Thursday, September 4, 2008

Google Chrome Browser Exploit

First published exploit for Google's Chrome Browser. Automatically downloads a file without prompting the user. However it does not seem to automatically execute the downloaded file so the risk is not that great.

http://milw0rm.com/exploits/6355

Wednesday, September 3, 2008

Google Browser Released

http://www.google.com/chrome

Google recently released Google Chrome (BETA) an open source browser. I'm betting there's about a hundred people fuzzing the hell out of it right now =)


MySpace Cofounder Tom Anderson Was A Real Life “WarGames” Hacker in 1980s

http://www.techcrunch.com/2008/08/30/myspace-cofounder-tom-anderson-was-a-real-life-wargames-hacker-in-1980s/

"In 1985, when he was fourteen and in high school in Escondido, California, Anderson was subject to one of the largest FBI raids in California history after hacking into a Chase Manhattan Bank computer system and subsequently showing his friends how to do it. He was never arrested because he was a minor, but the FBI confiscated all of his computer equipment and some newspaper accounts of the incident stated incorrectly (see image below from a 1986 LA Times story) that he was “convicted in federal court of computer hacking and placed on probation” (the statements were corrected in subsequent articles). Anderson used the hacker name “Lord Flathead.”"

Actually this is quite common. In the Philippines did you know that linux luminaries R_____ and S_____ used to be members of a hacker group? =)

Monday, September 1, 2008

DNS flaw redirects Internet users to wrong websites

http://newsinfo.inquirer.net/breakingnews/infotech/view/20080831-157877/DNS-flaw-redirects-Internet-users-to-wrong-websites

MANILA, Philippines -- A flaw in the Internet’s domain name system (DNS), first detected more than a month ago, is affecting Internet service providers (ISPs) and their customers, according to a local security expert.

Security researcher Dan Kaminsky first detected the flaw early July and discussed it at length at a security conference a month later, although it was thought to have been already exploited by hackers.

The problem concerns the DNS, which translates numerical IP addresses into Web addresses (URL) familiar to users. By typing in that address, such as www.inquirer.net, users do not have to wrangle with memorizing numerical IP addresses to input into their browsers.

Experts fear that the flaw is now being exploited in such a way that a user who enters a legitimate address may be redirected to a different site or worse, a bogus mirror site that's actually designed to gather sensitive information such as passwords and credit card numbers.

INQUIRER.net has received feedback from readers calling attention to local Web addresses that have been redirected instead to different sites.

Joey Santos, CEO of local security services provider NetX Technology Solutions, reported that at least two local banks have encountered possible DNS-related problems, in particular detecting email containing suspicious links to their respective websites.

"It could be isolated cases involving some of their employees. But nonetheless these banks are investigating it," Santos told INQUIRER.net via telephone.

Reports about the DNS flaw also advise Internet service providers (ISP) to protect mail servers and ensure they are accessing protected (or patched) DNS servers.

Local ISPs and service providers could not be reached for comment as of this writing.

The problem is, ISPs usually do not hold themselves accountable when it comes to security cases such as this which is presumably out of their control, according to Santos.

"Their SLAs (service level agreements) only cover connectivity and the usual issue (for the user) is speed," Santos said. "In the US, it is a bigger deal because customers pay a premium for added security services from their ISPs."

Major technology companies including Microsoft and Cisco have reportedly convened and are issuing appropriate patches to their products specific to this DNS problem. Security and anti-virus company Trend Micro has also blogged about this "DNS cache poisoning" flaw in July.

In its blog, it pointed out that it was the Unites States Computer Emergency Response Team that was first to published about this vulnerability, as it detailed the security implications and the possible vendors affected.

"While this is completely unrelated to any particular malware, there is a rather disconcerting DNS cache-poisoning vulnerability that has surfaced which deserves the attention of any and every organization on the planet which operates their own DNS servers," Paul Ferguson of Trend Micro's Internet Security Intelligence in Advanced Threats Research group wrote as early as July 22.

"The importance of determining if you are vulnerable, and getting the vulnerability fixed quickly, is becoming more important as each days passes. This is due not only to the criticality of the vulnerability, but also due to some of the 'colorful' background in how some of the details have become available surrounding the vulnerability itself," he said.

User are also advised to go to this website to check if DNS servers their browsers are using are prone to attacks.


ISP's should get sued if one of their customers get scammed as a result of the ISP's not patching their servers =)