05 December 2008
Welcome to the Cloud
03 December 2008
Facebook Blocked?!? (static.ak.fbcdn.net)
Vista SP2 on its way!
07 October 2008
Standard Bank Spoofed Email Malware
"Attention to all Standard Bank Customers!To address this, Standard Bank has released a 128-bit SSL update for the online banking page that eliminates this bug."
Some Standard Bank customers have reported experiencing disconnect or write error issues with online banking.
- Standard Offshore Bank - Security - security of individual customer information.
- Standard Offshore Bank - Security - We use some information to help identify
- Standard Offshore Bank - Security - Our customer information
Attention to all Standard Bank Customers!
Some Standard Bank customers have reported experiencing disconnect or write error issues with online banking.
To address this, Standard Bank has released a 128-bit SSL update for the online banking page that eliminates this bug.
You can update your browser from our Customer Service Department>>>
- bizcombf.com
02 October 2008
The PHP Driven World Will End in 2037!
Delivery Reciept SPAM
03 September 2008
Some Google Chrome Features
New Browser - Google Chrome
Google released a new browser into the wild yesterday. The new browser called Google Chrome has many cool features and I think it has the potential to become a major player in the heavily contested browser market.
02 September 2008
Google to launch web browser
You can find information about the new browser on the following sites:
- http://www.google.com/googlebooks/chrome/
- http://www.crunchbase.com/product/google-chrome
- http://www.techcrunch.com/2008/09/01/first-public-screen-captures-of-google-chrome/
I for one am looking forward to see what Google can bring to the browser market. I am still however a loyal Firefox user, until something that compete with the power of Firefox and its array of useful extensions I am not budging, but hey Google normally makes really awesome easy to use products so I will hopefully have a copy soon to review.
08 August 2008
17 July 2008
SARS e@syFile Employers Manual Backup & Restore
"The application has started from the incorrect icon. Please start e@syFile - employers from the desktop icon"
Even if you open the program from the desktop icon it still gives you this error.
I found that you can do the following to fix this.
- goto
Windows XP: C:\Documents and Settings\{username}\Application Data\EasyFileEmployer. {hash}\Localstore\
Windows Vista: C:|Users\{username}\AppData\Roaming\easyFileEmployer.{hash} \Localstore\ - Copy the EasyFile.db and easyFile-employer.air files to a safe location.
- Uninstall the e@syFile Employer application.
- Re-install the program from the setup file
- Copy the EasyFile.db and easyFile-employer.air files back to the directory.
Windows XP: C:\Documents and Settings\{username}\Application Data\EasyFileEmployer. {hash}\Localstore\
Windows Vista: C:|Users\{username}\AppData\Roaming\easyFileEmployer.{hash} \Localstore\ - Start the e@syFile program again.
I would suggest that you backup the EasyFile.db and easyFile-employer.air files on another computer/server or removable disk.
You can write an xcopy script that will copy the files to a server or backup disk and create folders named with the date of the backup like so:
@ECHO OFF
MD E:\PAYEBACKUP\%Date:~0,4%-%Date:~5,2%
CD C:\Documents and Settings\{username}\Application Data\EasyFileEmployer.{hash}\Localstore\
XCOPY *.* E:\PAYEBACKUP\%Date:~0,4%-%Date:~5,2%\
@ECHO ON
16 July 2008
Music to Malwares Ears?
As the Trend article pointed out this could be a massive problem because of P2P networks. Infected multimedia files could soon be flying around P2P networks infecting everyone.
Multimedia files are some of the most shared files and therefore this could be a very problematic attack to prevent. I would suggest that network administrators keep their eyes open and try to discorouge users from bringing multimedia files to the office.
11 July 2008
Windows and OSPF issue
We tested it on our Cisco routers and everything seemed fine, but the Windows clients are not playing the game. Basically we have 2 routers on each subnet, one for Wireless (Mikrotik) and the other for Diginet (Cisco).
When we disconnect the LAN cable for the Mikrotic router the Cisco automatically detects this and then re-routes traffic via the Diginet. The windows clients however do not go through the Diginet.
On closer inspection we noted that in the Windows routing table (route print) on the client machines they have a route to the remote subnet via the Wireless router. The strange thing is that their default gateway set via DHCP is the Cisco router yet they still have this entry in the routing table.
If anyone out there has had something similar could they please help out. We have been scratching our heads for a couple of days now and can not find anything usefull on Google yet. (Clearly our search strings are all messed up!)
The one solution that we have thought of is to put the mikrotik router on its own subnet and set the Cisco's LAN interface to have addresses on both subnets. This would mean that the Wireless equipment will not be directly accessible from the local client subnet and only allow traffic to traverse this link via the Cisco ethernet interface. The only problem with this scenario is that it will result in a lot of network downtime to setup and that there is the possibility that the client connection to the wireless may be limited to the speed of the 10Mbps ethernet port on the Cisco router.
DNS Mega-Poison
DNS (Domain Naming System) is the system that converts domain names to IP Addresses. This previously undiscovered vulnerability could lead to massive identity theft due to the fact that users could be redirected to fake websites without their knowledge.
http://www.itweb.co.za/sections/software/2008/0807111040.asp?O=FPTOP&S=Security&A=SEC
10 July 2008
MSN SPIM - ultimate-stuff.info
- ultimate-stuff.info
- <msn username>.hostings.info
Please do not enter your username and password in these forms. They will take your account details and start sending links to all your contacts.
If you have entered your username and password in this form please change your password as soon as possible!
My complete list of domain names to look out for are:
- imagedino.info
- imagelook.info
- locatehost.info
- imagedino.info
- hostings.info
- ultimate-stuff.info
08 July 2008
More SPIM - locatehost.info, imagelook.info
Some of the ones that I have seen so far are:
- imagelook.info
- locatehost.info
- imagedino.info
http://www.raymond.cc/blog/archives/2008/06/14/beware-of-pics-for-msn-friends-phishing-websites/
WHAT NEXT? - imagedino.info MSN SPIM
I have been following the imagedino.info saga since yesterday when I received a link to the site from a contact. Ever since then I have been trying to figure out what the point of this "attack" was. It seems pretty harmless and it also seems to be a rather basic attack, but I did some digging and found this article from Trend that seems to be rather similar form of attack.
The article indicates that once you have entered your user name and password into the form your login details are sent to an email box. The owner of that email box can then use your email account to send out spam mails or malware. This is obviously not a good thing, as it will annoy the daylights out of all your friends and possible infect their machines if your account is used to send out malware!
imagedino.info has Google Analytics
I noticed that if you view the source of the page it has Google Analytics embedded in it! What on earth are these guys doing? Is it some security research project by some students that got into the wild?
Get Firefox 3 to block
Also note that Mozilla Firefox 3 now blocks that domain. I would recommend that if you are using internet explorer rather upgrade to Firefox 3. It has some really good security features that block websites like these once they are identified. This is very usefull if you expect someone else to use your computer that also uses MSN. It will prevent them from being part of this whole attack.
What is SPIM?
I noticed that a lot of people where referring to the messages sent as SPIM. according to wiktionary.org : "SPIM is Unsolicited commercial messages sent via an instant messaging system"
SOLUTION - imagedino.info MSN Phishing
It would appear as the the MSN phishing outbreak is nothing more than phishing. After running several scans on his computer my "infected friend" found no viruses or malware. After changing his MSN password the messages seemed to stop. (Also verified by Gregg. See link found http://www.avertlabs.com/research/blog/index.php/2008/06/10/now-be-a-good-victim-and-enter-your-login-credentials-in-the-form/)
Lets hope this is just a single vector attack as now these punks have managed to get all the email addresses and msn information of most of the contacts. I would watch out for the next week or so for any suspect looking emails that arrive in your MSN account email address.
imagedino.info MSN Phishing
When I followed the link it took me to a rather suspicious login screen that asked me to logon using my MSN Account.
I would suggest that no one do this as this is more than likely a phishing website that will use your account details for no good.
The link was http://
Please block this on your proxy server is you have a proxy.
DO NOT ENTER YOUR MSN USERNAME AND PASSWORD IN THIS FORM.
If you have entered your username and password into this form:
please change your MSN password as soon as possible. I am not sure if the page downloads anything malicious onto your computer. I would suggest updating your anti-virus and running a full system scan.
You can get AVG Anti-virus for free from here.- Also try using something like spybot search and destroy
20 June 2008
The moral debate
One in three information technology professionals abuses administrative passwords to access confidential data such as colleagues' salary details, personal e-mails or board-meeting minutes, according to a survey.This is a pretty concerning statistic. We (Netowrk Admins) all know that we can access anything in our organisation, but it is our moral responsability not to do so. I know that I can get my hands on any information that I want, any time, from anywhere, but I choose not to as it is not right.
http://www.news24.com/News24/Technology/News/0,,2-13-1443_2343432,00.html
The problem with network administrators is that their role is often missunderstood and that management does not have a clue that they have access to this information. The other problem is that IT administrators are also mostly the implementers of the file security on the networks and that we hold the Administrator rights which allow us to access any information.
It is a double edged sword, we need access to the files to assist when something goes wrong, but we should not be able to see the contents of certain files.
19 June 2008
Hack my Coffee?
Photo courtesy PDPhoto.org |
17 June 2008
Facebook Phishing
"helloIt was followed by the following link:, howdy?? lisen i got a new friend here..sh ex kinda new here..maybe you can give her a lil tym so she can enjoy here?? not forcin u but u can chk out =)
http://www.facebook.comIt looks pretty legit at first glace, but if you take a close look you will notice that the domain is actially for dortos.net..profile.id.aymacc.2810ly6l .dortos.net/facebook/index.php ?id=5aaz6677&auth=j5xp2&cyua =hwy9e1l821
Whois information from whois.net
Now the thing that I found wierd was that when I logged into my profile on facebook I still got a notification about the wall post, but there was no post on my wall.
I cautiously opened the link to the fake profile and Firefox 3 Beta blocked it. (See screenshot)
I then decided to open the page up in IE8 and guess what. It looks identical to the facebook login screen. Except that it aint. (screenshot below)
This is a typical phishing attempt. I imagine that my buddy who sent the origional wall post recieved the same thing and his account was compromised. My personal information was then obtained through his profile and a wallpost was placed on my wall.
I am not sure exactly what is going on, but I recon there will be some information once the security researches around the world get a similar "phantom wall post".
I guess this is another reason to upgrade to Firefox 3 :P
13 June 2008
Ransomware
Ransomware seems to be a relativly old form of malware that is beginning to resurface according to Trend Micro. This form of malware takes certain files on your computer and encrypts them. You will not be able to access the files unless you pay the malware writer a fee for the program to decrypt the files. You can find more information about this malware on Wikipedia.
I think that this type of malware is particulary destructive / disruptive and could cause massive problems for computer administrators in future if this type of threat increases.
10 June 2008
More Officescan Woes
Well now, lets get back to the Trend Micro Officescan issue AGAIN!
After downloading SP1 for officescan, which failed to install I eventually got it up and running again by fully un-installing the Officescan server and then IIS. Re-installing both and applying all the pathes for Officescan and then installing Service Pack 1.
All seemed well for about 12 hours. I came back this morning and tried to check on my client machines and do some routine maintenence when all of a sudden the web interface started to hang up again.
I went into task manager to see what was going on and noticed that there where a huge amount of processes running for the Web Interface. There where mostly the following apps running in the background:
- cgiOnStart.exe
- cgiSummary.exe
- cgiChkMasterPwd.exe
- cgiRqlNl.exe
- cgiClientAdm.exe
I managed to get back into the web console by restarting IIS and then restarting the office scan master service. You need to do this in this order to first close all the cgi*.exe applications running in the background under IIS. This will allow you to stop the officescan master service. If you just try and restart the officescan master service without restarting IIS the service will say "stopping" infinitly.
I am back in the web console now, but there are no hosts shown at all in the console. ARG ! I know that a re-boot will remedy this, but I can't restart until later when there are less users on this machine. Trend is really starting to be a pain in the butt!
31 May 2008
Help Firefox set a world record!
29 April 2008
Trend Micro Officescan 8.0 Clients Crashing
We seem to be experiencing some difficulty with Trend Micro Officescan lately. When a client right clicks on the system tray icon and tries to open the Officescan console Trend Crashes. If they try to double click on the tray icon Officescan also crashes.
This is happening on all the clients that are attached to the servers that we recently updated to the latest patch from Trend Micro. It is happening to both Windows XP SP2 machines as well as Windows Vista Business SP1 machines. As yet I have been unable to find any information on the Trends website on how to resolve the issue.
When you double click you get the following error on Windows Vista:
"Trend Micro Officescan Monitor has stopped working"
When you right click you get the following error on Windows Vista:
"Trend Micro Officescan Management Console (32-bit) has stopped working"
Server Version: Officescan 8.0 build 1834
01 April 2008
Officescan 8.0 Web Console Hangs
The latest patch from the Trend Micro Website managed to sort out the issues we have been experiencing. So far, there have been no more hiccups. (Hold thumbs)
20 March 2008
Windows Vista SP1
The download weighs in at a pretty heft 434.5 MB. So beware the cap.
The Service Pack does not seem to be available yet via WSUS.
Apparently the Windows Update version of the update will weigh in at only about 65MBfor the x86 version and 125Mb for the x64.
I am waiting to see what the WSUS download is going to do to my cap!
And then there is still Windows XP SP3 which should be out some time soon too!
Ah Telkom, you are going to make some money this month!
19 March 2008
Pacemakers Hacked !?!
"They were able to reprogram it to shut down and to deliver jolts of electricity that would potentially be fatal — if the device had been in a person. In this case, the researcher were hacking into a device in a laboratory"Imagine a heart attack toolkit being released for sale! (Ok so it would cost you an arm and a leg)
New Your Times
I hope these kind vulnerabilities don't become common place in future!
17 March 2008
Malvertising
Trend Micro:Link to Trend Article
"Surprisingly, users do not necessarily have to click on an ad to trigger a Web threat."
"viewers may be quickly redirected from the original site to a different site, which initiates a malicious adware download through browser vulnerabilities—a process known as drive-by-download."
Trend Micro Malvertising Threat Prevention
Vista SP1 a load of crap?
Classic! Some japenese guys have started making toilet paper with Windows Vista SP1 features listed on it! Check it out on Engadget.
http://www.engadget.com/2008/03/16/vista-sp1-sp1-toilet-paper-hit-japan/
Edit:
Link to translated website with more images :
http://translate.google.com/translate?hl=en&u=http://www.watch.impress.co.jp/akiba/hotline/20080315/etc_vistasp1nv.html
28 January 2008
WORM_IRCBOT.OY
You can find information about the virus here:
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM%5FIRCBOT%2EOY&VSect=Sn
24 January 2008
SOLUTION: Hey, is this your picture?? MSN Virus
I noticed that the sneaky code modified my host file and pointed all anti-virus websites to local host as well as making the host file read-only. You can fix this by going to %SystemRoot%\System32\Drivers\Etc\ and right clicking on hosts file and unchecking the read only checkbox.
You can then open the file in something like wordpad and delete all the entries that show up near the bottom. Mine had a huge list.
Once you have doe this the instructions to get rid of the virus can be found on this helpfull blog:
http://2j07--jamboree.blogspot.com/
Look at the entry " Wednesday, January 23, 2008"
Hope this helps you out!
Hey, is this your picture?? MSN Virus
So I tried scanning the file with Trend Micro Office Scan Client and it didn't pick up anything.
So I then decided to try the following online scanners:
- Trend Micro House Call
- Bit Deffender Online Scanner
- kaspersky Online Scanner
At that point Windows Defender started screaming like mad!
I imagine that shortly after that multiple MSN windows opened and closed in quick succession on my PC, but I have not been able to verify that yet as I pulled out my network cable. None of my msn contacts have complained yet, but I suggest you ignore any links to pictures in MSN for now.
I will keep you posted as I am currently doing full system scans with Trend and with windows defender.
08 January 2008
Trend Micro Office Scan 8 Control Manager Service Keeps Stopping
This had occured at all 3 of my sites with office scan 8 installed. To rectify the problem you can open the services mmc console. Start > run > services.msc
Find the Office Scan master service and click start.
To prevent the error in future I changed the recovery options for the service to restart the service should it ever fail.