, which will prevent many vulnerabilities whenever they arise.

There are currently two bulletins:

The first bulletin, APSB10-06, is a security update for Adobe Flash
Player and Adobe AIR that addresses a critical vulnerability.
Exploitation of these vulnerabilities may allow an attacker to make
unauthorized cross-domain requests. The bulletin indicates that the
update also addresses a potential denial-of-service issue.

The second bulletin, APSB10-07, is a security advisory for Adobe
Reader and Acrobat. This shows that Adobe is planning to
release updates for Adobe Reader and Acrobat on February 16, 2010 to
address other critical security issues.

 

Please head here:

http://www.adobe.com/support/security/bulletins/apsb10-06.html

http://www.adobe.com/support/security/bulletins/apsb10-07.html

(both links safe as of time of posting)

Posted on February 13, 2010 .

E-Cards and E-Greetings

With Valentines day almost upon us, it's a good time to mention to be careful of any rogue E-Cards that might land in your inbox.

  • Check that the greeting is from somebody you know
  • Don't click the link in the email, instead visit the e-card website by manually typing their address into your browser, and visit the "e-card pickup area"
  • Be suspicious!

Happy Valentines Day....

May all your cards be clean :)

Posted on February 11, 2010 .

Microsoft Patch Tuesday

Microsoft has recently fixed 26 vulnerabilities in 13 security bulletins as part of its Patch Tuesday, including critical ones for Windows that could be exploited to take control of a computer and one that has been resident in the 32-bit Windows kernel since for 17 years.

Please update Windows (if you must run it) via Windows Update (which we recommend is set to Automatic)

Posted on February 9, 2010 .