What's the opposite of Hooray!
New online banking Trojan empties users' wallets, videos privates
Bank account-raiding Trojan Hesperbot has infected computers in UK, Turkey, the Czech Republic and Portugal, The Register has learned. Net security firm Eset said the software nasty is distributed via rather convincing-looking emails, which are dressed up as legit package tracking documents from postal companies or …
-
-
-
-
-
Thursday 5th September 2013 18:07 GMT Peter2
Implement a Software Restriction Policy as follows:-
Default Level : Disallowed
Rule: Allow C:/Program Files
Rule: Allow //server/required_executables
This needs minor modifications for each environment it's used in so the paths allow all programs your business uses (which should all be in program files already, but this needs checking) Failing that, just leave the default as unrestricted and set the temp folders to disallowed.
Unauthorised executable code ran from email attachments execute in the temp folder, which does not have execute permissions so trojans etc the users may run just generates an error message stating "Sorry, Dave, you can't do that! Contact your System Administrator"
And that's the end of your virus outbreak, even if your AV doesn't have signatures for it since it's a zero day threat.
-
Friday 6th September 2013 15:36 GMT Tom 13
Re: That's quite common
Regardless of frequency of use, practices which have the ultimate affect of compromising users should be avoided.
Yes, this one still mostly belongs in the MS court for bad, bad, bad choices on default settings. Given that MS have decided to try to ape Apple's forked file structure using three dot extensions on their file format, they do need to implement something to check the file when it has a double dot. If the OS can always determine whether or not the file is executable, the icon for the file should always default to one that shows the user the file is an executable. Better still, get rid of the thrice-damned obfuscation.
-
-
Friday 6th September 2013 10:47 GMT MacGyver
Clicky, click.
"Thanks Microsoft for hiding the extensions by default which IMHO is one of the most stupid things they have ever done."
And show the feeble-minded that those clickable words point to things called "files" and those have things called "extensions", and those mean different things. Consumer's Mind=Would Be Blown. (from Microsoft's point of view) They want users that click on pictures, and enter their creditcard info when prompted, not ones that understand file extensions. (have you seen Windows 8?)
-
-
-
-
-
Thursday 5th September 2013 16:53 GMT mmeier
Re: Move Along Linux Users
Actually Trojans like this one work on every OS. They do not use a security hole, they get the user to open the doors and haul them in. But 1.4 percent market share is not worth writing a version, even less so since considerable parts of that share are students and low income groups
-
Thursday 5th September 2013 17:21 GMT Anonymous Coward
Re: Move Along Linux Users
I think allowing an executable to run by merely clicking on a hyperlink IS the fault of the OS and its helper programs.
Certainly on my systems running OpenSUSE/Firefox it will not run but put a warning message to the effect that the file is a binary and would I Iike to save it. If it is saved the executable bit is not set.
-
-
-
-
-
Thursday 5th September 2013 17:00 GMT @ValidSoft
Combating global cyber crooks
Fraudsters using new and improved Zeus and SpyEye malwares like Hesperbot to infiltrate people’s computers, enabling them to steal their personal details so that they can siphon large amounts of money into their own bank accounts. This isn’t the first time that malware has conquered innocent victims’ computers, but what is more malicious about the new version is that money transfers are automated. Criminals are evolving with technology and targeting cloud-based servers.
Fraudsters needn’t lurk around the internet and wait for people to log on to their bank accounts anymore (classic Man-in-the-Middle type fraud), instead with the process computerised, criminals can now drain bank accounts more quickly and efficiently making it even more difficult to detect.
Organised criminal gangs are tactical and ambitious, targeting high net worth individuals and business accounts with large sums of money.
The real worry is the sheer scale of this global problem that we are dealing with which is now a major a core revenue generator for organised crime.
Perhaps, what the security industry needs to admit that alongside efforts to prevent fraud, the industry needs to focus increasingly on detection and what it can do is make it very difficult for fraudsters to actually use the stolen data to access bank accounts.
As I’ve said before, two factor authentication is no longer viable. The industry needs to move towards a multi-layered approach to authentication, using a mix of visible and invisible layers such as voice biometrics. Also, detection needs to work in real-time so that victims and their banks are alerted to attacks immediately and thereby given the chance to prevent it from happening, saving them the inconvenience of being out of pocket and their banks from the costs of fraud investigation.
-
Friday 6th September 2013 08:28 GMT Charles 9
Re: Combating global cyber crooks
The trick will be to make things BOTH secure AND easy to use. You need both because without the latter, people get fed up and go around. Trouble is, the two tend to work against each other, as secrity tends to require some complexity (to combat brute forcing) to be useable. And no matter which angle you take, there are complications (anything internal to the user like biometrics can't be replaced if cloned, and anything external to the user like dongles can be lost or stolen).
Plus the anonymous nature of the Internet means there's a ponit when Mallory can mimic Alice to the point of gaining trust, stymiing forensic analysis. Some malcontents are patient enough to fall below the noise floor, such that trying to detect them (realtime or not) results in too many false positives, making the system impractical. Then there's the matter of establishing trust in the first place, and there's hints two parties who can't meet face-to-face can't properly establish it without help from a third party (who really can't be trusted), taking the whole e-commerce system back to DTA mode.
-