1
news Usenet hotbed of malware says McAfee Usenet is now a seething mass of viruses, Trojans and backdoors, according to one industry spokesperson. Dmitry Gryaznov, manager of advanced virus research at McAfee, claims that news- groups are increasing in popu- larity as they allow people to download free information and files, but that the virus writers are joining too, and are posting their malware there. Infected files are often disguised as multimedia files or as pirated software. The volume on newsgroups has grown 20% between Jan- uary and April this year and looks set to continue. The sheer volume of traffic makes them difficult to police — 230GB of data is posted to Usenet each day. According to Gryaznov's research, a single virus can be posted about 200 times in a day. A further danger is posed by sites such as Google that archive material, because they prevent posts from expiring, even after they have been taken down. Despite the fact that many corporations block the use of newsgroups, the malware ends up on the company network anyway. "There are plenty of gateways and you simply cannot block all of them," Gryaznov said. He says that "undoubtedly, education is one of the keys" to solving this problem. To this end, McAfee is launching Virus- Patrol Live, a website which will carry a lot of information about Usenet and viruses and form a resource for statistics and detailed information about specific viruses. Technology News Biometrics used as correction tool Biometric authentication is being applied by those who have no choice in the matter — convicted criminals. According to Maurice Chad- wick, COO of voice specialists Buytel, the ‘community correc- tions market’ is second only to financial services and telco applications. He says that the reason for choosing voice, rather than the more traditional fingerprint or iris recognition, is that the entry costs are significantly lower. There is no need to buy an expensive reader as only a microphone, or even ordinary telephone, is required at the client side. So, offenders who are out on bail, or governed by a curfew, will make a telephone call to say that they are ‘home’. This will be authenticated by the telephone number from which they are calling, coupled with a voice sample to prove the identity of the caller. This is a far cry from the James Bond image formerly enjoyed by the biometrics industry. Chadwick describes community corrections as “one of the early adopters…[but the] end users have no choice in the matter.” Buytel’s main business is as a managed service provider for its own verification product, Voicevault. The technology works by transforming a voice sample into a ‘voice print’ of the characteristics of that person’s voice. This voice print is then matched against a sample to see if the two are the same. This can be done with a microphone or a telephone. It uses “algorithms to filter out noise,” and can be used via a mobile handset or on a PC. When CF&S asked him about the accuracy of the technology, he said that it had a less than 1% equal error rate. That means that there are a similar number of false rejects/accepts. However, it can be configured by threshold — to be more or less strict — depending on the priorities of the business need. Chadwick emphasised the importance the application of the risk algorithm to decide on the level of security sophisti- cation required. He argued that security is about appropriate levels and warned against trying to “shoehorn applications into old security methods eg. PKI.” He said that voice verification technology is “the natural thing to use in M-commerce as its uses are only limited by imagination.” Two new hacking tools There are two new hacking tools available for download, which are stirring up a lot of interest in hacking circles. They are GodMessage and Choke. GodMessage lets crackers put ActiveX code on Web pages. This could cause browsers to download a compressed file, to be exe- cuted on startup. The danger is that innocent sites could be used in this exploitation. And, according to Jonathon Mynott at security specialist Cryptic Software, “You only have to browse a Web page to be infected”. However, the anti-virus firms claim that those with AV protection should be protected. Denis Zenkin at Kaspersky Lab describes GodMessage as an ordinary Internet worm generator. He said that Kaspersky has, “received no reports of malicious code from God- Message 4 in the wild”. Sophos spokesperson Gra- ham Cluley concurred: “God- Message relies on a vulnera- bility in some people’s browsers, but if you have an up-to-date anti-virus, it’s irrelevant.” The Choke worm circum- vents security controls using MSN Messenger and sends itself to user’s ‘buddy’ lists. Cluely pointed out that instant messaging is not caught by traditional AV: “These viruses can waltz past anti-virus gateway software.” Tally Systems update threat list Tally Systems has added a further 400 fingerprints to the database of threats that it can detect. Among the threats now covered are Back Orifice. L0phtcrack, WinNuker and VBS Worms Generator (of AnnaKournikova fame). Michael Vatis from NIPC explained: “The cyber-environ- ment is borderless, affords easy anonymity and provides new tools to engage in criminal activity.” 4

Two new hacking tools

  • View
    223

  • Download
    3

Embed Size (px)

Citation preview

Page 1: Two new hacking tools

news

Usenet hotbed ofmalware saysMcAfee

Usenet is now a seething massof viruses, Trojans andbackdoors, according to oneindustry spokesperson.Dmitry Gryaznov, manager ofadvanced virus research atMcAfee, claims that news-groups are increasing in popu-larity as they allow people todownload free information andfiles, but that the virus writersare joining too, and are postingtheir malware there.

Infected files are oftendisguised as multimedia filesor as pirated software.

The volume on newsgroupshas grown 20% between Jan-uary and April this year andlooks set to continue. The sheervolume of traffic makes themdifficult to police — 230GB ofdata is posted to Usenet eachday. According to Gryaznov'sresearch, a single virus can beposted about 200 times in a day.

A further danger is posed bysites such as Google that archivematerial, because they preventposts from expiring, even afterthey have been taken down.

Despite the fact that manycorporations block the use ofnewsgroups, the malware endsup on the company networkanyway. "There are plenty ofgateways and you simplycannot block all of them,"Gryaznov said.

He says that "undoubtedly,education is one of the keys" tosolving this problem. To thisend, McAfee is launching Virus-Patrol Live, a website which willcarry a lot of information aboutUsenet and viruses and form aresource for statistics and

detailed information aboutspecific viruses.

Technology News

Biometrics usedas correction tool

Biometric authentication isbeing applied by those whohave no choice in the matter— convicted criminals.According to Maurice Chad-wick, COO of voice specialistsBuytel, the ‘community correc-tions market’ is second only tofinancial services and telcoapplications.

He says that the reason forchoosing voice, rather than themore traditional fingerprint oriris recognition, is that theentry costs are significantlylower. There is no need to buyan expensive reader as only amicrophone, or even ordinarytelephone, is required at theclient side.

So, offenders who are out onbail, or governed by a curfew,will make a telephone call tosay that they are ‘home’. Thiswill be authenticated by thetelephone number from whichthey are calling, coupled witha voice sample to prove theidentity of the caller.

This is a far cry from theJames Bond image formerlyenjoyed by the biometricsindustry. Chadwick describescommunity corrections as “oneof the early adopters…[but the]end users have no choice in thematter.”

Buytel’s main business is as amanaged service provider forits own verification product,Voicevault.

The technology works bytransforming a voice sampleinto a ‘voice print’ of thecharacteristics of that person’s

voice. This voice print is thenmatched against a sample tosee if the two are the same.This can be done with amicrophone or a telephone. Ituses “algorithms to filter outnoise,” and can be used via amobile handset or on a PC.

When CF&S asked himabout the accuracy of thetechnology, he said that it hada less than 1% equal errorrate. That means that there area similar number of falserejects/accepts. However, itcan be configured bythreshold — to be more or lessstrict — depending on thepriorities of the business need.

Chadwick emphasised theimportance the application ofthe risk algorithm to decide onthe level of security sophisti-cation required.

He argued that security isabout appropriate levels andwarned against trying to“shoehorn applications intoold security methods eg. PKI.”He said that voice verificationtechnology is “the naturalthing to use in M-commerceas its uses are only limited byimagination.”

Two new hackingtools

There are two new hackingtools available for download,which are stirring up a lot ofinterest in hacking circles.They are GodMessage andChoke.

GodMessage lets crackersput ActiveX code on Web pages. This could causebrowsers to download acompressed file, to be exe-cuted on startup. The dangeris that innocent sites could

be used in this exploitation.And, according to JonathonMynott at security specialistCryptic Software, “You onlyhave to browse a Web page tobe infected”.

However, the anti-virusfirms claim that those withAV protection should beprotected. Denis Zenkin atKaspersky Lab describesGodMessage as an ordinaryInternet worm generator. Hesaid that Kaspersky has,“received no reports ofmalicious code from God-Message 4 in the wild”.

Sophos spokesperson Gra-ham Cluley concurred: “God-Message relies on a vulnera-bility in some people’sbrowsers, but if you have anup-to-date anti-virus, it’sirrelevant.”

The Choke worm circum-vents security controls usingMSN Messenger and sendsitself to user’s ‘buddy’ lists.

Cluely pointed out thatinstant messaging is notcaught by traditional AV:“These viruses can waltz pastanti-virus gateway software.”

Tally Systemsupdate threat list

Tally Systems has added afurther 400 fingerprints tothe database of threats that itcan detect.Among the threats nowcovered are Back Orifice.L0phtcrack, WinNuker andVBS Worms Generator (ofAnnaKournikova fame).

Michael Vatis from NIPCexplained: “The cyber-environ-ment is borderless, affords easyanonymity and provides newtools to engage in criminalactivity.”

4

July issue.qxd 7/4/01 2:44 PM Page 4