Web Users Must Stay Extra Wary to Fend Off Stealthy 'Malvertising'

Found on eWEEK on Saturday, 02 April 2016
Browse Internet

The malvertising now seems to be showing up on major Websites using well-known ad networks such as Google's DoubleClick.

The reason that malvertising is being distributed by the top ad networks is because the malware writers are actually buying ads and then feeding the ad servers content that is infected with malware, but the latest tactics are even more sinister. Now the malware can simply infect your computer without any action on your part. No longer do you have to click on an infected link.

Segura said that the fingerprinting process will check to see if the computer is using a residential IP address, whether it’s running a real copy of Windows on a real machine or whether it's actually running in a virtual environment.

Still advertisers claim that blocking ads harm their business model. If they would care about what they do, and who buys ad-space, things would be quite different.

Big-name sites hit by rash of malicious ads spreading crypto ransomware

Found on Ars Technica on Tuesday, 15 March 2016
Browse Internet

Mainstream websites, including those published by The New York Times, the BBC, MSN, and AOL, are falling victim to a new rash of malicious ads that attempt to surreptitiously install crypto ransomware and other malware on the computers of unsuspecting visitors, security firms warned.

The new campaign started last week when "Angler," a toolkit that sells exploits for Adobe Flash, Microsoft Silverlight, and other widely used Internet software, started pushing laced banner ads through a compromised ad network.

According to a just-published post from Malwarebytes, a flurry of malvertising appeared over the weekend, almost out of the blue. It hit some of the biggest publishers in the business, including msn.com, nytimes.com, bbc.com, aol.com, my.xfinity.com, nfl.com, realtor.com, theweathernetwork.com, thehill.com, and newsweek.com. Affected networks included those owned by Google, AppNexis, AOL, and Rubicon.

Please let us hear from representatives of the advertising industry and from politicians on their payroll, why running adblockers to protect yourself are such an evil product. They also could explain why it is important to run ads which allow exploits, instead of plain and simple jpg or png banners.

Marcher Trojan Hits Android Users Through Face Adobe Flash Installer

Found on eWEEK on Monday, 14 March 2016
Browse Internet

Many different vulnerabilities show up in Adobe Flash—in fact, Adobe just released fixes 23 of the latest security flaws this week. But the new Android Marcher Trojan isn't using an authentic version of Flash or exploiting vulnerabilities that Adobe has already patched. Rather, the Android Marcher Trojan uses a fake version of an Adobe Flash Player installer to infect users.

Flash again, really now? That giant black hole should just die.

Encrypted WhatsApp messages frustrate new court-ordered wiretap

Found on Ars Technica on Sunday, 13 March 2016
Browse Internet

According to a Saturday report in The New York Times, prosecutors have gone head-to-head with WhatsApp, the messaging app owned by Facebook. Citing anonymous sources, the Times reported that "as recently as this past week," federal officials have been "discussing how to proceed in a continuing criminal investigation in which a federal judge had approved a wiretap, but investigators were stymied by WhatsApp’s encryption."

As Ars reported earlier this month, since late 2014, all WhatsApp messages sent between Android devices are end-to-end encrypted, which means that not even parent company Facebook can access their plaintext contents.

When police et al complain about encryption, it makes you wonder how they dealt with being unable to listen to a conversation back in the days where modern communication did not exist and people just talked to each other, face to face.

Let's Encrypt Free Certificates' Success Challenges SSL/TLS Industry

Found on eWEEK on Friday, 11 March 2016
Browse Internet

The Let's Encrypt certificate service was first announced in November 2014 as an effort to help expand the use and availability of cryptographic security for Websites.

"More encryption is great but the ease of obtaining certificates automatically can be riskier," Bocek said. "We've already seen phishing sites and other attacks use Let's Encrypt certificates."

"We are only issuing certificates with 90 day lifetimes, and that will be the case for the foreseeable future," Aas said. "Dealing with certificates manually is inefficient and error-prone. We want to strongly encourage automation. And if your system is automated then it doesn't really matter how long the certificate lifetimes are."

It may be acceptable for a private blog which is not really important, but anybody else will still prefer certificates issued by a company. "Dealing with certificates manually" is their business and makes sure that e.g. EV certificates (which are used by banks and big companies) are not issued to anybody without doing a background check. Let's Encrypt is no better than any random self-signed certificate; except that the browser does not pop up a warning message.

Email inventor Ray Tomlinson dies at 74

Found on TechRepublic on Sunday, 06 March 2016
Browse Internet

Tomlinson was best known for choosing the @ symbol to indicate a message should be sent to a different computer on a network. He also led development of standards for the from, subject, and date fields found in every email message sent today.

News of his death began circulating on a BBN alumni email list tonight. Another networking legend, TCP/IP inventor Vint Cerf, confirmed it via Twitter.

From today on, his email will hard-bounce with "user unknown".

When a WordPress Plugin Goes Bad

Found on Sucuri on Saturday, 05 March 2016
Browse Internet

Custom Content Type Manager (CCTM) is a relatively popular plugin with three years of development, 10,000+ active installs, and a satisfaction rating of 4.8. It helps create custom post types. Website owners find the classical “blog format” too restrictive, use the plugin to add custom elements to their posts.

All we know is that the plugin hadn’t been updated before that for ten months. Perhaps its developer lost interest in it and accepted an offer from wooranker. On the other hand, taking into account the malicious plugin update and the fact that fireproofsocks was inactive for nearly a year, we can suspect that wooranker could have hacked into the fireproofsocks account and added themselves as a new owner.

Wordpress is used by millions of people who do really understand how things work, and who tend to install every plugin another random blogpost suggests. In the end, dozens of plugins live in the shadows, and the webmaster in almost every case does not bother to keep an eye on them, even though it is 3rd party code. This mix makes Wordpress one of the worst choices for websites.

UK government launches initiative against online adblocking, compares it to piracy

Found on The tack on Thursday, 03 March 2016
Browse Internet

Today the UK’s culture secretary John Whittingdale has announced that the British government intends to ‘do something’ on the issue, describing the practice as a ‘modern day protection racket’, and comparing it to piracy.

Last month the president and CEO of the Interactive Advertising Bureau (IAB), Randall Rothenburg, described adblocking companies as a freedom-hating ‘Mafia’.

Now the companies complain and whine, but for years they tried to bury users under blinking gifs, pop-ups, pop-unders and animated flash ads with sound which all eat up resources such as bandwidth and CPU usage; and sometimes ads also delivered drive-by installs, exploits and other malware. Not to mention the increased tracking of visitors over different websites with (flash-)cookies. At some point users were fed up because all their complains were ignored and thus fixed the problem by rigorously blocking ads. You reap what you sow.

Zynga CEO resigns – again – after terrible results

Found on The Register on Wednesday, 02 March 2016
Browse Internet

Both Pincus and Gibeau in a separate email put the blame for Zynga's failure to continue its early successes with games such as Farmville on a reduction in the social aspect of mobile games.

In the fourth quarter, Zynga saw a 24 per cent decline in its users, and revenue also fell from $193m the previous year to $186m.

Shares have fallen 20 per cent since Pincus was brought back in April 2015, but that's nothing compared to the nearly 80 per cent fall in the company's share price since it went public in 2011.

The main question is why any investor would put money in this bubble at all. After seeing a single of their games, it should be obvious that it's not made to last.

Reinvented ransomware shifts from pwning PC to wrecking websites

Found on The Register on Monday, 29 February 2016
Browse Internet

The website variant of CTB Locker is encrypting all files on WordPress-powered sites and replacing the index.php with a file that displays instructions for paying the ransom.

Victims can decrypt two separately-encrypted files for free in a bid by attackers to demonstrate the legitimacy of the ransom demand.

That is why you do backups. Restore, update and move on.