Over 16,530,036 people are on fubar.
What are you waiting for?

Sabpab - Another Mac os Backdoor Trojan Discovered

Posted by THN Reporter On 4/15/2012 07:36:00 AM

http://3.bp.blogspot.com/-pqQ42Oz6XJ4/T4nByL1BMqI/AAAAAAAAFsg/HVyFWsCKH_8/s640/Sabpab+-+Another+Mac+os+Backdoor+Trojan+Discovered.jpg

Security firm Sophos has discovered more malware for the Mac OS X platform called Sabpab. It uses the same Java vulnerability as Flashback to install itself as a “drive-by download.” Users of older versions of Java now have still more malware to worry about.
It also doesn't require any user interaction to infect a system either just like Flashback all that needs to happen is for you to visit an infected webpage. Sabpab, according to Sophos, installs a backdoor that allows the hackers to capture screen snapshots, upload or download files and execute commands on infected Macs remotely.
The Trojan creates the files
  • /Users//Library/Preferences/com.apple.PubSabAgent.pfile
  • /Users//Library/LaunchAgents/com.apple.PubSabAGent.plist
Encrypted logs are sent back to the control server, so the hackers can monitor activity. Although one variant of Flashback installed a file in the LaunchAgents folder, not all tools for detecting Flashback do anything with that folder.
Symantec identifies the trojan as OSX.Sabpab which exploits the Oracle Java SE Remote Java Runtime Environment Denial Of Service Vulnerability (BID 52161) in order to install itself on to the compromised computer.
Sophos products, including free Mac anti-virus for home users, detect the Trojan horse as OSX/Sabpab-A.

Over 600,000 Macs infected with Flashback Trojan

By Emil Protalinski | April 4, 2012, 8:56pm PDT

Summary: The Flashback Trojan botnet reportedly controls over 600,000 Macs. Thankfully, Apple yesterday released a patch for Java, which the Trojan exploits, so make sure you install it.

Two months ago, a new variant of the Flashback Trojan started exploiting a security hole in Javato silently infect Mac OS X machines. Apple has since patched Java, but this was only yesterday. As of today, more than 600,000 Macs are currently infected with the Flashback Trojan, which steals your user names and passwords to popular websites by monitoring your network traffic.

Russian antivirus company Dr. Web first reported today that 550,000 Macs were being controlled by the growing Mac botnet. Later in the day though, Dr. Web malware analyst Sorokin Ivanannounced on Twitter (via Ars Technica) that the number of Macs infected with Flashback had increased to over 600,000:

@mikko, at this moment botnet Flashback over 600k, include 274 bots from Cupertino and special for you Mikko - 285 from Finland

As you can see in the screenshot above, Dr. Web says 56.6 percent of the infected Macs are located in the U.S., 19.8 percent are in Canada, and 12.8 percent are in the U.K.

Flashback was initially discovered in September 2011 masquerading as a fake Adobe Flash Player installer. A month later, a variant that disables Mac OS X antivirus signatures updates was spotted in the wild.

In the past few months, Flashback has evolved to exploiting Java vulnerabilities. This means it doesn’t require any user intervention if Java has not been patched on your Mac: all you have to do is visit a malicious website, and the malware will be automatically downloaded and installed.

Another variant spotted last month asks for administrative privileges, but it does not require them. If you give it permission, it will install itself into the Applications folder where it will silently hook itself into Firefox and Safari, and launch whenever you open one of the two browsers. If you don’t give it permission, it will install itself to the user accounts folder, where it can run in a more global manner, launching itself whenever any application is launched, but where it can also more easily detected.

You can grab the new version of Java that patches the security hole in question from Apple here:Java for Mac OS X 10.5 Update 6Java for Mac OS X 10.6 Update 7 and Java for OS X Lion 2012-001. Additionally, F-Secure has instructions on how to remove this malware if you think your Mac may already be infected.

http://www.zdnet.com/blog/security/over-600000-macs-infected-with-flashback-trojan/11345?tag=nl.e540

Finally Google Chrome gets hacked at Pwn2Own

 

Finally Google Chrome gets hacked at Pwn2Own
Finally+Google+Chrome+gets+hacked+at+Pwn2Own

Vupen Security and Sergey Glazunov independently managed to penetrate Google Chrome’s security defenses at the Pwn2Own and 'Pwnium' contests respectively. The annual competition, which invites ethical hackers from around the world to attempt hacking into the most popular web browsers and in the process expose vulnerabilities and loopholes in the browser's security, while grabbing a handsome reward.
At this year's competition, the co-founder and head of research of Vupen, Chaouki Bekrar and his team managed to break into Google Chrome in less than 5 minutes, in the process quashing talks about the browser's unquestionable security. They used "a pair of zero-day vulnerabilities to take complete control of a fully patched 64-bit Windows 7 (SP1) machine." For the successful break-in, Vupen has won itself 32 points.

Google Chrome security knew that the Flash Player plugin sandbox is significantly weaker and that an exploit against Chrome’s Flash Player would have to go through a certain path.Having figured out that Vupen used that technique (from the May video), Google decided to add a specific protection for Flash. The hack qualifies him for one of the top $60,000 prizes that are part of Google’s $1 million Pwnium challenge, and could be the launch of a new security career.
VUPEN co-founder Chaouki Bekrar, an outspoken exploit writer who insisted the team deliberately targeted Chrome to prove a point, was uncharacteristically coy when asked if the faulty Chrome code came from Adobe.”It was a use-after-free vulnerability in the default installation of Chrome,” he said. “Our exploit worked against the default installation so it really doesn’t matter if it’s third-party code anyway.” Bekrar told, Zdnet reports.
IE 9 on Windows 7 was also hacked, again through a complicated hack that had to circumvent the browser’s sandbox. Microsoft, however, may not respond so rapidly, as its quality testing procedure usually takes a few months to fix bugs like these.Safari on Mac OS X Snow Leopard, along with Firefox and IE 8 on Windows XP, was also hacked.

Microsoft censors The Pirate Bay links on Windows Live Messenger

 

Microsoft censors The Pirate Bay links on Windows Live Messenger
Microsoft+censors+The+Pirate+Bay+links+on+Windows+Live+Messenger

Microsoft has decided to block access to The Pirate Bay from Windows Live Messenger. When users try to send an instant message to a friend with a link from The Pirate Bay, Windows Live Messenger displays a warning, saying that the link is "blocked because it was reported as unsafe."
"We block instant messages if they contain malicious or spam URLs based on intelligence algorithms, third-party sources, and/or user complaints. Pirate Bay URLs were flagged by one or more of these and were consequently blocked," Redmond told The Register in an emailed statement.

The Pirate Bay has been a lightning rod of controversy for years now, as copyright holders take aim at the organisation for giving users access to their content. Much of the focus of last year's ill-fated Stop Online Piracy Act (SOPA) centered on stopping The Pirate Bay and other sites that provide a similar service. Still, The Pirate Bay sails on.
The Pirate Bay acknowledges that it faces a lot of enemies and is using a variety of tricks and tools to fight them off, including, we hear, airborne WiFi drones.
Although Live Messenger's apparent ban will block the standard Pirate Bay URL, users can easily share the link by adding a space or modifying it in other ways.

The next time you’re asked in an interview to name your greatest weakness, remember that it could be worse: Job seekers applying to Maryland’s Department of Corrections were asked for their Facebook logins and passwords.

After learning of this practice, the ACLU stepped in and put a stop to it. However, the folks in Maryland, somehow still unclear on the concept, then had job candidates log in to their Facebook accounts while the hiring manager peered over their shoulder as they perused everything behind their privacy settings.

The officials at the Maryland Department of Corrections said that they did this to make sure job candidates didn’t have any gang affiliations. The agency told the ACLU it had reviewed the social media accounts of 2,689 applicants and denied employment to seven because of items found on their pages. Talk about throwing the baby out with the bath water and all that.

When I used to advise people to be careful what they put into social media, I’d always temper that with telling them to at least put sensitive things behind a privacy wall (if you can keep up with Facebook’s ever-changing privacy settings). But I guess even that doesn’t hold water, as you can see in this  blog that shows an image of a job application (for a clerical position) that comes right out and asks for social media logins and passwords. Scary stuff.

By Toni Bowers
March 13, 2012, 8:31 AM PDT

 

 

RELATED

 

Could employers begin asking for Facebook passwords on applications?

Privacy


 Job seekers asked to throw their privacy out the window

by Mike Wehner | Last updated 12:45PM EST on November 30, 2011

For all the good it can do, social networking also has its share of downsides. Putting personal information of any kind on the internet raises plenty of privacy concerns on its own, and handing over your username and password can be like giving away the keys to your very identity. But if you're in the process of seeking new employment, that may be exactly what you'll have to do. 

The image below is a snapshot of an application from North Carolina for a clerical position at a police department. One of the required pieces of information is a disclosure of any social networking accounts, along with the username and password to access them.

 

Job App

 

You don't have to be a security expert to realize that asking for such information is out of the ordinary. Depending on how much detail and private information you choose to post on Facebook, Google+, or MySpace, relinquishing your password would allow your would-be employer to investigate every area of your life. Aside from status updates that may be secured for only friends to view, logging in to your account provides access to private messages, chat logs, and any number of other potentially damaging tidbits. 

We've known for a while that companies often scour social networks when considering a new employee, so keeping party photos and scandalous posts out of the public eye is well advised. And while this particular application appears — for now, at least — to be an isolated case of an employer overreaching their bounds, it highlights a growing problem with social network privacy. 

Sites like Facebook have become a one-stop-shop to learn anything and everything about a person. For anyone — especially a company or potential employer — to casually request access to that information is as bold as asking for a copy of person's house keys. Would you agree to a full search of your home and worldly possessions in order to land a job? If the answer is no, then you should be just as hesitant to let someone rummage around inside your online identity. 
[Image credit: SportzTawk]

(Source)

 

last post
12 years ago
posts
5
views
2,901
can view
everyone
can comment
everyone
atom/rss

other blogs by this author

 11 years ago
Guyz n' Dollz
blogroll (list of blogs that the blogger recommends)
12 years ago 
The Good, The Bad, and The ... by Ninja  
9 years ago 
Ask the Ninja by Ninja  
1 year ago 
Real Fu-Kin Life. by Johnnydevil  
13 years ago 
Grrrrrrrrrrrrrrr and stuff by Ninja  
9 years ago 
Cooking with Ninja by Ninja  
12 years ago 
help-tips by 1334117  
official fubar blogs
 8 years ago
fubar news by babyjesus  
 13 years ago
fubar.com ideas! by babyjesus  
 10 years ago
fubar'd Official Wishli... by SCRAPPER  
 11 years ago
Word of Esix by esixfiddy  

discover blogs on fubar

blog.php' rendered in 0.2916 seconds on machine '80'.