Category Archives: Security

Secret US Gov kill command for Cloud

The Daily Cloud reports on a controversial takedown action initiated by the US government related to reported IP abuse

After complying with a secret order from U.S. authorities, hosting provider BurstNet shut down Blogetery.com with no warning and no way to get the blog provider’s servers back up and running. According to Blogetery, BurstNet is under a gag order, so Blogetery has no way of knowing the specifics of the complaint, the basis for legal action, or even whether the order was legal.

On a blog forum, Blogetery further complained that BurstNet would not even specify which agency or government authority ordered the shutdown.

The secrecy of the action and response is what distinguishes it the most from in-house hosting takedown disputes.

Losing Poker Player Sentenced to Play Poker

Here is a strange story from ABC that says a man in New Mexico who has a gambling problem has been sentenced to…gamble. New Mexico man sentenced to playing poker in order to avoid prison

He allegedly owes more than $400,000.

Prosecutors say the deal is not a get out of jail free card.

McMaster’s sentencing will be delayed for six months while he participates in tournaments.

He must make payments of $7,500 a month.

If he misses two payments he will face immediate sentencing of up to 12 years in prison.

He stole from his clients to support his gambling habit before. One can only presume he now has even more motive to try extreme and illegal measures — take big gambles, if you will — to support the payment plan rather than go to jail.

Malicious Advertisements Steal $1 Million

When I worked for Yahoo! there often was discussion about the security filters and controls for an advertisement system (e.g. making ad banners safe for web pages).

Unfortunately this attack vector still poses a problem today. A CNet story explains how a Zeus Trojan steals $1 million from U.K. bank accounts

A computer user is compromised by either visiting a legitimate Web site that is secretly hosting the malware, or a site designed to host the malware, or a legitimate site hosting the malware in an advertisement. The primary attack came through malicious advertisements, including ads delivered by Yahoo’s Yieldmanager.com, the report said.

The malware redirects a Web surfer to an exploit kit, either the Eleonore Exploit Toolkit or the Phoenix Exploit Toolkit, that then exploits a vulnerability on the surfer’s computer and drops the Trojan on the machine. The Eleonore Exploit Toolkit includes exploits for vulnerabilities in Adobe Reader, Java, and Internet Explorer, among others.

Filtering code allowed into an advertisement is a solution that is tempting to pursue. Consider, however, that after decades of research there are still 4% detection rates (yes, 4%, as I wrote about a couple years ago) for some anti-virus software. An investment in “black list” filtering for code is expensive yet still may not end up with the necessary protection.

Thinking about the other extreme — “white list” filtering — brings a bigger issue into focus. Why are financial institutions are allowing third-party code, let alone advertisements, onto sites that manage bank accounts? Do banks need advertising dollars more than they need safe web sites? Perhaps someone missed the memo on secure code and the weaknesses in trust domains.

Anti-terror Ad Banned

I was trying to be funny with my post about custom anti-terror billboards, but it turns out it was not far from reality. The BBC reports of an Anti-terrorist hotline ad banned for being ‘offensive’

In the advert, a man says: “The man at the end of the street doesn’t talk to his neighbours much, because he likes to keep himself to himself.

“He pays with cash because he doesn’t have a bank card, and he keeps his curtains closed because his house is on a bus route.”

It then says: “If you suspect it, report it.”

Those criteria hardly seem worthy of reporting. Quiet, cash and curtains? I always thought terrorists preferred blinds.