Let say you are thinking of purchasing something online or you are not sure in general about the safety of a certain website. How can you tell? I just came across this little page that Google has for their Safe Browsing…
http://google.com/safebrowsing/diagnostic?site=weebly.com/
In this case I have weebly.com in the query because it is good to know if your “free” website host also allows malware or has a history of it. If you put wordpress.com in there you will see similar results. Although not as drastic.
http://google.com/safebrowsing/diagnostic?site=cswtech.wordpress.com/ looks clean as a whistle 🙂
Have a great day.
-
-
Using OSSEC to Detect MacDefender in Squid Logs
While doing forensics this week to determine where the MacDefender malware was coming from I noticed one thing that was distinct to all the requests for this malicious package. When it was downloaded the mime type for the file request was “application/download” when searching through the logs I noticed that this was a mime type that I would want to know about anyways and that generally there are not a lot of requests associated with this mime type. So I would not be overwhelmed with notifications.
So how do I monitor this? I’ve been using the OSSEC IDS system (https://www.ossec.net/) for a few years now. It is an excellent tool and completely customizable. To get OSSEC to monitor my squid log first I added the /var/log/squid/access.log to the list of monitored files in the /var/ossec/etc/ossec.conf file and restarted the service.
<localfile> <log_format>squid</log_format> <location>/var/log/squid/access.log</location> </localfile>
Now, the problem I found with adding this is if you have a pretty busy network with a lot of different clients (Macs, Linux, PCs) then you are going to get some odd traffic that will trigger alerts based on multiple errors found in the squid access log. To monitor this it would be a good idea to shut off active response for a while and then gather some exceptions that you can put into the local_rules.xml file on the OSSEC server. Below is the rule I used to detect application/download.
<group name="squid-custom,"> <rule id="100400" level="6"> <if_sid>35000</if_sid> <match>application/download</match> <description>Application downloaded via squid proxy. Check URL to determine malware.</description> </rule> </group>
I have I have email notifications set for level 6 and up and active response to 7 or greater. This way internal hosts will not lose there internet connection abilities when downloading a legitimate program. Below are some of the exceptions that I had to add to the local_rules.xml to make sure that certain requests did not add internal hosts to the hosts.deny file.
<rule id="35057" level="0"> <if_sid>35057</if_sid> <match>secars.dll</match> <description>False Positive. Symantec Endpoint client going through proxy.</description> </rule> <rule id="35009" level="0"> <if_sid>35009</if_sid> <match>secars.dll</match> <description>False Positive. Symantec Endpoint client going through proxy.</description> </rule> <rule id="35008" level="0"> <if_sid>35008</if_sid> <match>secars.dll</match> <description>False Positive. Symantec Endpoint client going through proxy.</description> </rule>
There will probably be a few more things to add. Just monitor your alerts carefully and you will have it smoothed out in short order.
As I was about to leave work today I received an alert from OSSEC that looked like what you see below. I’ve edited out the internal information and the bad URL’s host.
OSSEC HIDS Notification. 2011 May 27 14:49:17 Received From: (MyProxy) IPaddress ->/var/log/squid/access.log Rule: 100400 fired (level 8 ) -> "Application downloaded via squid proxy. Check URL to determine malware." Portion of the log(s): 1306522093.290 620 <InternalHost> TCP_MISS/200 47939 GET http://VeryBadHost.com/files/a6930dd67bda35bd60e694db3a40ec58d3875a870e2210c7.zip DIRECT/<BadIPAddress> application/download --END OF NOTIFICATION
I blocked the IP on my network, checked the host that downloaded the package and then submitted the bad ip address to the Google Safe Browsing Report here:
-
Macintosh Fake Anti-Malware: How to Protect Yourself and Your Network
Protection at Home: (For the regular home folks)
There is a new Malware scam going around for Mac computers that exploits Safiari’s “Open safe files automatically” feature. If you are just a home user and use Safari then please disable this risky feature . In Safari() just go to the Menu: Safari->Preferences and under the General tab un-check the option near the bottom.Protection at Work: (For Network Administrators and other Geeks)
So what if you are like me and you are in charge of a whole network full of Macintosh machines? Well hopefully your settings are managed with Open Directory and you use Workgroup Manager to enforce certain settings. I have a variety of User and Computer groups that are managed in this manner. In order to manage Safari settings in Open Directory you need to add the Safari.app to the preferences under this screen which you see when you click on a group, then preferences(Note: Click on the details tab).Choose Safari in the /Applications folder. (Note that I have also previously chosen /System/Library/CoreServices/Managed Client.app which is why there are a lot more options on this screen.) Once Safari is added, highlight com.apple.Safari and click the Pencil
In the next dialog highlight the “Often” and then “New Key”. Choose the “Open Safe Downloads Automatically” and change the value to false. Apply it and click Done. This preference will now be set each time a managed client opens Safari. End-users can still un-check it if they like, but it should be reset after a quit and reopen.
I’m not sure why this option is not available under the “Always” section, which would lock the option. Feel free to explore the other options available under the “Always” key.Filed under: Computer Security, For-Facebook, For-My-Facebook, Macintosh
Category: Computer Security, For-Facebook, For-My-Facebook, Macintosh, MacDefender, malware
-
Online Accounts: Just a Bit of Common Sense
Millions, possibly billions, of people are conducting transactions online. Whether this is online banking, shopping, social networking or group discussions there are a few important guidelines to follow in order to make sure that your information and accounts are only going to affect the scope of the site you use them on. In other words do NOT use the same username/password at multiple sites. In the last week alone there have been three larga data breaches that involved either employee or customer information. For an example just Google: texas OR barracuda OR epsilon data breach.
Account Choices:
For my very important accounts I never use anything remotely close to a real name when choosing my username. The same applies when I am choosing a password. I never will use the same password that I used on another site. Why? Because when something happens at the site with whom I am engaging services with is hacked or left wide-open I do not want my username password to be valid elsewhere. For instance, say I have an account with Citibank or some other online banking firm and somehow that site’s information is extracted by a group of online criminals. I want this breach to stop within the scope of that institution and not have those credentials move onto another popular website.
Choosing an account name and password. Your usernames and passwords need to contain alpha, numeric, upper case, lowercase and special characters(These things:!@#$%^&*). When I am making a password I have a couple approaches. One approach is to choose a fairly long phrase or lyric that I like and use the first initial of each word to create my password. I’ll alternate upper and lower case and put in a few 1′s for I’s or zeros for O’s. Sometimes I’ll phonetically alter the spelling and combine acronyms. For example: RUr34llyPhour2dazeOld? (English Translation: Are you really four days old?) Another approach that I use I like to call is a Brain-Fart-on-my-Keyboard. Just start pressing random keys on the keyboard while thinking random things. I usually end up with something like this…
User: Lhjglkj(*&y43tiy678e
Pass: z7834hKJGjkG78efuhff%YThese are things I will never remember and if possible they will never be lifted from my mind. I save these passwords in an encrypted file that I do know the password to (that is another story) and then simply copy/paste them into the sites that I am logging into. An easy way to do this would be by using the highly rated free program LastPass: https://lastpass.com/
The point to all this: Do not use a real word or name!
Those Stupid Questions they ask:
One thing that is really annoying are those security questions that they ask you to fill out. Such as what is your Mother’s maiden name, etc… If they ask you to create your own question I use the “Brain Fart” method above for the question and the answer. If it is one of those choose a drop-down question and then they make you type your answer it’s another brain fart for me…
Filed under:
-
Specialized Email Phishing Attacks Highly Likely
This week many of you have received emails from companies (Best Buy, Chase, Citi, Disney, Walgreens, TiVo, etc, etc..), whose website’s you’ve registered with with that mentions a data or security breach in which your Name and Email address was stolen from a company called Epsilon. Epsilon is a company that send out gazillions of emails for a lot of companies(About 2,500). Simply they are a very busy email marketing delivery service with a lot of personal information.
The Problem: Since these criminals now have your name, email address and the actual company associated with that information, you can expect that they will be sending you email communications posing as a legitimate company. I’m not going to get in to the technical aspects of how they will do this, just know that they can and will.
The Solution: In a previous blog post I mentioned phishing attacks that appear to come from a legitimate source yet do not. In that post I summarized at the end a few things that you should do to be cautious and protect your information/identity from being stolen. What I really should have said is simply: Do not click on links in an email*.
If you get an email from your bank, read it, maybe it is real (Do you always believe everything you read?) and something you need to take care of. Instead of clicking on that convenient link in the message, manually open your web browser(hopefully you use Firefox or Chrome), go to the companies site that you should have bookmarked and take care of business.
For a fairly complete list of companies that were exposed check this website: http://www.databreaches.net/?p=17374
For more on Phishing attacks the FBI.gov site has a good example: http://www.fbi.gov/news/stories/2009/april/spearphishing_040109
If you want learn more about computer security I recommend this weekly podcast: http://twit.tv/sn . They have hundreds of shows online with notes: http://wiki.twit.tv/wiki/Category:Security_Now_Show_Notes
——————————————————-
* Unless of course you know what message headers or HTML source code are and how to decipher what they actually mean. I only look at them since it is part of my job and I am curious. In reality, it is easier and safer to just go to the companies website manually.
Filed under:
Category: Computer Security, For-Facebook, For-My-Facebook, Phishing, Email, Epsilon, phishing
-
Security Note: Fake SSL Certificates Issued for 9 Popular Websites
Apparently Comodo issued security certificates for these popular websites…
login.live.com,, mail.google.com, http://www.google.com, login.yahoo.com (3 certificates), login.skype.com, addons.mozilla.org. This would allow attackers to create fake websites using these certificates and pose as authentic site and at least steal your logon information.So when your Microsoft Update asks you to install an update out of make sure you do(That little yellow shield near the clock). If you do not want to wait for the update to come to you then go get it here…
http://support.microsoft.com/kb/2524375
In addition, make sure you update your Firefox Browser as well. Mozilla Firefox released 3.6.16 today also to include a fix that “blacklists a few invalid HTTPS certificates”. The Firefox 3.6 update is available here: http://www.mozilla.com/en-US/firefox/all-older.html
Or just simply update to the latest version: http://www.mozilla.com/en-US/firefox/new/References:
http://www.wired.com/threatlevel/2011/03/comodo-compromise/
http://support.microsoft.com/kb/2524375
-
Avoiding Phishing Scams That Look Like Facebook Notifications
Social network users need to pay close attention to links that come to you via a social network website. There are several Phishing scams circulating that will trick you into clicking on a misleading link in a message. Sometimes the link is just to show you something that they are trying to sell, or infect your machine with a malicious program such as a virus or trojan. By default facebook notifications come to the email account that you signed up with. For me this is not a big deal. I just used an inbox that I use for nothing but junk and rarely do I visit it, but there are several that will check an email account daily if not more and have “notifications” in the inbox that will be clicked on regularly. Below is an example email fake facebook notice. It looks genuine. I should know. My wife clicked on it before I could tell her that it wasn’t real 🙂
This email looks like it is from facebook. The return address has facebookmail.com in it just like all the other messages you receive from this website. So what do you do? The first thing you need to do is just hover your mouse over a few of the links (do NOT click on them) and see if they actually read the same in the hover as they read…
You can see from these examples that if you click on these links it will send you to a site that is anything but facebook. The domain: campus.2kool4u.net is where this goes. If you click on it the site will redirect to a site selling viagra. If you look at https://whois.domaintools.com/2kool4u.net you see that the 2kool4u.net domain hosts quite a few different sites. This looks a tad “phishy”. Try googling these keywords: 2kool4u.net scam and all you seem to find is junk and more junk.
Summary/Options:
- Do not click on links in an email
unless you are sure that it is a good link. - Turn off your notifications or just trash them and manually go to the social networking site and look at your updates.
- Turn off HTML email in your mail program if you can. There should be an option to view mail as “plain text”. This is inconvenient, but it removes the fake links from the message.
Note: Edited on 4/9/11 to change #1 and #2 in the summary. Simply do not click on links in an email. Explanation on this newer blog post.
Filed under: Computer Security, For-Facebook, Internet, Phishing, Social Networking
- Do not click on links in an email
-
Symantec BackupExec 12.5 RALUS on Ubuntu
Although backup exec 12.5 does not officially support Remote Agent installation on Ubuntu I have had success installing it on my Ubuntu Hardy servers. Just download the agents from Symantec File Connect and extract the contents. Then go to this folder: BEWS_12.5.2213_LINUX-UNIX-MAC-SAP_AGENTS/pkgs/Linux/VRTSralus/ Inside is a file called VRTSralus.tar.gz. Extract the contents of that and you will see a .DEB file that you can install on a debian based system (VRTSralus-12.5.2213-0.i386.deb).
Install that as root like so…
dpkg -i VRTSralus-12.5.2213-0.i386.deb
Once that is installed you will want to patch it. On the BackupExec server go to the Backup Exec installation directory and find this file in the patches folder(C:\Program Files\Symantec\Backup Exec\Agents\RALUS\Linux\). Copy VTRSralusPatch.tar.gz somewhere that you can extract it’s contents and edit the installraluspatch.sh file.
Look for this line (mine was on line 19).
if [ `cat /etc/issue | grep Debian | wc -l` = 1 ]Change that to this…
if [ `cat /etc/issue | grep Ubuntu | wc -l` = 1 ]…and run the installer.
-
Remotely Setting the Time on a Windows Machine
Use psexec.exe from an admin account on a remote system and send this command below. This can be from a Domain Admin account or if the machine you are logged onto has the same exact Admin account…
psexec \\MachineName w32tm /resyncPsExec v1.98 – Execute processes remotely
Copyright (C) 2001-2010 Mark Russinovich
Sysinternals – www.sysinternals.comSending resync command to local computer…
The command completed successfully.
w32tm exited on MachineName with error code 0.Then check time with…
net time \\MachineNameNote: You can specify a username to execute this command as, but the password will go over the wire in plain text.
References
http://technet.microsoft.com/en-us/library/cc773263%28WS.10%29.aspx
http://technet.microsoft.com/en-us/sysinternals/bb842062
http://technet.microsoft.com/en-us/sysinternals/bb897553
-
Apple 10.6.5 update Failure (Fix)-2
By crmanski
I have been pulling my hair out trying to get 10.6.5 to install on a particular macbook and kept getting this error with software udpate…
“An Installation error occurred.”
…and then I would have to reboot.or this one with the Full Combo update package…
“The Installer encountered an error that caused the installation to fail. Contact the software manufacturer for assistance.”The fix was to set the max file limit to 10000. This appears to have be adjusted by the Smart Board software that is installed on the laptop. This is all I had to run in the terminal…
sudo sysctl -w kern.maxfiles=10000
sudo sysctl -w kern.maxfilesperproc=10000The second one actually showed a schange from 2000 to 10000.
I re-ran the Combo Update and had no problems with the install.I gleaned this from reading a few thread on Apple Support and actually found the fix here…
http://discussions.apple.com/thread.jspa?threadID=2468522&tstart=0So, if you have “Smart” software installed and cannot install this update this might help.
Technology: