Informazioni personali

Cerca nel blog

Translate

mercoledì 19 gennaio 2011

The Anatomy of a Scam Spam Message

Spam mail recognized by SpamAssassin. Image via Wikipedia

The Anatomy of a Scam Spam Message
By Paul Mah
An examination of the common characteristics of scam spam.

Related articles

martedì 18 gennaio 2011

Frode Alimentare? Non è piu reato! Banda armata? Idem!

E cosa potevamo chiedere di più?

Ora capisco che si debba semplificare il delirio normativo italiano, ma con un poco di accortezza certe sviste si sarebbero potute o dovute evitare. Che è successo? è successo che al momento sembra definitiva l’abrogazione della legge 283 del 1962, che puniva le adulterazioni alimentari.

Il ministro Calderoli aveva dato disposizione di cancellare 375mila leggi precedenti al 1970, senza eccezioni. Però, proprio per ovviare al rischio di eliminare norme vecchie ma ad oggi ancora valide ed indispensabili, era stato dato mandato all’ufficio tecnico del ministro della Semplificazione, di stilare un elenco di leggi da salvare. Ma in quell’elenco la legge sull’adulterazione degli alimenti non è stata inclusa. Così la norma risulta di fatto abrogata dall’11 dicembre.

A causa dell’abrogazione, anche se la legge venisse riesumata, i vari processi sui cibi adulterati verrebbero archiviati senza un nulla di fatto, in quanto prevarrebbe il principio di applicazione delle norme più favorevoli all’imputato. Adesso, quindi, anche se la legge venisse riesumata, i processi si concluderanno con delle assoluzioni in base al principio che devono essere applicate le norme più favorevoli agli imputati.

Per rendere chiaro il concetto mozzarelle alla diossina, vino adulterato e qualsiasi altra frode alimentare adesso non puo essere piu perseguita e tutti I processi eventualmente in corso vengono di fatto annullati.

Ma non è il solo colpo ad effetto che abbiamo avuto ultimamente.

Tra le varie depenalizzazioni abbiamo anche il reato di Banda Armata. (Dl 14.2.1948 n. 43), quello che puniva col carcere da 1 a 10 anni “chiunque promuove, costituisce, organizza o dirige associazioni di carattere militare, le quali perseguono, anche indirettamente, scopi politici” e si organizzano per compiere “azioni di violenza o minaccia”.

Quindi adesso siamo in una situazione I cui in Italia non è reato la frode alimentare e tantomento organizzare strutture paramilitari ed armate.

sigh

no comment!

ai

Security Blogger Missing

Security Blogger Missing
[Dancho_Danchev_photo_2010.jpg]eSecurity Planet
By eSecurityPlanet Staff ZDNet’s Ryan Naraine reports that security blogger and malware researcher Dancho Danchev has been missing since August of 2010.

lunedì 17 gennaio 2011

What Does a Spamhaus Attack Feel Like? - Black Hat Forum Black Hat SEO

What Does a Spamhaus Attack Feel Like? – Black Hat Forum Black Hat SEO
By BlackBeauty
I am writing a manual on how to do this as I have been struggling with a targeted attack and have defeated them each and every time they attempted to shut me down. I have one more migration and I am done.
Black Hat Forum Black Hat SEO – http://www.blackhatworld.com/blackhat-seo/

Related articles

lunedì 10 gennaio 2011

SECURITY: Web Browsing infection and protection basics

As the 2010 ended we learned that it was the most prolific years in terms of malware, new malware and botnets. And also we found out that internet browsing has been the most used vehicle to spread infection and attack.
Actually seems not to be an astonishing news, ou contraire, but it is interesting to notice that the focus has shifted from OS related threats to application and browsing vulnerability. this allowed malware to attack new surfaces, virtually any operating systems with internet browsing capabilities is subject and can be target of an attack or an infection: pc, smarthphone, tablet, consoles and any other device.
So let’s try to focus on how this is possible.
The first step is clearly try to understand how browsing works.
image
When we plan to go to the internet we usually start an application we call browser. to say the truth there are many different kind of browsers, and some does not even looks like a browser.
A browser is, basically, a client that is able to show us the result of a complex HTTP transaction. This kind of capability is used in internet browsers like Internet Explorer, Chrome, Opera, Firefox, Safari running on different platforms (PC, Mac, Pad, smarthphone and so on) but also on email clients (more than 90% of e-mail are actually HTTP documents) as well as games and other program interfaces.
Usually a program that use a browsing capability can refer to a specific (or limited set) of addresses or sources of information, or can point to any allowed resource just typing a web address.
image
This is the typical activity performed when the user needs to browser the internet using a web browser.
The task start typing the address we want to reach.
when we type something like www.myusualsite.com a lot of things happen in the background.
The first problem is that the browser need to translate the address into an IP address in order to be able to reach the needed resources.

This step is performed using a service called DNS.
image 
A DNS resolution is a complex task that requires some effort. Basically the browser ask to the guest operating Systems to translate the web address URL into something easier to manage, an IP address.
The Operating Systems query an Internet server, called DNS, that need to translate the URL into an IP address.
The protocol Used for this operation is the DNS protocol, and the port used are  TCP and UDP port 53.
The DNS server looks into its database to search the address. Since it is not possible for a single DNS server to host all internet addresses, it contains just a portion of the web address space, when it is not able to solve the address just call another DNS making a so called recursive query.
image
The DNS calls a so called root server (1) to ask who hold information for the .com domain.
the Root server answer (2)  with one or more zone owner that has the needed information.
So the DNS can query directly (3) the new DNS that master that specific zone (.COM) and usually receive as an answer the addresses of the DNS servers that owns the domain interested (4).
Finally the DNS server can ask (5) to one of the owners of “myusualdomain.com” the requested page “www.”.
The DNS owner of “Myususaldomain.com” can either answer directly to the DNS server that make the request (it’s usually the case) or can give to the DNS server the address of another DNS server that own that specific address that need to be translated.
At the end, after all those iterations the DNS server can answer the client with the correct address requested.
Now the browser can finally ask to the web server the page.
image

The request looks somehow similar to the pic, what the browser ask it is usually an index page (index.html or index.htm) that contains the info needed to create the page on the browser.
image
the answer , as you can see, is a file that contains a lot of indications, links and other resource references.
image
the references that are indicated inside an index file can be internal to the same webserver, external to the webserver or even code to be executed, like java or flash code.
image
when the browser read the index code start executing the request, asking for all the resources and executing the requested code I order to compose the requested page.
 image
The page we see into our web browser is the final result of a complex set of activities that involve several players. from the DNS resolution to the execution of code nothing is like it seems, a webpage is NOT the result of a single machine answering a request, but involves a lot of different sources.

image
When everything is good and all the transactions are clear browsing is an amazing activities. But in such a complex situation we can have a lot of things that can go wrong. some can be just mistakes and result in just an unsatisfactory browsing experience, but sometimes things go wrong on purpose, means someone try to use this complex process to do something bad Devil.
the main problem we can face is that when trying to download and execute everything needed to create our page something  unwanted comes and reach us.
Since a page is composed by different objects and code any of those object could have been compromised.
We could point to this object directly because the source itself has been compromised:
for instance the index file, to force us pointing to a compromised resource
or the DNS can have been poisoned and direct you to a compromised resource.
either way the result is that you are directly trying to contact a resource that can be dangerous.
image
but there are also trickiest possibilities.
When we call a resource, we cannot assume the resource itself will provide all the needed output to us. the resources itself could need to call other instances and external resources. So the result is that we can have a risk of compromising not only related to The resource we directly contact, but also indirectly by a resource’s resource Confused smile.
image
Virtually there are unnumbered possibilities to create a security outbreak in this situation.
Keep in mind that using different layers when creating a web services is related to several factors, the complexity of the output, security between layers, scalability and so on. The more complex the web become the more layers and risk of compromising we have.
E-commerce, social networks, web applications and services are just the most common example of this kind of approach.
Once a resource is compromised we face, usually different type of risks:

  • The web service or page steal information redirecting, copying a standard data flux (for example an e-commerce  credit card transaction) or just asking information that are not processed by the legal site.
  • The web service or page try to execute code  for instance to look for data or change permissions on the host platform in order to allow a later access form an intruder
  • the web service or page can try to download code to be executed in the host infected machine at intruder’s will
  • a mix of all those issues and many many more (the sky is the limit Smile)

all the rumors about malware recently just refers to one of this possibility, to download something in your device.
Actually it is not strictly necessary to download something, could be a permanent redirection to a service, or any other possibility. but keep it simple to understand what happen.
The infected resource become a part of the process that generate the page, thou when the user got it’s page it has a surprise attached.
the user experience can be unaffected by the compromised process, so the user usually has not idea that something went wrong.
image
while browsing there could be background task executed without the user being aware, we should always keep in mind that a browser can perform a lot of task, like executing code, interacting with the host operating systems and many more.
image
to do those kind of stuff malware writers usually compromise web services and leverage some vulnerabilities in the applications or operating systems running on the browsing device.
image
But why we should be worried by this scenario?
The easiest problem is data tracking and data redirection:
image
In this scenario can be several way to track or redirect data, cookies, host file compromised, plugin running with the browser and so on.
But since any  browser can browse your file system and send out data with a simple “http post” a more scary possibility is that something just not copy web browsing data, but that actually look for something in your file and send it out to someone else.
image
we should consider that this can be done as a background task, and does not even require the browser be opened or visible (beside we can have a browser instance running even if we don’t know about it, just using services in background without the running GUI that is just one of the components of the browser).
even more scarier is the fact that a well written piece of code can browse not only your local resource, but also remote resource using your device as a vehicle to be easily inserted in your network (making your device a sort of Trojan horse), may be using your credential and privileges to have easier access to resources.
image
The malware itself can, this way, reach place that does not even has internet access, and same times can replicate itself to become more effective in it’s tasks.
and of course it can modify system settings in order to obtain the needed result and hide itself.
image
Beside data gathering a malware can also perform different tasks, the most common are sending data and requesting external services.
as an example of the first task is sending out mail using smtp protocol (usually this is the technique used to send out spam)
as an example of the second task is sending http or dns request for ddos attack.
image
usually the modern malware is able to perform different and complex tasks, but it need instruction on what to do.
Receiving instruction require an interesting approach, since it is not possible to know where the malware will be hosted it is quite difficult to make a discovery, so most malware infected device use to announce themselves to the controlling unit.
this activity is usually called “phone home”, and the aim is to let the controlling unit to send instruction to the controlled devices.
image
To be more effective the technology used are quite sophisticated. The discovery and communication is usually based on a mix of standard and P2P protocols, the controlling unit, or master, are usually elected inside the malware realm using sophisticated election procedure. The idea is to have a system that can provide always a master to make the infection always effective and useful (at least for the bad guy). The use of P2P technologies make the system more stable to accidental discovery of infected units making, at the same time, more difficult to find master and control units.
image
Due to it’s nature the infection try to hit any device possible, the more the better. Big numbers can provide better performance while remaining relatively undetectable, drowning just a few resources form the hosting device. When we are in presence of a large number of infected machine controlled by a logical master (they can be several physical devices, organized in layer to make more difficult the backtracking activity) we use to call it a “botnet” ( from “robot network”, where robot reminds to it’s literal meaning of “slave”) and the infected device “zombie” (brainless executors).

the result can be visible through the world, take as an example the rustok botnet, specialized in sending spam.