Java tipped in Red October – may be Homeland Security’s hang-up

Over the past several days, the US Department of Homeland Security has issued warnings against using Java due to newly discovered security weaknesses – today it’s been tipped that the Red October cyberespionage attacks may have had their own Java iterations. The two have not been put together by the Israeli IT security firm Seculert, the group that today suggests Red October was implemented not just via email downloads and USB sticks, but through web-based Java exploits as well. Could that and Homeland Security’s warning be timed both right here at this point in time together without any relation to one another?

wagwe

Coincidences like this don’t just happen every day. According to Kaspersky Lab, the antivirus group that let loose the info on Red October earlier this week, it was mainly through Word and Excel documents that the security exploit was delivered, either via an email download or possibly through USB sticks plugged into host computers. Security researchers from Seculert assigned to analyze the command and control servers used in the Red October campaign have found a malicious Java applet made to exploit a Java vulnerability they say was patched all the way back in October of 2011.

trashing_java-580x429

What this means is that their targets were not computers that were brand new, patched and up to date, but older machines that for one reason or another hadn’t gotten with the program. Another fabulous reason to keep your computer up to date, that’s what this is. According to the Seculert blog where the Java connection announcement was made, “the JAR file of the Java exploit was compiled in February 2012, even though the patch for the vulnerability was available as of October 2011.”

These exploits appear to have been included in pages with the title “We Can Find All News!” The terms “news theme” and “NewsForYou” were also included in the code, this leading the team to believe that it was through a series of pages that suggested they’d be delivering the malicious project via harmless-seeming websites with “fake” news blasts galore. While it would seem strange that the US Department of Homeland Security would wait many, many months to deliver a warning against an attack like this, it is possible that, like the rest of us, they only found out about it here in 2013 – and they’ve not confirmed that this is the same attack, of course, but we shall see!


Java tipped in Red October – may be Homeland Security’s hang-up is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Operation Red October cyberattack detailed by Kaspersky Lab

This week the Moscow-based antivirus company Kaspersky Lab has revealed details of a five year long campaign that apparently targeted diplomatic, governmental and scientific-research organizations across the former Soviet Union. This attack used software known as Operation Red October, aka Rocra, a piece of malware designed to locate and make copies of both encrypted and non-encrypted documents in a target’s computer. This attack appears to have been spread across hundreds of victims since 2007 with an intent on gathering classified information as well as geopolitical intelligence.

bugs

Kaspersy chief malware expert Vitaly Kamluk spoke on the situation this week, noting that “there are about 300 computers infected that we know about.” These computers include those owned by embassies, government research centers, and aerospace facilities throughout former Soviet states as well as Belgium and India. Most of the attacks appear to have been directed at former Soviet states while Belgium and India each suffered a total of 15 infections, while the United States and Iran were confirmed to have suffered six and seven attacks, respectively.

The team at Kaspersy noted that though they’d found a set of 60 “command and control” servers throughout Germany and Russia that were responsible for these attacks, they each appeared to have been controlled by a sort of “mother ship” server which they’ve not yet located. Each of the attacks thus far appear to have been attached to Microsoft Word or Excel documents and delivered via email. When the document was downloaded and opened, a connection was made between the computer and one of the many command and control servers which then delivered the files necessary to collect secure data.

This Rocra malware was also spread with USB drives as well as through smartphones, not just through desktop machines. Mentions of Russian words throughout the discovered malware systems have been suggested to either point towards the software as being Russian in origin or placed deliberately to make the software appear to have come from Russia when in fact it was made by a different group entirely.

We’ll see more information on this relatively widespread attack in coming weeks, without a doubt. Stay tuned to SlashGear’s hacking tag to see all the action as it comes down.

[via Wall Street Journal]


Operation Red October cyberattack detailed by Kaspersky Lab is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Meet Red October: The Global Cyber-Espionage Ring That Spent 5 Years in the Shadows

There are plenty of cyberweapons floating around out there, like Stuxnet, Flame, and that whole gang. Now, Kaspersky has turned up a cyber-espoinage operation its dubbed “Red October,” and it’s up there in the big leagues. But unlike its cohorts, it doesn’t look state-sponsored. This is a freelance job, and it’s professional grade. More »

Developer releases dozens of fake apps in Google Play store, user beware

Malware in the Google Play store is nothing new, and Google does their best to sift out most of the crap that makes its way in, but sometimes some of it sneaks through. A Google Play developer account by the name of “apkdeveloper” has released a ton of fake apps and games that are essentially rip-offs of other popular apps.

Screen Shot 2012-12-28 at 1.23.51 PM

Some of the more popular titles that the developer rips off are Imangi’s Temple Run game and Glu Mobile’s Contract Killer Zombies. It appears the faux developer has put “Super” at the end of each app name, which should throw a red flag up right away as far as if it’s a legitimate app or not. Plus, all of the icons for all the apps are the same, rather than unique icons for each individual app or game.

Since many people won’t even dare to install these fake and malware-infested applications, we’re not quite sure what the malicious code might be capable of exactly, but several reports suggest that it delivers unwanted ads to several parts of your device. While doesn’t seem like a huge deal, it’s still annoying, and you never know what could be going on behind the scenes.

As always, be careful when downloading apps and make sure you’re not downloading a fake app that’s filled with malware. Usually, though, it’s all about common sense — check the name of the developer, check the reviews, check the descriptions and make sure you’re always downloading from legitimate sources. And if you come across a fake app, report it to Google.


Developer releases dozens of fake apps in Google Play store, user beware is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Android 4.2 App Verification Service tested, found no substitute for full anti-malware tools

Android 42 App Verification Service tested, found no substitute for dedicated antimalware tools

Google’s App Verification Service is a quiet addition to Android 4.2, but potentially game-changing: it promises malware checks for any installable Android app, whether it comes from a Bouncer-verified Google Play or a website lurking in the shadows. NC State University Associate Professior Xuxian Jiang doesn’t want to simply accept the claim at face value, though. He just pitted the service against 10 anti-malware apps to gauge its effectiveness at stopping a wide range of rogue code. The short summary? Don’t quit your day job, Google. Among 1,260 samples, the App Verification Service caught 193 instances, or 15.32 percent — well below the 50 percent of its closest challenger, and nowhere near the perfect scores of two apps. According to the professor, Google’s shortcoming mostly comes from a relatively skin-deep routine that checks the SHA-1 value and install package name, not underlying code that’s tougher to change. Android malware isn’t a serious enough issue for us to be worried at present, but nor would we lean on the App Verification Service as our only safety net.

Filed under: ,

Comments

Source: NC State University

Android malware scanner only detects 15% of malicious code

Android 4.2 Jelly Bean features a new security tool that quickly scans downloaded apps for malicious code. It’s essentially Google‘s way of addressing the long-time threat of malware on the company’s mobile platform. However, a computer scientist at North Carolina State University found that only about 15% of malicious apps were caught by the built-in scanner.

During his testing, Xuxian Jiang loaded 1,260 instances of Android malware onto the recently-released Nexus 10, and examined which of the 1,260 instances triggered a warning to users. Surprisingly, only 193 of them correctly triggered such a warning, resulting in a measly 15.32% detection rate.

Jiang also discovered that the performance of Google’s own offering lagged behind the performance of numerous third-party antivirus apps such as Avast, Symantec, and Kaspersky. Overall, the detection rates of the third-party antivirus apps were between 51% to 100%, compared with 15% for Google’s offering, which comes built-in with the Google Play app.

However, Jiang points out that VirusTotal, which was recently acquired by Google, had superior detection capabilities, so hopefully Google will integrate VirusTotal’s technology into the core Android OS to act as the malware scanner for downloaded apps that come through. The built-in scanner could quickly improve if Google makes this happens.

[via Ars Technica]


Android malware scanner only detects 15% of malicious code is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Japanese Android Developers Successfully Infected 270,000 Phones With Malware

Today Japanese police arrested five developers for embedding a virus into their Android apps. It’s no secret that a lot of apps on Android are suspect and often scummy, but what is a surprise is how many people they fooled: according to Japanese police, who initially suspected only 90,000 infections, apparently these guys collected 10 million separate pieces of information from their series of apps. According to Google Play, some apps have been downloaded 270,000 times. The worst part is how they got people to download their virus-ridden software: they simply took names of popular games, and added “The Movie” to the end. So,  for instance, “Angry Birds: The Movie.”  Guys, if you’re going to download an app, you should probably Google it and see whether it has any value before your let it see what’s on your phone.

By Ubergizmo. Related articles: Google disputes claims of Android botnet , Apple App Store’s first spam sending app pulled,

Google explains how its Android 4.2 malware scanner guards the side door

Android's new malware scanner

Sideloading apps on Android implies a whole set of security holes, but the new malware scanner included in Android 4.2 could provide a much-needed plug. Talking to Computerworld, Android VP of Engineering Hiroshi Lockheimer revealed that Google’s been analyzing APKs that crop up online, regardless of whether they’re official market apps or not, in order to maintain a growing database of good and bad code. The scanner — shown above — then works in a similar way to the Bouncer on the front gate, comparing all the apps on your phone to that database. The new sentry helps Google build upon other Android 4.2 security features such as an improved app permission screen and a block against apps sending premium SMS messages in the background. On the other hand, some might say that collecting samples of existing malware will never be as powerful as truly understanding its DNA.

Filed under: , , , ,

Google explains how its Android 4.2 malware scanner guards the side door originally appeared on Engadget on Fri, 02 Nov 2012 11:36:00 EDT. Please see our terms for use of feeds.

Permalink Android Police  |  sourceComputerworld Blogs  | Email this | Comments

Android 4.2′s security system features real-time app scanning

Google‘s Android 4.2 mobile operating system offers a variety of new features, one of which is a security system. This comes in light of reports about malware targeting smartphones, with Android malware levels tripling in Q2 of this year. The Android 4.2 security system is integrated into the mobile OS, and is always on the lookout for problems.

According to Computer World, 4.2′s security system is an extension of the Google Play Store’s security technology, which analyzes apps uploaded to the store for maliciousness. With Android’s new security system, however, the mobile OS will scan apps installed from third-party sources in real time. This offers users protection from malicious apps that aren’t vetted by the Play Store’s security system.

Android’s security system is opt-in. Users who download an app from a third-party source will be prompted the first time around to let Google check them for harmful behavior. The users can then opt-in by tapping “Agree,” or dismiss it and take the risk. If you opt-out the first time around but change your mind later on, you can enable the feature in Security via Settings.

Said Android’s Vice President of Engineering Hiroshi Lockheimer, “We view security as a universal thing. Assuming the user wants this additional insurance policy, we felt like we shouldn’t exclude one source over another.” Apps are checked via Google’s app database. According to Lockheimer, the company has a “catalog of 700,000 applications in the Play Store, and beyond that, we’re always scanning stuff on the Web in terms of APKs that are appearing.”

[via Computer World]


Android 4.2′s security system features real-time app scanning is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Notorious Cyberspy Caught By His Own Malware

The nation of Georgia discovered a botnet trying to steal sensitive government documents, and what did they do? They gave the cyber-spy a taste of his own medicine, infecting his computer with the very same software he was targeting governments with. His infected computer eventually captured a photo of the alleged cyberterrorist, as well as his IP address. Georgia’s Computer Emergency Response Team says the hacker is behind the “Georbot Botnet” which targeted major governments around the world, including Georgia, the US, and France. The botnet was pretty sophisticated, using 0-day vulnerabilities, embedding itself in links on major Georgian news sites, and turning on microphones and webcams to glean important government data from infected computers. According to CERT, they’ve hack is linked to “Russian Security,” but all we know about him is the photo they gave us.

If you’re interested, read the entire report from CERT here.

By Ubergizmo. Related articles: Google disputes claims of Android botnet , German Police monitor Gmail, Skype, and Facebook via snooping malware,