<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Andrei Zammit</title>
	<atom:link href="http://www.gfi.com/blog/author/andrei-zammit/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 17:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>GFI MailSecurity™ 2010: LinkScanner &amp; FIFA World Cup 2010 malware</title>
		<link>http://www.gfi.com/blog/gfi-mailsecurity-2010-linkscanner-fifa-world-cup-2010-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-mailsecurity-2010-linkscanner-fifa-world-cup-2010-malware</link>
		<comments>http://www.gfi.com/blog/gfi-mailsecurity-2010-linkscanner-fifa-world-cup-2010-malware/#comments</comments>
		<pubDate>Mon, 19 Jul 2010 10:59:46 +0000</pubDate>
		<dc:creator>Andrei Zammit</dc:creator>
				<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[email filtering]]></category>
		<category><![CDATA[GFI Idea Factory]]></category>
		<category><![CDATA[GFI MailSecurity]]></category>
		<category><![CDATA[LinkScanner]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2592</guid>
		<description><![CDATA[The FIFA World Cup 2010has come and gone; however, spammers and malware writers are still exploiting this global event as happened previously with the Icelandic Volcano eruption. One particular targeted attack related to the World Cup was socially engineered with &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="Answer Ahead" href="http://www.gfi.com/blog/wp-content/uploads/2010/07/Answer-Ahead.jpg"><img class="alignright size-medium wp-image-2593" style="margin: 10px; border-width: 0px;" title="Answer Ahead" src="http://www.gfi.com/blog/wp-content/uploads/2010/07/Answer-Ahead-300x199.jpg" alt="" width="300" height="199" /></a>The FIFA World Cup 2010has come and gone; however, spammers and malware writers are still exploiting this global event as happened previously with the <a href="http://www.thesecurityblog.com/2010/03/icelandic-volcano-erupts-fake-antivirus-spews-forth/" target="_blank">Icelandic Volcano eruption</a>.</p>
<p>One particular targeted attack related to the World Cup was socially engineered with emails claiming to originate from a famous sportswear manufacturer while the potential victims were executives and managers of other established companies. What makes this attack more sophisticated is that with the email message included both a malicious PDF attachment and a hyperlink to a website hosting malware.</p>
<p><span id="more-2592"></span></p>
<p>The hosted malware was discovered to be a version of <a href="http://blog.novirusthanks.org/2010/01/a-new-sophisticated-bot-named-spyeye-is-on-the-market/" target="_blank">SpyEye</a>, a new sophisticated bot on the market. Capabilities of SpyEye include harvesting of bank accounts, credit cards information and ftp accounts. Including two different modes of attack greatly increases the chance of success in infecting the victim.</p>
<p>A typical email filtering system would strip the infected PDF attachment and allow the now ‘clean’ version of the email, containing the URL, to be delivered to the recipient. At this point, there is real danger to all the organization; if the malicious link still is visited, the hosted malware can very easily infect the recipient and propagate, stealing sensitive data during the process.</p>
<p>The upcoming release of GFI MailSecurity 2010 is scheduled for the first public beta release in the coming weeks. One of the new features to debut in this release is ‘LinkScanner’. The job of the LinkScanner is to scan the email messages for links (URLs) and perform an action on those emails which link to malware. The LinkScanner is also capable of crawling the linked-to website using the link included in the email as an entry point. This is a novel feature for an email filtering system and should defend organizations from attacks similar to the one discussed above. The proposal of this feature started after an idea was submitted to the <a href="http://ideas.gfi.com/a/dtd/Block-emails-with-links-to-malware/15629-4178" target="_blank">GFI Idea Factory </a>(feel free to participate in the GFI Idea Factory and Beta programmes). The idea quickly gained votes and was included for this release.</p>
<p>With the introduction of ‘LinkScanner’ even elaborate scams such as this one can be fought in an effort to decrease viruses from infecting computers and networks.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-mailsecurity-2010-linkscanner-fifa-world-cup-2010-malware/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Why spamming is an easy business &#8211; and the problems it causes</title>
		<link>http://www.gfi.com/blog/why-spamming-is-an-easy-business-and-the-problems-it-causes/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-spamming-is-an-easy-business-and-the-problems-it-causes</link>
		<comments>http://www.gfi.com/blog/why-spamming-is-an-easy-business-and-the-problems-it-causes/#comments</comments>
		<pubDate>Tue, 16 Mar 2010 13:43:36 +0000</pubDate>
		<dc:creator>Andrei Zammit</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[spam]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1983</guid>
		<description><![CDATA[Recently, whilst searching for a particular solution on the Internet, I encountered the following post in a forum: Surely, not the solution I was looking for. However, the post is strange and did catch my attention. Apart from the broken &#8230;]]></description>
				<content:encoded><![CDATA[<p>Recently, whilst searching for a particular solution on the Internet, I encountered the following post in a forum:</p>
<p style="text-align: center;"><a class="lightbox" title="AdverstingSpam1" href="http://www.gfi.com/blog/wp-content/uploads/2010/03/AdverstingSpam1.PNG"><img class="size-full wp-image-1984 aligncenter" style="border: 0pt none; margin-top: 10px; margin-bottom: 10px;" title="Advertising Spam" src="http://www.gfi.com/blog/wp-content/uploads/2010/03/AdverstingSpam1.PNG" alt="" width="642" height="128" /></a></p>
<p>Surely, not the solution I was looking for. However, the post is strange and did catch my attention. Apart from the broken English, the forum post advertises “bp servers” and “mailing servers” from China to be used and abused by any person willing to pay a fee. Also notice that this is a recent post which might indicate that there seem to be new players in the spam market.</p>
<p><span id="more-1983"></span></p>
<p>Interesting question: is it so simple to send a mass spam campaign? I just needed to contact the promoter of this service to find out. Here’s how it went:</p>
<p style="text-align: center;"><a class="lightbox" title="AdverstingSpam3" href="http://www.gfi.com/blog/wp-content/uploads/2010/03/AdverstingSpam3.PNG"><img class="size-full wp-image-1988 aligncenter" style="border: 0pt none; margin-top: 10px; margin-bottom: 10px;" title="Advertising Spam 3" src="http://www.gfi.com/blog/wp-content/uploads/2010/03/AdverstingSpam3.PNG" alt="" width="606" height="309" /></a></p>
<h2>The simple Math behind a spam campaign</h2>
<p>This scenario is even more disturbing than I thought because the manufacturers who wish to sell their wares using spam techniques can actually skip the middle man (the spammer) and operate the campaign by themselves. In this case, the manufacturers are those who produce or resell fake medicine, healthcare products and other items that are typically marketed using spam methods. Many times these manufacturers do hire a spammer for a couple of weeks; however, they have to pay the spammer a commission rate for every product sold.</p>
<p>In such a scenario the costs of a spam campaign are the server and the mailing list. The tools to generate the spam messages are freely available and most probably will be included when hiring the spam service.</p>
<p>At 100,000 emails an hour, one can potentially send a total of 72 million emails in one month at a cost of $1,200. Access to a mailing list will cost in the region of $3,000 to $4,000. Let’s consider that 0.005% of those who receive the spam do purchase a $10 product; that would result in an income of $36,000 with a very high margin of profit.<br />
There is a very interesting read which describes <a href="http://spamsymposium.eu/" target="_blank">the global situation of spam</a>. There is also a list of interesting <a href="http://spamsymposium.eu/livewebcast.php" target="_blank">webcasts</a> with the one from <a href="http://video.google.com/videoplay?docid=-6015509146555379457&amp;hl=en" target="_blank">Spammer-X</a> being the most influential. Spammer-X is the nickname of an ex-spammer who retired from his activity and his webcast  shows how spammers operate and how much money is involved in spam.</p>
<h2>What does “bp servers” mean?</h2>
<p>Again, I visit my beloved Google.com and enter “bp servers” as search criteria. I did learn that “bp servers” mean bullet-proof servers but more surprisingly is that many of the Google top results are from organizations promoting their spam services. The following screen shot shows part of first page results:</p>
<p style="text-align: center;"><a class="lightbox" title="AdverstingSpam2" href="http://www.gfi.com/blog/wp-content/uploads/2010/03/AdverstingSpam2.PNG"><img class="size-full wp-image-1985 aligncenter" style="border: 0pt none; margin-top: 10px; margin-bottom: 10px;" title="Advertising Spam 2" src="http://www.gfi.com/blog/wp-content/uploads/2010/03/AdverstingSpam2.PNG" alt="" width="482" height="544" /></a></p>
<p>When analyzing such situations, there is always an Easter egg reserved for the conclusion: one of Google’s sponsored links was an organization promoting their spam solutions! By the way, MailingSolution.net is also registered in China. Some of these organizations are so entangled in the spam market that they are paying Google to have more client exposure.</p>
<p style="text-align: center;"><a class="lightbox" title="AdverstingSpam4" href="http://www.gfi.com/blog/wp-content/uploads/2010/03/AdverstingSpam4.PNG"><img class="size-full wp-image-1986 aligncenter" style="border: 0pt none; margin-top: 10px; margin-bottom: 10px;" title="Advertising Spam 4" src="http://www.gfi.com/blog/wp-content/uploads/2010/03/AdverstingSpam4.PNG" alt="" width="281" height="402" /></a></p>
<p>It is fairly easy to send a spam campaign – it is cheap and the resulting incoming is high when compared to the costs and effort. In previous years, a spammer would have to own his network of servers, botnets and mailing lists. Currently, it seems that there is a shift in the spam market where the spam service is being sold directly to manufacturers and spammers alike.</p>
<p>Without any doubt, China is a key player in the spam problem and unless the authorities of this country start taking concrete measures in the fight against such illegal activity, problems will persist for all the millions of people who use email.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/why-spamming-is-an-easy-business-and-the-problems-it-causes/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Facebook, Facebookhealth and the rogue AntiVirus application</title>
		<link>http://www.gfi.com/blog/facebook-facebookhealth-rogue-antivirus-application/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=facebook-facebookhealth-rogue-antivirus-application</link>
		<comments>http://www.gfi.com/blog/facebook-facebookhealth-rogue-antivirus-application/#comments</comments>
		<pubDate>Thu, 08 Oct 2009 10:10:08 +0000</pubDate>
		<dc:creator>Andrei Zammit</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[malware]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1383</guid>
		<description><![CDATA[A mass operation is underway to infect several thousands of computers worldwide. The attack from the malware writers is taking place from various sources using an array of different techniques. Information regarding this attack until now is very limited however &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="facebook malware" href="http://www.gfi.com/blog/wp-content/uploads/2009/10/facebook-malware.jpg"><img class="alignright size-medium wp-image-1394" style="margin: 10px;" title="facebook malware" src="http://www.gfi.com/blog/wp-content/uploads/2009/10/facebook-malware-300x194.jpg" alt="" width="300" height="194" /></a>A mass operation is underway to infect several thousands of computers worldwide. The attack from the malware writers is taking place from various sources using an array of different techniques. Information regarding this attack until now is very limited however the following is the current situation as we know it:</p>
<h3><span style="-webkit-text-decorations-in-effect: underline;">Run 1: Facebook.com wall posts</span></h3>
<p>Several users have reported that &#8216;someone&#8217; posted weightloss messages on their friends&#8217; walls. There text of the message varies with the following three being the most common:</p>
<p><span id="more-1383"></span></p>
<p><em>Wow, this woman&#8217;s story has inspired me to lose weight facebookhealth4.com</em></p>
<p><em>I stumbled across this woman&#8217;s weight loss blog today, really interesting facebookhealth5.com</em></p>
<p><em>These things must work well for losing weight, check out this woman&#8217;s blog and what she did facebookhealth4.com</em></p>
<p style="text-align: center;"><em><a class="lightbox" title="Facebook-posts" href="http://www.gfi.com/blog/wp-content/uploads/2009/10/Facebook-posts.png"><img class="size-medium wp-image-1384 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Facebook-posts" src="http://www.gfi.com/blog/wp-content/uploads/2009/10/Facebook-posts-300x216.png" alt="" width="300" height="216" /></a><br />
</em></p>
<p>There are three possibilities how this might have been achieved:</p>
<ol>
<li>A number of Facebook accounts were compromised via a direct attack on Facebook.com (lowest possibility).</li>
<li>Malware writers discovered a way to directly post on Facebook users’ walls without their knowledge (might be a possibility).</li>
<li>A Trojan was installed on the Facebook user’s machine stealing account login details (highest possibility).</li>
</ol>
<h3>Run 2: Facebookhealthx.com and wwwsecurityscan04.com</h3>
<p>Just yesterday ten domains, Facebookhealth1.com to Facebookhealth10.com, were registered by a Chinese registrant carrying the name of TANGHUA. The contacts seem fake and both the Name Servers and IP are located in China. This simple public information already gives us the indication that these domains were created for the malicious activities.</p>
<p style="text-align: center;"><a class="lightbox" title="Whois Facebookhealthx" href="http://www.gfi.com/blog/wp-content/uploads/2009/10/Whois-Facebookhealthx.png"><img class="size-medium wp-image-1385 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Whois Facebookhealthx" src="http://www.gfi.com/blog/wp-content/uploads/2009/10/Whois-Facebookhealthx-273x300.png" alt="" width="273" height="300" /></a></p>
<p>These ten domains redirect immediately to another location hosted on wwwsecurityscan04.com. From the Whois record of wwwsecurityscan04.com, the registrant is an individual who makes use of dynamic DNS service but the contacts do not seem fake.</p>
<p style="text-align: center;"><a class="lightbox" title="Whois-Securityscan04_1" href="http://www.gfi.com/blog/wp-content/uploads/2009/10/Whois-Securityscan04_1.png"><img class="size-medium wp-image-1386 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Whois-Securityscan04_1" src="http://www.gfi.com/blog/wp-content/uploads/2009/10/Whois-Securityscan04_1-293x300.png" alt="" width="293" height="300" /></a></p>
<p>However, this domain was registered just yesterday, the same as the Facebookhealthx.com domains.</p>
<p style="text-align: center;"><a class="lightbox" title="Whois-Securityscan04_2" href="http://www.gfi.com/blog/wp-content/uploads/2009/10/Whois-Securityscan04_2.png"><img class="size-medium wp-image-1387 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Whois-Securityscan04_2" src="http://www.gfi.com/blog/wp-content/uploads/2009/10/Whois-Securityscan04_2-300x90.png" alt="" width="300" height="90" /></a></p>
<h3><span style="-webkit-text-decorations-in-effect: underline;">Run 3: Forum posts in various small websites</span></h3>
<p>Fire up your favorite Internet browser and in Google enter “facebookhealth5”. You should receive a list of websites which host posts similar to those on the Facebook wall.</p>
<p style="text-align: center;"><a class="lightbox" title="Google-Search" href="http://www.gfi.com/blog/wp-content/uploads/2009/10/Google-Search.png"><img class="size-medium wp-image-1388 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Google-Search" src="http://www.gfi.com/blog/wp-content/uploads/2009/10/Google-Search-300x233.png" alt="" width="300" height="233" /></a></p>
<p>Any of these links will redirect you to a ‘free’ virus scan of your computer. What you would not expect is that malware will be installed.</p>
<p>Run 4: The rouge AntiVirus scan and malicious payload from wwwsecurityscan04.com</p>
<p>As soon as you are redirected to wwwsecurityscan04.com an animation of a rouge AntiVirus software is displayed. The animation is visually very well done and presented. It has the potential to easily fool uneducated users. The following screenshots show a complete run from the rogue AntiVirus software:</p>
<p style="text-align: center;"><a class="lightbox" title="Fake-Virus-Scan" href="http://www.gfi.com/blog/wp-content/uploads/2009/10/Fake-Virus-Scan.png"><img class="size-medium wp-image-1389 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Fake-Virus-Scan" src="http://www.gfi.com/blog/wp-content/uploads/2009/10/Fake-Virus-Scan-300x180.png" alt="" width="300" height="180" /></a></p>
<p style="text-align: center;"><a class="lightbox" title="Fake-Virus-Scan2" href="http://www.gfi.com/blog/wp-content/uploads/2009/10/Fake-Virus-Scan2.png"><img class="size-medium wp-image-1390 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Fake-Virus-Scan2" src="http://www.gfi.com/blog/wp-content/uploads/2009/10/Fake-Virus-Scan2-300x180.png" alt="" width="300" height="180" /></a><a class="lightbox" title="Fake-Virus-Scan3" href="http://www.gfi.com/blog/wp-content/uploads/2009/10/Fake-Virus-Scan3.png"><img class="size-medium wp-image-1391 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Fake-Virus-Scan3" src="http://www.gfi.com/blog/wp-content/uploads/2009/10/Fake-Virus-Scan3-300x76.png" alt="" width="300" height="76" /></a></p>
<p>It is important to notice the long and complex URL being used to launch the fake AntiVirus scan (first screenshot under Run 4). If you visit wwwsecurityscan04.com (not recommended) nothing should happen and only some text will be displayed.</p>
<p>At the end of the AntiVirus scan by the animated screen, a dialog box requires you to download “Soft71.exe”; the malware. Do not expect that, if the Cancel button is pressed, you will be able to clear everything. The website together with the animation leaves no simple escape route.</p>
<p>I have uploaded the malware to VirusTotal.com for analysis. As at today, 07 October 2009, <strong>ONLY 3 AntiVirus Engines out of 41 managed to detect the malware</strong>. These engines power your desktop AntiVirus software and those of your place of work. This illustrates how prone we all are to malware and the risks that we all encounter when we do not think about our actions. Just imagine the consequences had you clicked on the malicious link whilst at work. This is the permalink for the <a href="http://www.virustotal.com/analisis/a9e1cdfec232a094e09518e1909705e8d3e5d4c8db2dae1d42561dae75140d20-1254934621" target="_blank">VirusTotal analysis</a>.</p>
<p style="text-align: center;"><a class="lightbox" title="VirusTotal" href="http://www.gfi.com/blog/wp-content/uploads/2009/10/VirusTotal.png"><img class="size-medium wp-image-1392 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="VirusTotal" src="http://www.gfi.com/blog/wp-content/uploads/2009/10/VirusTotal-300x256.png" alt="" width="300" height="256" /></a></p>
<h3>Run 5: Malware activity</h3>
<p>Until now I do not know exactly which activities “Soft71.exe” (the malware) performs on a computer. To understand the actions of the malware, the executable must be disassembled and run under a controlled environment monitoring the changes being performed.</p>
<p>However, it seems that this malware would be writing a number of registry keys and also downloading other malware from the Internet.</p>
<p>The possible malware attacks and how they are orchestrated are next to infinite. We must always be a step ahead of malware writers and, apart from keeping all machines secure and safe, we must ensure that all users are educated. This is valid advice both at the workplace and at home. A weak link in the chain may cause irreparable damage.</p>
<p>As we have seen there are occasions where the machine and software will not defend our resources. Education will always be the key to success against such criminal activity.</p>
<p><span style="text-decoration: underline;"> </span></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/facebook-facebookhealth-rogue-antivirus-application/feed/</wfw:commentRss>
		<slash:comments>7</slash:comments>
		</item>
		<item>
		<title>DHL Delivery Problem NR.59544</title>
		<link>http://www.gfi.com/blog/dhl-delivery-problem-nr59544/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=dhl-delivery-problem-nr59544</link>
		<comments>http://www.gfi.com/blog/dhl-delivery-problem-nr59544/#comments</comments>
		<pubDate>Mon, 28 Sep 2009 10:11:02 +0000</pubDate>
		<dc:creator>Andrei Zammit</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[executable files]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[virus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1258</guid>
		<description><![CDATA[DHL Delivery Problem NR.59544 Another day, another example exposing the fragile human security in an organization. Malware writers and spammers greatly depend on disguising their payload as innocent messages or software, which may even pretend to be offering a form &#8230;]]></description>
				<content:encoded><![CDATA[<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">DHL Delivery Problem NR.59544</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">Another day, another example exposing the fragile human security in an organization. Malware writers and spammers greatly depend on disguising their payload as innocent messages or software, which may even pretend to be offering a form of service to the innocent victim. The aim is to make the user perform an action: execute an infected e-mail attachment, click on a link to a compromised web site, or reply to fake unsubscribe notices and the list just goes on and on.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">The e-mail body and attachment claiming to originate from DHL Support Services</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">Just recently, I discovered an e-mail in my Inbox claiming to be originating from the DHL Support Services. DHL is a high profile legit international company which offers transport and logistics services. The e-mail also had attached a zip archive containing an executable file. The message of the e-mail states that there was a problem delivering my package due to an undisclosed problem. The message continues by trying to convince me to print the ‘invoice’ attached to the e-mail. The ‘invoice’ being referred to in the message is the executable found in the zip archive.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">As previously stated, the e-mail ended up in my Inbox and my personal antivirus did not detect the attachment as malware. However, I am still very susceptible that the attached file is malware for the following reasons:</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">•<span style="white-space: pre;"> </span>The MIME From domain is listed as dhl-support.com. This domain is registered on an individual from Germany but not on the actual DHL organization.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">•<span style="white-space: pre;"> </span>I did not have any postal packages which were not delivered.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">•<span style="white-space: pre;"> </span>The structure, grammar and tone used in the message do not seem to match those that would be used by a commercial company.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">•<span style="white-space: pre;"> </span>DHL have the facility to track any packages using their website. Why would they send an ‘attachment’ with an email?</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">Whois information for domain dhl-support.com. Clearly, this domain is not registered for DHL.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">In order to confirm this, the zip archive was uploaded to VirusTotal.com for analysis. As at the 23rd September 2009, nearly half of the antivirus engines at VirusTotal did NOT manage to detect the attachment as malware.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">Partial results after the analysis by VirusTotal.com</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">These engines form part of some of the most popular antivirus applications that protect desktops of home and business users and organizations’ servers. It takes time for the antivirus vendor to discover the malware, analyze it and distribute the necessary updates to detect it. This time lapse can prove to be the security hole for an organization or a disaster for the home user.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">The antivirus engines that did manage to detect the malware, listed it as yet another variant of the infamous Bredolab Trojan. This Trojan firstly appeared around May and variants have been going around in the form of attachments in spam messages throughout all these months.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">DHL and any other transport services organization will never send you an executable via e-mail to run on your desktop for any reason. This is simply an attack on users and organizations alike. The best defense is always education. Although software does protect, as we have seen, it is also prone to failure.</div>
<p><a class="lightbox" title="spam" href="http://www.gfi.com/blog/wp-content/uploads/2009/09/spam.jpg"><img class="alignright size-medium wp-image-1271" style="margin: 10px;" title="spam" src="http://www.gfi.com/blog/wp-content/uploads/2009/09/spam-300x199.jpg" alt="" width="240" height="159" /></a>Another day, another example exposing the fragile human security in an organization. Malware writers and spammers greatly depend on disguising their payload as innocent messages or software, which may even pretend to be offering a form of service to the innocent victim. The aim is to make the user perform an action: execute an infected e-mail attachment, click on a link to a compromised web site, or reply to fake unsubscribe notices and the list just goes on and on.</p>
<p>Just recently, I discovered an e-mail in my Inbox claiming to be originating from the DHL Support Services. DHL is a high profile legit international company which offers transport and logistics services. The e-mail also had attached a zip archive containing an executable file. The message of the e-mail states that there was a problem delivering my package due to an undisclosed problem. The message continues by trying to convince me to print the ‘invoice’ attached to the e-mail. The ‘invoice’ being referred to in the message is the executable found in the zip archive.</p>
<p style="text-align: center;"><a class="lightbox" title="Message" href="http://www.gfi.com/blog/wp-content/uploads/2009/09/Message.PNG"><img class="aligncenter size-medium wp-image-1259" title="Message" src="http://www.gfi.com/blog/wp-content/uploads/2009/09/Message-300x55.PNG" alt="" width="300" height="55" /></a></p>
<p style="text-align: center; "><em>The e-mail body and attachment claiming to originate from DHL Support Services</em></p>
<p style="text-align: left; "><em></em><span id="more-1258"></span>As previously stated, the e-mail ended up in my Inbox and my personal antivirus did not detect the attachment as malware. However, I am still very susceptible that the attached file is malware for the following reasons:</p>
<ul style="text-align: left; ">
<li>The MIME From domain is listed as dhl-support.com. This domain is registered on an individual from Germany but not on the actual DHL organization.</li>
<li>I did not have any postal packages which were not delivered.</li>
<li>The structure, grammar and tone used in the message do not seem to match those that would be used by a commercial company.</li>
<li style="text-align: left; ">DHL have the facility to track any packages using their website. Why would they send an ‘attachment’ with an email?</li>
</ul>
<p style="text-align: left; "><a class="lightbox" title="Whois" href="http://www.gfi.com/blog/wp-content/uploads/2009/09/Whois.PNG"><img class="aligncenter size-medium wp-image-1260" title="Whois" src="http://www.gfi.com/blog/wp-content/uploads/2009/09/Whois-157x300.PNG" alt="" width="157" height="300" /></a></p>
<p style="text-align: left; "><em>Whois information for domain dhl-support.com. Clearly, this domain is not registered for DHL.</em></p>
<p style="text-align: left; ">In order to confirm this, the zip archive was uploaded to VirusTotal.com for analysis. As at the 23rd September 2009, nearly half of the antivirus engines at VirusTotal did NOT manage to detect the attachment as malware.</p>
<p style="text-align: left; "><a class="lightbox" title="VirusTotal" href="http://www.gfi.com/blog/wp-content/uploads/2009/09/VirusTotal.PNG"><img class="aligncenter size-medium wp-image-1261" title="VirusTotal" src="http://www.gfi.com/blog/wp-content/uploads/2009/09/VirusTotal-300x253.PNG" alt="" width="300" height="253" /></a></p>
<p style="text-align: left; "><em>Partial results after the analysis by VirusTotal.com</em></p>
<p style="text-align: left; ">These engines form part of some of the most popular antivirus applications that protect desktops of home and business users and organizations’ servers. It takes time for the antivirus vendor to discover the malware, analyze it and distribute the necessary updates to detect it. This time lapse can prove to be the security hole for an organization or a disaster for the home user. This is why it is important to make use of a product which has multiple different antivirus engines such as <a href="http://www.gfi.com/mailsecurity">GFI MailSecurity</a>.<span style="font-family: Calibri, sans-serif; font-size: 15px;"> </span></p>
<p style="text-align: left; ">The antivirus engines that did manage to detect the malware, listed it as yet another variant of the infamous Bredolab Trojan. This Trojan firstly appeared around May and variants have been going around in the form of attachments in spam messages throughout all these months.</p>
<p style="text-align: left; ">DHL and any other transport services organization will never send you an executable via e-mail to run on your desktop for any reason. This is simply an attack on users and organizations alike. The best defense is always education. Although software does protect, as we have seen, it is also prone to failure.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/dhl-delivery-problem-nr59544/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>Greetings from China</title>
		<link>http://www.gfi.com/blog/china/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=china</link>
		<comments>http://www.gfi.com/blog/china/#comments</comments>
		<pubDate>Fri, 31 Jul 2009 13:09:23 +0000</pubDate>
		<dc:creator>Andrei Zammit</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[spam]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=701</guid>
		<description><![CDATA[During the recent months, spam originating from China has been hitting the mailboxes of users from all over the world. One interesting fact is that this latest wave of spam is constructed differently from its predecessors. What makes this spam &#8230;]]></description>
				<content:encoded><![CDATA[<p style="text-align: left;"><a class="lightbox" title="Spam from China" href="http://www.gfi.com/blog/wp-content/uploads/2009/07/Greetings-from-China.jpg"><img class="alignright size-medium wp-image-767" style="margin: 10px;" title="Spam from China" src="http://www.gfi.com/blog/wp-content/uploads/2009/07/Greetings-from-China-300x200.jpg" alt="" width="240" height="160" /></a>During the recent months, spam originating from China has been hitting the mailboxes of users from all over the world. One interesting fact is that this latest wave of spam is constructed differently from its predecessors. What makes this spam different is the way that the advert is delivered to the victim.</p>
<p>Such spam takes the form of a greeting e-card originating from greetingcard.org or 123greetings.com. These two domains are legitimate domains however the spammer is using these brand names to fake the origin of the email. The body content contains a typical greeting message urging the receiver to click the URL to view the e-card. </p>
<p><span id="more-701"></span>The URL in this case does not directly lead to a store promoting the spamvertised products but to a post in a forum or group showing a screenshot of the store. It is this hyperlinked screenshot which redirects the potential victims to the store being operated by the spammer.</p>
<p style="text-align: center;"><img class="size-medium wp-image-702 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Outlook" src="http://www.gfi.com/blog/wp-content/uploads/2009/07/Outlook-300x63.PNG" alt="" width="300" height="63" /></p>
<p>This technique offers a lot of advantages to the spammer:</p>
<ol>
<li>Social Engineering – inexperienced users are very prone to accepting the message of an email. In this case a greeting e-card is used which targets this type of user. Content checking and statistical techniques for filtering are bypassed easily because basic English words are used.</li>
<li>The spammer is using a ‘middle man’ to lead the victim to the store. The ‘middle man’ is the website hosting the forum\group post. It is the task of the administrators of the forum\group to remove such a post. Obviously this may take a considerable amount of time until the post is reported and action taken.</li>
<li>These forum\group posts are very easily generated using scripts and hence there might exist thousands of different forum posts which lead to the same store. Checking only the URL against a blacklist provider such the surbl.org typically results in a negative result because the unlimited possibilities where the post is hosted and typically the forum\group are legit domains.</li>
</ol>
<p>The URLs of the group of spam messages under test conditions, redirected to a post hosted on Google Groups ,which in turn contained a screenshot redirecting to buybegin.com. This domain hosts a ‘Canadian’ pharmacy store selling Viagra, Cialis and other medicine of dubious quality and origin.</p>
<p style="text-align: center;"><a class="lightbox" title="Forum post" href="http://www.gfi.com/blog/wp-content/uploads/2009/07/Scr1.png"><img class="size-medium wp-image-703 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Forum post" src="http://www.gfi.com/blog/wp-content/uploads/2009/07/Scr1-300x180.png" alt="" width="300" height="180" /></a></p>
<pre style="text-align: center;"><em>Forum post hosted on Google Groups</em></pre>
<p style="text-align: center;"><a class="lightbox" title="Website selling fake goods" href="http://www.gfi.com/blog/wp-content/uploads/2009/07/Scr2.png"><img class="size-medium wp-image-704 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Website selling fake goods" src="http://www.gfi.com/blog/wp-content/uploads/2009/07/Scr2-300x180.png" alt="" width="300" height="180" /></a></p>
<pre style="text-align: center;"><em>The redirected website ‘buybegin.com’ from the post hosted on Google Groups</em></pre>
<p> </p>
<p>It is very clear that the domain buybegin.com has been very recently registered and it seems that the owners do not intend to remain in ‘business’ for a long period of time. In fact the domain is registered for only one year. The administrative and billing contacts of the domain are clearly fake and only the contact email address may be genuine. </p>
<p style="text-align: center;"><a class="lightbox" title="Whois" href="http://www.gfi.com/blog/wp-content/uploads/2009/07/Whois.PNG"><img class="size-medium wp-image-705 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Whois" src="http://www.gfi.com/blog/wp-content/uploads/2009/07/Whois-300x279.PNG" alt="" width="300" height="279" /></a></p>
<pre style="text-align: center;"><em>Whois record for ‘buybegin.com’ domain</em></pre>
<p> </p>
<p>Digging deeper into this information reveals that the registrant with the name “Du Qiaowen” has 24 other domains registered under his name such as MagnetAroma.com. The MagnetAroma.com domain has a very similar whois record as buybegin.com with both domains being registered on the same day. The MagnetAroma.com website hosts the same pharmacy store as buybegin.com. All of these indications are the trademark of a large scale scam operation.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/china/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>The current and future SPAM storms</title>
		<link>http://www.gfi.com/blog/current-future-spam-storms/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=current-future-spam-storms</link>
		<comments>http://www.gfi.com/blog/current-future-spam-storms/#comments</comments>
		<pubDate>Mon, 15 Jun 2009 09:15:09 +0000</pubDate>
		<dc:creator>Andrei Zammit</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[spam]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=45</guid>
		<description><![CDATA[You may already be familiar with SPAM emails that contain just one sentence about weight loss; Oprah and the infamous Acai berries. What is interesting about this current spam storm is that the spammer did not try to bypass any anti-spam filtering technologies. Surely, most products would have filtered such email as spam. Hence, the question to pose is ‘What is the aim of such spam?’]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="spam" href="http://www.gfi.com/blog/wp-content/uploads/2009/05/spam.jpg"><img class="alignright size-medium wp-image-100" title="spam" src="http://www.gfi.com/blog/wp-content/uploads/2009/05/spam-300x199.jpg" alt="" width="240" height="159" /></a>You may already be familiar with SPAM emails that contain just one sentence about weight loss; Oprah and the infamous Acai berries. What is interesting about this current spam storm is that the spammer did not try to bypass any anti-spam filtering technologies. Surely, most products would have filtered such email as spam. Hence, the question to pose is ‘What is the aim of such spam?’</p>
<p>Visiting capturedright.com (do not visit this website) one can notice that there is no Viagra, weight loss pills or berries for sale. Only a very simple and small ‘opt-out’ form with the words “Remove me:”</p>
<p style="text-align: center;"><a class="lightbox" title="spam2" href="http://www.gfi.com/blog/wp-content/uploads/2009/05/spam2.png"><img class="aligncenter size-medium wp-image-44" title="spam2" src="http://www.gfi.com/blog/wp-content/uploads/2009/05/spam2-300x42.png" alt="" width="300" height="42" /></a></p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2009/05/spam1.png"></a><a class="lightbox" title="spam1" href="http://www.gfi.com/blog/wp-content/uploads/2009/05/spam1.png"><img class="aligncenter size-medium wp-image-43" title="spam1" src="http://www.gfi.com/blog/wp-content/uploads/2009/05/spam1-300x49.png" alt="" width="300" height="49" /></a></p>
<p>The innocent victims of spam would be tempted to insert their email addresses to ‘opt-out’ of the spamming list. In reality, this is very similar to a phishing attack. The spammer would be harvesting the email addresses. The benefit to the spammer is that there is a very high probability that the email addresses being harvested are valid.</p>
<p style="text-align: center;"><a class="lightbox" title="Opt-out form at capturedright.com" href="http://www.gfi.com/blog/wp-content/uploads/2009/05/optout.png"><img class="aligncenter size-medium wp-image-42" title="Opt-out form at capturedright.com" src="http://www.gfi.com/blog/wp-content/uploads/2009/05/optout-300x35.png" alt="" width="300" height="35" /></a></p>
<p><em>Innocent looking opt-out form at capturedright.com</em></p>
<p>It is costly to send SPAM and according to recent studies, the profit spammers make is not as big as it was thought in the past. Hence, it is in the interest of the spammer that the mailing list being used is kept clean of invalid email addresses. As soon as a victim places an email address in the ‘opt-out’ form, the email address is confirmed as a valid address to target spam since there was a manual process of inserting the email address in the form.</p>
<p style="text-align: center;"><a class="lightbox" title="Confirmation of removal" href="http://www.gfi.com/blog/wp-content/uploads/2009/05/confirm.png"><img class="aligncenter size-medium wp-image-41" title="Confirmation of removal" src="http://www.gfi.com/blog/wp-content/uploads/2009/05/confirm-300x33.png" alt="" width="300" height="33" /></a></p>
<p><em>Confirmation of ‘removal’ of email address. <strong>DO NOT TRY THIS!</strong></em></p>
<p>The intent of this current trend of SPAM is not to sell or promote a product but more to create and harvest better mailing lists for spamming activities in the near future. In addition to anti-spam products, the best weapon in such cases is the education of end users.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/current-future-spam-storms/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 11:42:20 by W3 Total Cache --