Page 1 of 6 123456 LastLast
Results 1 to 10 of 59

Thread: Dangerous!

  1. #1
    Join Date
    Jan 2005
    Location
    Sundsvall, Sweden
    Posts
    3,532

    Dangerous!

    To all in this forum!

    Keep an eye on this! :shockingzap:

    "You can fool some of the people some of the time,
    you can fool some of the people all the time,
    but you can't fool all the people all the time".
    Abraham Lincoln (United States, 1809-1865),
    President of the United States of America

    - Panda Software reports the emergence of pharming as a serious threat to users -
    Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)

    Madrid, march, 23th, 2005 - Panda Software is now warning of the emergence of a new online fraud technique, sophisticated and dangerous: pharming.

    Pharming involves altering DNS (Domain Name System) addresses so that the web pages that a user visits are not the original ones, but others created specifically by cyber-crooks to collect confidential data, especially information related to online banking.

    Pharming attacks can be carried out directly against the DNS server, in such a way that the change of address will affect all users accessing this server while they browse the Internet, or they can be carried out locally i.e. in individual PCs. This second scenario is much more dangerous, not just because it is more effective, but because it is easier for attackers. They only need to take two actions: modify a small file, called hosts, which can be found in any computer running Windows and using Internet Explorer to access the Internet; and create a false web page. The host file stores a small table with the server and IP addresses most commonly accessed by the user, so that it is not necessary to access the DNS server to convert Internet addresses (URLs) into IP addresses. If this file is overwritten, for example, with false addresses for online banking pages, whenever a user types the name of this bank in the browser he will access the page created by the hacker which has exactly the same appearance as the genuine page. The unsuspecting victim could then enter confidential data unaware that it is really falling into the hands of the cyber-crook.

    The hosts file can be edited directly by the hacker (by accessing remotely to the system) or using malicious code, normally Trojans such as some variants of the Bancos, Banker and Banbra families. Pharming attacks can also be perpetrated by exploiting any software vulnerability that gives access to the system files.

    Panda Software is offering the following advice to users to help prevent them falling victim to pharming attacks:

    - Use anti-malware software combining proactive and reactive detection systems: the simplest way of manipulating a computer so that it becomes the victim of a pharming attack is by using malicious code, generally Trojans. It is highly advisable to use proactive protection systems that can pre-empt threats and block them simply by analyzing their behavior.

    - Install a personal firewall: this precaution will prevent a hacker from entering the computer through an unprotected communication port and modifying the system.

    - Frequently update the software installed on the computer or have automatic update systems enabled to ensure there are no vulnerabilities that can be exploited in order to launch these kinds of attacks.

    NOTE: The address above may not show up on your screen as a single line. This would prevent you from using the link to access the web page. If this happens, just use the 'cut' and 'paste' options to join the pieces of the URL.

    ------------------------------------------------------------

    The 5 viruses most frequently detected by Panda ActiveScan, Panda Software's free online scanner: 1)Netsky.P; 2)StartPage.FH; 3)Mhtredir.gen; 4)Downloader.GK; 5)Shinwow.E

    Lagu
    Once an AMDuser always an AMD user

  2. #2
    Good to see you back on line Lagu!

    To fight the mentioned attack, for winXP users:
    use MS's AntiSpyware Beta 1

    Quote from its help:

    What does this System Agent do?
    The Windows Host File Agent monitors changes to your system hosts file. If a new entry is made, or an older entry is modified or deleted, an alert prompts you to confirm the change.

  3. #3
    AMDave's Avatar
    AMDave is offline Seeker of the exit clause Moderator
    Site Admin
    Join Date
    Jun 2004
    Location
    Deep in a while loop
    Posts
    9,658
    And a reminder for ZoneAlarm users
    Firewall > Main > Advanced > Lock Hosts file
    . . . . . ___
    . . . . . . .\___/\______
    . . . . . . . \__AMD___\\__
    ---------------------------------------------

  4. #4
    Found a swedish site about the ms AntiSpyware:
    http://www.microsoft.com/sverige/sec...ntispyware.asp

  5. #5
    Join Date
    Jan 2005
    Location
    Sundsvall, Sweden
    Posts
    3,532
    Quote Originally Posted by AMDave
    And a reminder for ZoneAlarm users
    Firewall > Main > Advanced > Lock Hosts file
    Thanks AMDave for this tip! I have now locked the host into my ZA
    Lagu
    Once an AMDuser always an AMD user

  6. #6
    Join Date
    May 2004
    Location
    Kent, UK
    Posts
    3,511
    Just locked mine too, thanks Lagu.

  7. #7
    Join Date
    Jul 2004
    Location
    Sussex, UK
    Posts
    3,734
    gd information well found lagu, nice to know about the security threats before they cripple your machine ;)

  8. #8
    Join Date
    Jan 2005
    Location
    Sundsvall, Sweden
    Posts
    3,532
    Quote Originally Posted by meckano
    Found a swedish site about the ms AntiSpyware:
    http://www.microsoft.com/sverige/sec...ntispyware.asp
    Thanks Meckano for this link!
    I have download this software and let i go a run but no spyware was found. I have also AD-advare vho i run yesterday and it found some spyware who I remove.

    Lagu :D
    Once an AMDuser always an AMD user

  9. #9
    As well as locking it, check it to see if there are any oddities.
    do a search on C drive for Hosts, it is called hosts, mine has no extension. Found it in:
    C:\WINDOWS\system32\drivers\etc (winXP)
    I deleted any *.bak's that spybot s&d created and ignored the one called *.sam.
    Now the only non-comment line in that remaing file is:
    127.0.0.1 localhost

  10. #10
    Join Date
    Jan 2005
    Location
    Sundsvall, Sweden
    Posts
    3,532
    Quote Originally Posted by meckano
    As well as locking it, check it to see if there are any oddities.
    do a search on C drive for Hosts, it is called hosts, mine has no extension. Found it in:
    C:\WINDOWS\system32\drivers\etc (winXP)
    I deleted any *.bak's that spybot s&d created and ignored the one called *.sam.
    Now the only non-comment line in that remaing file is:
    127.0.0.1 localhost
    I have found by search:
    wpa.bak (system32) 5 kb 17/3 2005
    Ntmsdata.bak. (system 32) 108 kb 17/3 2005
    imsins.bak (Windows) 5 kb 17/3 2005
    personal_32_1053.dat.bak 147 kb (Windows\pchealt) 24/3 2005

    Lagu
    Once an AMDuser always an AMD user

Page 1 of 6 123456 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •