Home Tags Posts tagged with "malicious software"

malicious software

FBI has warned that hundreds of thousands of people worldwide could lose access to the internet by July following a hackers’ scam – and they don’t even know it.

Unknown to most of them, their problem began when international hackers ran an online advertising scam to take control of infected computers around the world.

In a highly unusual response, the FBI set up a safety net months ago using government computers to prevent Internet disruptions for those infected users. But that system is to be shut down.

Now, the FBI is encouraging users to visit a website run by its security partner that will inform them whether they’re infected and explain how to fix the problem. After July 9, infected users won’t be able to connect to the Internet.

Most victims don’t even know their computers have been infected, although the malicious software probably has slowed their web surfing and disabled their antivirus software, making their machines more vulnerable to other problems.

Last November, the FBI and other authorities were preparing to take down a hacker ring that had been running an Internet ad scam on a massive network of infected computers.

Tom Grasso, an FBI supervisory special agent, said: “We started to realize that we might have a little bit of a problem on our hands because … if we just pulled the plug on their criminal infrastructure and threw everybody in jail, the victims of this were going to be without Internet service.

“The average user would open up Internet Explorer and get `page not found’ and think the Internet is broken.”

FBI has warned that hundreds of thousands of people worldwide could lose access to the internet by July following a hackers' scam

FBI has warned that hundreds of thousands of people worldwide could lose access to the internet by July following a hackers' scam

On the night of the arrests, the agency brought in Paul Vixie, chairman and founder of Internet Systems Consortium, to install two Internet servers to take the place of the truckload of impounded rogue servers that infected computers were using.

Federal officials planned to keep their servers online until March, giving everyone opportunity to clean their computers. But it wasn’t enough time. A federal judge in New York extended the deadline until July.

Tom Grasso added: “The full court press is on to get people to address this problem.”

Hackers infected a network of probably more than 570,000 computers worldwide.

They took advantage of vulnerabilities in the Microsoft Windows operating system to install malicious software on the victim computers. This turned off antivirus updates and changed the way the computers reconcile website addresses behind the scenes on the Internet’s domain name system.

The DNS system is a network of servers that translates a web address – such as www.ap.org – into the numerical addresses that computers use. Victim computers were reprogrammed to use rogue DNS servers owned by the attackers. This allowed the attackers to redirect computers to fraudulent versions of any website.

The hackers earned profits from advertisements that appeared on websites that victims were tricked into visiting.

The scam netted the hackers at least $14 million, according to the FBI. It also made thousands of computers reliant on the rogue servers for their Internet browsing.

When the FBI and others arrested six Estonians last November, the agency replaced the rogue servers with Vixie’s clean ones. Installing and running the two substitute servers for eight months is costing the federal government about $87,000.

FBI officials said they had taken the unusual step of organizing a system to avoid any appearance of government intrusion into the Internet or private computers. And while this is the first time the FBI used it, it won’t be the last.

Eric Strom, the FBI’s Cyber Division unit chief, said: “This is the future of what we will be doing.

“Until there is a change in legal system, both inside and outside the United States, to get up to speed with the cyber problem, we will have to go down these paths, trail-blazing if you will, on these types of investigations.”

Now, he said, every time the agency gets near the end of a cyber case, “we get to the point where we say, how are we going to do this, how are we going to clean the system” without creating a bigger mess than before.

 

A new virus is threatening PCs via emails which infect PCs without the user having to open an attachment.

The user will not even be warned this is happening, the only message that appears is “loading”.

The email automatically downloads malicious software into your computer from elsewhere the moment a user clicks to open it.

The mails themselves are not infected and thus will not “set off’ many web-security defense packages.

Security experts say that the development is “particularly dangerous”.

“This sort of spam also affects cautious users which would never open an unknown attachment or link,” say security experts Eleven Research Team.

Previous generations of email-borne viruses and trojans required users to click on an attachment – often an office document such as a PDF.

The new emails – dubbed “drive-by emails” – have been detected “in the wild” by computer researchers Eleven Research Team.

“This drive-by spam automatically downloads malware when the e-mail is opened in the e-mail client,” says Eleven Research Team.

“Previous malware e-mails required the user to click on a link or open an attachment for the PC to be infected.

“The new generation of e-mail-borne malware consists of HTML e-mails which automatically downloads malware when the e-mail is opened.

“This is similar to so-called drive-by downloads which infect a PC by opening an infected website in the browser.”

The current wave of emails arrives with the title “Banking Security Update”.

To stay safe, Eleven Research Team advises switching all security settings in email software to maximum, and updating your browser to the latest version so it’s protected against malicious software.