Language Selection

English French German Italian Portuguese Spanish

Drive-by Trojans exploit browser flaws

Filed under
Security

Trojans - malicious programs that pose as benign apps - are usurping network worms to become the greatest malware menace. Sixteen of the 50 most frequent malicious code sightings reported to Symantec in the second half of 2004 were Trojans. In the first six months of last year, Trojans accounted for just eight of the top 50 malicious code reports.

Symantec blames Trojans for an upsurge in client-side exploits for web browsers. Trojans create the means to deliver malicious code onto vulnerable Windows PCs. Browsers are the primary target, but flaws in email clients, peer-to-peer networks, instant messaging clients, and media players can also be exploited in this way.

Between July and December 2004 Symantec documented 13 vulnerabilities affecting Internet Explorer and 21 vulnerabilities affecting each of the Mozilla browsers. Six vulnerabilities were reported in Opera and none in Safari.

Of the 13 vulns affecting IE in 2H04, nine were classified as "high severity". Of the 21 vulnerabilities affecting the Mozilla browsers, Symantec classified 11 as "high severity". Firefox users enjoyed an easier ride with just seven affecting "high severity" vulns over the report period.

Symantec says there have been few attacks in the wild against Mozilla, Mozilla Firefox, Opera, or Safari, but the jury is still out on whether these browsers represent a more secure alternative to IE.

Nigel Beighton, Symantec’s director of enterprise strategy, EMEA, told El Reg that choice of browser is less important than activating seldom-used security zones features to limit exposure. "If you don't set trusted sites and stick by default browser security it's like surfing everywhere on the net with your wallet open," he said.

Symantec's Internet Threat Report, published Monday (21 March), brings together data gleaned from the security firm's SecurityFocus and managed security services division. The report found that financial service industry was the most frequently targeted sector in internet attacks, followed by hi-tech and pharmaceutical firms. "Attacks are becoming more targeted and specific," said Beighton.

For the third straight reporting period, the Microsoft SQL Server Resolution Service Stack Overflow Attack (formerly referred to as the Slammer Attack) was the most common attack, used by 22 per cent of all attackers. Organisations reported 13.6 attacks per day, up from 10.6 in the previous six months. The United States continues to be the top country of attack origin, followed by China and Germany.

Variants of NetSky, MyDoom, and Beagle, dominated the top ten malicious code samples in the second half of 2004. Symantec documented more than 7,360 new Win32 viruses and worms, 64 per cent up on the first half of the year. Two bots (malicious code that turns infected PCs into zombies under the command of hackers) were present in the top ten malicious code samples, compared to one in the previous reporting period. There were 21 known samples of malicious code for mobile applications, up from one in June 2004.

Symantec also noted a marked rise in email scams over second half of 2004. The firm's BrightMail anti-spam filters blocked an average of 33 million phishing emails a week in December 2004 compared to nine million a week in July 2004.
Symantec documented 1,403 new vulnerabilities in the second half of 2003, up 13 per cent from the first six months of last year. The vast majority (97 per cent) of the vulns recorded between July and December 2004 were either moderate or high risk.

In addition, over 70 per cent of these security flaws could be exploited using readily available tools or without the need for any attack code. The time between the disclosure of a vulnerability and the release of an associated exploit increased from 5.8 to 6.4 days.

Continuing a recent trend, web applications were a particular source of security problems. Almost half - 670 of 1,403 - of the security bugs logged by Symantec in 2H04 affected web applications. ®

Source.

More in Tux Machines

today's howtos

  • Five practical guides for managing Linux terminal and commands [Ed: People from Linux Foundation are renaming GNU programs "LINUX"]
  • Add a subcommand showing GNU Guix history of all packages

    Hello, everyone! I'm Magali and for the next three months, I'll be an Outreachy intern in the GNU Guix community. As part of my Outreachy application process, I made my first ever contribution to Free Software adding a package to Guix, and since then I'm eager to begin contributing even more. My task for this three-month period is to add a subcommand showing the history of all packages. Although Guix makes it possible to install and have an older version of a package, it isn't as easy to find, for example, the commit related to these versions. The subcommand I'll implement will be something like guix git log. The idea is that, for instance, when the user invokes guix git log --oneline | grep msmtp, a list with all the commits, one per line, related to msmtp, will be shown.

  • WildFly server configuration with Ansible collection for JCliff, Part 2

    Welcome to the second part of this series introducing Ansible collection for JCliff. This new extension is designed for fine-tuning WildFly or Red Hat JBoss Enterprise Application Platform (JBoss EAP) configurations using Ansible. In Part 1, we installed JCliff and its Ansible collection and prepared our environment. We set up a minimal, working playbook for installing JCliff on the target system. In this article, we will focus on configuring a few of our WildFly server’s subsystems.

  • Bpytop on openSUSE

    I recently published an article about how great Bashtop is on openSUSE, and when I was nearly done with it, I was told about Bpytop. Since I was going through the final edit, I didn’t just want to dump what I did before but rather, follow it up with Bpytop. I am not sure how far behind the curve I am now and maybe there is something even cooler out there but before anyone tells me what the latest hotness is in terminal, system monitoring applications, I am feverishly writing about this What is so great about Bpytop? If you are a nerd about what your system is doing and like to see the numbers, charts graphs, etc, and you have previously enjoyed Bashtop, Bpytop is going to send tingles of joy down your finger tips. The little bits of information it gives you from CPU load, load average, and frequency is superb. The chart it produces on the CPU usage looks fantastic and really makes you wonder how they accomplished this when it is only in text mode. Truly a feat of terminal engineering!

  • Work-around in Linux to switch between single-sided and double-sided printing | Fitzcarraldo's Blog

    I use Gentoo Linux on my laptop, and have drivers installed for quite a few printer manufacturers and models, as I work in multiple offices and they have a wide range of printers and MFPs. To date I have had no trouble printing single-sided (‘simplex’) and double-sided (‘duplex’) documents on the printers that support duplex printing. However, one of the offices I have been working in recently has a Konica Minolta bizhub C368, a floor-standing MFP, and the printer in this MFP did not enable me to switch between single-sided and double-sided printing even though Windows users in the same office could. This article explains how I managed to switch between the two printing modes.

  • [Older] LFCS - Scheduling Tasks

    Sometimes it is necessary to have tasks execute at specific times. Automating tasks to run at specific times can be a very necessary administrative function. Even on a home system tasks can be automated to reduce your time from ‘babysitting’ your system.

  • Everything you need to know about Kubernetes namespaces. - UX Techno

    Kubernetes namespaces is a virtual cluster being created within the actual Kubernetes cluster. This will bring separation between the different Kubernetes objects such as Pods, deployments and service etc. This will comes handy in order to separate your cluster environment wise or among the different teams.

Daiki Ueno: What’s new in GnuTLS 3.7.0

On behalf of the GnuTLS team, I am pleased to present GnuTLS 3.7.0, the first cut of the 3.7 series. This is the result of several months of planning and work by 25 contributors and includes feature enhancements and behavior changes, such as removal of deprecated functions and tightening of system requirements. In this entry, I will try to detail some notable features in the release. API for on-demand CA certificates retrieval During the TLS authentication phase, the server typically presents a chain of X.509 certificates, from the end-entity certificate to the trusted CA certificate. The AIA extension allows the server to omit certain portion of the certificate chain, by pointing to the location where the client can download the missing certificates. Although GnuTLS provides a means to override the certificate verification logic completely through callbacks, this task is error-prone and thus desired to be supported natively. Sahana Prasad introduced the new set of API that allow applications to safely complement the certificate chain. The API is already being used in glib-networking. Read more

Kernel: Zen 3, Bootlin and Collabora

  • EPYC Zen 3 CPU Support Coming To Linux's AMD_Energy Driver - Phoronix

    In addition to AMD Zen 1/2/3 PowerCap RAPL support coming for the Linux 5.11 kernel, the hwmon-next Git branch has also queued initial support for Zen 3 processors within the AMD_Energy driver. The AMD_Energy driver was introduced earlier this year and merged for Linux 5.8 for easily exposing AMD CPU energy metrics -- albeit the list of supported CPU models was later restricted to EPYC CPUs.

  • Videos and slides of Bootlin's talks at Live Embedded Event 2020 - Bootlin's blog

    Yesterday, Bootlin co-organized and participated to the first edition of Live Embedded Event, a new online conference dedicated to embedded systems topics. In addition to co-organizing the event, we also gave four different talks at this conference, and we are happy to share the slides and videos of our talks.

  • Linux 5.11 Adding An "Inhibited" Feature To Temporarily Disregard Select Input Devices - Phoronix

    This input inhibited property is being led by Google ChromeOS engineers in conjunction with Collabora and the initial use-case for inhibiting input from select devices is a 2-in-1/laptop use-case where the keyboard may be folded under the screen for creating a tablet-like experience. This new property allows for such a property to be created in user-space so that when such a keyboard folding event occurs it could inhibit the input from that given device. Other use-cases will also surely materialize.

Open Hardware/Modding: Open-Source Firmware Conference (OSFC 2020), Arduino, Raspberry Pi and PINE64

  • AMD Is Making Progress On Open-Source Firmware - Initially With OpenBMC - Phoronix

    While we are still waiting to see what AMD might do for returning to open-source AGESA or better supporting Coreboot and the like, they are making some inroads with open-source firmware support -- beyond the context of Chromebooks where they continue to engage due to Google's engineering requirements. AMD is working to "align with the industry direction of open-source firmware stacks" with their initial focus being on open-source OpenBMC firmware support for their server platforms. AMD's Supreeth Venkatesh spoke at this week's virtual Open-Source Firmware Conference (OSFC 2020) on the work they are pursuing around OpenBMC. It was acknowledged that this work is being done due to the industry direction these days of preferring open-source firmware stacks (and being "a good open-source citizen") but stopped short of outlining any other open-source firmware plans at this time outside of OpenBMC. Given the customer interest and industry trends they have been working to support open-source OpenBMC support on the AMD server reference platforms. From the presentation, it looks like Twitter's engineering team has been involved with the bring-up and among the interested users but surely other key industry players are also taking note.

  • $25 TTGO T5 4.7-inch e-Paper Display comes with ESP32 WiFi & Bluetooth SoC

    We’ve very recently covered M5paper IoT development kit based on ESP32 WiSoC, and equipped with a 4.7-inch touchscreen e-Ink display together with a 1,150mAh battery all nicely packed into an enclosure. It looks great, but costs $69, so if you’d like to integrate this type of ESP32 connected display into your own project at a lower cost, you may be interested in TTGO T5 4.7-inch e-Paper display with 16 gray levels fitted with an ESP32-WROVER-E module with 16MB flash, and 8MB PSRAM. [...] The company says the display can be programmed with the Arduino IDE, ESP-IDF or MicroPython, but they only provide sample code for Arduino based on EPDiy E-Paper Driver project. Typical applications listed by LilyGO include desktop weather station, STEM education, and IoT device.

  • Private Git Web Portal in Raspberry PI With Gogs
  • Pine Store Community Pricing & Online Retail Stores

    In 2021 you’ll see online retail Pine stores open in Europe, North America and possibly also worldwide at a later stage. Let me start by making one thing clear – the current Pine Store isn’t going away and the pricing in the Pine Store will remain unchanged. You’ll always be able to buy and pre-order your devices from pine64.com at a community-oriented price point. The retail stores will function alongside the Pine Store, not replace it, and offer a different customer experience. In this blog I’ll explain the rationale behind this strategy.

    PINE64 is not a business

    First things first – PINE64 is a community, not a business, and the Pine Store’s sole purpose is to serve this community by providing FOSS development-friendly hardware. Sales numbers and revenue are not, and never were, a driving force behind this project; making the next fun and often experimental device was and still is. Some devices, such as the original Pinebook, were even sold at a loss at times – simply because we knew people wanted one. Seriously.