greenman: (Default)
[personal profile] greenman
Please be careful opening any email that is sent to you with an attachment, even if it purports to be from a legitimate company.

Recently a couple of virus varients have been going around, using social networking as more effective ways of getting people to open them. There have been two iterations of them that I have seen so far.

The first purports to be from AirTran Airways, and the text thanks you for purchasing your ticket online through them, and indicates that a charge of $400+ has been made to your credit card. It also refers to the the attachment, which supposedly includes your receipt and the ticket. Of course, most people want to know what the hell is going on, since they didn't purchase any tickets online, and certainly not for $400+ dollars. Of course, they open the attachment, which isn't a receipt, but is in fact the virus. And the virus that has been going around does not seem to be stopped or detected by Symantec Antivirus, even using the most recent updates, so that machine in infected.

The latest varient arrives as a message from FedEx, warning either that the package that was sent to you, or that the package that you sent, was not able to be delivered because the wrong address was given. Again, an attachment with more information is included, and many people seem to want to open the attachment without thinking about it. The virus included in both of these messages seems to be a varient of the Virantex (or Braviax) trojan/virus, and is remarkably resistent to removal.

Please be careful. There is always lag between the newest virus varients showing up in the wild, and the latest updates released by Antivirus companies. There is always the chance that you can be infected, even if your virus definitions are up to date. Do NOT open any attachments that you aren't completely sure of. In fact, if you receive a message from someone that you DO know, with an attachment, contact them and confirm that they sent you the message, and that they included an attachment, before you open in, and go so far as to confirm the name of the attachment, as well.

Viruses have been out there for quite a while. Generally, they no longer carry destructive payloads, but they CAN slow your machine to a crawl, get you blacklisted when they try and spam other people with copies of themselves from your machine, or slam your network connection with extra traffic. And they can be VERY difficult to get rid of, once you're infected.

Date: 2008-08-19 02:46 pm (UTC)
From: [identity profile] huashan.livejournal.com
I just took the Certified Ethical Hacker class, and while it wasn't what I wanted, it definitely gets the idea across that you should never accept attachments in email. It's very simple to fake an email from anybody to anybody and attach something that looks innocuous but plants whatever malicious code the attacker wants to infect your machine with.

I used to think I was just worried about protecting my systems from script kiddies and zombie/bot nets because those are the most numerous and most likely attacks. Most of those are pretty easy to protect from. Now I'm even more aware of just how amazingly easy it is to hack most computers and have to assume that the only reason my systems aren't hacked on a daily basis is that targeting a public library just isn't cool nor profitable enough to be worth doing.

Date: 2008-08-19 03:07 pm (UTC)
From: [identity profile] curiousalexa.livejournal.com
Certified Ethical Hacker???

Please, tell more!

Date: 2008-08-19 03:42 pm (UTC)
From: [identity profile] huashan.livejournal.com
The Certified Ethic Hacker training I got was 5 intense days of 8 hour classes taught by New Horizons. The idea of the class is to teach people the techniques to be a hacker in order that they then use those powers for good. In fact, you have to sign a contract stating that you will use your new hacker powers for good and not evil (not the specific legal terminology...).

It was a very interesting and intense class. It taught a lot of great information, and for people that knew less than I about hacking going into the class it must have been really difficult. The class taught the basics of a ton of exploits/vulnerabilities and attacks. It also mentioned close to 100 pieces of software useful for hacking. We also got some time actually using computers to create and attempt attacks including creating viral loaded attachments, backdoors, and the basics of good social engineering techniques.

The problems I had with the class are that it was much too microsoft centric, it included incredibly inaccurate information about *nix, and the test was one of the biggest pieces of shit I've ever taken. It had questions that were provably incorrect, it had questions requiring a single answer when multiple answers were correct, it had questions so poorly worded that I couldn't figure out what they were even asking for sure, it had questions we didn't cover in the class and I don't mean we covered X specific version of a theory and they asked about the Y specific version of a theory. I mean they asked things like "is X true" when X was something we never covered at all.

So...coming out of this class I'm positive nothing is unhackable (I was pretty sure of that before). I'm pretty sure I can hack just about any microsoft server to at least some degree, and anybody with some experience and skill at this definitely can. Since the class was so microsoft centric, I can't make those statements about *nix boxes, and having been an admin for Microsoft servers and *nix servers I know that microsoft boxes are less secure by default but that both can be hacked, but I'd say that *nix boxes are probably a bit harder/more time intensive to hack.

And now I've got a truly huge number of extremely complex decisions to make about what we need to do here at work to make things more secure, and the sure knowledge that it'll be an uphill battle to get any of it approved by management. Very fun.

Date: 2008-08-19 04:45 pm (UTC)
From: [identity profile] apostle-of-eris.livejournal.com
A tiny asterisk —
Occasionally, I'm not sure what a probably-valid attachment is; once in a blue moon, I'm curious about a bogus attachment.
I've never gotten myself into trouble by opening something with a hex editor.

Profile

greenman: (Default)
greenman

May 2009

S M T W T F S
      12
3456789
10111213141516
17181920212223
24252627282930
31      

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jul. 7th, 2025 07:39 pm
Powered by Dreamwidth Studios