Tag Archive for malware

Sorry, Apple People, You’re Just Not That Popular

I know, you think I’m less than smart, but let me assure you, I have some idea what I’m talking about. I began as a wildly satisfied Apple ][+ user many decades ago. While others bought “inferior” computers that hit the market, from PET, Commodore, Atari and TRS-80…well, Atari was the bomb for gaming….I was forging ahead. I moved to the Mac line with a 512K, then an SE, a Mac II, then a IIcx. I learned how to make a computer work for humans because of Apple.

However, here’s the reality. Macs aren’t that popular. I support this by playing into the meme that Macs don’t get viruses, ergo, they are superior platforms. Nope, you have that wrong, but there is the genius of not only Apple, but the evangelized Apple faithful that have somehow missed the point of their lack of bad programmings disrupting their lives at the worst moment, as PC users have come to know and still not love.

Here’s the truth staring you in the face, Apple fanatics: You’re not popular with the people who create viruses, and therefore, you don’t get them. It’s not that your computer is in this uber operating system world, impenetrable by mere mortals out to steal credit card and bank account numbers. I know, in just about every single movie where the earth is saved from alines of environmental disaster, Apples are prominently displayed and used in the crucial scenes. I also know some of you believe that to be the real case.

What’s really up is this: The MacOS is built on top of UNIX, which is very secure, but the face that, depending on the link, the Apple market is about 10-12% and therefore, the effort to infect them is not worth the ROI, on one analysis point. Take the next step: How many Macs are used to manage and handle credit card databases, and large customer files? Pretty much none. Besides taking quite a bit of effort to learn the system inside and out, even if they could find ways in through security flaws, they would most likely find intellectual property, but not something they could make money on, like entire user profiles of banking/financial services, a key set of data for identity theft.

Consider, from a business owner’s view point: If you could set up to serve 87-90% of the market for the same effort to serve 10-13%, with the return per customer the same, which direction would you head? There will be a minnow out there (thank you, Scott Weber!) who gets this answer wrong and insists loudly they are correct, but you all know the right answer to remain viable in the market. That’s why you’re also not infected. Far more ROI in spending your energy developing and working the PC market and the associated Windows based server farms. Not to mention, Apple made a run at the server world and built a very cool piece of technology, but like Beta tape, the public went for the lesser versions in the PC based systems using LINUX and Windows.

That all being said, there are those, because the Apple market share is growing no doubt, who are taking up the challenge to infect the Apple Faithful. You’ve been spared due to not being attractive (I’m not talking the aesthetics of the device design, but the ugly fact that Apples aren’t used to conduct serious financial business). That’s my tough love for you. Some are coming after you and the good news is you can now enjoy virus and malware protection as we PC users do.

Now let me, after turning your meme upside down, drop it on (your) its head: If the MacOS doesn’t get viruses, as some smuggly post to Facebook, why, pray tell, would giant anti-virus companies have software on the market to provide anti-virus for the MacOS that doens’t get viruses? Oh, yeah, it would be a very silly and costly idea to serve a market that has no need, right? Software costs money and then, as any product has to return some what of a profit, or it will be dropped from the company offerings for failing to add to the bottom line.

Check this Dogpile search out: Looks like Symantec, ESET, Norton and Webroot, Avast, AVG just to name a few “small” companies trying to sell something “real” Mac users don’t need.

I’m hoping this dose of reality spurs the Apple faithful to break down and admit they have been a tool in the greater Mac propaganda machine, but then get online and download an appropriate software package to protect themselves. Speaking as a complete PC/Windows user for all my own (too) many computers, it’s a pain to get them, I have two layers of anti-malware/virus on all my systems, just to practice as much safe computing as possible. I encourage you Mac types to do the same. I see the helplessness in people’s eyes all the time, when they have contracted such an infection. Trust me, you don’t want to feel that way, let alone missing your working hours while I or your Mac tech (who should have already advised you to get software – if they haven’t, send them this link so they can be better providers for their customer base) conduct the technical exorcism rites.

If you need help in getting protected, contact me and let’s get you into the real world you actually live in.

Malware and Virus attacks get more “life-like”

I spent a few hours pulling a serious malware infection, actually a set of 8 different ones, off a client’s main system yesterday. He contracted the mess at 5:40 PM last Monday.

My contention os these attacks are getting more “life-like” is based on the manner in which he identified the moment of problems: He has a major customer and he ships mountains of product to them via UPS. On Monday afternoon (consider what else was going on in the Post-Christmas days and UPS), he received and email indicating an updated delivery status for his UPS shipment. His comment was it appeared to look very much like others he had received via the major customer, so he clicked on it. He said it didn’t have fancy graphics, but it certainly was a detailed looking email, not a one liner with a link.

It also reminds me of the 1-3 emails I get a day into one of my other blogging emails that obviously some scraper picked up off that site. They tend to be advertisements, but they are mixed in with emails that are my accounts at (fill in the banking institution) suspended, blocked, etc. Some of them actually are all dressed up with HTML graphics layouts, too. I stay away, but then I deal with this daily. For others, like my client, when one comes that makes sense to their work flow/life/personal business/social networking, there is a likelihood they will allow the malware in, and their firewalls may not stop it.

For the user: You have to be wary of things that look kinda true , but something still tells you it’s not kosher and look closer before clicking.

Be careful out there and practice safe computing!

For you techs, looking how to get rid of this:

Anyhow, it really embedded itself within his system, flagged as a Win32 password stealer by Microsoft Security Essentials. The good news, in early Tuesday, I convinced him to take the rest of the year off and reward himself for a great year, and I’d be over Thursday morning (since the malware would allow a network connection for a few moments, then cut it off, so a remote session was out of the question.

I used MalwareBytes, Microsoft Security Essentials, Kaspersky TDSS Root Killer and old school digging through the entire registry, after seeing the names in the user appdata roaming and local files under nonsense random lettering named .exe files and folders.

I called this one a “repeater,” as MSE would identify it, clean it, then it would fire itself back up about 30 seconds later. I would see 8 different start up program listings named BitNefender 2016, turn them off, and they would be back, activated in the next reboot. Interestingly enough, searching for that name in the registry never found anything, even after several tries.

It was the searching for the keys and values in the registry and manually deleting them) that, in combination of the MSE and MalWareBytes scans that finally got things working normally, including restoring a constant network connection.

“Flame” – a new virus, but it’s not after your credit card information

Quite often I’m asked why do people write viruses and malware. The bottom line: because it makes them money.

Today, there’s another reason. The recent news indicates a virus by the name of “Flame” is running amok in the Middle East, specifically Iran. From the New York Times – “Researchers Find Clues in Malware:’

Security experts have only begun examining the thousands of lines of code that make up Flame, an extensive, data-mining computer virus that has been designed to steal information from computers across the Middle East, but already digital clues point to its creators and capabilities.
[…]

There you have it. Governments are now in the business of writing PC based malware for the specific purpose to conduct espionage. Which government? We can all speculate, but most likely one’s threatened by the prospect of a nuclear arsenal being built by an unfriendly neighboring nation.

There have been two other reported viruses used to work inside the computers of other nations, but one, Stuxnet, wasn’t designed to go after computer users, but the systems used to run machinery, in that case centrifuges. Duqu, the other known one, was like Flame, to collect information and email it out, but not nearly as sophisticated as Flame.

And this quote is a keeper for the NYT article linked above:

“This is the third such virus we’ve seen in the past three years,” Vikram Thakur, a Symantec researcher, said in an interview Tuesday. “It’s larger than all of them. The question we should be asking now is: How many more such campaigns are going on that we don’t know about?”

It’s Flu Season….for computers, too!

I’ve mentioned it lately, but I’m keeping busy chasing smarter viruses. Now I’ve seen “repeaters,” meaning the anti-malware/virus software did it’s job, but something in the background was watching over the process and did the ET “Phone home” thing, and in one case, within seconds, the malware was coming right back up as being detected. End result? I took a long look at the history in Microsoft Security Essentials (MSE) and then went chasing the indications on the net. The thing that caught my eye was a infection/hijacking of an add-in to FireFox, the main browser they used.

Response: Control panel>Uninstall FireFox. Then I went to the (windows Vista settings) user/application data> local and roaming directories and deleted the FieFox folders completely. Then downloading and installing a new copy of FireFox solved the problem. That was three days ago, and I’ve not been called back for subsequent fixes.

I have been chasing the Windows XP Anti-Virus 2012 and Firewall malware for about a week now, in a home with three computers, that don’t share data, but the malware seems to get taken off, then shows up on one of the other (or both) computer(s). a day later. The computers are all being used for separate uses, so common websites/files aren’t a condition. Best guess I can come to right now is the Internet Explorer * is compromised on one of the systems, since we can scan with several products, block with firewalls, and at some point, it’s either hammering to get in with great rapidity, or it reappears on the screen. Today I had them shift that computer to FireFox as the default browser and it’s been quiet on the phone since this morning. Haven’t gotten an email or call, so I suspect that’s the case. In a few days, barring a reinfection, I’ll have to figure out how to uninstall IE 8 and put it back in again.

Between all of these, I can’t figure a common thread of how it’s happening, but the result is not so good for the users. I have a suspicion one of the flash game websites, frequented by one user may be injecting scripts, but that’s still just speculation right now.

Be careful out there! Make sure any links you click are really good ones…..that will be the topic of another full featured post soon: How to validate links.

My User is being directed into another users folder named TEMP

Malware, BadWare, ScareWare, RansomWare, just make you MadWare. I couldn’t get back far enough to find the cause, but the brief version began with a call well before business hours from a client…

I didn’t get to see all the problems, as he tired to fix it first, before deciding this was something different. The story goes like this: “I had a message on the screen to upgrade [not update] Avast.” He did as directed, and it said it had to reboot. When he came back to the login screen, all three users were presented and he clicked on his own icon. In he went, to a balck desktop, missing all but the public icons. When he started Outlook 2007, it took him to the new install, set up a new account wizard.

He ran a restore point, yet the results were the same. He left me a message.

I go there and began to look for the associated “hide all your icons” malware, but the user documents folder was empty…not even any hidden files, just like a new Windows 7 user would be. Found the Outlook .pst, and it was very small, but there with a new date. His desktop folder had none of his files/icons, so this left me wondering what was up. I pulled up the cmd line and what caught my eye was the initial directory was “C:\Users\TEMP>,” not one named for his user, as he signed in under.

From here, I wondered what was up, so I went to regedit and did a serach for “\users\temp.” I got the result I was looking for (in HKey_Users), but it was the surrounding registry entries that clued me to the fix required: The malware had taken the normal -1000 (first user) and had renamed in with a “.bak” extension, and then in the now existing -1000 user settings, it had used his login in name, but pointed his settings to the “\user\temp” folders, which now explained the absence of any of his files.

I went back to Windows Explorer and confirmed all his files were actually in the user folder bearing his name, and then, being a bit smarter on the problem, noted the temp user folders were, of course, like a brand new user.

The repair was simple at this point: Rename the offending -1000 user with a “.bad” extension on the entry, then removed the “.bak” from his real -1000 user entry. Of course, I first backed up the registry as it was, just in case I would find out this wasn’t the case, and then, with the changes in place, restarted the system and all was now back to normal.

Still can’t tell you the exact cause, but the symptoms were a solid black desktop, and empty files for My Documents/Pictures/etc, and Outlook wanted to create a new install for a new user. All it turned out to be was the infection had copied and renamed the proper user registry entry, and put iteslf in is the user, and, while using the the correct user name, it was sending the coputer to the new “TEMP user name, now new and empty folders.

The reboot after correcting the registry entries worked fine, and that was two weeks ago.

Isn’t it Ironic? Mac OS X Virus arrives

A sesimic shift in the PC word has just happened: A Mac OS X virus is here, coming in the form of a Java script off of social media.

The irony? as I was removing a virus off a “real” PC this morning, my client indicated they might buy a Mac, so they wouldn’t viruses. I began with a little business analogy: One day, it will happen. When? When the Macs in the market reach some magical %, the “bad guys” will then take the time to study the Mac OS in detail, to try and exploit it. I also went on to discuss how a business decision, when done right, always looks for the most impact, for the least expenditure of resources. And, as of that moment, it must haven’t arrived (little did I know)…yet. I potulated, that when it did, it would be like a very big tidal wave, particulalry accentuated by the fact that it’s “well known” Macs are invulnerable from attack. Yeah, right.

So any how, for you MacoPhiles…gird your loins, the attainment of 20% of the PC market by Macs announced by Steve Jobs a few days ago, has had an impact on your bulletproofness. Be on your toes, and hope the good guys have anti-virus software ready for you, really, really soon.

Here’s the warning from the articles at ARSTechnica:

A new trojan horse has cropped up that affects Mac OS X (and Windows as well), primarily disguised as a video flitting around social networking sites. When users click an infected link, a Java applet is launched that downloads multiple files, including an installer that runs automatically without users’ knowledge.

While between other appointments this after noon, I saw the article (linked above) and I knew the time has come.

Note, too, you Windows based PC users, you’re a casualty of this new attack, too.

Be on the look out for any video on the social media sites….all of you computer users.

I’ll bring this history, too, because there have been Mac based viruses before. In early 1988, I contracted the “Scores” virus on my Mac II from a download off of GEnie.

That was bad news. The good news is the PC market exploded on cheap Intel based PCs and the bad guys went after them. That has left the Mac world as the untouchables for all these years…until now.

LimeWire is Dead…

Thankfully. I know a lot of people liked it, as they could avoid, not only paying retail for music and movies, but not pay anything at all….until some of them had to call me, because their computers were so zapped by malware/spyware/scareware/ransomware from embedded “payloads.”

In one case it wasn’t pretty at all, with me spending three evening trying to save their family photos.

The “bad guys” figured out how to insert viruses and Trojans in the “free” files, on that peer-to-peer sharing network. Not all of them, but it certainly was a crap shoot when you tried to pick a torrent to pull down for your entertainment.

Anyhow, the full report from TechCrunch is here.

We Infect Our Computers Ourselves

Didn’t bookmark it, but a few weeks back, I saw an article that said greater than 50% of computer infections were no user imposed.

What does that mean exactly? It means the people who write and manage software are doing a pretty good job of staying ahead of the hacker crowd, but,we the users, are become our own worst enemies. Not that we purposely let spyware, malware and viruses in, but we are more easily fooled into doing just that.

The “bad guys” are becoming very good at replicating things that are legitmate, both in look and in a social context, that make us want to click it.

Next hing you know, you’ve got a “ScareWare” problem, which, if you don’t pay the ransom, it begins to dig about your files and, over time, render your PC useless.

What got me to post this? An article in a security news feed I track saying there are a crop of “Browser Updates” showing up on people’s screen, and, we do what we are told “KEEP YOUR COMPUTER UP TO DATE!”

That makes it increasingly difficult to sort the fake updates from the real ones.

Let’s be careful out there and, according to Symantec researcher Parveen Vashishtha know this:

Malware authors are employing innovative social engineering tricks to fool users — it’s as simple as that…”

They show up at the most vulnerable spots…

The “bad guys” on the Internet have long had a habit of finding the biggest security holes with the greatest potential impact. That’s one reason why the Apple computer line has remained effectively virus free (I caught at least one in the early Mac days (Scores), so don’t tell me there never has been any Mac viruses).

Over the years, operating systems have been “hardened”, so the bad guys have become creative and looked towards other avenues, to the point that Mike Cox in an article “Social media attacks dominate first half of 2010 malware trends” on eChannelLive tells us what is now going as as the biggest impact by the bad guys:

“Cyber criminals are putting increasing emphasis on using social media platforms like Facebook and Twitter as effective ‘spread mechanisms’ for malicious software,” said Arvid Gomez, Norman vice president, OEM and Technology. “In the past, they put nearly all of their efforts into compromising PC operating systems. As social media use becomes part of the fabric of our daily life, Internet users need to make certain they are taking the necessary steps to protect their privacy and security.”

He then goes on the discuss the koobface malware that has come through FaceBook since 2007. I encountered this at a client’s site about 4 months ago.

Another method to not only frustrate you, but also get some money, or your credit card number for use in, in the least case fraud, and the worst case, identity theft, are the “scareware” or “rasomware” programs that take over your system and basically demand that you buy their removal tools, which…are pretty much garbage anyhow. Mike has this comment:

Norman security experts also note that fake antivirus programs continued to plague many home PC and business users. Rogue antimalware programs have been around for a long time. In recent years however, they have become increasingly widespread, and represent a major problem. These programs can be difficult to eradicate, as they often consist of many different malicious elements.

I spent a better part of Wednesday ripping one of these attacks out of a laptop of a client’s office machine. I’ll say this: About 6 months ago, I could find these and get around them and eliminate them in about an hour. That was thanks to having seen several in a short time frame. They all had different file names, and loaded themselves from different places on the drive, but they all used the same methods. The one I ran into Wednesday had grown far smarter. I found it pretty quickly, but it had done many things to mask itself, and had placed some more hooks in the registry than I was used to deleting. Additional, I found a browser web director trojan in there, too. It may have arrived as a package deal, but it took 6 hours to find it, delete the offending things, much of the time was spent running scans, which found more things with each delete/reboot/scan cycle. It’s gone now and they are back to work, without having to just wipe the drive and begin all over, but it was a long day, when some elements have become smart enough to even force a load, regardless of some settings you applied to keep them from coming in a boot up.

I know many people don’t want to learn about the specifics of keeping your computers free of malware and other bad things, but your choice, as I see it, is to commit to some training by your local computer support person/people/staff/support company, or you can call us up and pay by the hour to undo what was maybe a 5 second decision on what to do about the question: “XXX is requesting to run. Do you want to block or allow it?” from your firewall protection. Because of the bad guys, you must get some education in how to keep from your system from becoming unavailable for a few hours (at best) to days (worst case).

Good rule of thumb: You can unblock accidentally prohibited functions. You will lose time and money if you let something in out of “I don’t have time to deal with this, I just want to get back to work!” frustration.

Read Mike’s article and practice intelligent computing!

Zombie “botnet” Network Busted!

SIERRA MADRE, CA - MAY 29:  Seventieth anniver...
Image by Getty Images via Daylife

Back in November, I talked about “zombie computers,” those which had been infected to do the bidding of a master computer, usually to SPAM others. The discussion was about how that type of infection was a usual suspect in a “slow computer.”

Some good news was found in my reading this morning: A Spanish man, who controlled a huge zombie network, has been busted. From the UK Register:

As previously reported, the Mariposa botnet was principally geared towards stealing online login credentials for banks, email services and the like from compromised Windows PCs. The malware infected an estimated 12.7 million computers in more than 190 countries.

The botnet was shut down on 23 December 2009 following months of collaboration between security firms Panda Security and Defence Intelligence in co-operation with the FBI and Spain‘s Guardia Civil.

One down, more to go, but good news to know many organizations are working hard in the background to make the net safer and free of such threats.

Reblog this post [with Zemanta]