Thursday, 26 June 2008
Asprox: app52.com, aspssl63.com, update34.com, appid37.com, asp707.com, westpacsecuresite.com
Another bunch of domains coming up in the latest batch of Asprox SQL Injection attacks: app52.com, aspssl63.com, update34.com, appid37.com, asp707.com, westpacsecuresite.com - check your logs for these.
Labels:
Asprox,
SQL Injection,
Viruses
Wednesday, 25 June 2008
Microsoft Security Advisory (954462) - Rise in SQL Injection Attacks Exploiting Unverified User Data Input
A timely advisory from Microsoft on SQL Injection attacks plus some tools to help secure your setup are available on KB954462 with more information here and ISC's commentary here.
Of particular interest is the free Scrawlr tool available from HP. That could be a useful way to see if your server is vulnerable before the bad guys find it,
Of particular interest is the free Scrawlr tool available from HP. That could be a useful way to see if your server is vulnerable before the bad guys find it,
Labels:
Microsoft,
SQL Injection
Monday, 23 June 2008
Motorola MOTOZINE ZN5
Former Moto fans such as myself have waited ages for a truly decent handset to come out from Motorola.
The Motorola ZINE ZN5 certainly has an impressive looking camera.. but the problem is that the rest of the phone is pretty unimpressive.
Motorola's woes have been well documented, but this certainly does look like Motorola's last chance. And it looks like the ZN5 is not really up to the task..
The Motorola ZINE ZN5 certainly has an impressive looking camera.. but the problem is that the rest of the phone is pretty unimpressive.
Motorola's woes have been well documented, but this certainly does look like Motorola's last chance. And it looks like the ZN5 is not really up to the task..
ISC: SQL Injection mitigation in ASP
If you're trying to secure your SQL server against the latest round of injection attacks, then check out this item from the Internet Storm Center, which gives some pointers on how to secure you database with ASP.
It probably makes much more sense to an SQL development than to me.. but the important point is that just cleaning up the injection attack is not enough - you also need to prevent it from happening again by securing your SQL server. And I'm afraid that probably involves spending some time and money..
It probably makes much more sense to an SQL development than to me.. but the important point is that just cleaning up the injection attack is not enough - you also need to prevent it from happening again by securing your SQL server. And I'm afraid that probably involves spending some time and money..
Labels:
SQL Injection
SQL Injection: bnradw.com
Another SQL Injection domain to block or watch out for in your logs - bnradw.com.
Other than that, the bad guys seem to have been quiet for a couple of days, however it does look like they've managed to exploit 3 million or so pages (according to Yahoo!) so it could just be that they are very busy.
Other than that, the bad guys seem to have been quiet for a couple of days, however it does look like they've managed to exploit 3 million or so pages (according to Yahoo!) so it could just be that they are very busy.
Labels:
SQL Injection,
Viruses
Friday, 20 June 2008
List of SQL Injection domains
My postings here about SQL injected domains are a bit ad-hoc, but Shadowserver also have a pretty up-to-date list if you're looking at blocking them.
Quite a lot of these domains are .cn (China). You might want to consider completely blocking access to .cn, but if you only have basic filtering then you might find yourself blocking things like www.cnn.com too (that took some diagnosing followed by a "d'oh!).
Quite a lot of these domains are .cn (China). You might want to consider completely blocking access to .cn, but if you only have basic filtering then you might find yourself blocking things like www.cnn.com too (that took some diagnosing followed by a "d'oh!).
Labels:
SQL Injection
SQL injection: pingadw.com, alzhead.com, pingbnr.com, coldwop.com, adwbnr.com, bnrcntrl.com, chinabnr.com
More SQL Injection domains, this time pingadw.com, alzhead.com, pingbnr.com, coldwop.com, adwbnr.com, bnrcntrl.com and chinabnr.com. Probably a good idea to check your logs and/or block access to these sites.
No change in the method of attack, and the cleanup of SQL servers is proceeding pretty slowly. It's clear that some sites are not going to be fixed any time soon, so if you see a site that hasn't been secured then perhaps a complaint to their web host might help.
No change in the method of attack, and the cleanup of SQL servers is proceeding pretty slowly. It's clear that some sites are not going to be fixed any time soon, so if you see a site that hasn't been secured then perhaps a complaint to their web host might help.
Labels:
SQL Injection,
Viruses
Thursday, 19 June 2008
msmvps.com, msinfluentials.com and Spyware Sucks offline
I'm a regular reader of Spyware Sucks and was surprised to see that it had been offline for a few days. It turns out that the server that runs the msmvps.com blogging service (used by main Microsoft specialists) got infected with this nasty.
The Google cache of the SBS Diva Blog throws up this information:
and
The Google cache of the SBS Diva Blog throws up this information:
In getting ready for the upgrade to CS 2008 I was trying to make some special backups... that wouldn't work. Well in digging into the matter more, that' service that is missing some files which is causing the peer to peer backups between Brianna and Yoda to fail.. isn't a real service at all.
http://www.sophos.com/security/analyses/viruses-and-spyware/w32rbotgos.html
We have backups so first thing tomorrow morning I'll be calling PSS Security to, more than anything else find out the "how" this happened.
Bottom line we got a critter on the box and I didn't (intentially anyway) put it there.
And to check to see if Yoda should be quarantened (aka web server turned off) to protect web visitors as well. So if the blog goes off the air a bit we're just doing it to better protect viewers.
and
Oh well.. it can happen to anyone.
In looking at the log files and event logs of Yoda, I'm not liking what I'm seeing... so the blog site at www.msmvps.com and www.msinfluentials.com will be offline starting at 7p.m. Pacific possibly until Friday.
Apologies for the inconvenience to all the bloggers on the site and we'll get back online as soon as we can.
Microsoft recommends that any systems found to be compromised or suspected of being compromised be formatted and re-installed from a known good build (i.e. operating system CD + all security patches while disconnected from the network). CERT has a good web site that provides information on recovering from security incidents located at: http://www.cert.org/nav/recovering.html
Labels:
Viruses
Wednesday, 18 June 2008
HTM Hell
One feature of these recent SQL Injection attacks is that the same sites will get repeatedly hit. So an infected site might have any number of malware-laded domains injected into the code. Click the image below to see a snippet from a really badly infected site.
The interesting thing about these attacks is that they are not very reliable. It's perfectly possible to visit an infected site and have the javascript fail to load because that particular node of the fast flux botnet is offline - but where there are several calls to several different domains, then the likelihood of infection is much greater. The upside is that any sharp-eyed user should notice something odd with these badly infected pages.
The interesting thing about these attacks is that they are not very reliable. It's perfectly possible to visit an infected site and have the javascript fail to load because that particular node of the fast flux botnet is offline - but where there are several calls to several different domains, then the likelihood of infection is much greater. The upside is that any sharp-eyed user should notice something odd with these badly infected pages.
Labels:
SQL Injection,
Viruses
chkadw.com
The latest domain in the SQL Injection attacks is chkadw.com (i.e. pointing to www.chkadw.com/b.js). Domain is registered to a (probably fake) Chinese contact through a Chinese registrar. Delivery mechanism and payload seem to be identical to the latest attacks.
Labels:
SQL Injection,
Viruses
Tuesday, 17 June 2008
Yet more SQL injection domains
Keep an eye out for datajto.com, dbdomaine.com, upgradead.com, clsiduser.com, clickbnr.com, bnrcntrl.com, domaincld.com, jetdbs.com, updatead.com, all pointing to b.js (e.g. www.dbdomaine.com/b.js) - all forming part of the latest SQL injection attack.
Registrar is VIVIDS MEDIA GMBH - let's see if they clean up their act.
If you're in tech support, check your outbound logs for connections to these domains. If you're an end user then I'd recommend Firefox with Noscript as a good way to protects youself.
Registrar is VIVIDS MEDIA GMBH - let's see if they clean up their act.
If you're in tech support, check your outbound logs for connections to these domains. If you're an end user then I'd recommend Firefox with Noscript as a good way to protects youself.
Labels:
SQL Injection,
Viruses
Friday, 13 June 2008
One to watch: js.users.51.la
What the heck is js.users.51.la? In fact, where the heck is .la anyway? And why am I asking?
As I've mentioned before, there are possibly two gangs carrying out the current round of SQL Injection attacks, one possibly based in China and one based in Russia. Their techniques are very similar, but the seem to have distinct differences.
js.users.51.la appears in many of the "Chinese" exploits - 51.la itself appears to be a legitimate web counter site. Presumably part of the bad guys' statistical tracking system the js.users.51.la domain is combined with what appears to be a randomly named .js file.
This doesn't appear to be a malware site in itself, but it could be a useful thing to look for in your proxy logs as it may well help track down machines that have visited infected sites. Either search for js.users.51.la or perhaps just 51.la as part of your normal audit process.
Where is .la? Officially it is Laos, but the TLD is also being punted as "Los Angeles" by www.la. No clue there, but the fact that all the signups for 51.la are in Chinese really does indicate that there's a Chinese connection here.
As I've mentioned before, there are possibly two gangs carrying out the current round of SQL Injection attacks, one possibly based in China and one based in Russia. Their techniques are very similar, but the seem to have distinct differences.
js.users.51.la appears in many of the "Chinese" exploits - 51.la itself appears to be a legitimate web counter site. Presumably part of the bad guys' statistical tracking system the js.users.51.la domain is combined with what appears to be a randomly named .js file.
This doesn't appear to be a malware site in itself, but it could be a useful thing to look for in your proxy logs as it may well help track down machines that have visited infected sites. Either search for js.users.51.la or perhaps just 51.la as part of your normal audit process.
Where is .la? Officially it is Laos, but the TLD is also being punted as "Los Angeles" by www.la. No clue there, but the fact that all the signups for 51.la are in Chinese really does indicate that there's a Chinese connection here.
Labels:
SQL Injection,
Viruses
advabnr.com and adsitelo.com
SQL injection time again, this time with two new domains advabnr.com and adsitelo.com both loading a script called b.js (i.e. advabnr.com/b.js and adsitelo.com/b.js)
This is turning up on sites that have already been infected with other SQL injection attacks. The good news is that the new attacks seem to be smaller, indicating that people really are managing to secure their web servers.
Some notable infected sites (many of these have been cleaned up).
adsitelo.com
advabnr.com
This is turning up on sites that have already been infected with other SQL injection attacks. The good news is that the new attacks seem to be smaller, indicating that people really are managing to secure their web servers.
Some notable infected sites (many of these have been cleaned up).
adsitelo.com
- bioimmune.com - BioImmune Inc (Health)
- immuquest.com - Health
- eyemdlink.com - Health
- tandberg.com - Tandberg (Electronics)
- techsol.com - Technology Solutions Company (ERP services)
- pollingcompany.com - The Polling Company (Market Research)
- spjc.edu - St Petersburg College
- judge.com - The Judge Group (jobs)
advabnr.com
- ibs.com - IBS, Inc (IT Services)
- outsourcingcentral.com - Business information
- mintek.com - Mintek Mobile Data Solutions
- engcen.com - Engineering jobs
- micronet.com - Digital storage
Labels:
SQL Injection,
Viruses
Thursday, 12 June 2008
bigadnet.com - lastest SQL injection domain
A continuation of the latest wave of SQL Injection attacks is bigadnet.com - many sites infected with "older" attacks have been "upgraded" to bigadnet.net. The inserted code to look for is www.bigadnet.com/b.js which then forwards to bigadnet.com/cgi-bin/index.cgi?ad - this in turn seems to be able to deliver a variety of malware.
bigadnet.com is running on a fast flux botnet, so it's highly distributed and resilient but not very reliable at actually delivering a payload.
bigadnet.com is running on a fast flux botnet, so it's highly distributed and resilient but not very reliable at actually delivering a payload.
Labels:
SQL Injection,
Viruses
Tuesday, 10 June 2008
UK Goverment sites hit by SQL Injection attacks
Do you trust the government with your personal data? A look at some recent national and local government sites that have been compromised with SQL injection attacks might make you think again.
Widen the search to sites containing .gov with a "b.js" exploit in (the most common), and you can see that government sites all over the world have been compromised, with Yahoo! estimating 11,000 infected pages. Think about it.. these should be trusted sites, but clearly they are not safe. Remember: there is no such thing as a trusted site anymore.
- fco.gov.uk - Foreign and Commonwealth Office
- dfes.gov.uk - Department for Children, Schools and Families
- harrow.gov.uk - Harrow Council
- cwic.cornwall.gov.uk - Cornwall County Council
- cityoflondon.gov.uk - City of London
- corpoflondon.gov.uk - City of London
- nottinghamcity.gov.uk - Nottingham City Council
- relocateleicester-shire.gov.uk - Leicetershire County Council
- gos.gov.uk - Government Office Network
- lda.gov.uk - London Development Agency
- uktradeinvest.gov.uk - UK Trade & Investment
- dcalni.gov.uk - Northern Ireland leisure and tourism
- colchester.gov.uk - Colchester Borough Council
- countryside.wales.gov.uk - Welsh assembly
- cefngwlad.cymru.gov.uk - Welsh assembly
- broadband.cymru.gov.uk - Welsh assembly
- wmra.gov.uk - West Midlands Regional Assembly
- wmlga.gov.uk - West Midlands Local Government Association
- wycombe.gov.uk - Wycombe District Council
- southshropshire.gov.uk - South Shropshire District Council
- businesslink.gov.uk - Business Development
- shetland.gov.uk - Shetland Council
- unlockingessex.essexcc.gov.uk - Essex County Council
- southshropshire.gov.uk - South Shropshire District Council
- e-petitions.kingston.gov.uk - Kingston Borough Council
- clevelandfire.gov.uk - Cleveland Fire & Rescue
- surreyheath.gov.uk - Surrey Heath Council
- rbkc.giv.uk - Royal Borough of Kensington and Chelsea
- conwy.gov.uk - Conwy County Council
Widen the search to sites containing .gov with a "b.js" exploit in (the most common), and you can see that government sites all over the world have been compromised, with Yahoo! estimating 11,000 infected pages. Think about it.. these should be trusted sites, but clearly they are not safe. Remember: there is no such thing as a trusted site anymore.
Labels:
SQL Injection,
Stupidity,
Viruses
SQL Injection: advertbnr.com, logid83.com, script46.com, rexec39.com
Another batch of domains being used in SQL Injection attacks: advertbnr.com, logid83.com, script46.com, rexec39.com. Sanitize your inputs.
It looks like a lot of recent domains have been suspended by their registrar, some of the recent domains are with Xin Net who have been spam-friendly in the past, but may be cleaning up their act.
Google indicates that around 668,000 web pages are infected, but a search at Yahoo! shows around 3,000,000 infected pages which is probably more accurate.
It looks like a lot of recent domains have been suspended by their registrar, some of the recent domains are with Xin Net who have been spam-friendly in the past, but may be cleaning up their act.
Google indicates that around 668,000 web pages are infected, but a search at Yahoo! shows around 3,000,000 infected pages which is probably more accurate.
Labels:
SQL Injection,
Viruses
Monday, 9 June 2008
Apple iPhone 3G
After lots and lots of rumours, the Apple iPhone 3G is finally here. It adds UMTS and HSDPA (3.5G), plus GPS and mapping. There's a new software platform, plus a number of other enhancements. But, really it's a bit disappointing.. the camera is still poor and you can't take out the battery.. and the 480 x 320 pixel display is so last year..
One surprising thing is that the iPhone will ship to 70 countries from July onwards. They've managed to do all that while keeping the iPhone 3G very quiet indeed.
Oh well, perhaps the iPhone 3 will finally be the one that fits in everything but the kitchen sink!
SQL Injection: sslnet72.com, encode72.com, bannerupd.com, err68.com, cookieadw.com
Another batch of domains showing up in SQL injected are sslnet72.com, encode72.com, bannerupd.com, err68.com, cookieadw.com.
Some notable compromised sites:
Some notable compromised sites:
- ise.ie - Irish Stock Exchange
- pittsfield-ma.org - City of Pittsfield
- corangamite.vic.gov.au - Corangamite Shire, Victoria
- fdc.org.br - Brazilian government agency
- dailyu.com - Local newspaper
- www.humanrightsfirst.org - Campaigning organisation
- therecruitbusiness.com - Recruiting
- corporate-responsibility.org - Business information
- childcarefinancialaid.org - Financial information
- micronet.com - Computer storage
- tairawhiti.ac.nz - Tairawhiti Polytechnic, New Zealand
Labels:
SQL Injection,
Viruses
"Company Littmann Stethoscopes Co.Ltd" bogus job, spoofing medisave.net
medisave.net is an "under construction" website belonging to the wholly legitimate Medisave UK Ltd, a supplier of medical equipment.
Unfortunately, there is a fake job offer being sent out in Medisave's name. One twist is that the "From:" address is jobs@medisave.net, but the reply to address is littmannstethoscopeshelpdesk@gmail.com. The spammers are taking advantage of the fake the the "reply to" address is often not clear until the user clicks "reply", otherwise they tend to see the fake "from" address (note, medisave.net is not compromised and is not sending out these emails).
The job offer is likely to be some sort of money mule/money laundering scam. Really there's no need to dig further. Of interest is the fact the the email address has been harvested from a UK retailer and this is a UK-targeted spam.
Unfortunately, there is a fake job offer being sent out in Medisave's name. One twist is that the "From:" address is jobs@medisave.net, but the reply to address is littmannstethoscopeshelpdesk@gmail.com. The spammers are taking advantage of the fake the the "reply to" address is often not clear until the user clicks "reply", otherwise they tend to see the fake "from" address (note, medisave.net is not compromised and is not sending out these emails).
The job offer is likely to be some sort of money mule/money laundering scam. Really there's no need to dig further. Of interest is the fact the the email address has been harvested from a UK retailer and this is a UK-targeted spam.
From: Company Littmann Stethoscopes Co.Ltd
Reply-To: littmannstethoscopeshelpdesk@gmail.com
Subject: Online Job Opportunity (Apply Now )
Would you like to earn £5,000 in a week?
Reply Back for more details
100% legal No upfront payment from you.
Risk Free
Amazon.com - reverse pump and dump or blackmail?
I received this unintelligible email from an IP address in Russia (213.221.29.19), probably relating to the recent mystery outage at Amazon.com.
Unfortunately for the bad guys, the email is completely incomprehensible. As spam, this one is definitely destined for the failboat.
Subject: Amazon.com In what a problem?What gives? My best guess is that someone is trying to either drive the share price down (perhaps they have a put option), or perhaps it is part of some blackmail plot relating to the amazon.com outage.
Date: Mon, June 9, 2008 7:14 am
Hello!
News agency Reuters informs about not to working capacity of a site amazon.com in
current of two weeks since June, 9th and corresponding it to falling of share price. Be close
at work with them.
Unfortunately for the bad guys, the email is completely incomprehensible. As spam, this one is definitely destined for the failboat.
Subscribe to:
Posts (Atom)