Most Recent News from the Lab
 

Thursday, February 28, 2013

 
RSA Conference: Ransomware + Mitigating Botnets Posted by Sean @ 12:49 GMT

RSA Conference USA 2013 is taking place this week.

On Wednesday, our Antti Tikkanen and Paolo Palumbo gave a talk called: Ransomware Attacks!

RSA HTA-W23, Ransomware Attacks!
Slides available here. [PDF]

Here's a view of the ZeroAccess botnet:

ZeroAccess

The screenshot was taken from a KML file that maps over 200 thousand unique bots (which is just fraction of ZA).

And that brings us to Mikko's RSA talk: New Ways of Mitigating Botnets

RSA BR-R33, New Ways of Mitigating Botnets
Slides available soon.

Here's Mikko fighting some "bots" in preparation for his talk:

Mikko playing Space Invaders







 
 

 
 
Trademark Python™?? Posted by SecResponse @ 11:26 GMT

It seems the Python Software Foundation needs some help with a company in the UK that is trying to trademark the word "Python" for "software, servers, services… pretty much anything having to do with a computer".

So here, for the record, is our statement.

F-Secure Labs hearts Python

We at F-Secure use Python extensively in our organization, mainly on the back end and for internal tooling, but it's ubiquitous in our R&D work, and we encourage all our developers to embrace Python (in the fairly unlikely event that they are not already enthusiastic about it). To the best of our knowledge, our company is representative of the technology industry in Europe in general in this respect; apart from very specialized niche companies, everybody is using Python, and it would seem preposterous outrageous insane unfair to grant this trademark to anybody except the legitimate holder of the intellectual property rights for the Python programming language.

Best Regards,
NftL

 
 

 
 
Wednesday, February 27, 2013

 
Things That Make You Go Hmmm… About Apple "Security" Posted by Sean @ 13:22 GMT

Dear Tim Cook,

Have you searched for the term "antivirus" lately? — I'm guessing not.

Here's what Google Instant is currently offering up:

google.com, antivirus

Hmm, "antivirus for mac" — very interesting.

You know, maybe it's time for Apple to adjust its "security culture"?

Let's do some more searches. Here's what you'll get from apple.com when you search for "security updates":

apple.com Search Results

Marketing material. Typical. Oh, support info is on the right-hand side. Alright, fair enough then, security is a support issue.

Here's what you'll get from apple.com/support/ when you search for "security updates":

apple.com/support/ Apple Support Search Results

The top result is from December of last year, and there are even older results below. But there does seem to be a mention of security updates inside the text. Opening the article finally links you to an index: Apple security updates.

The index shouldn't be so difficult to find. And it's kind of sad it needs to be in quotes to actually show up in the search results.

Apple Security Updates

So let's take a look at the most recent security update article:

About the security content of Java for OS X 2013-001 and Mac OS X v10.6 Update 13

At the very bottom of the page, there's a section about Malware removal:

Malware removal

This is the definition of the word "summary" as provided by Google:

google, summary definition

Not for nothing, but don't you think its kind of lame that "malware removal" isn't mentioned in the summary?

Now let's search for something else.

Here's something you'll find if you search apple.com/support/ for "antivirus":

Avoid harmful software

Avoid harmful software? Gee, great tip. If this was 2009.

These apps, called

Internet downloads and email enclosures?

To be very frank, this advice was already behind the times when it was written in July 2012:

Last Modified: Jul 31, 2012

You just might want to get somebody to update that article with a mention of "exploits" and "drive-by attacks" and "watering holes" and… oh, you know, relevant stuff.

Look, here's the thing. Eleven years ago, Internet worms smacked around Windows so much — it ended up being a real wake up call. At which point, Microsoft made a big, and successful, effort to change its security culture.

But Apple?

Here's your corporate line:

"For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available."

Here's the problem.

Apple not only refuses to confirm issues "until" patches are available — it doesn't even discuss them after the fact.

And why is that a problem?

Because we don't live in an era of Internet worms anymore. This is an era of Internet hacks! And information is valuable in that it allows for organizations with a large Mac user base to make informed threat assessments.

And the more Apple shares with the community, the better off everybody will be.

So please, consider making a change in Apple's culture of secrecy and denial.

You have talented, and friendly, security response analysts working for you. Why not highlight their efforts? Consider putting them front and center and applaud them for their good work. Own this problem, get in front of it.

Because it's the right thing to do.

Regards,
Sean Sullivan
Security Advisor, F-Secure Labs

 
 

 
 
Tuesday, February 26, 2013

 
Poika Visits Malaysia Posted by Sean @ 13:05 GMT

Looks like our poika (AV-TEST's award for Best Protection 2012) decided to visit Malaysia.

Seen here with members of our Kuala Lumpur team:

Our poika visits Kuala Lumpur

That's a very cool view…

 
 

 
 
Monday, February 25, 2013

 
The Lowest Hanging Fruit: Java Posted by Sean @ 17:00 GMT

By all measures, Java is the current title holder for the lowest hanging fruit in computer security. (And by Java, we mean JRE and its various browser plugins.) It wasn't always so. How did it happen? Let's review some highlights in the history of low hanging fruit.

From 2004 to 2008: Attacks shifted from Windows to Office.

2004, August — Windows XP Service Pack 2 was released.

2005, February — At RSA Conference, Microsoft announced the first beta of Microsoft Update.

2005, June — The initial release of Microsoft Update.

Result: Over time, fewer Microsoft Office vulnerabilities in the wild as Microsoft Update replaced Windows Update.

From 2008 to 2010: Attacks increasingly focused on Adobe.

2009, February — "Adobe Reader has become the new IE"

From my point of view, Adobe Reader has become the new IE. For security reasons, avoid it if you can.

2009, March — Adobe started a quarterly update schedule, available on "Patch Tuesday".

  •  ASSET Blog: Adobe Reader and Acrobat Security Initiative

2009, April — Oracle buys Sun, became owner of Java.

2010, March — PDF Based Targeted Attacks are Increasing

Targeted Attacks

  •  Computerworld: Hackers love to exploit PDF bugs, says researcher

Adobe wasn't surprised by the data. "Given the relative ubiquity and cross-platform reach of many of our products, Adobe has attracted — and will likely continue to attract — increasing attention from attackers."

Given the relative ubiquity and cross-platform reach of many of our products…

2010, July — Adobe Joins Microsoft's MAPP Program.

  •  ASSET Blog: Working Together: Adobe Vulnerability Info Sharing via Microsoft Active Protections Program (MAPP)

Result: Adobe became a team player… and has the results to show for it.

From 2010 to 2013: Java claims the title lowest hanging fruit (on multiple OS).

2012, April — Adobe ends "quarterly updates", responds monthly, as needed, still aligned with Microsoft's update schedule.

  •  ASSET Blog: Background on Security Bulletin APSB12-08

2012, August — Java Runtime Environment = Perpetual Vulnerability Machine

2013, January — ZDNet reporter, Ed Bott, declared Java the new king of foistware.

  •  ZDNet: A close look at how Oracle installs deceptive software with Java updates

2013, February — Numerous companies admit to security breaches due Java.

  •  The Verge: After so many hacks, why won't Java just go away?

Result: Java's browser plugin is deemed public enemy number one.

But wait, is disabling Java's browser plugins enough?

2011, March — Spotify Free users attacked via malicious ads. At least one attack used a Java exploit.

  •  SC Magazine: Spotify in malvertising scare

Seems it isn't just "browsers" that can trigger Java.

From 2013 to 201X: Oracle either evolves or JRE becomes increasingly irrelevant.

Oracle releases its critical patch updates on the Tuesday closest to the 17th day of January, April, July and October. By releasing such updates on a day other (and later) than "Patch Tuesday", Oracle currently forces IT departments to schedule an additional patch maintenance assessment and testing meeting.

Something really ought to change.

 
 

 
 
Saturday, February 23, 2013

 
Another Friday Night Disclosure: Microsoft Posted by Sean @ 06:47 GMT

In this week's episode of Friday Night Disclosures: Microsoft.

General Manager of Trustworthy Computing Security, Matt Thomlinson, provided details in a post on the MSRCTeam's blog:

MSRCTeam, Recent Cyberattacks

For those of you catching up on previous episodes of FND, see also:

Timeline: Hacks Related to Apple
Our Mac Antivirus Blocks Java Exploits (Our Windows AV, too.)

P.S. Kudos to Microsoft for publishing its disclosure notification on the Web (unlike Apple).

 
 

 
 
Friday, February 22, 2013

 
Our Mac Antivirus Blocks Java Exploits Posted by Sean @ 10:35 GMT

Yesterday, two of our analysts, Brod and Timo, tested a Facebook/Apple hack related Java exploit with our Anti-Virus for Mac.

And the result?

Our Mac AV blocked the exploit with a generic detection (created Nov. 19th 2012) called: Exploit:Java/Majava.B.

2013-02-21 Exploit:Java/Majava.B

Nice!

So, how is the sample related? On February 15th, Mac malware samples were shared via a "Mac malware" mailing list. In the follow up discussion, two file hashes were shared, one of which is available via VirusTotal. And that sample turned out to be a Java exploit that drops a Windows backdoor. Brod analyzed the backdoor (detected as Trojan.Generic.8282738) and discovered that it attempts to connect to digitalinsight-ltd.com, one of the sinkholed C&Cs related to Friday's Mac malware.

Our generic detection, Exploit:Java/Majava.B, is used by our cross-platform antivirus scanning engine, so our Windows customers are protected, too. Our thanks to the analyst who shared the file hash (she knows who she is).

 
 

 
 
Thursday, February 21, 2013

 
Chinese Hackers Posted by Sean @ 15:01 GMT

All you probably need to know about Mandiant's Chinese hacker report:


Chinese military hacker unit behind US attacks

Well, that, and that not everything in Mandiant's report about Chinese hackers can be verified.

Marketplace's Shanghai-based China correspondent, Rob Schmitz, called a phone number supposedly belonging to a hacker (from a Mandiant video) and reached a 69 year old farmer instead.



Edited to add: there are malicious versions of Mandiant's report being used in spear phishing attacks. Don't open any attachments claiming to be "APT1: Exposing One of China's Cyber Espionage Units", here's the direct source: intelreport.mandiant.com.