All posts by remotehelpexpert

Multiple Malware Campaigns Impersonating Multiple U.S. Government Agencies

The United States Computer Emergency Readiness Team (US-CERT) has warned of multiple malware campaigns impersonating multiple U.S. government agencies, including the United States Cyber Command (USCYBERCOM) and the Federal Bureau of Investigation (FBI).

Once installed on a system, the malware displays a screen claiming that a Federal Government agency has identified the user’s computer as being associated with one or more crimes. The user is told to pay a fine to regain the use of the computer, usually through prepaid money card services.

Affected users should not follow the payment instructions. Instead, the computer should be scanned for malware with an appropriate antivirus program, and then measures taken to avoid the infection from re-occurring.

What Happens When Your Paid Antivirus Subscription Expires?

Note: This covers PAID antivirus programs. There are free antivirus programs that, because they are not under a time license, basically don’t expire.

What happens when your paid antivirus subscription expires? In a nutshell: Your antivirus program stops updating itself. But what does that mean and what are the ramifications?

To understand this, first you have to understand how traditional antivirus programs work. I’ve explained this before, but here’s the gist of it: Your antivirus program protects you from malware trying to infect your computer by keeping a list of all known malware. It then compares every file you open, every file you download, every email you get, and so on, to its master list of  “bad guys”.

Because malware creation is such a dynamic subject, the list of known malware grows daily. In order to be effective, your antivirus must have the latest additions to the list of “bad guys” to recognize them. To the degree that it doesn’t have the most recent additions, it won’t be able to detect the most recent infections.

So, a typical antivirus program updates its list at least once a day. Some are configurable and can be set so they update themselves several times a day.

Now, let’s say you have a yearly license in your antivirus and it’s about to expire. Typically you get warnings and pop-up windows that alert you to the fact that your license is about to expire. So what happens if it does? Does the program stop functioning?

No. Typically, your antivirus program still works even if your license has expired. BUT, your vendor will probably not allow updates to happen. So, as days, weeks go by, your antivirus program’s list become more and more outdated. To that degree it won’t be able to detect the latest infections. The more outdated, the less effective. You get the idea.

The above is so true, that an up-to-date,  free antivirus program is probably more effective than a paid expired one. Even if the paid one is fancier and has more features etc., it’s somewhat useless without an up-to-date definitions list.

Normally when your expired antivirus license is renewed, your antivirus will resume updating itself and you will stop getting warnings about it. Sometimes it requires asking the antivirus program to perform an update in order to bring the list up-to-date, and then it resumes doing it automatically from that point on.

Strong Passwords

Last article covered in what ways your email account can be hacked. Since it is related to the password strength your email account has, I thought we should now cover how to create a strong password.

A strong password is one that is hard to guess. Oversimplifying some might say, yet it’s the basic definition of it. Therefore having your password be ” joe” when your email account is “joeblow@yahoo.com” is not very hard to guess. That would be at the extreme end of weak. So what’s at the other end?

A good, strong password:

1. Contains uppercase and lowercase characters,

2. Contains at least one number,

3. Contains at least one of the characters over the numbers in your keyboard ( !@#$%^&*() ),

4. Does not contain a word that can be found in the dictionary, and

5. Is at least 8 characters long.

OK so now we know what a strong password is, but we have a problem. How do we craft one that can ALSO be remembered? I mean, “g5OmCU)k” might be a strong password by definition, but who the hell is going to remember it? This is where mnemonics – a memory tool, any device or technique that aids information retention –  comes in handy.

Rather than going on a lengthy written explanation of how this all works, let me give you a link to a video that explains it all very well in under 4 minutes. Watch it and then come back to finish reading this article. Here’s the link to the video:

http://www.youtube.com/watch?v=VYzguTdOmmU

As you might have noticed, the last problem posed in the video, how to remember multiple passwords when you use one per each different authentication required, is solved by the use of a password manager. I personally use RoboForm to keep my 90+ passwords secure, and it even has a feature that will generate random strong passwords for me when required, which can then be stored and thus does not need to be remembered.

May your email account remain secure.

How Did My Email Account Get Hacked?

Concerns over hacked email accounts seem to have increased as of late, mostly because, well, the number of hacked emails seem to have increased as of late.

Recently I covered how to proceed when you receive an email from a contact who obviously did not send it and might be the victim of a hack attack. But how do these attacks succeed and how many ways are there to perpetrate them? Knowing the answer would give you an understanding of what to do to stay safe.

So, I’m glad you asked. I’ll try to keep the answers simple. First, it wouldn’t hurt to understand how email works.

When you look at the simplest way to break it down, an email account’s password can only be hacked at two different points: 1) At the point where the user handles emails (his/her computer, phone, tablet, etc) and at the server, where all the information on usernames and passwords are kept.

The common user does not have control over his/her email server, so if a hack attack occurs at the server, there’s not much he/she can do about it. Pray maybe, or be careful as to what email provider he/she chooses. A definite measure he/she can take is change his/her password periodically, and of course make sure they’re all strong passwords.

Unfortunately, much too often a) Users don’t change their passwords periodically, b) The passwords are weak and c) The same password is used for many things, including their online banking identity and whatnot! The reason for these three factors is the basic drive of the user to remember his password. a) Changing it periodically makes it hard to remember which is your current one b) Using familiar words or numbers make a password weak but easy to remember and c) Who wants to remember 10 passwords when using the same password for everything is so much easier?

We’ll circle back to that. The point is, the server-side aspects of things is not much under the control of the normal user, and that’s a potential hack attack point. How those attacks occur become irrelevant, so we’ll leave it at that.

The second point at which the password can be hacked is more under the control of the user, mostly because is within arm’s lengths and he/she is for the most part in control of it. This is of course  his/her computer/phone/tablet.

So now, how many ways are there to figure out a password? Exactly two:

The first one is under the category of guessing. A specific type of a “brute force attack”. This consists mainly of feeding passwords from a list, often a dictionary. A computer program can do this very fast, so if the password is weak, the probabilities of guessing it that way are not too bad.

the second one is under the category of stealing/sniffing/recording. Basically a tool is installed in your computer that will record key strokes, or steal your password from known stored locations and transmit it over the internet to a place the hacker has access to. So in this case, changing your password, making it complex and unique will not accomplish anything, since the moment you use your computer to change it, it will be stolen/sniffed/recorded again.

Therefore when one’s email account has been hacked, one should

a) Change the password to a strong, TEMPORARY one. This is just in case the way it was figured out was a brute force attack and not just stolen. Then

b) You have to make sure there is no malicious software in your computer that is stealing/sniffing/recording your passwords. That is, of course, easier said than done. But it must be done. Ask an expert for help as needed. Finally,

c) Once there’s an assurance that there is no data leak active, the password should be changed again to a strong, more permanent one. Even if there is no malicious software found, it never hurts to change the password again, so it should be done regardless.

Hope I’ve been able to increase your understanding of the subject.

Facebook Don’t

With over 150 million users in the US alone, Facebook boasts a vast amount of personal data, which some users seem to be willing to give away, publicly.

Check out this website: http://www.weknowwhatyouredoing.com/

The website is powered by a tool that shows some of the public status updates users post on Facebook.

The point is, if you are a Facebook user, you should have you privacy control setting set to anything but “public” or you risk being featured in websites like the above.

To do that, go to https://www.facebook.com/settings/?tab=privacy and make sure your privacy control is set to anything but “public” and if it is set to “public”, change it to “Friends” or “Custom”.

Hope this helps.

 

What is the Proper Way to Inform Someone Their Email Has Been Hijacked?

Somebody recently asked me this question. Many people have seen, every now and then, the weird emails coming from a friend or relative that could not possibly be sent by them, so I thought it’s worthwhile to make the answer broadly available:

If you want to inform someone that their email account has been hacked, it is usually wise to use an alternate mode of communication if possible (Another email address than the one being the source of suspicious emails or even a phone call). Sending an email to the email address that seems to be hacked might only worsen things if the account is actually under the control of a hacker, for it only confirms your email address is valid and makes you prone to receiving spam (your email address will be sold in the black market for a price).

If YOUR email has been hacked, the first immediate action is to change your password, preferably from a different computer than then one you normally use, just in case the cause of the email hacking is password-stealing malware implanted in your computer. The next action is then to do a thorough malware check to make sure the source of the security breach in your computer is NOT malware (weak passwords can be guessed without needing password-stealing malware to perpetrate, plus in rare cases passwords are stolen from the computers running the email service on the Internet – the servers), or get rid of any malware if there is any.

There is a possibility that your hacked email account has had its password changed to lock you out. To regain control of your email account you might need to reset the password. Most email services provide methods of doing that. Security questions that only you know the answer to, a cell phone number a new password can be sent to as a text message, a secondary email to send a new password to, all these must be pre-set for this kind of eventuality. So a good preventive measure is to make sure these reset password mechanisms are in place for your email address.

Recent and Upcoming Computer Updates

A summary of recent and upcoming updates you should know about:

Windows Updates: Microsoft has published a Security Bulletin Advance Notification indicating that its May release will contain seven bulletins (updates). These bulletins will have the severity ratings of critical and important.  The release of these bulletins is scheduled for Tuesday, May 8, 2012.

Google Chrome web browser: Google has released Chrome 18.0.1025.168 for Linux, Macintosh, Windows, and Google Chrome Frame to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition. It also contains an automatic update for Adobe Flash (covered next). To check what version of Chrome you have and to update as needed, click on the wrench symbol on the upper right corner of a Chrome window, and then select About Google Chrome.

Adobe Flash: Adobe released a Security Advisory for Adobe Flash Player a couple of days ago to address a vulnerability affecting the following software versions:

  • Adobe Flash Player 11.2.202.233 and earlier versions for Windows, Macintosh, and Linux operating systems
  • Adobe Flash Player 11.1.115.7 and earlier versions for Android 4.x
  • Adobe Flash Player 11.1.111.8 and earlier versions for Android 3.x and 2.x

This vulnerability may allow an attacker to take control of the affected system. There are reports that the vulnerability is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious file delivered in an email message. To check what version of Flash you have installed in your computer, click here.

 Keeping your computer(s) up-to-date with the latest patches from the various software vendors is one of the key steps to fend off malicious cyber-attacks.

Test Drive – Microsoft Security Essentials 4.0

A little over a week ago, version 4.0 of Microsoft Security Essentials (MSE) was released. First seen in version 1.0 back in 2009, MSE has been among the top free antivirus programs ever since. I first mentioned it back in 2009, when it was in its testing stages, in one of my articles. I took version 2.0 for a test drive in 2011, where it performed surprisingly well. So I decided to take this version, 4.0 for a spin as well (there never was a version 3.0).

As I’ve usually done it, the test drive consisted of visiting known infected websites with my test computer, with the antivirus program installed and then observing and analyzing how the antivirus performs in terms of detecting malware, preventing the computer from being infected and cleaning it up as needed.

So I took my test computer and accessed 4 or 5 infected websites. One of them infected with a Trojan, one with a Fake Antivirus, one with a rootkit, and finally one with another Trojan. In each case the real-time protection feature of MSE correctly detected the presence of malware, stopped access to the infection, and cleaned up successfully any files downloaded by the website to my computer, without any user intervention needed. A detailed after-the-fact analysis of what went on when I accessed each infected website revealed that neither an invisible, behind-the-scenes infection nor computer settings alteration took place, confirming that MSE succeeded and passed the test.

I already liked MSE 2.0, and I’m liking MSE 4.0 even more. Out of all the free antivirus alternatives, it is the one I like the most.

If you have MSE in your computer(s), check to make sure you have this version, the latest. If you need help checking which version you do have or how to upgrade to the latest one, feel free to ask.

Trojan, Trojan Horse

Trojan horses are a specific type of malware (malicious software) that, similar to the  the Greek story of Troy, allow for intrusion of a system from within, opening the door to external control of your computer by a remote intruder. As of late 2014, 78% of malware are Trojans.

Why Antivirus Programs Fail

This is a real example of why just relying on an antivirus to detect all malware will fail. Today I got, for the nth time, a few of those scam emails that have an infected attachment and a message enticing me to open it. Since I hate to disappoint, I went ahead and opened one, just to see what my antivirus would do (But also having fail-safe measures in place).

I’m currently using Kaspersky Internet Security 2012, one of the top security suites and my current favorite. Normally upon receipt of the email Kaspersky would quarantine the suspicious attachment… if it detects it as malicious. But it didn’t. The attachment was compressed in a file, so I thought maybe that’s why and went ahead and extracted the file from it. Nothing. No response from Kaspersky. So I forced a scan of the object, and still was not detected as malicious!

I then went to a website where individual files can be scanned by many scan engines. This particular one scans the file against 42 different engines. Kaspersky, Avast, Symantec, VIPRE, McAfee, you name it. All the big brands and more. Well, only 4 out of the 42 detected the file as malicious!

Why is that? Because the creation of different malware samples outdoes by far the updating of signature files (the files that tell your antivirus program which files are good and which ones malicious). Signature files are what antivirus scanners mostly depend on to detect malware.

I said it in 2009, and I’ll reiterate it today. Want to have a better chance at staying malware-free? Follow the model I laid out back then, in my pivotal article on the subject.

 

P.S.: 4/12/12: It’s the morning after, and I decided to analyze that piece of malware in detail, so I tried to fetch it from the trash folder in my email… Wasn’t able to. Kaspersky beat me to the punch and deleted it. In re-analyzing the file (from an alternate source) against the 42 scan engines, the count had changed to 7 out of 42 recognizing it as malware. Kaspersky was one of them. So relatively good.