Tuesday, September 30, 2014

New Signed Version of CryptoWall Ransomware On the Loose Secure Hunter

Researchers have discovered a variant of the CryptoWall ransomware that has a valid digital signature and is being distributed through malicious ads on several top-ranked Alexa Web sites. CryptoWall is one of the more successful ransomware strains in recent memory, with researchers estimating last month that the malware had grossed more than $ 1 million for […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post New Signed Version of CryptoWall Ransomware On the Loose Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1owTCdK

Secure Hunter

Monday, September 29, 2014

FBI to Open Up Malware Investigator Portal to External Researchers Secure Hunter

SEATTLE–The FBI has developed an internal malware-analysis tool, somewhat akin to the systems used by antimalware companies, and plans to open the system up to external security researchers, academics and others. The system is known as Malware Investigator and is designed to allow FBI agents and other authorized law enforcement users to upload suspicious files. […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post FBI to Open Up Malware Investigator Portal to External Researchers Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1mIDzOp

Secure Hunter

Friday, September 26, 2014

Bash Exploit Reported, First Round of Patches Incomplete Secure Hunter

Reports of the first in-the-wild exploits targeting the Bash vulnerability have surfaced, as have complaints the first patches for the bug are incomplete.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Bash Exploit Reported, First Round of Patches Incomplete Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1neC0bA

Secure Hunter

Patching Bash Vulnerability a Challenge for ICS, SCADA Secure Hunter

Experts are concerned that many Linux-based industrial control systems and embedded systems could be too steep a patching challenge and remain in the crosshairs of the Bash vulnerability.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Patching Bash Vulnerability a Challenge for ICS, SCADA Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1pg6V25

Secure Hunter

Thursday, September 25, 2014

Wednesday, September 24, 2014

Researchers Work to Predict Malicious Domains Secure Hunter

SEATTLE–A typical phishing or Web-based malware attack usually isn’t terribly complex. But they need a few things in order to work, and one of the key components often is a malicious domain. Researchers spend a lot of time identifying and taking these domains down, but some researchers now are trying to stay a step ahead […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Researchers Work to Predict Malicious Domains Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1v1fJyD

Secure Hunter

Tuesday, September 23, 2014

JQuery Website Redirecting to RIG Exploit Kit Secure Hunter

jQuery.com, website for the popular jQuery JavaScript library, is redirecting visitors to a site hosting the RIG exploit kit, security company RiskIQ said.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post JQuery Website Redirecting to RIG Exploit Kit Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/XYdMWx

Secure Hunter

Monday, September 22, 2014

Microsoft cloud protection


​Microsoft is using cloud protection to help keep our customers safe. In fact, nearly any detection made by Microsoft security products could be the result of cloud protection. Software developers often ask us how this cloud protection works and how they can improve our cloud’s impression of their software.


How our cloud protection works


When our antimalware products encounter anything unusual, they can send a small packet of information about the event or file to our server. The server then sends back a reply telling the antimalware software whether to block it or not. It can also request a sample for further analysis.


There are three situations that highlight the benefits of cloud protection:



  • If a file is known to be malware by our servers but not by the local antimalware product, the cloud protection module can tell the local product to block or remove it.

  • If a file is known to be clean by our servers, but the local antimalware product detects the file as malware (an incorrect detection situation), the cloud protection module can tell the local antimalware to not detect it, and the incorrect detection does not affect the user.

  • If a local antimalware product encounters a file that we don’t know about, our server can make a determination based on probabilities, and tell the local antimalware software to block it, even without having seen a copy of the file.


It’s this third point that I would like to discuss further.


Improving your software’s cloud impression


We are often asked by software vendors if we have a way for them to pre-whitelist their software. However, our backend processing actually works better if we see your software as it’s naturally distributed. I will outline a few methods to improve our cloud’s impression of your software below:



  • Digitally sign your software using a method accepted by Microsoft. This is the fastest way to get a good cloud reputation because the reputation of a good file can be distributed to all files signed by the same key.

  • Once you have digitally signed your software, be careful that malware isn’t also signed by your key. This will negate any good reputation. You can help avoid this situation by:






    • Making sure you protect your key from being stolen by malware authors.

    • Ensuring your development process prevents a parasitic file-infecting virus from being inadvertently signed by your key.

    • Reading more about the best practices for signing software.






  • If you can’t digitally sign your software, be aware that every minor version of your product will have to build reputation from scratch. This affects vendors who provide a different file on every single download. It doesn’t mean you can’t make bug-fix versions, different languages, etc.

  • Make sure your software doesn’t install malware:





    • Take care to avoid security vulnerabilities. Even if you don’t intend to install malware, a security vulnerability could be detected as your product installing malware.

    • If you download executables off the internet, have your software check a digital signature or cryptographic hash, to ensure it has the correct file you intended it to download. We have seen one case where a popular installer had some URLs distributing malware and we had to detect every one of their installers in case it was downloading one of the malware URLs.





  • Make sure your software isn’t installed by malware:





    • Proactively check your affiliates and companies who bundle your software.

    • Fill out the metadata information such as the information about the author and company in the file resources. If this and the digital signature isn’t enough, consider adding contact information, or a pointer to find contact information on the web. This contact information should direct to the right contact to report a security vulnerability, or work with to fix or prevent a incorrect detection.





  • If you use a runtime packer or obfuscator, you need to be aware that the majority of malware is packed or obfuscated, and this does affect how your software is seen at the back end.

  • Consider how your software is seen and whether it’s installed on the machines of users who really want it. We have honeypots, web crawlers, and automatic software testing. We can look at whether users chose to continue the download after the warning that a program isn’t commonly downloaded. We can also see whether users chose to ignore or remove software if our antimalware detects it. Bad behavior can quickly ruin a good software reputation.

  • There are some behaviors that, while not enough to warrant a detection on their own, do attract the suspicion of human and automated systems. They could be used for legitimate reasons, but are often closely associated with malware behavior. This includes:





    • Installing outside the commonly accepted folders for the type of software.

    • Modifying or adding a sensitive registry key.

    • Process or thread injection.

    • Autonomous internet activity.




If you believe we have made an incorrect detection for your product you can submit a developer contact form. Making a slight change and pushing it out to your software won’t necessarily address any incorrect bad reputation applied to the code signing key you used for the file that was incorrectly detected. Our cloud protection might also note the similarity between the file that it still believes was correctly detected as malware, and the new version.


MMPC






Microsoft Malware Protection Center

Secure Hunter Anti -Malware



The post Microsoft cloud protection appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1DuWz8e

Secure Hunter

Kyle and Stan Malvertising Network Nine Times Bigger Than First Reported Secure Hunter

The Kyle and Stan malvertising network has compromised more than nine times as many domains as originally reported two weeks ago.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Kyle and Stan Malvertising Network Nine Times Bigger Than First Reported Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/XYUPDm

Secure Hunter

Thursday, September 18, 2014

Dyre Trojan Caught In The Cookie Jar Secure Hunter

Researchers at Adallom analyzed a sample of the Dyre banking Trojan that was found to be targeting Salesforce.com credentials.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Dyre Trojan Caught In The Cookie Jar Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/XOZAzl

Secure Hunter

Thursday, September 11, 2014

Key Flaw Enables Recovery of Files Encrypted by TorrentLocker Secure Hunter

Crypto ransomware, a relatively unknown phenomenon a couple of years ago, has exploded into one of the nastier malware problems for Internet users. Variants such as CryptoLocker and CryptoWall have been siphoning money from victims for some time, and now researchers have dissected a newer variant known as TorrentLocker and found that the creators made […]

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Key Flaw Enables Recovery of Files Encrypted by TorrentLocker Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1lYYixe

Secure Hunter

Tuesday, September 9, 2014

‘Kyle and Stan’ Malvertising Network Targets Windows and Mac Users Secure Hunter

A malvertising network that has been operating since at least May has been able to place malicious ads on a number of high-profile sites, including Amazon and YouTube and serves a unique piece of malware to each victim. The network, dubbed Kyle and Stan by the Cisco researchers who analyzed its activities and reach, comprises […]

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post ‘Kyle and Stan’ Malvertising Network Targets Windows and Mac Users Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1rDxbEk

Secure Hunter

Israeli Think-Tank Site Serves Sweet Orange Exploit Secure Hunter

Drive-by malware downloads have been spotted on the website of a prominent Israel think-tank, the Jerusalem Center for Public Affairs. The attacks seems to target bank credentials.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Israeli Think-Tank Site Serves Sweet Orange Exploit Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1tqQbYT

Secure Hunter

Monday, September 8, 2014

Salesforce Warns Customers of Dyreza Banker Trojan Attacks Secure Hunter

Salesforce.com is warning its customers that the Dyreza banker Trojan is now believed to be targeting some of the company’s users. The Trojan, which has the ability to bypass SSL, typically goes after customers of major banks, but seems to be expanding its reach. Dyreza is relatively new among the banker Trojan crowd and it […]

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Salesforce Warns Customers of Dyreza Banker Trojan Attacks Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1lRYkqD

Secure Hunter

Thursday, September 4, 2014