Threatblogger Footsloggers Review 2012

Threatblogger Footsloggers Review 2012

December 2012 Feature Article: ThreatBlogger FootSloggers Review 2012 Table of Contents ThreatBlogger FootSloggers Review 2012 ..................................................................................................................3 ESET Papers and Articles in 2012............................................................................................................................. 10 The Top Ten Threats of 2012 ................................................................................................................................... 12 Top Ten Threats at a Glance (graph) ....................................................................................................................... 15 About ESET .............................................................................................................................................................. 16 Additional resources ................................................................................................................................................ 16 ThreatBlogger FootSloggers Of course, other social media were targeted too, as Stephen Review 2012 pointed out in Tricky Twitter DM hack seeks your credentials, malware infection, and more. David Harley, ESET Senior Research Fellow In fact, scams were a very prominent feature of the January 2012 on the ThreatBlog was far too busy to do justice to in a threatscape: the first blog of the year, with some input from fairly short article: inevitably, I’ll have to leave out some ESET Ireland’s Urban Schrott, looked at a 419 scam that the articles. Nevertheless the following summary should at least scammer took the trouble to translate into Irish Gaelic, though I give you an idea of how the year looked to the blogging team. can’t vouch for the quality of the translation: Irish 419-er seeks Spanish Lady. There was an echo much later in the year when January began with a flurry of Facebook-related activity, the Irish Times reported the discovery of ‘the first Irish virus’, though it covered a wide range of related topics. though it was actually ransomware rather than a real (self- replicative) virus, with the message translated into Irish: Irish Stephen Cobb wrote about the many scams that preyed on the Ransomware Report. Somewhat amusingly, Kafeine also drew popular dislike and distrust of Facebook’s imminent Timeline my attention to a scam message targeting Ireland but feature: Facebook's timeline to fraud-a-geddon? In Facebook, translated into Iranian rather than Irish. Some your birthday #1, and survey scams I looked at Facebook miscommunication there... Ransomware Part III: another drop memes like ‘the song that was #1 when I was born’ – in my case of the Irish. And Aryeh Goretsky warned us to Beware of SOPA it was a snappy little number called Sumer is icumen in, I think. Scams and ZeuS-related malware, rather bizarrely, passed itself off as a phishing message alert from US-CERT and the Anti- The Facebook watch site Facecrooks flagged a scam based on a Phishing Working Group (Phishing and Taxes: a dead CERT?). fake app that claimed to tell you how much time you’d wasted Sebastian Bortnik flagged the way that Malware exploits death – sorry, spent – on Facebook, which reminded one of our of North Korea's Kim Jong-il. readers of the persistent ‘see who visits your profile’ scam. (Such an app isn’t possible.) I wrote about it in Facebook scam: Passwords and passwording has been a pretty constant topic of the hours I spend... interest this year, too. In Passwords, passphrases, and big numbers: first the good news... I flagged an interesting paper In Facebook Fakebook: New Trends in Carberp Activity, by Cormac Herley and Paul van Oorschot and linked to a Aleksander Matrosov described some changes in the Carberp number of resources from ESET and elsewhere that might be of Trojan, including its gambit for extorting money from Facebook use and interest (so I’m including them here). users by displaying a fake Facebook page when they tried to log into FB. The page claims that “Your Facebook account is Keeping Secrets: Good Password Practice temporary locked!” and instructs the victim to pay 20 Euros by Ukash voucher. Passwords, passphrases and past caring No chocolates for my passwords please! Cameron looked in CarrierIQ-style data gathering law to require mandatory notification/opt-in? at a bill requiring mandatory Choosing Your Password consumer consent prior to allowing the collection or transfer of data on smartphones: he also looked at Google’s attempts to Passphrases A Viable Alternative To Passwords? beat back the rising tide of Android malware in Google responds to Android app Market security with stronger scanning measures, and at social media’s commoditization of A Research Agenda Acknowledging the Persistence of its customer in Facebook/app data privacy - sharing gone wild, Passwords and finished the month with a searching examination of the BYOD trend. Hearing a PIN drop Inevitably, the run-up to Valentine’s Day saw lots of malicious And as Cameron Camp described in Zappos.com breach - activity, and Stephen addressed the problem comprehensively lessons learned, Zappos.com experienced one of the first major in Cookie-stuffing click-jackers rip off Victoria's Secret customer authentication breaches of the year but reacted Valentine's giftcard seekers. I got the opportunity to talk to promptly and efficiently. Cameron also had some good advice senior police officers in the UK about those PC support scams for those of us who were enjoying new toys of the tablet that I’ve been banging on about since before Columbus sailed persuasion: New Year’s resolutions for securing your new the blue: Cybercrime and Punishment, and also Cybercrime, tablet. Peter Stancik asked us if it was Time to check your DNS Cyberpolicing, and the Public. I also looked at some data from a settings? and offered advice on how to tell if your system had survey conducted by Amárach Research on behalf of ESET been infected by DNSChanger malware in advance of the Ireland, as blogged by Urban Schrott: Your Children and Online constantly shifting deadline for the shutting down of the Safety, ESET North America CEO Andrew Lee returned to the servers that were keeping the owners of infected machines topic of intellectual property, piracy and legislation: ACTA and online after the botnet was taken down. TPP: The wrong approach to intellectual property protection. Aryeh Goretsky took a long hard look at Windows Phone 8: We translated and published an English version of ESET Latin Security Heaven or Hell? America’s predictions for 2012 – New White Paper "Trends for 2012: Malware Goes Mobile" – and Aryeh updated his paper on On the technical analysis front, Aleksandr Matrosov and Eugene Possibly Unwanted Applications: Potentially Unwanted Rodionov shared some more research with us on Olmarik/TDL4: Applications White Paper Updated. TDL4 reloaded: Purple Haze all in my brain. And Righard Zwienenberg, fresh to ESET but with many, many years in the In February, I came back to Facebook memes that might not be security industry already, looked at Password management for as harmless as they seem in an article for Virus Bulletin: Living non-obvious accounts. the Meme, while in How to improve Facebook account protection with Login Approvals Stephen complimented Cameron kicked us off in March with a series of reports from Facebook on a security measure while clarifying its use. the huge RSA conference in San Francisco, and Stephen followed up in Information Security Disconnect: RSA, USB, AV, Joncas delved into the murky world of Mac malware: and reality. Several security gurus at RSA who should really OSX/Imuler updated: still a threat on Mac OS X, and have known better told Wired that they don’t use antivirus and OSX/Lamadai.A: The Mac Payload. strongly implied that no-one else should either: I responded to that in Security professionals DO use anti-virus. Stephen made In April the questions of quasi-testing and the usefulness (or available the excellent Malware Inc. presentation that he made not) of anti-virus came up again. I finally posted a paper on the at RSA – Changing how people see the malware threat: images topic with Julio Canto of VirusTotal and engaged in a debate of can make a difference – and offered an infographic exploring all sorts in SC Magazine: VirusTotal, Useful Engines, and Useful AV, the data Google could, potentially exploit: Google's data mining and, along with Andrew Lee, tried to introduce a note of sanity bonanza and your privacy: an infographic. He also considered into the ‘AV isn’t worth paying for’ debate: Free Anti-virus: the issues around employers requiring access to employee Worth Every Penny? So that’s sorted that question? Facebook accounts and the spring crop of IRS-related scams: Unfortunately not: in December (see below) the same fallacies Facebook logins toxic for employers, violate security and came up all over again. privacy principles and Spring Brings Tax-related Scams, Spams, Phish, Malware, and the IRS. Aleksandr looked at a hot-off-the-press exploit kit technique: Exploit Kit plays with smart redirection (amended), and in On the more technical front, Righard shared a few surprises Phishing Using HTML and Intranet Security Settings Righard dug with us after he installed Skype onto a new laptop: SKYPE: deep into a rather novel approach to phishing – Phishing Using (S)ecurely (K)eep (Y)our (P)ersonal (E)-communications, HTML and Intranet Security Settings – and gave some good

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    16 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us