InfoSec News

Some fonts are masters of illusion, creating a sense of space beyond the two-dimensional plane. Other fonts are crafty (like Black Jack and Waltograph) and styled to appear written by hand. Now here's a font that bends over backward to do double duty. Naveen Chandru's En Origami is a remastered clone of an earlier attempt to fold letterforms and this time the designer has worked the kinks out.
 
Can we talk? Based on the e-mails I get every day, I know a lot of you are still using Windows XP. I can understand why; it's like a comfortable old shoe. Plus, it's bought and paid for. Windows 7 probably seems stiff and scary, and it's not like Microsoft is handing out free upgrades.
 
Now that we are getting close to the 2010 year end, I posted a survey last week on Which of the following issues affected your business in 2010?. At the beginning of the survey, Targeted malware attacks were on top around 40% which wasn't really any surprise because of all the new malware found daily. However, things turnaround at the end of this week and malware dropped to #2 and Inbound DDoS attacks has been climbing well above 50%. I looked over the diaries posted by all handlers in 2010 for some stories related to parts of this survey.


Inbound DDoS attack


In September, ISC published a diary related to a series of DDoS attacks released by the Shadowserver on the BlackEnergy bot. The diary is posted here.


Enterprise wide DoS




In April, an issue with a McAfee DAT file caused widespread corporate DoS believing that svchost.exe was a piece of malware named W32/Wecorl.a. A lot of people had to work overtime to restore a clean svchost.exe file to the affected hosts. The diary is posted here.


Data lost through mobile devices

In January, ISC made reference to a fake Android application that was stealing user password. The diary is posted here.

Targeted malware attacks



In April, ISC reported a targeted malware scams in an enterprise were all the targeted individuals were handling money and had a LinkedIn profile. The diary is posted here. Another was on a Legal Threat malware on contract terms breached and the diary is posted here.
If you want to comment on any of the six point in the survey, you can contact us using our contact page here.
-----------
Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot org (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Microsoft pulled an update for Outlook 2007 just two days after it was released, citing connection and performance problems for the unusual move.
 
According to Techspot (Thanks Richard!), Intel's new Core processors (Sandy Bridge), that will hit the market for desktops and laptops early 2011, have a remote kill switch (called Anti-Theft v3.0). This technology embedded in the CPU allows the user to remotely disable the processor through 3G, that is, even when the computer is not connected to the Internet or it switched off.
Intel's goal is to offer the user the capability to shut down remotely the computer if it is lost or stolen. Somehow, this is similar to what most modern mobile device platforms offer today to remotely lock, show a message, or wipe a stolen or lost device, such as Windows Mobile 6.5, iPhone, iPad... Iguess that, in any case, the thief will be able to replace the CPUwith a new one and make the computer work again. Will be Intel planning to add remote disk wiping capabilities from the processor too?)
Definitely, this new feature is something to pay attention to, as potential vulnerabilities in the implementation can open the door to new remote attacks, starting with DoS. The debate is open!
UPDATE1:
It seems that the Intel Anti-Theft announcement is creating a significant debate on The Net. This ISC post simply tried to catch your attention about new technologies and features we need to keep an eye on, and it didn't reflect this will be a feature for mass p0wn4g3. Trying to clarify this technology a little bit, Intel Anti-Theft seems to be associated to Intel vPro (TM) CPUs only and the associated chipsets, plus capabilities on the BIOS , firmware/software, and a capable 3Gsubscription. The kill switch can be reversed (enabling the computer back without physical damage)by providing proper authentication through a 3G heartbeat, a local passphrase or one-time token.



Some extra reading for those interested on this technology:

- http://www.intel.com/en_US/Assets/PDF/general/br_IT_AntiTheft_vPro.pdf?wapkw=(vpro+antitheft)

- http://antitheft.intel.com/Libraries/Documents/Intel_R_Anti-Theft_Technology_-_Technology_Brief.sflb.ashx

- http://download.intel.com/technology/vpro/Whitepaper_AllNew2010IntelCorevProProcessors.pdf
----

Raul Siles

Founder and Senior Security Analyst with Taddong

www.taddong.com (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 


Internet Storm Center Infocon Status