Hi bob3160,

At the outset of such a policy then, aren’t they thinking about the consequences? This is almost infantile behavior or just started on an impulse. But you can almost know for sure an issue like this will seriously backfire later, why then start it in the first place.? Unbelievable, the world is a surrealistic place sometimes,

polonus

Comodo and Chromium now blocks major sites with poor certification.

Chromium browser remixed as a security dragon

Source: The Download Blog

Hi malware fighters,

Every day spammers will send two hundred billion spam messages, mainly through botnets. From numbers provided by M86 security 78% of all spam messages are coming from the top 5 botnets. The top two are Rustock and Pushdo botnets, together serving up 54% of total spam.

The number of malicious spam messages, email with a malicious attachment or with a link to a drive-by-download website, grew to three million a day. That means fivefold the number of the 600 million number seen during the first half of the year 2009. “It is important to make out the main spam mailers, so the industry can take action”, according to Technical Strategy vice president Bradley Anstis.

Zero-day
The security researcher discovered in the second half of last year that 40% of attacks worked through zero-day security leaks. “One of the biggest problems with zero-days is the time developing between discovery and in the wild abuse and the launch of a patch by the software vendor.”

This so-called “Window of Vulnerability” is getting smaller and smaller all the time, but even when a patch has been issued, users are slow to implement it. Take for instance the so-called MDAC-hole, patched during 2006, and still very popular with malcreants,

polonus

Zeus Trojan found on 74,000 PCs in global botnet

Source: CNET News

Ads poisoning – JS:Prontexi
Directly from an Avast! blog entry…

The malware usually spreads through web infection placed on innocent, badly secured websites. The ad infiltration method is growing in popularity alongside with the website infections. Now we are facing probably the biggest ad poisoning ever made – all important ad services are affected. It means that computers might get infected just by reading your favorite newspaper or by doing search on famous web indexers. We named the source of this attack JS:Prontexi – JavaScript code which initiates infection on victims computer using various vulnerabilities including latest PDF exploits.

Zeus Trojan found on 74,000 PCs in global botnet
http://news.cnet.com/8301-27080_3-10455525-245.html

Mystery malware nuke’s US city’s Windows PCs
Malicious code wipes out Windows PCs
http://computerworld.co.nz/news.nsf/security/windows-nuked-by-malware-at-city-of-norfolk

Conficker is alive and well…

Another NHS hospital stricken with Conficker virus
http://www.theregister.co.uk/2010/02/18/conficker_nhs/

Kneber: An Old Botnet Dressed Up in New Clothes
http://www.pcmag.com/article2/0,2817,2360032,00.asp

Google attacks traced back to Chinese schools
http://www.v3.co.uk/v3/news/2258188/google-attacks-traced-back

Almost a year later, Conficker still lurking

http://www.sophos.com/security/threat-spotlight/index.html#threat1

http://i.zdnet.com/blogs/chinagoog.jpg

Google cyber attacks traced to Chinese schools.
Sorry Pondus,
Didn’t see your post. :-[


Mis-placed botnet warning :

http://forum.avast.com/index.php?topic=55913.msg472331#msg472331


Not to downplay the Kneber botnet threat in any way.

http://www.sophos.com/blogs/gc/g/2010/02/19/zeus-kneber-botnet-unmasked/

http://www.krebsonsecurity.com/2010/02/zeus-a-virus-known-as-botnet/

Perhaps underlines even more - never go to the internet without adequate protection against malware. The botnets are families that will continue to grow and mutate and grow and on and on and on…

Hi mkis,

Part of a solution to the growing problem: http://www.malwaredomains.com/wordpress/?p=671

polonus

Thanks Pol.

I’ve bookmarked the site for my personal reference - ideally placed link for security warnings and notices.

I also found the following under Defense in Depth: IP and Netblock Blocking (in right-hand column)

  • anecdotal example but revealing story I thought

http://blog.washingtonpost.com/securityfix/2007/10/taking_on_the_russian_business.html

What a dilemma, I would expect the option to block would be first choice but I suppose they didn’t want to lose the business - and then things got out of hand. I wonder how common such situations are in the US.

Why not use the latest?
aurora, zeus, phishing, pushdo,rogue domains to block
http://www.malwaredomains.com/wordpress/?p=851

Archives
■ February 2010 (9)
http://www.malwaredomains.com/wordpress/?m=201002

Thanks YoKenny. You always are up to date, aren’t you? I guess Polonus was just posting an instance.

Here is my bookmark http://www.malwaredomains.com/wordpress/

Polonus here with a European threat, because of the regulations that made MS come up with an aternative browser screen, which initiative can be grossly abused by malcreants:
http://www.sophos.com/blogs/gc/g/2010/02/19/european-internet-explorer-users-invited-choose-browser/

D

Just made a topic about this, but thought I would post here too anyway.

Modern Warfare 2 servers hacked, Trojan’s inserted.
http://www.infinityward.com/forum/viewtopic.php?f=24&t=181646

Oh, now thats just plain evil grr.

I do worry, however, whether cybercriminals might attempt to take advantage of this initiative by creating bogus browser choice screens that could pop up on innocent users' PCs and potentially lead them to a malicious download.
Polonus, [b]It's not a current threat[/b], it's a blog post and someones opinion of a possibility of a potential problem.

Hi bob3160,

If a benevolent blogger can think this up, why cannot a malcreant? There are also smart cyber criminals, you know. The man in the nicest suit often has the… eh… most evil mind, often that is…So threats come from where you least expect them. f you want to keep them at bay, prepare yourself,

polonus

Hi malware fighters,

A so-called “Chuck Norris”(name mentioned inside the malware code) botnet cracks routers and modems: http://praguemonitor.com/2010/02/16/czech-experts-uncover-global-virus-network
Czech Defense Malware Researchers found the botnet and servers in South-America, Europe and China.
A good advice to you all - change that modem or router standard password to be protected, according to Jan Vykopal of the Masaryk University

polonus