Help Support my Blog!

Virgin Mobile USA
Glasses USA
Amazon
Newegg
VPN4ALL
Netflix
Hulu
CafePress

 

Subscribe to Paul’s Tech Talk Affiliate Marketing Blog

Subscribe to Paul’s Tech Talk Science Fiction Blog

Subscribe to Paul’s Tech Talk Scams Blog

  • Acer 11.6
    Acer 11.6" Laptop 2GB 16GB | C710-2856
    Acer

    Currently  in process review this Acer Chrome book and boy is it nice!

Navigation
Sponsors

Entries in Fake Codecs (4)

Thursday
Aug272009

Malware Domain List for Aug 28, 2009

personalantivirus2


[ad#Google 486x60]


This is going to be a small list like [intlink id="4325" type="post"]yesterday which was small also[/intlink] but if there is more you know I will post it.


[intlink id="3607" type="post"]Personal Antivirus Scareware Sites[/intlink]:

  • antivirus-online-scan5.com

  • remove-pc-spyware.com


[intlink id="4217" type="post"]Internet Antivirus Pro Scareware[/intlink] sites:

  • prarie.info


[intlink id="3977" type="post"]Rogue Antivirus scareware sites[/intlink]:


  • savedefense.com

  • mitrodermo.com

  • seritrupik.com

  • great-pcprotect.com (fake scanner page)

  • scan.howtosecurepcs.com (Fake scanner page)

  • dl.howtosecurepcs.com (Fake Spyguard)

  • a2tv.org (Fake Codec, installs fake AV)


[ad#Scarewaresitesrecommend]


[rating:4/5]


[ad#Scarewaresitesrecommend1]


[ad#SUPERAntiSpyware]

Wednesday
Jul222009

Computer Security : How you get infected with Malware?

I have had several people how they get infected in the past few weeks and I have scoured the internet to try to come up with some answers.   There are several ways to get infected and we will discuss them all here.   In case someone wants to get a better idea on how to avoid these commons ways of infections

What is an Exploit?


This by nature is the first thing we need to discuss because exploits are most common with Malware due to the fact that they like to use them to gain control over an Application or computer.
An Exploit is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.

[Via Wikipedia]

Now it can come from several vectors that I know of and it doesn't just have to be one but has to have several different programs running to happen.   You see malware authors like to write code to crash your system in a way.   Just like a Remote Code Execution, when they run the code it does something to the computer to make it install software without the users knowledge or permission.  When Remote Code execution happens it is most commonly used to take control over a computer process where the program is located in memory or on the hard drive.

Opening a PDF


As you explore the internet you may come across sites with PDF's that are there to hide there true nature.   Just like the H1N1 Virus that is epidemic in the US,  Malware authors are using PDF to run a number of possible exploits on people computer.  There are a number of exploits that can be used in PDF and even examples for those who want to understand it even more.   It however means you should turn off auto-load PDFs in your browser.  Any browser will auto load PDFS without having to open a new session it will load in your browser without as much of a warning.

Fake files name


I don't know what else to call this but you get an email with what looks like it is a picture but that isn't always true.   For example you would get a email from a friend and it says it is a document and may look like documentname.doc.exe  which will also use an ICON that looks like a document and may fool you.  See the Hidden File extensions that need to be fixed in Windows 7 for examples of what I mean.

Fake Codecs


Codecs are a necessity to view videos but most often are not real.  [intlink id="2991" type="post"]Fake Codecs[/intlink] are a way to get you to install malware when you actually think it is a codec.  Install fake codecs can lead to trojans, virus, or even key loggers.  I've talked abut this from time to time but figure it would be good to remind people about this.

Installing Fake Antivirus Software


Sometimes you may get to a [intlink id="3964" type="post"]site that may look like it is a real antivirus[/intlink] but it in reality is a [intlink id="3713" type="post"]scam and will scare[/intlink] you into buying there product.   Sometimes the [intlink id="3114" type="post"]Scareware will say you are infected and send you a file to run to help protect you,[/intlink] if that ever happens don't run it.   You should never run programs from sites that you have never heard of.    Always go to trusted vendors first or at least Google for the product name before you install any questionable software.

Website tries to use web Browser exploits


Just like WebAttacker uses scripts to try to exploit several different known exploits in IE and other such Browsers.   This is the most common way to get virus or trojans to be install into a computer.   That is why I will always recommend getting away from IE and running Firefox or some other low profile web browser

Windows Up to Date


It is very important to keep you Windows System up to date. That said you got to understand that if you don't keep your system up to date there will always be an increasing possibility of getting an infection. Due to the fake that malware authors right after Patch Tuesday will know exactly how to exploit a system that hasn't updated there windows system to current. Install Service packs and other patches is the one way to keep malware authors at bay.

In one of my next posts I will recommend software to use to help prevent some of this or even how to disable some of the most common exploits.   If you like this post please feel free and tell you friends so they may also learn more about Computer Security.

[ad#SUPERAntiSpyware]
Wednesday
May202009

Spyware : Michelle Obama's Ta's Ta's Video

I love this one, I was reading the Sans Report about Michelle Obama Ta's Ta's on Video.  I wanted to investigate this a little further so I went searching around.  I found some comment spam links to a site I will not talk about the links directly.  The site however had a fake video on it :


michelleobamatoplessfake



It looks like if you hit Cancel or Details it keeps trying to tell you need to install an ActiveX Object.   It also makes the user think that there is only one option to use right now.   As you can tell  it makes you think you can't cancel or get details but I did.  I tried to cancel and it kept on popping up trying to get you to install this active X installer.   AVG detects it as:


michelleobamatoplessfake1



[ad]This proves the fact that any Anti-virus software is better than nothing at all.   I also  have talked in the past about [intlink id="2991" type="post"]fake codecs and how they are used maliciously[/intlink] to spread malware to people who aren't up to the job.   I didn't take long to find Phrases such as "Michelle Obama Topless" or "Michelle Obama Topless Video" to find spam comments linking to sites that are hosting these types of malware.  It seemed that in order to get out of the cycle with the Malware site, I had to do a CLT-ALT-DELETE and End the process of Internet Explorer process from Task manager.  It was an infinite loop and could not be closed any other way.  upon trying to go the link again it seems to be a random redirection every time you visit that site the next time I went there, I had a scare message pop up telling me:

michelleobamatoplessfake2



As you can tell this [intlink id="3397" type="post"]pops up with scareware[/intlink] instead of the video and tries to tell you have a virus and you should run a free scan from the site of their choice.   This is an old tactic and still being used but funny if you look at that message one you know it is from a "Webpage" and two there are at least one grammar error?  Can you see it?

You're best bet is not to go clicking on links that people have left in comments.   I am so glad I have moderation turned on and I have to approve each and every post someone comments on.   This is the only way I know how to prevent from being used in the spam campaign.  Remember it is time to update your [intlink id="2205" type="page"]Anti-virus and Firewall [/intlink]if you don't already have it.  Don't forget to visit the Forums and help discuss this problem in detail.
Saturday
Mar142009

Malicious Spammers target Bank of America

I've saw two different security firms talking about Bank of America and I wanted to share with you:

Fake Bank Of America SitePicture from F-secure


[ad#cricket-right-ez]The two sites are F-secure and Pandalabs who are talking about Bank of America and how they try to get you to install malware.  With Adobe having just sent out the new updates last month it looks like spammers are using this to get people to install Malware.


It is also been known to be floating around in Facebook this spam.  So if you get a link going to a site you don't know about to see a video and it says you need a codec or the Adobe update you should turn right around and leave site. You should always type in the url of Your Bank and not go there through links.


From what they are saying it monitors Network traffic and Steals ICQ, POP3, and IMAP passwords.  If you find network traffic going to Hong Kong IP, then it is time to check to make sure all your Virus definitions are up to date and you've installed an Anti-virus and Firewall.  I would encourage  users to report it to Phishtank so that any other unsuspecting user or person going to that site will be warned.