REMOVING SPYWARE/ADWARE/VIRUS

Articles
Home
Remove 180search Assistant/AND others
Disabling or enabling Windows Me System Restore/Windows XP
security advisories
AROURA
LINKS
Articles

 Sunbelt Adds Detection for ID Theft Keylogger  nti-spyware vendor Sunbelt plans to release a free tool to zap a sophisticated keystroke logger being used by an organized ring of identity thieves.
 

The spyware keylogger, named Srv.SSA-KeyLogger, was being used to hijack confidential data from millions of infected computers and send the information back to a remote server controlled by an identity theft ring.

As previously reported, researchers at Sunbelt Software Inc. made the discovery during an audit of "CoolWebSearch," a program that routinely hijacks Web searchers, browser home pages and other Internet Explorer settings.

According to Sunbelt president Alex Eckelberry, the keylogger is a small program related to the Dumador/Nibu family of Trojans.

He said the executable runs under the cover of Microsoft Corp.'s Internet Explorer browser, making it difficult to detect by software of hardware firewalls.

The keystroke logger has been programmed to shut down the firewall that ships with Windows XP and steal data from the IE "Protected Storage Area."

The program also hijacks data from the Windows clipboard and uploads all the stolen data to a remote Web server controlled by an unknown ring of identity thieves.

PointerRead more here about Sunbelt's discovery of the identity theft ring.

Ziff Davis Internet News has confirmed that the data being sent to the Web server included chat sessions, user names, passwords, bank account information, full names, addresses, eBay and PayPal account information.

The logs being sent to the server also include logins and passwords from a number of software programs, including WebMoney, Far Manager and Total Commander.

According to Eckelberry, the keylogger also modifies the host file to block the infected machine from accessing anti-virus programs.

Because the keylogger is programmed to hijack data from the IE "Protected Storage Area," Eckelberry recommends that IE users turn off the browser's "AutoComplete" feature.

That can be done by unchecking the pre-checked boxes via Tools > Internet Options > Content.

According to Eckelberry, the data stored in that IE feature is very lucrative for identity thieves.

The browser's AutoComplete tool is used to store all data entered on HTML forms when purchasing products over the internet or filling out personal information like addresses, phone numbers, and Social Security numbers.

It also has a feature that stores usernames and passwords for Web sites that require you to login.

One example of this is online banking Web sites that include Web-based mail servers like Hotmail or Gmail, he explained.

PointerRead more here about the many faces of spyware.

Eckelberry said Sunbelt will share the technical details on the keystroke logger with the entire anti-virus industry to ensure that detections are added for users.

Sunbelt has already updated its CounterSpy and CounterSpy Enterprise anti-spyware databases and plans to post the free detection tool to the Sunbelt home page on Thursday.

Anti-virus vendor Trend Micro Inc. provides a free online scanning tool that detects and deletes the "CoolWebSearch" application.

The Trend Micro tool is available for the Microsoft Windows XP, Windows 2000, Windows Millennium Edition and Windows 98 operating systems. However, it will not detect the Srv.SSA-KeyLogger executable.

Protection Recommendations:

Sunbelt has published a list of basic security recommendations for users and administrators to help thwart identity thieves. They include:

  • Train employees on the dangers of opening attachments they are not expecting. Also, do not install software that is downloaded from the Internet unless it is scanned for viruses. Even visiting an infected Web site can compromise a computer if certain browser vulnerabilities have not been patched.

  • Isolate infected computers quickly to prevent further infection throughout your organization.
  • Use complex passwords to make it difficult to access key information on compromised computers. Turn off and remove unnecessary services. Many operating systems install auxiliary services that are not critical, such as an FTP server, Telnet and a Web server. These services open avenues through which malware can attack.
  •  

  • Configure your e-mail server to block or remove e-mail that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.

  • If malware infects any network services, disable or block access to those services until you can apply a patch. Always keep your systems up-to-date with the necessary patches and security updates, especially on computers that host public services and can be accessed through a firewall, such as HTTP, FTP, mail and DNS services.
  •  Perform a detailed analysis and only use trusted media to restore previously infected computers.
  •  

     

     

     

     

     

     

     

     

     

     

     

     
     


    Spyware researchers picking apart one of the more notorious spyware programs have stumbled upon what appears to be a massive identity theft ring hijacking confidential data from millions of infected computers.

    Sunbelt Software Inc., makers of the enterprise-grade CounterSpy spyware protection product, made the discovery during an audit of "CoolWebSearch," a program that routinely hijacks Web searchers, browser home pages and other Internet Explorer settings.

    During the research, Sunbelt researcher Patrick Jordan deliberately installed the "CoolWebSearch application on a machine and immediately noticed that the infected system became a spam zombie that was placing callbacks to a remote server.

    When Jordan visited the remote server, he was shocked to find that it was being used to distribute sensitive personal information from millions of PC users infected by the spyware application.

    "We found the keylogger transcript files that are being uploaded to the servers. We're talking real spyware stuff…chat sessions, usernames, passwords, bank account information, full names, addresses," said Sunbelt president Alex Eckelberry.

    PointerRead more here about the many faces of spyware.

    In an interview with Ziff Davis Internet News, Eckelberry said the sophistication of the operation suggests it's the work of a "massive identity theft ring" that used keystroke loggers to grab confidential information that could be used to create fake online identities.

    "I'm not being dramatic. This is the most repulsive thing I've ever seen. It's very painful to see what's in these log files that are being uploaded in real time. We're seeing a lot of bank information and usernames and passwords to get in," Eckelberry said.

    He said the log files included logins to one business bank account with more than $350,000 and another small company in California with over $11,000, readily accessible.

    "There are lots of eBay account information and names and addresses of the people owning those accounts. Names, passwords, all matched up," Eckelberry added.

    PointerRead more here about Sunbelt's acquisition of a Google-like spyware sniffer.

    He said the server, which is hosted out of a data center in Texas, was effectively a "massive repository of stolen data" that was being replenished in real time.

    "As the [log] file gets to a certain size, it gets taken down and a new file starts generating. This goes on nonstop. We've been watching it for a few days while trying to get to the FBI, and it just keeps growing and growing."

    While the site is being hosted in the United States, Eckelberry said the domain name is registered to an offshore company.

    Eckelberry said the huge size of the log files is a clear indication that thousands of machines are pinging back daily

    Spyware Researchers Discover ID Theft Ring
    By Ryan Naraine

     

    PC Pitstop has previously examined the dangers in P2P software bundles but there are also dangers in the files you can get from these networks. Last week, Chris Boyd (a.k.a. PaperGhost) of VitalSecurity.org published the first public information of spyware installs created by a company named Marketing Metrix Group (MMG). In many ways, though, that is the last chapter of the story. During May and June, MMG was pelting BitTorrent sites with a steady stream of spyware-infested downloads. The incident shows how the adware industry lacks either the skill or the will to police their distribution channel, and how users are usually the victims of their shortcomings.The whole story can be found at PC PitStop/Dave Methvin

    Spyware - Because its not just big brother any more. Be aware of what is running on your computer, what it is doing, who put it there, why they put it there and if they had the right to put it there.

    READ MORE ABOUT IT >>>Spyware.UK

    Direct Revenue's Aurora: Plague of the Internet?
    Posted on 2005-06-07 17:16:15
    Direct Revenue (aka ABetterInternet) is one of the companies given the green light by AOL's Netscape trust rating system. The self-professed "leader in online media" has sent cease and desist warnings to companies who categorize their software as malicious. But malicious it is: as Spyware Warrior explores, Direct Revenue's new Aurora software is making users so angry, they're filing class action lawsuits and calling Congress. Our post on the subject has received over 18,000 unique views, most of those from Google users searching for ways to remove it. A reformed adware industry?

    180Solutions and the Short way to the Cleaner Image
    180 Solutions has again launched another move to get their act together. So what's the big deal? You dare ask!? 180 is no longer installing its software through 3rd party websites! And they've ended talks with IST. Today is a good day in spyware history (for once). Straight from their news release:

    BELLEVUE, Wash.- October 11, 2005-180solutions, Inc., a leading provider of Internet search marketing solutions, today announced it has ended its distribution partnership with Montreal, Canada-based Integrated Search Technologies (IST). In addition, the company will no longer allow third parties to distribute its software via ActiveX except when using a 180solutions-controlled ActiveX installer. This will allow the company to ensure that every step of the ActiveX installation experience is controlled by 180solutions rather than third parties.

    Great. We all know that IST isn't a pretty sight and comes in many flavors: installation through security holes. No surprise: 4 of the 10 top spyware threats by SunBelt Software are from IST. I was visiting Spyware Confidental today and I really agreed with Suzi. She writes:

    180solutions has been talking about changes for nearly a year but the talk didn't stop the continued non-consensual installations, often via security exploits, as captured on video and in network logs by a number of spyware researchers as recently as October 5, just one week ago. The CDT's decision not to file the complaint serves no justice to the thousands, maybe hundreds of thousands, of consumers whose computers were violated by 180solutions. A few days ago I stumbled upon an article about Fortune Small Business magazine's list of "Best Bosses". The last name on the list is Keith Smith, CEO of 180solutions. It says "Keith Smith (180solutions, Bellevue, Washington) At this online marketing firm, employees play dodgeball and volleyball." Apparently all the dodgeball practice has served them well. 180solutions did, indeed, dodge the bullet about to be fired by the CDT.
     

    contact me stevenoonan214@hotmail.com