Malicious Advertisements Steal $1 Million

When I worked for Yahoo! there often was discussion about the security filters and controls for an advertisement system (e.g. making ad banners safe for web pages).

Unfortunately this attack vector still poses a problem today. A CNet story explains how a Zeus Trojan steals $1 million from U.K. bank accounts

A computer user is compromised by either visiting a legitimate Web site that is secretly hosting the malware, or a site designed to host the malware, or a legitimate site hosting the malware in an advertisement. The primary attack came through malicious advertisements, including ads delivered by Yahoo’s Yieldmanager.com, the report said.

The malware redirects a Web surfer to an exploit kit, either the Eleonore Exploit Toolkit or the Phoenix Exploit Toolkit, that then exploits a vulnerability on the surfer’s computer and drops the Trojan on the machine. The Eleonore Exploit Toolkit includes exploits for vulnerabilities in Adobe Reader, Java, and Internet Explorer, among others.

Filtering code allowed into an advertisement is a solution that is tempting to pursue. Consider, however, that after decades of research there are still 4% detection rates (yes, 4%, as I wrote about a couple years ago) for some anti-virus software. An investment in “black list” filtering for code is expensive yet still may not end up with the necessary protection.

Thinking about the other extreme — “white list” filtering — brings a bigger issue into focus. Why are financial institutions are allowing third-party code, let alone advertisements, onto sites that manage bank accounts? Do banks need advertising dollars more than they need safe web sites? Perhaps someone missed the memo on secure code and the weaknesses in trust domains.

Anti-terror Ad Banned

I was trying to be funny with my post about custom anti-terror billboards, but it turns out it was not far from reality. The BBC reports of an Anti-terrorist hotline ad banned for being ‘offensive’

In the advert, a man says: “The man at the end of the street doesn’t talk to his neighbours much, because he likes to keep himself to himself.

“He pays with cash because he doesn’t have a bank card, and he keeps his curtains closed because his house is on a bus route.”

It then says: “If you suspect it, report it.”

Those criteria hardly seem worthy of reporting. Quiet, cash and curtains? I always thought terrorists preferred blinds.

VMware cloud praise from Forrester

Forrester has an absolutely glowing blog post about VMware’s new cloud offering.

VMWare drives another nail into the coffin of on-premises business email. At $5/mailbox/month for cloud email, f you take away client software and mailbox administration costs, our analysis shows that it costs twice as much to host a mailbox yourself than to host it in the cloud. This offering gives service providers around the world the opportunity to compete at that price. So who would use on-premises email? Only someone with stringent requirements, massive scale, or a recent upgrade. Even the federal government is moving to cloud-based email as GSA has announced.

Who would use on-premises? I am surprised no mention is made of compliance or security. Perhaps that is what is meant by “stringent requirements”? Privacy is one of the main reasons to keep email in-house. The cloud providers, even with a VMware solution such as this, need to clarify procedure and technology options to show they can give privacy equivalent to in-house email. I do not see encryption and subpoena response, for example, as stringent but rather baseline requirements.

Google 100% CAPTCHA fail

Last May I posted a concern about the 50% failure of CAPTCHA. Only one of the two words were actually checked to validate a user as human so entering random data worked half the time.

A few days ago a full disclosure post announced a 100% CAPTCHA failure.

Google’s reCAPTCHA is currently broken. At the moment, you may follow these
steps to complete a CAPTCHA without user-input:

1) Click the “Play Sound” button
(javascript:Recaptcha.switch_type(‘audio’);)
2) Enter any sentence comprising of 10 words (“google google google google
google google google google google google”, as an example).
3) “Answer Correct!”

http://www.google.com/recaptcha/learnmore