Tuesday, March 28, 2006
Hundreds of malicious Web sites are attempting to exploit the most critical of two flaws announced in Microsoft's browser over the last week, convincing two companies to release workarounds late Monday to head off the threat. Security firms Determina and eEye Digital Security each created a standalone patch to protect Windows systems that use Internet Explorer to browse the Web. The vulnerability, the most critical of three announced in the last week, is reportedly being actively exploited by more than 200 malicious Web sites. So Microsoft is again last to bring out there own patch ... however are these other companies not using these patches in a commercial way? Are they not exagerating? This is not the same situation as last time during the WMF exploit period when the risc was really higher in my opinion.
Sunday, March 26, 2006
Another dangerous zero-day IE exploit on the loose.
The unpatched CreateTextRange vulnerability in Internet Explorer is already being used by at least one Web site to install spyware on users' machines. Disclosed only Wednesday, the flaw in IE 5.01, 6.0, and the January version of IE 7 Beta 2 Preview has security vendors worried because a patch isn't available from Microsoft. Thursday, as news circulated that a working exploit had been publicly posted, Microsoft said it was working on a fix. Even before the site exploiting the CreateTextRange bug was discovered, several other security companies had raised alarms. It reminds me at the Windows Metafile fiasco in late December, when another "zero-day" flaw hit Windows users.
Disable IE's active scripting or switch to any other browser which is not using this... or try to find out if your AV package is able to counter this exploit.
Disable IE's active scripting or switch to any other browser which is not using this... or try to find out if your AV package is able to counter this exploit.
Thursday, March 23, 2006
InfoSecurity Belgium 2006 finished.

I also wrote the opinion article for the InfoSecurity Data News Guide : The illusion of security. You can find it at my press page.
Sunday, March 19, 2006
My wife and I are both 'in Security'.

Thursday, March 16, 2006
RFID virus POC paper
Cheap radio chips that are replacing the ubiquitous barcode are a threat to privacy and susceptible to computer viruses, scientists at a Dutch university said on Wednesday.
The paper presents an attack where the tags carry a small amount of data (127 characters) that will infect the RFID reader. More precisely, they use an SQL injection attack against an Oracle database backend that interfaces with the reader. The reader will then continue to infect all new tags it sees. Luckily, this is currently only a proof-of-concept attack, even though it's a scary idea. The problem is that an infected RFID tag, which is read wirelessly when it passes through a scanning gate, can upset the database that processes the information on the chip, says the study by Melanie Rieback, Bruno Crispo and Andrew Tanenbaum.
Well don't worry at this moment as this is only a POC. The 'EICAR taskforce on RFID' will take action ASAP to prevent such real attacks. But 'that' will take 'ages' in my opinion... ;-)
You can find more info within the self-replicating RFID viruses paper. The paper is titled "Is Your pet Infected with a Computer Virus?".
The paper presents an attack where the tags carry a small amount of data (127 characters) that will infect the RFID reader. More precisely, they use an SQL injection attack against an Oracle database backend that interfaces with the reader. The reader will then continue to infect all new tags it sees. Luckily, this is currently only a proof-of-concept attack, even though it's a scary idea. The problem is that an infected RFID tag, which is read wirelessly when it passes through a scanning gate, can upset the database that processes the information on the chip, says the study by Melanie Rieback, Bruno Crispo and Andrew Tanenbaum.
Well don't worry at this moment as this is only a POC. The 'EICAR taskforce on RFID' will take action ASAP to prevent such real attacks. But 'that' will take 'ages' in my opinion... ;-)
You can find more info within the self-replicating RFID viruses paper. The paper is titled "Is Your pet Infected with a Computer Virus?".
Monday, March 13, 2006
I'm not at Cebit, I'm home!
Unbelievable, it seems to be a must to be at Cebit. Well I'm not, I returned home safely after my visit to Stockholm and I'm ready for our next event: InfoSecurity Belgium 2006 however in meantime I will be travelling around between some customers and sending loads of emails between hundreds of people. What a life ... and just at that moment McAfee released some problematic dat-file. If you did an on-demand scan during the 5 hours the bad dat-file was appearing at the website, you could facing up with problems with missing 'MS Excel' or even other legitimate applications. Well it happened before with TrendMicro and Symantec also. Of course the new datfiles which were on the web since saturday returned proper detection. I haven't seen any AV-company which didn't got any problem with their signature files in the past. Still I find the detection from McAfee as one of the best!
Wednesday, March 08, 2006
Diner at Gamla Stan (Stockholm) and attacks in the hotel...

First fake eicar test string inside a mobile virus!
My friend Mikko H. Hypponen of F-Secure sent me yesterday the first fake eicar.com (test string) inside a mobile virus. It seems to be dropped dropped by a new Symbian virus (Appdisabler.I). It won't run and it contains this text: {Series60ProductID}$EICAR-SYMBIAN-ANTIVIRUS-TEST-FILE-2006!
What could be the reason to drop such a file which is even not detected as the real eicar string and which can't be run.... tell me!
Thanks Mikko for bringing this up to the EICAR organisation.
What could be the reason to drop such a file which is even not detected as the real eicar string and which can't be run.... tell me!
Thanks Mikko for bringing this up to the EICAR organisation.
Monday, March 06, 2006
Symantec Nordic at Kista

Saturday, March 04, 2006
Bye BlackHat, Here I come Stockholm!
