Tuesday, July 24, 2007

Storm Worm Escalates

Dallas Computer Repair reports that Storm Worm has escalated to new heights within the last week. The worm erupted with over 200,000,000 emails sent out in just over a week that directed users to malicious websites where little content was offered but contained a downloader that put the malicious software onto the unsuspecting users computers. The goal of these malware authors is to create a large botnet that can also download fresh malicious software where the authors will control the computers to their advantage.

Last Thursday was the biggest day with between 24,000,000 and 26,000,000 malicious emails sent compared to this last Tuesday where security experts predicted between 4-6 million malicious emails where Storm Worm constitutes 99% of the malicious software.

Monday, July 16, 2007

"Phish and Chips" Bust Nets Italian Phishing Scheme

18 Italians and 8 Eastern Europeans were arrested in a phishing scheme that targeted Poste Italiane's home-banking services and stolen identities from hundreds of unsuspecting users. Poste Italiane is Italy's government postal service which offers banking services. The group sent emails which directed unsuspecting users to a fake website that looked like Poste Italiane's site where information was then gathered.

A 22 y.o. admitted to being the main hacker who sent out emails and directed users to a cloned website overseas, appearing to be the Italian Postal Service where the information was then stolen and users bank accounts were emptied into cards the hackers had secured from Poste Italiane.

Police confiscated, laptops, data backup equipment, phones, false identification and equipment for manufacturing credit cards.

Dallas Computer Repair recommends avoiding identity theft by:
  1. Never open emails from those you do not know
  2. Never follow links from emails from senders you do not know
  3. Always make sure you are on an authenticated secure site which should show a yellow address bar with the following prefix> https:
  4. https: stands for hyper text transfer protocol secure

Saturday, July 14, 2007

Botnets Targeting iPhone Buyers

A new botnet is making its way across the worldwide internet that so far has about 7,500 zombie computers on its network. Infected computers are directed to a malicious website that is designed to look like the iPhone website but is a fake and the botnet is able to deliver real looking popups and advertisents to users who attempt to go to iPhones authentic site. If users are on a secure webpage a yellow address background should be seen in the address bar.

Solution to Botnets:

  1. Keep YOUR Computer Secure
  2. Scan for Viruses regularly
  3. Keep a Firewall running
  4. Scan for Adware and Spyware

Wednesday, July 11, 2007

Storm Worm Morphed Again

Dallas Computer Repair is reporting that Strom Worm has again morphed and is showing up in emails prompting unsuspecting users to click on a link in an email where the participant is taken to a website and prompted to download malicious software.

Email users are urged not to open emails sent from unknown parties and to never click on a link to an unknown website much less download software from an unknown source.

Saturday, July 7, 2007

iPhone Hacked?

InformationWeek report's that a hacker has breached the Apple iPhone's security. The hacker offers downloads that will activate the wifi's email, video application, web browsing and music without activating the phone through AT&T. Another hacker reports that he or they have the capability to activate the phone through AT&T prepaid phone cards versus the two-year contract at $60 per month.

Dallas computer repair predicted that iPhone would be targeted so a hacker could take the claim to fame as the first hacker to break iPhone's security features. Although the current hacks may prove the system is vulnerable but the hack is not capable of being used as a cell phone in the first instance and the second instance would make the iPhone a premium paid phone service.

Monday, July 2, 2007

Storm Worm Raises Its Ugly Head

The well-known Storm Worm keeps getting rewritten by its malware authors to target email users in a social engineering campaign. The email directs people to a malicious website that opens up a greeting they have been sent from a family member.

To avoid email worms and keep you computer safe by following this PC security info:
  1. Never open emails from unknown senders.
  2. Always keep your anti-virus updated.
  3. Scan your computer at least once a week for viruses.
  4. Keep your firewall turned on.
  5. Have an emergency boot cd available.
  6. Use as computer tips have.

Dallas Computer Repair reported recently how company executives are now being targeted by an email worm.

Monday, June 25, 2007

iPhone Hackers

Apple's iPhone is about to roll out to the public and iPhone security issues are being explored publicly. The device is a cell phone, internet browser and iPod that is wifi capable. Developer's Tools will not be available for the iPhone so hacking will be more tricky for malware writer's. Third party vendors will have a tougher time writing software for the iPhone without developer tools which will be an ace in Apple's pocket. Hackers have mostly taken advantage of software developer toolkits to write the malware programs in the past.

The amount of publicity is going to be too tempting for some skilled hackers who want to go after a tough system to "prove themselves". The device will run with the Mac OS X operating system and mostly likely along with the iPod, the iPhone's firmware will be updateable and more than likely updateable over the phone lines along with wifi to make the system quite stealthy. The browser will be Safari which will also be able to be easily updated and constantly ahead of hackers and malware authors.

A draw back to Apple will be that if hackers know the Safari browser vulnerabilites that they will be able to exploit the browser and compromise the system. The biggest threat that affects the iPhone is the number of applications, media formats, etc. that the iPhones supports making the ability to totally secure the device amazingly complex and leaving hackers with a multiple avenue of exploits to utilize. Last but not least is the hackers award of, "I was the first to hack iPhone".

DHS Chief Tries Reassuring Congress

Department of Homeland Security Chief, Scott Charbo, reassure the U.S. Congress that hackers have infiltrated the Nations US-VISIT which is the computer system handling all the information of people entering the United States, according to an article by PrivacyDigest. The information is vital to track those entering the country plus it also contains information on watchlists and Visa programs. Although he maintains the Nation's US-VISIT computer system is stealthy and has not been breached a computer worm/malware was found in the system.

Dallas Computer Repair has always maintained, "For National Security, protect your computer".

Thursday, June 21, 2007

Mpack Spreading from Italy Thoughout Europe/Worldwide

Mpack Toolkit is hitting hard in Italy and spreading across the world with a reported 10,000 computers effected according to a report by VirusBulletin:
  1. The basic function incorporates hidden iframes and it is then placed on a hacked website to exploit known flaws in operating systems, browsers and other components where
  2. downloads of infected code infiltrate vulnerable systems.
  3. It appears Russian malware authors are using the toolkit to hack and use the toolkit for statistical use in order to download the best, needed trojans and other malware to carry out attacks.

Friday, June 15, 2007

Spyware Illegal?

Arkansas Sen. Mark Pryor wants to stop spyware and by introducing a bill to make it illegal, according to InformationWeek. Other measures have been tried and passed in the U.S. House of Representatives but it is doubtful the measure will go through and become law. Sen. Pryor sites the many different types of spyware and how it slows computer, installs itself without user's knowledge and is hard to remove.

Dallas Computer Repair doubts the measure will pass the House and the Senate with groups like The Information Technology Association of America who has opposed similar legislation in the past.