Scrapkut worm spread via code injection
A new breed of malware targets the scrap book feature on Google’s Social Networking site Orkut and spreads by active code injection as scrap book entries to all the contacts of the user.
The details on the malware can be obtained from Symantec’s website. There was a malware attack of prominence a while back on Orkut through a Cross Site Scripting error which was eventually fixed.
Malwares going local to target applications:
Malwares authors are virtually leaving no stone unturned in their bid to target users based on specific country, language, software or company. These sort of attacks make a lot of sense since the internet has brought the whole world under one accessible media.
Jeff Green, Senior VP of McAfee’s ‘Avert Labs’ says that: “Malware has become more regional in nature during the past couple of years. This trend is further evidence that today’s cyberattacks are targeted and driven by a financial motive, instead of the glory and notoriety of yesteryear’s cybergraffiti and fast-spreading worms. We’re in a constant chess match with malware authors, and we’re prepared to counter them in any language they’re learning to speak.”
With the proliferation of Web 2.0 also, there are several intricacies that are opening up for malware authors to exploit. This is because security is as of now not core to the architecture of the internet and as more sophisication gets added to the software designed for web, more points of insecurity are bound to open up.
CAPTCHA’s are getting compromised
CAPTCHA, that stands for Completely Automated Public Turing test to tell Computers and Humans Apart, no longer presents an insurmountable threat to spammers. There have been reports MessageLabs on the increase in the number of spam mail from webmail accounts.
Google is the latest free webmail provider to be victimised by spammers’ efforts to create software to solve the codes. At times, spammers also employ people to solve the codes en masse.
“It’s only a matter of time before [CAPTCHAs] are comprehensively defeated,” said Paul Wood, senior analyst at MessageLabs, which has predicted a spam bonanza in 2008.
While the success percentage of the techniques being used by the spammers is low, on a higher frequency that is sufficient to create a big problem. Perhaps its time to think about newer twists to the concept CAPTCHAs, such as removing text for pure image based identification.
Trend Micro victim of major malware attack
Ironically, security vendor Trend Micro announced that it has fallen victim to a massive web attack which installs password stealing software on the PCs of those who visit the affected pages.
Researchers are still not sure how the attackers are managing to hack these Web pages, but the pages all seem to use Microsoft’s Active Server Page (ASP) technology, which is used by many Web development programs to create dynamic HTML pages. A software bug in any of those programs is all the attackers need to install their malicious code.
The attacks are thought to be directed towards ActiveX controls which may not be patched or disabled. The fact that a security vendor should fall victim to such attacks speaks volumes to the precaution one must take online when visiting sites, even legitimate one. A fully patched uptodate system is a great preventive measure.