---By our dear Anonymous@YourAnonNews June 26) - News release -(1).@scryptcc2015 hacked, large amount of #Bitcoin stolen. DO NOT DEPOSIT! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html…]-(2).Unusual Exploit Kit Targets Chinese Users (Part 2)!-
(3).Huoqixiaoqiang: by the player set off a nationwide( (mainland-china) large-scale horse hung analysis!-[from the beginning by the end of May, 360 system to monitor cloud security to those who download a "plug-China alliance," the horse! infective dose surge. It is inconceivable that, download the passage of the Trojans turned out to be a variety of users millions or even billions of dollars of player clients. ]-
---由我們親愛的匿名@ YourAnonNews6月26日) - 新聞消息發布-
(1)。@ scryptcc2015黑客攻擊,大量#Bitcoin被盜。不要定金!
http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-
(2).Unusual漏洞利用工具包瞄準中國用戶(第二部分)! - (3).禍起蕭牆:由播放器引爆的全國性(大陸-china)大規模掛馬分析!--[從5月底開始,360雲安全系統監測到一個名為“中國插件聯盟”的下載者木馬感染量暴漲。令人匪夷所思的是,該木馬的下載通道竟然是多款用戶量上千萬甚至過億的播放器客戶端。]-
---Durch unser lieber Anonym @ YourAnonNews 26. Juni) - Pressemitteilung -
(1). @ Scryptcc2015 gehackt, große Menge von #Bitcoin gestohlen. KEINE Einzahlung! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-(2).Unusual Exploit Kit Ziele chinesischen Nutzer (Teil 2)! -(3) .Huoqixiaoqiang: vom Spieler löste eine bundesweit ((Festland-China) große Pferd hing Analyse - [von Anfang bis Ende Mai auf 360 System Cloud-Sicherheit für diejenigen, die eine "plug überwachen !. -China Allianz, "das Pferd Infektionsdosis Überspannungs Es ist unvorstellbar, dass, laden Sie die Passage der Trojaner entpuppte sich eine Vielzahl von Benutzern Millionen oder sogar Milliarden von Dollar an Spieler Clients]-
---私たちの愛する匿名@ YourAnonNews 6月26日によって) - ニュースリリース -(1)。@ハッキングscryptcc2015、#Bitcoinが大量に盗まれました。預金しないでください! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-(2).Unusualキットターゲット中国のユーザー(その2)を活用! -(3).Huoqixiaoqiang:!プレイヤーは、大規模な馬が分析をハング)全国((本土中国をオフに設定することによって - [最初から月の終わりまでに、360システムが「プラグをダウンロードした人に、クラウドのセキュリティを監視します!。 - 中国同盟、「馬感染量の急増は、トロイの木馬の通路は、ユーザー数百万やプレイヤークライアントのドルの十億の様々なことが判明しダウンロードすることは考えられません]。 -
---Par notre cher Anonyme @ YourAnonNews 26 Juin) - Nouvelles de presse -
(1).@Scryptcc2015 piraté, une grande quantité de #Bitcoin volé. NE PAS DÉPOSER! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-(2).Unusual Exploit Kit cible les utilisateurs chinois (Partie 2)! -(3) .Huoqixiaoqiang: par le joueur a déclenché une échelle nationale ((continent-china) cheval à grande échelle accrochée analyse - [depuis le début à la fin de mai, 360 système de surveillance de la sécurité en nuage pour ceux qui téléchargent un "plug !. alliance, Chine, "le cheval onde de dose infectieuse Il est inconcevable que, télécharger le passage des chevaux de Troie avéré être une variété d'utilisateurs millions voire des milliards de dollars de clients de lecteur].-
---우리의 친애하는 익명 @ YourAnonNews 6월 26일으로) - 보도 자료 -
(1). @ 해킹 scryptcc2015, #Bitcoin의 많은 양의 도난. 입금하지 마십시오! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-(2).Unusual 키트 중국 사용자 (2 부)를 표적으로 공격! -
(3) .Huoqixiaoqiang! 플레이어가 대규모의 말을 분석 걸려) 전국 ((본토 중국을 출발하여 - [처음부터 월 말까지, 360 시스템은 "플러그를 다운로드하는 사람들에게 클라우드 보안을 모니터링 !. - 중국 동맹, "말 감염성 용량 서지 그것은 트로이 목마의 통과 사용자 수백만 또는 플레이어 클라이언트 달러의 수십억의 다양한으로 밝혀졌다 다운로드하는 것이 상상도 할 수없는 것입니다]-**All The World Lauguage**-
---By our dear Anonymous@YourAnonNews Retweet and NTDTV press release - "Shanghai people have been
arrested protesters Anti PX,, thousands of people around the pro-government release (Video) !!" [Updated: 2015- 06-23] - published by the Apple Daily news - "[cross-strait] Guangdong rubbish headlines bridge collapse kills,, !!" Reviewed by Anonymous @ YourAnonNews share - "new spear phishing attacks to bypass the two-factor authentication!" - [http://www.esecurityplanet.com/network-security/new-spear-phishing-attack-bypasses-two-factor-authentication.html] - & - "EU enlargement on Russia's economic sanctions issued six months -official time: June 22, 2015] -
---由我們親愛的Anonymous @YourAnonNews轉推及新唐人電視發佈的新聞-"上海反PX示威 多人被抓,,數千人圍政府促放人(視頻)!!"[更新時間: 2015-06-23]-由蘋果日報發佈的新聞-"【兩岸頭條】廣東豆腐渣橋,,倒塌奪命!!"由Anonymous@YourAnonNews分享 - “新魚叉式釣魚攻擊繞過雙因素認證!” - [http://www.esecurityplanet.com/network-security/new-spear-phishing-attack-bypasses-two-factor-authentication.html ] - & - “歐盟擴大對俄羅斯的經濟制裁6個月-official發表時間:2015年6月22日] -
---Durch unser lieber Anonym@YourAnonNews Retweet und NTDTV Pressemitteilung - "Shanghai Menschen wurden festgenommen Demonstranten Anti PX ,, Tausende von Menschen auf der Pro-Regierungs-Release (Video) !!" [Aktualisiert: 2015- 06-23] - von der Apple Daily News veröffentlicht - "[die Taiwanstraße] Guangdong Müll Schlagzeilen Brückeneinsturz tötet ,, !!" Bericht von: Anonym@YourAnonNews Aktie - "neue Spear-Phishing-Angriffe, um die Zwei-Faktor-Authentifizierung zu umgehen!" - [http://www.esecurityplanet.com/network-security/new-spear-phishing-attack-bypasses-two-factor-authentication.html] - & - "EU-Erweiterung auf die russische Wirtschaftssanktionen erteilt 6 Monate -Offizielle Zeit: 22. Juni 2015] -
---私たちの愛する匿名@ YourAnonNewsリツイートとNTDTVのプレスリリースでは - "上海の人々は,,アンチPX親政府リリース(動画)周りの人々の何千もの抗議者を逮捕されました!!" [更新:2015- 6月23日] - アップルデイリーニュースによって公開 - 「[両岸]広東省ゴミの見出しの橋の崩壊は,,殺します!! "匿名@ YourAnonNewsシェアによるレビュー - 「新しいスピアフィッシング攻撃は、二要素認証をバイパスします! " - [http://www.esecurityplanet.com/network-
security/new-spear-phishing-attack-bypasses-two-factor-authentication.html] - & - 半年-official時間を発行したロシアの経済制裁の「EU拡大:2015年6月22日]-**All The World Lauguage**-
Anonymous
.@scryptcc2015 hacked, large amount of #Bitcoin stolen. DO NOT DEPOSIT! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html …
ScryptCC hacked, large amount of Bitcoin stolen. DO NOT DEPOSIT!
June 24, 2015
By Pierluigi Paganini
Altcoin cloud mining hash power online marketplace ScryptCC has been hacked and a large amount of Bitcoin was stolen by the attacker.
The news of another clamorous case of Bitcoin theft is circulating on the Internet, Altcoin cloud mining hash power online marketplace ScryptCC has been hacked. In time I’m writing it is not known the exact the amount of stolen Bitcoin neither the computational hashing power that has been abused. The announcement of the ScryptCC hack was posted by the admin Marcelo Santos and it is publicly available to the users once authenticated to the online service.According the first information disclosed about the incident, the attacker hacked the platform during an upgrade.
The hacker credited himself BTC and KHS has stolen all the Bitcoin from the wallet of the ScryptCC service, which represents the a major percentage of the overall amount of virtual currency stolen by the attacker.
The administrator confirmed that all the information related to the Scrypt.CC platform, including users’ data, was not lost due to the availability of recent backups.
The ‘Status’ section of the ScryptCC website is currently empty and the server offline to allow investigation.
In this moment is suggested to the users to NOT MAKE ANY MORE DEPOSITS SINCE THE HACKERS STILL HAVE ACCESS TO THE HOTWALLETS.
Pierluigi Paganini
(Security Affairs – ScryptCC, cybercrime)
=====
Anonymous
.@scryptcc2015 hacked, large amount of #Bitcoin stolen. DO NOT DEPOSIT! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html …
ScryptCC黑客入侵,大量比特幣被盜的。 不要定金!
2015年6月24日通過皮耶路易吉帕格尼尼
Altcoin雲散礦電上網市場ScryptCC已經被黑客入侵和大量比特幣被攻擊者竊取。
比特幣的盜竊另一吵鬧的情況下,該消息是在互聯網上流傳,Altcoin雲散礦電上網市場ScryptCC已經被黑客入侵。 隨著時間的推移,我寫它是不知道被盜的確切數額比特幣既不是已被濫用的計算散列電源。 在ScryptCC黑客的公告被張貼由管理員馬塞洛·桑托斯,這是公開的一次認證的在線服務的用戶。據透露有關這一事件的第一個信息,攻擊者在升級過程中砍死平台。
黑客記自己BTC和KHS已經從ScryptCC服務,它代表虛擬貨幣的攻擊者竊取總量的一個重大比例的錢包被偷所有的比特幣。
管理員證實,所有相關的Scrypt.CC平台,包括用戶的數據信息,並沒有由於最近備份的可用性丟失。
該“ 狀態的ScryptCC網站的“部分目前是空的服務器離線,使調查。
在這一刻,建議給用戶帶來不作任何更多的存款以來,黑客仍然可以訪問的HOTWALLETS。
皮耶路易吉帕格尼尼
( 安全事務 - ScryptCC,網絡犯罪)
=====
Huoqixiaoqiang: by the player set off a nationwide large-scale horse hung analysis
Posted onThe incident
From the beginning of the end of May, 360 system to monitor cloud security to those who download a "plug-China alliance" called Trojan infection volume surge. It is inconceivable that, download the passage of the Trojans turned out to be a variety of users millions or even billions of dollars of player clients.Initially, we suspect that these players upgrade file is a Trojan hijacking. Trojan downloaders hardest hit by Sohu video analysis, we found that Sohu video running on the network to download integrity check code does, but do not check for security, such as the signature information, hijack indeed be upgraded Trojans . But from the data analysis shows that Polly with player download Trojan spread across different regions, different operators, which can rule out the possibility of network hijacking.
The real problem lies in where? We find victims in feedback from users, "China plugins Alliance", contact the victims to find clues in the real world, trying to hold back from the source of the Trojan spread, not just check Trojans kill. To the victim survey, Sohu video on the move computer installation through official channels, bundled with Trojan itself is not; in about a month before the move within this time, the computer has not been performed suspicious programs. So the greatest possibility is that Sohu video was linked third party horse!
After focus on monitoring and verification testing, we found that Sohu video showing a client PW advertising page, the code hanging horse with IE Remote Code Execution Vulnerability (CVE-2014-6332), you can take advantage of Sohu Video to execute Trojan code.
Further investigation demonstrated that the vast majority of strokes XP computer system, few are unpatched Win7, Win8 system; Sohu video hang horse comes from third-party ad network, which is also linked to a variety of players, has become an important channel of horse the reason.
Because antivirus software on the browser process protection is tighter, even though the vulnerability is triggered, generally linked to horse attack will not be able to guarantee the escape. But for the players, you can load additional web advertising clients, then as many soft kill guard blind. Hanging horse attack ads triggered by the client, allowing the user to start the player could hit.
Since the players linked to horse abnormal hidden and elusive, the affected players, the amount of users and very large, for 360 security guards quickly upgrade adds support for anti-hung horse players and other clients, to respond to popular software into third-party content potential safety problems. From June 1 to June 25, interdiction 360 pairs players linked to the horse total has reached 3,537,406 times, which is the largest-scale Trojan attacks this year.
Sohu video Trojan script execution
360 block hanging horse player
Attacks
The player hanging horse attack, the use of the 2014 open IE God sees CVE-2014-6332, the vulnerability causes the VBScript virtual machine an integer overflow, trigger specific principles in this skip, there are a lot of detailed analysis of online . Do use IE kernel page display software, if the call to the VBScript, are likely to trigger this vulnerability. In addition, as the vulnerability was disclosed after stop taking XP, XP system will be permanently affected by this vulnerability.
Schematic attack
Case study
We analyzed the process of being attacked Sohu video, as well as some well-known domestic software has the same problem, Sohu video is a Trojan when the first wave of large-scale attacks exploit client.First, Sohu video in its internal WebBrowser added support, the kernel using IE core of the system, through the core to show the page content and ads:
Sohu video of the main interface and display ads
IE core support system for VBScript parsing, and calls to the VB
virtual machine, if there vbs script WebBrowser rendered page, the
script will be handed over to VB virtual machine. Sohu video client within the end of the page display ads, some from ad networks and a variety of marketing platforms:
Analysis is shown in a PW advertising page, it is inserted a malicious iframe tag, label with some vbs script:
Decrypt the script, I found to contain 6332 exploit code, which is published by the Internet through a period of transformation from poc.
Ultimately, the successful use of SHRes carry out an attack script, execute a vbs script written by cmd:
In the analysis of attack code, we found the script contains at least two attacks:
PlayLoad analysis
After the script executes, it will download an executable file from the specified url execution, download the executable file is called "China plugins Alliance" downloader. It will continue to download a downloader, a remote control and a lot of trojan installation package to a local, newly downloaded downloaders continue to download the installation package, forming a chain of silence to promote the potential (poor computer users ah), is the promotion of software including Rising, color look, voice reading fiction reader, 61 a key to start, eye artifact, Wu Han Net Knowledge Power, Mito browsing, daily 9 9 (with secondary marketing) and the like.
Caught computer appalling
Trojan remote control through a series of techniques to hide itself
while operating registry write services to enable remote control Trojan
boot from the start.
Players hang horse behavior chain
"China plugins alliance" murderers survey
Through the "China widget Union" Trojan server tracking survey, the preliminary judging its author is named yesimck network black production workers, which author QQ signature as "China officially launched the network receive unlimited installations www.vooyee.com . "Tracking clues as follows:
Domain name registration information: ichajianlianmeng.com
Trojan server information:
The authors name: yesimck (network data shows it is located in Chongqing Wanzhou, Chongqing Italian vocational and technical schools)
Location and registration information matches:
There are signs, yesimck is a specialized in black production staff to promote the use of Trojan horse software, the network information and the "China widget Alliance" downloaders server and domain information match.
Statistics
The player hanging horse attack began from May 30, May 31 to enter the active period. The following is a month, 360 pairs of players hanging horse (yesimck) intercept traffic statistics, the highest single-day volume reached 70 million times to intercept:By intercepting the data analysis, the wave of attacks Intermittent outbreaks, most likely attacker deliberately control the spread of Trojans to avoid excessive exposure. In June 24 to intercept data, for example, the Trojan is concentrated in the afternoon, other times the relative silence.
Solution
For Internet users, Win7, Win8 users should install the patch was not to be "patched will slow down the computer" misleading rumors. Since Microsoft provides a patch known vulnerabilities, as long as ordinary Internet users will be able to promptly fix vulnerabilities to prevent hanging horse attack; XP users can choose to upgrade the system, or use of the player to hang horse protection security software. In the domestic security software, 360 has fully supported browser, player, and other types of clients linked to horse protection.Software vendors, we should first strengthen the advertising review, avoid the chain other unknown content, advertising doped prevent malicious code. Another problem can not be ignored is that manufacturers should strictly regulate channel behavior to avoid becoming the main backers of malicious promotion. Malicious channels have been found, should be using legal means to crack down on, or the software vendor itself has become a hotbed for breeding rogue promotion.
PS: from the player you - "China plugins Union"
===
禍起蕭牆:由播放器引爆的全國性大規模掛馬分析
事件起因
從5月底開始,360雲安全系統監測到一個名為“中國插件聯盟”的下載者木馬感染量暴漲。 令人匪夷所思的是,該木馬的下載通道竟然是多款用戶量上千萬甚至過億的播放器客戶端。起初,我們懷疑這些播放器的升級文件被木馬進行了網絡劫持。 通過對木馬下載重災區搜狐影音的分析,我們發現搜狐影音對網絡下載的運行代碼做了完整性校驗,但並沒有對安全性做校驗,比如簽名信息等,確實可以被劫持升級種木馬。 不過從數據分析顯示,這一波利用播放器下載的木馬分佈在全國不同地域、不同運營商,基本可以排除網絡劫持的可能性。
真正的問題出在哪裡呢? 我們在網友反饋中找到“中國插件聯盟”的受害者,聯繫受害者在真實環境中查找線索,力圖從源頭上遏制該木馬的傳播,而不僅僅是查殺掉木馬。 對受害用戶調查顯示,中招電腦上的搜狐影音通過官方渠道安裝,本身沒有捆綁木馬;在此次中招前大約一個月時間內,電腦也沒有執行過可疑程序。 那麼最大的可能性就是,搜狐影音被第三方掛馬了!
經過重點監測和測試驗證,我們發現在搜狐影音客戶端展示的一個私服廣告頁面,帶有IE遠程代碼執行漏洞(CVE-2014-6332)的掛馬代碼,可以利用搜狐影音去執行木馬代碼。
進一步調查證明,中招電腦絕大多數為XP系統,少數是沒有打補丁的Win7、Win8系統;搜狐影音的掛馬則來自第三方廣告聯盟,這也是有多款播放器成為掛馬通道的重要原因。
由於殺毒軟件對瀏覽器進程防護比較嚴密,即使漏洞被觸發,一般也能保證掛馬攻擊不會逃逸。 但對於播放器等可以加載網頁廣告的其他客戶端,則成為眾多殺軟的防護盲區。 掛馬攻擊通過客戶端廣告觸發,用戶只要啟動播放器就可能中招。
由於播放器掛馬異常隱蔽且行踪不定,受影響播放器的用戶量又非常龐大,為此360安全衛士快速升級增加了對播放器等客戶端的防掛馬支持,以應對流行軟件引入第三方內容帶來的安全隱患。 從6月1日至6月25日,360對播放器掛馬的攔截量累計已達到3537406次,這也是今年以來國內最大規模的木馬攻擊事件。
搜狐影音執行木馬腳本
360攔截播放器掛馬
攻擊原理
此次播放器掛馬攻擊,利用的是2014年公開的IE神洞CVE-2014-6332,漏洞起因是VBScript虛擬機中的一個整型溢出,具體觸發原理在此略過,網上已有很多詳細分析。 使用IE內核做頁面展示的軟件,如果調用到了VBScript,都可能觸發這個漏洞。 另外由於該漏洞是在XP停服之後公開的,XP系統將永久受到此漏洞影響。
攻擊原理圖
案例分析
我們分析了搜狐影音被攻擊的過程,國內還有一些知名軟件存在同樣問題,搜狐影音則是第一波大規模攻擊時木馬利用的客戶端。首先,搜狐影音在其內部加入了WebBrowser的支持,使用的內核是系統的IE內核,通過這個內核來展示頁面內容和廣告:
搜狐影音的主界面以及展示的廣告
系統的IE內核支持對VBScript的解析,並調用到了VB虛擬機,如果通過WebBrowser解析的頁面中存在vbs腳本,腳本就會交給VB虛擬機執行。 搜狐影音客戶端頁面內展示的廣告,有一部分來自廣告聯盟和各種營銷平台:
分析發現在一個被展示的私服廣告頁面中,被插入了一個惡意的iframe標籤,標籤內容帶有一段vbs腳本:
通過對腳本進行解密,發現其中包含了6332漏洞利用代碼,這段代碼是由網上公開的一段poc改造而來。
最終,成功利用SHRes執行攻擊腳本,通過cmd寫入一個vbs腳本執行:
在對攻擊代碼的分析中,我們發現至少包含了這兩種攻擊腳本:
PlayLoad分析
腳本執行之後,會從指定url下載一個可執行文件執行,下載的這個可執行文件是一個叫“中國插件聯盟”的下載者。 它會繼續下載一個下載者、一個遠控木馬和大量安裝包到本地,新下載的下載者繼續下載安裝包,形成連環靜默推廣之勢(可憐的用戶電腦呀),被推廣的軟件包括瑞星、色彩看看,語音朗讀小說閱讀器,61一鍵啟動,護眼神器,武漢網知力,美圖瀏覽,天天9塊9(有二次推廣)等。
中招電腦慘不忍睹
遠控木馬則通過一系列手法隱藏自身,同時操作註冊表寫入服務,使遠控木馬開機自啟動。
播放器掛馬行為鏈
“中國插件聯盟”真兇調查
通過對“中國插件聯盟”木馬服務器的追踪調查,初步判斷其作者是網名為yesimck的黑產人員,該作者QQ簽名為“華越網絡正式上線無限收安裝量www.vooyee.com ”。追踪線索如下:
域名註冊信息:ichajianlianmeng.com
木馬服務器信息:
作者網名:yesimck(網絡資料顯示其位於重慶萬州,重慶中意職業技術學校)
所在地區和域名註冊信息相符:
種種跡象顯示,yesimck是一名專門從事利用木馬推廣軟件的黑產人員,其網絡信息與“中國插件聯盟”下載者的服務器和域名信息吻合。
數據統計
此次播放器掛馬攻擊從5月30日開始出現,5月31日進入活躍期。 以下是本月360對播放器掛馬(yesimck)的攔截量統計,單日最高攔截量達到70萬次:通過對攔截數據分析,這一波攻擊屬於間歇性爆發,很可能是攻擊者在有意控制著木馬的傳播,以避免其過快暴露。 以6月24日攔截數據為例,該木馬只是在下午集中出現,其它時段相對寂靜。
解決方案
對網民來說,Win7、Win8用戶應安裝補丁,切莫被“打補丁會拖慢電腦”的謠言誤導。 由於微軟為已知漏洞提供了補丁,普通網民只要及時修復漏洞就能防範掛馬攻擊;XP用戶可以選擇升級系統,或使用具備播放器掛馬防護能力的安全軟件。 在國內安全軟件中,360已經全面支持瀏覽器、播放器等多類型客戶端的掛馬防護。對軟件廠商來說,首先應加強對廣告的審核,避免外鏈其它未知內容,防止廣告被摻雜惡意代碼。 另一個不容忽視的問題是,廠商應嚴格規範渠道行為,避免成為惡意推廣的幕後金主。 針對已經發現的惡意渠道,應及時採用法律手段進行嚴厲打擊,否則軟件廠商本身就成為了滋生流氓推廣的溫床。
附:來自播放器的你——“中國插件聯盟”木馬分析
=====
Unusual Exploit Kit Targets Chinese Users (Part 2)
June 12, 2015.Recently, our researchers identified a strange exploit kit targeting Chinese domains. In that writeup, we talked about how the exploit kit operates in great detail, to include infection vectors, the delivered payload executables, and how the kit will stop in its tracks if the Chinese AV Qihoo 360 is detected.
This article will discuss the malware delivered from that exploit kit. The malware, which has been identified by many vendors on VirusTotal, has been labeled by our researchers as Trojan.Chinad or just “Chinad” as an alternative (short) label.
Observed Chinad Malware Files:
notepad.exe (MD5: 5a454c795eccf94bf6213fcc4ee65e6d)pic.jpg (MD5: 4e8639378d7a302c7474b5e4406dd7b4)
image.png (MD5: 55c447191d9566c7442e25c4caf0d2fe)
5003.tmp (MD5: d6ce4b6db8407ca80193ede96d812bb7) – Real Name, “Module_UacBypass.dll”
Notepad.exe (Chinad)
SummaryNotepad.exe (“Chinad”) behaves much like a typical bot client. This binary, along with image.png, is the main component of the Chinad malware.
The Chinad bot sends network requests to a remote server where it will then receive commands to carry out various tasks on the victim’s computer. Some of this functionality includes injecting arbitrary shellcode into itself, although the primary purpose of the bot appears to be for DoS attacks.
Delivery of this Chinad malware executable has been observed via FTP and after successful exploitation of CVE-2014-6332 in Microsoft Internet Explorer.
Technical Analysis
The executable has been compressed with UPX to reduce its size, making network transfers to potential victims more efficient.
And underneath the UPX compression is a rather clean Microsoft Visual C++ executable.
Chinad first creates a mutex with the hardcoded name “Global\3672a9586a5f342b2ca070851e425db6″ and copies itself into the users’ System folder if Admin privileges are found, and into the Appdata folder if not:
%windir%\System\Init\wininit.exe ("C:\Windows" being a typical value for %windir%) %appdata%\Microsoft\System\wininit.exe ("C:\Users\\Roaming" being a typical value for %appdata%)It remains persistent on the victim’s system using either a traditional “runkey” registry method or by using the Windows task scheduler, the commandline for which can be observed below:
C:\Windows\system32\schtasks.exe /create /F /sc onstart /tn Microsoft\Windows\Shell\Init /tr \C:\Windows\System\Init\wininit.exe\ /ru systemThis will also launch Chinad as a system user, the account having the highest level of privileges within Windows.
Before contacting any related malware servers, Chinad will first perform a simple Internet connectivity test, first trying to contact www.baidu.com.
Chinad will sleep if it has not active Internet connection; otherwise, it will continue to retrieve commands.
Receiving Commands
Receiving commands to execute is done by retrieving a file called “bootstrap.min.css” from a remote server (hardcoded IP address by default). An example of this request can be seen in the image below.
However, before Chinad can read any commands, it must first decrypt the retrieved file, which has been encrypted with the Salsa20 cipher, identified by the string “expand 32-byte k” and similar decompiled source code.
Commands accepted by Chinad include:
update - Store current cnc and report server info in a encrypted file. Then, download and execute an updated version of the malware, and delete the old copy. syntax: <command>,<url>,<param_1>,<param_2>,<param_3>; cnc - Specify address of cnc server to contact for commands. syntax: <command>,<url>; cnc_reset - Reset address of CNC server to the default value. syntax: <command>; report - Specify address of reporting server. syntax: <command>,<url>; report_reset - Reset address of reporting server to default value. syntax: <command>; attack - Attack a target IP over either a TCP or UDP socket using generated data. syntax: <command>,<udp|tcp>,<target IP>,<start_time>,<stop_time>,<sleep>; attack_reset - Reset address of the attack target. syntax: <command>; url_exec - Download a file from a specified url and execute it using WinExec syntax: <command>,<url>,<param_1>; shellcode_exec - Create a suspended process and inject shellcode into it. Then, resume the process. syntax:<command>,<shellcode>;The first command typically received by Chinad from the C&C server is the “update” command, which contains a parameter with a download url for the updated malware binary. In this case, it is image.png, a slightly more robust version of the bot.
Commands appear to be separated by a semicolon, the same syntax used in many modern programming languages, such as C. It appears that multiple commands can be issued at a time, as the “attack_reset” command is issued next. An example of a full command is seen below:
timestamp,1431270567; update,http:///image.png?13572v44,44,1,5b7e022f5009004985b34cf091d06752c765a25b445a46050eef51a17be8267d; attack_reset;The timestamp keyword is not actually a command, but has a value that represents a decimal-formatted FILETIME structure that will be compared with the system’s time. It seems this is used to ensure the malware only executes commands during times the botmaster wishes, and allows the botmsater to control when a bot will “expire”.
In the case of the update command, Chinad does something special before updating the malware, in that it first stores its current configuration information in a Salsa20-encrypted file. If the user has Admin privileges, this file will be stored at:
%windir%\Logs\WMI\Event\SystemEvent.evtIf no Admin privileges are available, the file is stored at:
%appdata%\Microsoft\System\wow64.dllWhen the updated malware is executed, it will first open this file and decrypt its contents to retrieve the last-known address of both the C&C and reporting server.
Reporting Information
Sending report information is another feature of Chinad, although it is not well understood at this point in time. Chinad will first make a call to GetAdaptersInfo, which retrieves information about the victim’s network adapter, like the name and IP address. Next, it will then execute an algorithm to generate a special value.
At the time of this writing, we could not ascertain the meaning of this value. In addition, the report server always responds to the request with “AAA”.
One theory is our samples of Chinad have “expired” (invalid timestamp values), and thus the reporting function is not working properly. It may also be that the report server used during analysis was simply not working properly.
Regardless, the values included in the request must have a special meaning that only the report server understands. We will update this section if more information becomes available.
Attacking Targets
As mentioned earlier, Chinad can receive attack commands, where it will be instructed to attack a specified IP address. Attacks can be carried out over either TCP or UDP sockets. The purpose of this appears to be carrying out Distributed Denial of Service attacks, oftentimes abbreviated as DDoS attacks.
Once the attack thread is created, Chinad will continuously send data to the target, sleeping after it sends data for a time specified by the attacker.
It will not stop attacking a target unless it has been issued another attack command or the attack_reset command. Below is an example of data sent to a target over a UDP socket.
To generate this data, Chinad retrieves the address of the thread’s tiddata block using the CRT function __getptd. It will then mangle returned data somewhat before sending it to the target.
Pic.jpg
SummaryAs mentioned in our previous blog, we have observed this Chinad malware being delivered through both Flash and Java exploits.
Pic.jpg is a Dll and requires a parent module (a loader) of either a web browser or java to run it. Like other parts of the Chinad set, pic.jpg aims to get the main bot component, image.png, installed on to the victim’s computer. This is its sole purpose, and can be achieved in several ways, to include exploiting the victim once again.
Technical Analysis
On the exterior, pic.jpg is rather plain and straightforward. The file has no obfuscation applied and no additional exported functions.
First, pic.jpg first performs a simple check of the full path for the loader process on disk. For example, if the exploit occurred using Flash in a browser, the loader might be at C:\Program Files (x86)\Internet Explorer\iexplore.exe, which is a standard path to Microsft Internet Explorer. Pic.jpg looks for the following strings in the path of the loader:
\java \iexplore.exe \mshtml.dll (checks if loaded in memory) \chrome.exe \firefox.exe \safari.exe \opera.exeIf pic.jpg does not find at least one of these strings in the loader process, it will terminate, likely assuming it’s being analyzed. This can sometimes bypass automated analysis systems, like sandboxes.
Pic.jpg will then attempt to exploit the TS WebProxy component of Microsoft Windows, a vulnerability documented as CVE-2015-0016. This privilege escalation attack (detailed description from Trend Micro here) allows an attacker to launch an arbitrary process. In this case, pic.jpg executes a powershell command in a hidden window. Parameters to the powershell command are seen below, where a base64 encoded gzip archive is first decompressed; this archive contains a script, located in variable $s that is then executed.
The decompressed script contains shellcode (also base64 encoded) that is place in new memory (VirtualAlloc) and executed as a thread.
Once the shellcode executes, it retrieves image.png from a remote server, names it desktop.ini.exe, and executes it.
In the event that the TS WebProxy exploit does not work, pic.jpg will also trying downloading image.png from a remote server, either directly using UrlDownloadToFile or through a Visual Basic script that’s dropped in a Temp directory.
Image.png (Protected Chinad)
SummaryDelivery of this Chinad malware executable has been observed via FTP and after successful exploitation of CVE-2014-6332 in Microsoft Internet Explorer.
Image.png is another variant of the Chinad bot and is nearly identical to notepad.exe in terms of functionality. However, it has a few extra functions and has much stronger anti-analysis capabilities.
Technical Analysis
Unlike notepad.exe, attackers have chosen to protect image.png by using the powerful Themida protector, a commercial product from Oreans.
Themida has a lengthy reputation of being a strong protector for executable files. The protector has an extensive feature set, to include capabilities such as VM and forensic tool detection.
In addition, Themida also offers different (mutable) protection code which changes drastically as different features are enabled, making it even harder to automate the process of unpacking.
Interestingly, it seems that it was an odd decision for the attackers to have obfuscated image.png and not notepad.exe, as notepad.exe is much easier to analyze and is essentially the same bot.
One major difference is noted in image.png, where a special Dll is dropped to disk in the user’s Temp directory before retrieving commands from the C&C server.
This Dll, known by its real name as “Module_UacBypass.dll” (the file name on disk is a temporary file name) will be used to establish persistence and bypass User Account Control (UAC) for non-Windows XP systems. More details on this Dll are noted in the section below.
Besides this, no other major differences have been observed in image.png. It still retains all of the functionality of its related binary, notepad.exe. As future versions of the bot are developed, it seems likely it will be delivered in a protected form, perhaps still using Themida.
5003.tmp (“Module_UacBypass.dll”)
SummaryModule_UacBypass.dll (“Uac_bypass.dll”) is a module seen used by the protected version of the Chinad bot (image.png). It’s main purpose is maintaining persistence for Non-Admin users who are running Windows Vista and later. Persistence is done using non-traditional methods, which involve hijacking a Windows SQL server Dll to bypass UAC and maintain a footprint on the victim’s computer.
Technical Analysis
Uac_Bypass.dll has two exported functions, Func1 and Func2, along with some interesting string artifacts, to include the real name of the Dll, “Module_UacBypass.dll”.
It is interesting that the authors chose to prefix the name seen with “Module,” suggesting that more modules might be planned for the Chinad bot, or perhaps already in circulation.
Uac_Bypass.dll is primarily used to establish persistance of the Chinad bot for Non-Admin users (for Admin users, persistence is achieved using the schtasks.exe method seen under the analysis of notepad.exe). The module also bypasses UAC, a security feature added in Windows Vista to help prevent execution of malicious programs. Since UAC is not available on Windows XP, this Dll will not execute on systems running the OS.
First, Uac_bypass.dll will make a copy of itself in the temp directory called NTWDBLIB.dll, and then makes that file into a cabinet archive. NTWDBLIB.dll is the name of a library used for Microsoft SQL server.
The purpose of this is to use this cabinet along with wusa.exe to update the NTWDBLIB.dll (if it exists) with a copy of Uac_Bypass.dll, thereby hijacking the Dll. Wusa.exe is an abbreviated name for Windows Update Standalone Installer, which allows Windows updates to be applied using a supplied cabinet.
Uac_Bypass.dll also writes a special registry key to:
HKCU\Software\Microsoft\Windows NT\CurrentVersion\UacCompatThis key value contains the path to the Chinad bot.
Then, Uac_Bypass.dll executes cliconfig.exe, which loads the new, malicious NTWDBLIB.dll into memory and points to the DllMain function.
Inside of DllMain, Uac_Bypass.dll check to see if the string “\cliconfig.dll” is in the calling process name. If it is, it will retrieve the path of the Chinad bot in the registry key above and run it with CreateProcess.
This bypass method has been talked about before here, and has been seen in malware as early as 2013.
Conclusion
The Chinad bot appears to have been designed mainly for the purpose of carrying out DDoS attacks using mostly Chinese victim computers.
Thus far, infected webpages that deliver Chinad have only been spotted on Chinese domains (hence the bot name), while the Exploit kit itself that delivers the malware has been spotted on servers in both Malaysia and Singapore.
Our research teams have not yet seen Chinad outside of Asia, and other clues, such as testing internet connectivity using both baidu.com and qq.com, suggest the bot has a primary focus in the Asian world.
While it doesn’t offer anything revolutionary, we believe the Chinad bot is still in it’s infancy, as some mistakes appear to have been made by the developers. This includes not applying a packer or protector to notepad.exe, a variant of the Chinad bot, as well as leaving many relevant strings, such as the name of “Module_UacBypass.dll” in plain sight.
These things lead us to believe that Chinad was not the work of a seasoned professional, and not likely the work of a group with large resources, such as a nation-state. It will be interesting to see if Chinad offers more improvements with time, along with added functionality.
===
不尋常的漏洞利用工具包瞄準中國用戶(第二部分)
2015年6月12日
最近,我們的研究人員發現一種奇怪的開發工具包針對中國域名。 在該書面記錄 ,我們談到了如何利用漏洞可工作非常細緻,包括感染載體,傳遞的有效載荷的可執行文件,並且該工具包將如何停止在其軌道上,如果中國AV奇虎360被檢測到。 本文將討論從開發套件提供的惡意軟件。 惡意軟件,已確定了許多廠商上顯示另一張圖片,已經貼上由我們的研究人員Trojan.Chinad或只是“Chinad”作為替代(短)的標籤。
觀察Chinad惡意軟件文件:
NOTEPAD.EXE(MD5: 5a454c795eccf94bf6213fcc4ee65e6d )pic.jpg(MD5: 4e8639378d7a302c7474b5e4406dd7b4 )
image.png(MD5: 55c447191d9566c7442e25c4caf0d2fe )
5003.tmp(MD5: d6ce4b6db8407ca80193ede96d812bb7 ) -真實姓名,“Module_UacBypass.dll”
NOTEPAD.EXE(Chinad)
總結NOTEPAD.EXE(“Chinad”)的行為就像一個典型的殭屍客戶端。 這個二進制,連同image.png,是Chinad惡意軟件的主要成分。
該Chinad殭屍網絡發送請求到遠程服務器在那裡將收到的命令進行受害者的計算機上的各種任務。 一些這方面的功能,包括注入任意的shellcode到自身,雖然機器人的主要目的似乎是DoS攻擊。
交付本Chinad可執行的惡意軟件已經通過FTP和開發成功後,觀察到了CVE-2014-6332 Microsoft Internet Explorer中。
技術分析
該可執行文件被壓縮與UPX以減小其大小,使得網絡傳輸到潛在受害者更高效。
與UPX壓縮下面是一個比較乾淨的Microsoft Visual C ++的可執行文件。
Chinad先建立與硬編碼名稱為“全球\ 3672a9586a5f342b2ca070851e425db6”,並將自身複製到用戶的系統文件夾中的互斥鎖管理員權限被發現,並進入應用程序數據文件夾,如果沒有:
%WINDIR%\ SYSTEM \初始化\ Wininit.exe將 (“C:\ WINDOWS”正在為%WINDIR%的典型值) %APPDATA%\微軟\ SYSTEM \ Wininit.exe將 (“C:\用戶漫遊\\”正在為%APPDATA%的典型值)它仍然在持續使用一個傳統的“runkey”註冊表的方法受害者的系統或者使用Windows任務調度程序,命令行的可觀察到如下:
C:\ WINDOWS \ SYSTEM32 \ SchTasks.exe會/創建/ F / SC的OnStart / TN微軟\的Windows \殼牌\初始化/ TR \ C:\ WINDOWS \ SYSTEM \初始化\ Wininit.exe將\ / RU系統
這也將推出Chinad作為一個系統的用戶,有Windows中的最高級別的權限的帳戶。 聯繫之前任何相關惡意軟件的服務器,Chinad將首先進行一個簡單的互聯網連接測試,第一次嘗試聯繫www.baidu.com。
Chinad會睡得若沒有可用的Internet連接; 否則,它會繼續檢索命令。
接到命令
接收的命令來執行通過檢索一個名為從遠程服務器(通過默認的硬編碼的IP地址)“bootstrap.min.css”文件完成的。 這種請求的例子可以看出,在下面的圖像中。
然而,前Chinad可以讀取的任何命令時,必須先進行解密所檢索的文件,該文件已被加密的Salsa20密碼,確定字符串“擴展32字節K”和類似的反編譯的源代碼。
通過Chinad接受命令包括:
更新 -在一個加密的文件存儲當前的CNC和報表服務器信息。 然後,下載並執行惡意軟件的更新版本,並刪除舊的副本。 語法 :<命令>,<網址>,<PARAM_1>,<PARAM_2>,<param_3>; 數控 -數控指定服務器的地址,聯繫的命令。 語法 :<命令>,<網址>; cnc_reset -復位數控服務器的地址為缺省值。 語法 :<命令>; 報告 -指定報告服務器的地址。 語法 :<命令>,<網址>; report_reset -重置報表服務器缺省值的地址。 語法 :<命令>; 攻擊 -攻擊目標的IP over任何一個TCP或使用生成的數據UDP套接字。 語法 :<命令>,<UDP | TCP>,<目標IP>,<START_TIME>,<STOP_TIME>,<睡眠>; attack_reset -重置攻擊目標的地址。 語法 :<命令>; url_exec -從指定的網址下載一個文件,然後使用執行的WinExec它 語法 :<命令>,<網址>,<PARAM_1>; shellcode_exec -創建掛起的進程,並注入的shellcode了進去。 然後,恢復的過程。 語法 :<命令>,<的shellcode>;通常收到Chinad從C&C服務器的第一個命令是“更新”命令,它包含了一個下載網址更新惡意軟件二進制文件的參數。 在這種情況下,它被image.png,稍微更穩健版本機器人的。
命令似乎由分號,在許多現代編程語言,如C似乎多個命令可以在同一時間內發出,作為“attack_reset”命令下一個發出所用的相同的語法來分離。 一個完整的命令的一個例子如下所示:
時間戳1431270567; update,http:///image.png?13572v44,44,1,5b7e022f5009004985b34cf091d06752c765a25b445a46050eef51a17be8267d; attack_reset;時間戳關鍵字實際上不是一個命令,但有代表一個十進制格式的值FILETIME結構,將與該系統的時間進行比較。 看來這是用來確保惡意軟件僅在倍殭屍主控機希望執行的命令,並允許botmsater控制當機器人將“過期”。
在更新命令的情況下,Chinad做一些特別的東西更新的惡意軟件,因為它第一家門店在Salsa20加密的文件,其當前的配置信息之前。 如果用戶具有管理員權限,這個文件將被存放在:
%WINDIR%\日誌\ WMI \事件\ SystemEvent.evt
如果沒有管理員權限可用,文件存儲在: %APPDATA%\微軟\ SYSTEM \ wow64.dll
當執行更新的惡意軟件,它會先打開這個文件,並解密其內容檢索了C&C和報表服務器的最後一個已知地址。 報告信息
發送報告信息是Chinad的另一個特徵,儘管它不能很好地理解,在這個時間點。 Chinad會先打電話到GetAdaptersInfo ,其中檢索有關受害者的網絡適配器的信息,如名稱和IP地址。 接著,將執行一個算法,以產生一個特殊值。
在寫這篇文章的時候,我們無法確定這個值的含義。 此外,報表服務器總是響應與“AAA”的要求。
一種理論是我們Chinad樣本有“過期”(無效時間戳值),因此報告功能不能正常工作。 這也可能是,在分析中使用的報表服務器根本無法正常工作。
無論如何,包括在請求中的值必須有一個特殊的意義,只有報表服務器可以理解的。 我們將更新這一部分如果有更多的信息可用。
攻擊目標
正如前面提到的,Chinad可以接收命令的攻擊,它就會被指示攻擊指定的IP地址。 攻擊可以進行在TCP或UDP套接字。 這樣做的目的似乎是承載服務攻擊,常常簡寫為出分佈式拒絕的DDoS攻擊。
一旦攻擊線程被創建,Chinad將連續數據發送到目標,睡它發送數據由攻擊者所指定的時間之後。
它不會停止攻擊目標,除非它已再次發出攻擊指令或attack_reset命令。 下面是發送到一個目標在一個UDP套接字數據的一個例子。
產生這種數據,Chinad檢索使用CRT函數__getptd線程的tiddata塊的地址。 那麼它將把它發送到目標之前有所曼格萊返回的數據。
Pic.jpg
總結正如在我們以前的博客,我們已經觀察到這種Chinad惡意軟件通過Flash和Java的漏洞被輸送。
Pic.jpg是一個DLL和要求要么Web瀏覽器或Java來運行它的一個主模塊(一個裝載器)。 像Chinad組的其他部分,旨在pic.jpg讓主機器人組件,image.png,安裝在受害者的電腦。 這是它的唯一目的,並且可以通過多種方式來實現,以包括再次利用的受害者。
技術分析
在外觀上,pic.jpg較為平淡和簡單。 該文件沒有混淆應用並沒有額外的導出的函數。
第一,pic.jpg首先執行用於磁盤上的裝載過程的完整路徑的一個簡單的檢查。 例如,如果在瀏覽器中使用Flash利用事件的發生時,裝入程序可以是在C:\程序文件(x86)\的Internet Explorer \ IEXPLORE.EXE,這是一個標準的路徑選擇微軟公司的Internet Explorer。 Pic.jpg會在加載器的路徑如下字符串:
\ java中 \ IEXPLORE.EXE \ Mshtml.dll的(檢查是否加載到內存中) \的chrome.exe \ firefox.exe \ safari.exe \ opera.exe如果pic.jpg沒有找到在裝載過程中,這些弦中的至少一個,它將終止,有可能假定它被分析。 這可以繞過有時會自動分析系統,如沙箱。
Pic.jpg然後試圖利用微軟的Windows,記錄為漏洞的TS WebProxy組件CVE-2015-0016 。 這個特權升級攻擊(從趨勢科技詳細說明這裡 )允許攻擊者發動的任意進程。 在這種情況下,pic.jpg執行在一個隱藏的窗口一個powershell命令。 參數的PowerShell命令如下看出,其中一個base64編碼的gzip壓縮文件先解壓; 該檔案包含了一個腳本,它位於變量$ S,然後被執行。
解壓縮後的腳本包含的shellcode(也Base64編碼),這是發生在新的內存(VirtualAlloc的),並作為一個線程執行。
一旦shellcode的執行時,它檢索image.png從遠程服務器,將其命名desktop.ini.exe,並執行它。
在事件的TS WebProxy利用不起作用,pic.jpg也將試圖從遠程服務器下載image.png,無論是直接使用UrlDownloadToFile或通過在一個臨時目錄中投下了Visual Basic腳本。
Image.png(受保護的Chinad)
總結交付本Chinad可執行的惡意軟件已經通過FTP和開發成功後,觀察到了CVE-2014-6332 Microsoft Internet Explorer中。
Image.png是Chinad機器人的另一個變種,是幾乎相同的在功能方面,以NOTEPAD.EXE。 然而,它有一些額外的功能,並具有更強的抗分析功能。
技術分析
不像NOTEPAD.EXE,攻擊者都選擇通過使用強大的保護image.png Themida保護,從Oreans商業產品。
Themida擁有的是一個強大的保護者可執行文件一個漫長的聲譽。 該保護器具有廣泛的功能集,包括功能,如虛擬機和取證工具檢測。
此外,Themida還提供了其劇烈變化為不同的功能被啟用,使得它更難自動拆包的過程不同(可變)保護代碼。
有趣的是,它似乎是對攻擊者已經混淆image.png和不Notepad.exe的奇數的決定,因為Notepad.exe的是更易於分析和是基本相同的機器人。
一個主要的區別是指出,在image.png,在一個特殊的DLL從C&C服務器檢索命令之前下降到磁盤在用戶的Temp目錄。
這個DLL,其真實姓名為“Module_UacBypass.dll”(磁盤上的文件名是一個臨時文件名)稱為將被用來建立持久和旁路用戶帳戶控制(UAC)對於非Windows XP系統。 對這個DLL的更多細節說明在下面的章節。
除此之外,沒有其他的重大分歧一直在觀察image.png。 它仍然保留了所有的相關二進制文件的功能,NOTEPAD.EXE。 由於機器人的未來版本的開發,這似乎有可能將交付在一個受保護的形式,也許仍然使用Themida。
5003.tmp(“Module_UacBypass.dll”)
總結Module_UacBypass.dll(“Uac_bypass.dll”)是見過模塊所採用的BOT Chinad(image.png)受保護的版本。 它的主要目的是保持持久性誰正在運行Windows Vista和更高非管理員用戶。 持久性是使用非傳統的方法,這涉及劫持的Windows SQL服務器DLL來繞過UAC和維護受害者的計算機上的足跡。
技術分析
Uac_Bypass.dll有兩個導出函數,FUNC1和FUNC2,以及一些有趣的字符串的文物,包括該DLL,“Module_UacBypass.dll”的真名。
有趣的是,作者選擇了前綴看到名為“模塊”,這表明更多的模塊可能會計劃在Chinad BOT,或者已經流通。
Uac_Bypass.dll主要用於建立Chinad BOT非管理員用戶的持久性(對於管理員用戶,持久性使用的notepad.exe的分析下看到SchTasks.exe將方法來實現)。 該模塊還繞過UAC,在Windows Vista中添加,以幫助防止執行惡意程序的安全功能。 由於UAC是不是在Windows XP中,這個DLL不能在運行OS系統上執行。
首先,Uac_bypass.dll會使自己在叫NTWDBLIB.dll臨時目錄中的副本,然後使該文件成為一個檔案櫃。 NTWDBLIB.dll是用於Microsoft SQL Server的庫的名稱。
這樣做的目的是使用這個機殼連同wusa.exe更新NTWDBLIB.dll(如果存在)與Uac_Bypass.dll的一個副本,從而劫持DLL。 Wusa.exe是Windows Update獨立安裝程序,它允許使用機櫃提供可應用於Windows更新的縮寫名稱。
Uac_Bypass.dll還寫了一個特殊的註冊表鍵:
HKCU \軟件\微軟\的Windows NT \ CURRENTVERSION \ UacCompat
該鍵值包含路徑Chinad機器人。 然後,Uac_Bypass.dll執行cliconfig.exe,它加載了新的惡意NTWDBLIB.dll到內存並指向DllMain函數。
裡面的DllMain的,Uac_Bypass.dll檢查是否字符串“\ cliconfig.dll”,就是在調用進程的名稱。 如果是,則取回Chinad機器人在上面的註冊表項的路徑,並與運行它的CreateProcess 。
這種旁路方法已經談到之前在這裡 ,並一直被視為惡意軟件,早在2013。
結論
該Chinad機器人似乎已經設計主要用於執行使用多數中國受害者計算機的DDoS攻擊的目的。
到目前為止,受感染的網頁能夠提供Chinad只被發現在中國區(因此BOT名),而該漏洞套件本身提供的惡意軟件被發現在馬來西亞和新加坡的服務器。
我們的研究小組還沒有看到Chinad亞洲以外,和其他線索,如測試互聯網連接同時使用baidu.com和qq.com,建議機器人具有在亞洲世界主要焦點。
雖然它並沒有提供任何革命性的,我們相信Chinad BOT仍處於它的起步階段,因為一些錯誤似乎已經由開發商。 這包括不採用封隔器或保護器NOTEPAD.EXE,該Chinad bot的一個變種,還可以把許多相關的字符串,如“Module_UacBypass.dll”在眾目睽睽的名字。
這些東西使我們相信,Chinad不是一個經驗豐富的專業工作,而不太可能在大的資源,如民族國家的一組工作。 這將是有趣的,如果Chinad提供了更多的改進隨著時間的推移,隨著附加功能。
=====
*---By our dear Anonymous@YourAnonNews June 26) - News release -(1).@scryptcc2015 hacked, large amount of #Bitcoin stolen. DO NOT DEPOSIT! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html…]-(2).Unusual Exploit Kit Targets Chinese Users (Part 2)!-
(3).Huoqixiaoqiang: by the player set off a nationwide( (mainland-china) large-scale horse hung analysis!-[from the beginning by the end of May, 360 system to monitor cloud security to those who download a "plug-China alliance," the horse! infective dose surge. It is inconceivable that, download the passage of the Trojans turned out to be a variety of users millions or even billions of dollars of player clients. ]-
---由我們親愛的匿名@ YourAnonNews6月26日) - 新聞消息發布-
(1)。@ scryptcc2015黑客攻擊,大量#Bitcoin被盜。不要定金!
http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-
(2).Unusual漏洞利用工具包瞄準中國用戶(第二部分)! - (3).禍起蕭牆:由播放器引爆的全國性(大陸-china)大規模掛馬分析!--[從5月底開始,360雲安全系統監測到一個名為“中國插件聯盟”的下載者木馬感染量暴漲。令人匪夷所思的是,該木馬的下載通道竟然是多款用戶量上千萬甚至過億的播放器客戶端。]-
---Durch unser lieber Anonym @ YourAnonNews 26. Juni) - Pressemitteilung -
(1). @ Scryptcc2015 gehackt, große Menge von #Bitcoin gestohlen. KEINE Einzahlung! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-(2).Unusual Exploit Kit Ziele chinesischen Nutzer (Teil 2)! -(3) .Huoqixiaoqiang: vom Spieler löste eine bundesweit ((Festland-China) große Pferd hing Analyse - [von Anfang bis Ende Mai auf 360 System Cloud-Sicherheit für diejenigen, die eine "plug überwachen !. -China Allianz, "das Pferd Infektionsdosis Überspannungs Es ist unvorstellbar, dass, laden Sie die Passage der Trojaner entpuppte sich eine Vielzahl von Benutzern Millionen oder sogar Milliarden von Dollar an Spieler Clients]-
---私たちの愛する匿名@ YourAnonNews 6月26日によって) - ニュースリリース -(1)。@ハッキングscryptcc2015、#Bitcoinが大量に盗まれました。預金しないでください! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-(2).Unusualキットターゲット中国のユーザー(その2)を活用! -(3).Huoqixiaoqiang:!プレイヤーは、大規模な馬が分析をハング)全国((本土中国をオフに設定することによって - [最初から月の終わりまでに、360システムが「プラグをダウンロードした人に、クラウドのセキュリティを監視します!。 - 中国同盟、「馬感染量の急増は、トロイの木馬の通路は、ユーザー数百万やプレイヤークライアントのドルの十億の様々なことが判明しダウンロードすることは考えられません]。 -
---Par notre cher Anonyme @ YourAnonNews 26 Juin) - Nouvelles de presse -
(1).@Scryptcc2015 piraté, une grande quantité de #Bitcoin volé. NE PAS DÉPOSER! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-(2).Unusual Exploit Kit cible les utilisateurs chinois (Partie 2)! -(3) .Huoqixiaoqiang: par le joueur a déclenché une échelle nationale ((continent-china) cheval à grande échelle accrochée analyse - [depuis le début à la fin de mai, 360 système de surveillance de la sécurité en nuage pour ceux qui téléchargent un "plug !. alliance, Chine, "le cheval onde de dose infectieuse Il est inconcevable que, télécharger le passage des chevaux de Troie avéré être une variété d'utilisateurs millions voire des milliards de dollars de clients de lecteur].-
---우리의 친애하는 익명 @ YourAnonNews 6월 26일으로) - 보도 자료 -
(1). @ 해킹 scryptcc2015, #Bitcoin의 많은 양의 도난. 입금하지 마십시오! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-(2).Unusual 키트 중국 사용자 (2 부)를 표적으로 공격! -
(3) .Huoqixiaoqiang! 플레이어가 대규모의 말을 분석 걸려) 전국 ((본토 중국을 출발하여 - [처음부터 월 말까지, 360 시스템은 "플러그를 다운로드하는 사람들에게 클라우드 보안을 모니터링 !. - 중국 동맹, "말 감염성 용량 서지 그것은 트로이 목마의 통과 사용자 수백만 또는 플레이어 클라이언트 달러의 수십억의 다양한으로 밝혀졌다 다운로드하는 것이 상상도 할 수없는 것입니다]-**All The World Lauguage**-
http://melody-free-shaing.blogspot.com/2015/06/by-our-dear-anonymousyouranonnews.html
===Melody.Blog===FOLLOW FOLLOW===>/
=====################
24/06
Anonymous
How to 'unsend' a sent email from Gmail http://www.cyberkendra.com/2015/06/how-to-unsend-sent-email-from-your.html …
After a long time Google finally introduced " Undo Send feature" on Gmail, by which users can revert back or cancelled sent emails. But to cancel the send email, you have to quite fast as Google only gives specific number of seconds to halt your email.
Many of the times if we are working on office and mistakenly we send the wrong email to wrong person or client, in that case this Gmail Undo Send feature will be very helpful, as it can also save your job, which gets in danger by sending wrong mail to wrong clients.
It is very easy to use this features, so just follow the below steps to activate and use Gmail Undo Send feature.
First log into your Gmail account.
In the upper right corner of the screen, click the Settings icon (the one that looks like a gear).
From the Settings menu, choose the option for Settings.
Over Setting page, make sure General Tab is Selected.
Now browse little below and look for option "Undo Send"
On that check the radio button of "Enable Undo Send".
Just beside it, you can also set the time period for the cancellation from the drop down list.. You can choose 5, 10, 20 or 30 seconds
Now Scroll down the bottom of the page and click on Save Changes button to save it.
Check How it Works..!!!
To test the feature -
Click on Compose mail button at the upper left corner of your Gmail account page.
Compose a message and then click the Send button.
As you click on Send, at the top of your screen you will see a message - "Your message has been sent. Undo. View Message." [in Yellow color]
To prevent the message from being sent, click the Undo link.
Gmail stops the message from going out, and gives an option to make any changes and Re-Send it. If you don't want to resend, just close the compose box and your message gets saved into Draft folder.
As the feature is very easy and handy to use, this is another the best features that Google have introduced on Gmail.
Check Video To Enable Undo Send features.
After a long time Google finally introduced " Undo Send feature" on Gmail,
by which users can revert back or cancelled sent emails. But to cancel
the send email, you have to quite fast as Google only gives specific
number of seconds to halt your email.
Many of the times if we are working on office and mistakenly we send the wrong email to wrong person or client, in that case this Gmail Undo Send feature will be very helpful, as it can also save your job, which gets in danger by sending wrong mail to wrong clients.
It is very easy to use this features, so just follow the below steps to activate and use Gmail Undo Send feature.
Many of the times if we are working on office and mistakenly we send the wrong email to wrong person or client, in that case this Gmail Undo Send feature will be very helpful, as it can also save your job, which gets in danger by sending wrong mail to wrong clients.
- First log into your Gmail account.
- In the upper right corner of the screen, click the Settings icon (the one that looks like a gear).
- From the Settings menu, choose the option for Settings.
- Over Setting page, make sure General Tab is Selected.
- Now browse little below and look for option "Undo Send"
- On that check the radio button of "Enable Undo Send".
- Just beside it, you can also set the time period for the cancellation from the drop down list.. You can choose 5, 10, 20 or 30 seconds
- Now Scroll down the bottom of the page and click on Save Changes button to save it.
To test the feature -
- Click on Compose mail button at the upper left corner of your Gmail account page.
- Compose a message and then click the Send button.
- As you click on Send, at the top of your screen you will see a message - "Your message has been sent. Undo. View Message." [in Yellow color]
- To prevent the message from being sent, click the Undo link.
- Gmail stops the message from going out, and gives an option to make any changes and Re-Send it. If you don't want to resend, just close the compose box and your message gets saved into Draft folder.
As the feature is very easy and handy to use, this is another the best features that Google have introduced on Gmail.
Check Video To Enable Undo Send features.
- See more at: http://www.cyberkendra.com/2015/06/how-to-unsend-sent-email-from-your.html#sthash.7h9GM7iv.dpuf Enable Google Undo Sent Email Feature
http://www.cyberkendra.com/2015/06/how-to-unsend-sent-email-from-your.html#sthash.7h9GM7iv.dpuf
Header image - TechnewsToday
=====
Anonymous
How to 'unsend' a sent email from Gmail http://www.cyberkendra.com/2015/06/how-to-unsend-sent-email-from-your.html …
如何“取消發送”已發送您的Gmail帳戶的電子郵件
如何“取消發送”已發送您的Gmail帳戶的電子郵件經過很長一段時間谷歌終於推出了“撤銷發送功能”上的Gmail,用戶通過它可以恢復或取消發送的電子郵件。 但要取消發送電子郵件,你必須非常快,谷歌只給幾秒鐘具體數量制止你的電子郵件。
很多時候,如果我們正在辦公室和錯誤,我們發送了錯誤的電子郵件給錯人或客戶端,在這種情況下,這個Gmail的撤消發送功能將是非常有益的,因為它也可以保存你的工作,它通過發送獲取危險錯誤的郵件客戶端錯誤。
這是非常容易使用這個功能,因此只要按照下面的步驟來激活和使用Gmail發送撤銷功能。
首先登錄到您的Gmail帳戶。
在屏幕的右上角,點擊設置圖標(就是那個看起來像一個齒輪)。
在設置菜單中,選擇設置選項。
在設置頁面中,確保選中常規選項卡 。
現在瀏覽下面一點,查找選項“ 撤銷發送 ”
在此檢查“ 啟用撤消發送 ”單選按鈕。
只是在它旁邊,您還可以設置的時間段從下拉列表中取消。您可以選擇5,10,20或30秒
現在向下滾動頁面的底部,然後點擊保存更改按鈕保存。
檢查它是如何工作.. !!!
為了測試功能 -
點擊撰寫新郵件按鈕,您的Gmail帳戶頁面的左上角。
撰寫郵件,然後點擊發送按鈕。
當你點擊發送,在屏幕的上方,你會看到一條消息 - “您的郵件已發送撤消查看郵件。” [黃顏色]
為了防止發送的消息,點擊撤消鏈接。
Gmail的停止消息出去,並給出了一個選項,以使任何更改並重新發送它。 如果你不想重新發送,只需關閉撰寫框,你的信息被保存到草稿文件夾。
因為該功能是非常容易和方便使用,這是另一個谷歌在Gmail上已經推出的最佳特性。
檢查視頻啟用撤消發送功能。
Enable Google Undo Sent Email Feature
http://www.cyberkendra.com/2015/06/how-to-unsend-sent-email-from-your.html#sthash.7h9GM7iv.dpuf
===
DIGITASHADOW
Meet our official Ghost Security operatives.
@ComediAnon @DigitaShadow @ISHuntingCIub @MikroSec @NoMercySec @WauchulaGhost
#GhostSec #OpISIS
DIGITASHADOW
You can now report terrorism websites, social media accounts or support our fight at http://ghostsec.org
#GhostSec
DIGITASHADOW
*-Updated by - our dear "Anonymous@YourAnonNews "teaches us - how to "cancel sending" e-mail has been sent to your Gmail account! "-Our friendly moral anonymous lead people to Identify the authenticity! in their efforts to fighting "ISIS bug '' extreme behavior,Take the most famous Anonymous "DIGITASHADOW @DigitaShadow" Renowned Fame ! They are also to teach people the importance of conscience and human rights! thankyou for every Anonymous tribal great legion - ~ tiny Melody.Blog heartfelt sincerely ~
-更新由我們親愛的匿名@YourAnonNews"教導我們-如何“取消發送”已發送您的Gmail帳戶的電子郵件!"-我們的友好道德匿名教領人們辨別真偽!在他們努力對抗"ISIS小蟲的極端行為,就以最享有盛名的匿名"
DIGITASHADOW@DigitaShadow"!也教導人們良知和人權的重要性!在此感謝各位偉大匿名部落軍團~渺小的Melody.Blog衷心敬上~**All The World Lauguage**-
http://melody-free-shaing.blogspot.com/2015/06/by-our-dear-anonymousyouranonnews.html
======####################
Anonymous 已轉推
Thousands Protest PX Chemical Plant in Jinshui,
Thousands Protest PX Chemical Plant in Jinshui, China
Jinshan, Shanghai – Thousands marched on Jinshan District Government building Monday afternoon to protest the construction of another PX chemical plant. The march chanted “PX Get out of Jinshan”as people followed behind a large banner with the same slogan.
At least 1 person was arrested during the day. Images and reports on social media show that at least 3 more people were arrested at night.
PX (paraxylene) is a flammable chemical used in polyester and plastics manufacturing is a major contributor to air pollution.
In April an explosion at a chemical factory producing (paraxylene) PX in Zhangzhou, Fujian province, required the attention of the Chinese army’s anti-chemical warfare unit and the evacuation of 30,000 people.
Construction of PX plants has sparked many protests, including violent demonstrations that lasted 3 days last year in Maoming, Guangdong province. Air pollution and especially the particulate PM2.5 are a major concern in the nation.
A recent study by Greenpeace and Peking University has found air pollution kills more people than smoking in many cities on the mainland.
Tiny smog-inducing pollutants, known as PM2.5, led to about 257,000 premature deaths across the mainland’s 31 municipalities and provincial capitals in 2013, according to the study – an average of about 90 in every 100,000 deaths.
In 12 of the 31 cities, including Shijiazhuang , Nanjing , Tianjin and Chongqing , the mortality rate due to pollution was even worse. In these cities, at least 100 out of every 100,000 deaths were blamed on PM2.5.
Both these figures were higher than the official mortality rate of smoking – recorded in 2012 as about 70 in every 100,000, according to Greenpeace.
And the true scale of the problem could be even worse, because several of China’s most polluted cities, including those in Hebei province, were not included in the survey. Watch the viral video Under the Dome: China Smog Documentary.
Video: People marching toward Jinshui, District government.
Jinshan, China - PX chemical plant protest
Video: Police lines are used to prevent people from reaching the building.
We will be following the situation and update when information becomes available.
=====
http://www.ntdtv.com/xtr/b5/2015/06/23/a1205685.html
上海反PX示威 多人被抓 數千人圍政府促放人(視頻)
更新時間: 2015-06-23
上海反PX示威 多人被抓 數千人圍政府促放人(視頻)
更新時間:
2015-06-23
掃描下二維碼, 即可在手機上瀏覽分享!
http://hk.apple.nextmedia.com/realtime/china/20150620/53876227
The collapse of the south exit Heyuan Guangdong-Jiangxi Expressway, yesterday at 3 pm, 四辆 trucks carrying clay, with this leading to the exit onto the bridge, the bridge suddenly collapsed. Sitting in a van in which the incident occurred on the expensive seats Bin (34 years old) said, when the truck turn onto the bridge, suddenly overturned truck suddenly fell into a large ditch under the bridge, he heard the sound behind the truck came more loud roaring. After reluctantly fellow out of the car, looked back only to find the bridge collapsed.
Bin expensive seats added that he saw the driver of a truck before also struggling to climb the car, took out his cell phone alarm, he is breaking with fellow climb the bridge on foot to the nearby toll, but when he is gone there will be more than 10 steps ambulances, hospital and his fellow. Another injured Yi Jinsong (37 years old) said: "suddenly fell down, and no time to think, then just like an earthquake!" He said that all documents, including mobile phones are still in the car.
Accident scene is a mess, the bridge deck lying on the ground, 四辆 rickety truck, car clay scattered over the ground, a large number of search and rescue personnel arrived at the scene to dig dig, searching for missing persons, will include your Bin seats, including four injured were sent to a local hospital for treatment, and 5:25 in the morning at the scene found the remains of one, by the staff wrap removed.
After dawn can be seen across the scene, breaking the 130 m long flyover, 8.5 meters wide, down the ramp from the bridge, connecting the toll station, the collapse of part of the 70-meter long, 60 meters also damaged the rest, some bars also exposed years, more than a dozen bridge piers were pressed. Local people pointed out that this flyover built in August 2005, when the opening in December, are brick with prefabricated components, technical condition rating to a bridge-like.
Authorities said the cause of the accident still investigating, but Internet users said the bridge appears to be very thin, found this crossover design load and other highways, like the case of "Cars - over 20" investigation level, equal to the weight of 20 tons carrying the main car or the total weight of 55 tons of trucks, questioning 若果 construction contractor in accordance with the drawings, not under the impact of external forces should not collapse. More Internet users said the mainland is now the bridge is too weak, "if the war, these tanks can not open the way, or have to wait for a tank before, another one can open."
"Guangzhou Daily"
=====
http://hk.apple.nextmedia.com/realtime/china/20150620/53876227
內地又現豆腐渣工程!廣東河源境內的粵贛高速公路一處出口的天橋突然倒塌,四部滿載瓷土的貨車剛好駛過,連車帶橋一同跌到11.5米下的地面,貨車翻側, 瓷土散滿一地,司機被埋在瓦礫中,事故造成至少1死4傷。這條公路在2005年才建成,不少網民質疑是又一項豆腐渣工程。
倒塌的是粵贛高 速公路的河源城南出口,昨凌晨3時許,四輛載着瓷土的貨車,一同駛上這條通往出口的天橋,突然天橋倒塌。事發時坐在其中一輛貨車上的席貴斌(34歲)稱, 當時貨車依次駛上天橋,突然貨車猛然翻側,掉到天橋下的大水溝,他又聽到後面的貨車傳來多聲轟轟巨響。之後忍痛將同鄉拖出車外,回頭一看才發現天橋倒塌。
席 貴斌續稱,他看最前一輛貨車的司機亦艱難地爬到車外,拿出手機報警,他則與同鄉爬上斷裂的天橋步行到附近的收費站,但當他走了10多步便有救護車到場,將 他與同鄉送院。另一名傷者易勁松(37歲)則說:「一下子就跌下去了,根本來不及多想,當時就跟地震一樣!」他說現在所有證件,包括手機都還在車裏。
事故現場一片狼藉,天橋的橋面躺在地面,四輛貨車東倒西歪,車上的瓷土散滿一地,大批搜救人員接報到場掘挖,搜尋失蹤者,將包括席貴斌在內的四傷者分別送到當地醫院救治,而在清晨5時25分在現場發現一具遺體,由工作人員包起移走。
天 亮後可見到整個事故現場,斷裂的天橋長130米、闊8.5米,從天橋往下斜,連接收費站,倒塌的部份長70米,其餘的60米亦有損毀,部份鋼筋亦露出來, 多座橋墩則被橋面壓住。當地民眾指出這條天橋2005年8月建成、當年12月通車,都是用預製組件砌成,技術狀況等級評定為一類橋。
當局 稱事故的原因仍要調查,可是網民稱天橋看似很單薄,調查時發現這段天橋的設計載重與其他高速公路一樣屬「汽車-超20」級,等於可承載重20噸的主車,或 總重55噸的貨車,質疑若果承建商依照圖紙施工、沒有外在力量衝擊之下,不應該倒塌。更有網民稱現在內地的橋樑實在太弱,「要是打仗,這些路上沒法開坦克 車,或者得等一輛坦克過了,另一輛才能開」。
《廣州日報》
======
Anonymous
New spear phishing attack bypasses two factor authentication http://www.esecurityplanet.com/network-security/new-spear-phishing-attack-bypasses-two-factor-authentication.html
New Spear Phishing Attack Bypasses Two Factor Authentication
The attack is simpler and cheaper to launch than traditional spear phishing attacks, and it can be dangerously effective.
Symantec researchers
are warning of a new spear phishing attack that targets mobile users
with the aim of bypassing two-factor authentication and taking over
victims’ email accounts.
“This social engineering attack is very convincing, and we’ve already confirmed that people are falling for it,” Symantec research engineer Slawomir Grzonkowski reports in a blog post detailing the threat.
All that’s required to launch the attack is the target’s email address and mobile phone number.
The attackers simply leverage the email provider’s password recovery feature, which allows users who have forgotten their passwords to verify their identities by having verification codes sent to their mobile phones.
By clicking on the “forgot password” link and requesting the
verification code, the attacker prompts the email provider to send an
SMS message with the code to the victim’s mobile phone.
To get the code, the attacker then sends the victim a separate SMS message saying something like, “Google has detected unusual activity on your account. Please respond with the code sent to your mobile device to stop unauthorized activity.”
The victim replies with the code, and the attacker gains access to the victim’s email account.
As Grzonkowski notes, after resetting the account password, the attacker could send the victim an SMS stating, “Thank you for verifying your Google account. Your temporary password is [TEMPORARY PASSWORD.”
“This makes the phishing attack all the more believable,” Grzonkowski writes. “The victim thinks that the correspondence must be legitimate and their account is now secure."
The majority of cases observed by Symantec affected Gmail, Hotmail and Yahoo Mail users.
Grzonkowski says the majority of attacks seem to be focused on gathering information on the victims, not financial gain.
"This simple yet effective attack method is significantly more economical than traditional spear-phishing, where an attacker would need to register a domain and set up a phishing site,” Grzonkowski notes. "In this case, the only cost to the bad guys is an SMS message. This method is also more difficult to detect, as it would have to be done by the user’s mobile software or by the mobile carrier.”
To avoid becoming a victim, Grzonkowski recommends that users be suspicious of SMS messages asking about verification codes, particularly if they didn’t request one. “Legitimate messages from password recovery services will simply tell you the verification code and will not ask you to respond in any way,” he writes.
This eSecurity Planet article offers 5 tips for fighting email security threats.
Photo courtesy of Shutterstock.
“This social engineering attack is very convincing, and we’ve already confirmed that people are falling for it,” Symantec research engineer Slawomir Grzonkowski reports in a blog post detailing the threat.
All that’s required to launch the attack is the target’s email address and mobile phone number.
The attackers simply leverage the email provider’s password recovery feature, which allows users who have forgotten their passwords to verify their identities by having verification codes sent to their mobile phones.
To get the code, the attacker then sends the victim a separate SMS message saying something like, “Google has detected unusual activity on your account. Please respond with the code sent to your mobile device to stop unauthorized activity.”
The victim replies with the code, and the attacker gains access to the victim’s email account.
As Grzonkowski notes, after resetting the account password, the attacker could send the victim an SMS stating, “Thank you for verifying your Google account. Your temporary password is [TEMPORARY PASSWORD.”
“This makes the phishing attack all the more believable,” Grzonkowski writes. “The victim thinks that the correspondence must be legitimate and their account is now secure."
The majority of cases observed by Symantec affected Gmail, Hotmail and Yahoo Mail users.
Grzonkowski says the majority of attacks seem to be focused on gathering information on the victims, not financial gain.
"This simple yet effective attack method is significantly more economical than traditional spear-phishing, where an attacker would need to register a domain and set up a phishing site,” Grzonkowski notes. "In this case, the only cost to the bad guys is an SMS message. This method is also more difficult to detect, as it would have to be done by the user’s mobile software or by the mobile carrier.”
To avoid becoming a victim, Grzonkowski recommends that users be suspicious of SMS messages asking about verification codes, particularly if they didn’t request one. “Legitimate messages from password recovery services will simply tell you the verification code and will not ask you to respond in any way,” he writes.
This eSecurity Planet article offers 5 tips for fighting email security threats.
Photo courtesy of Shutterstock.
=====
Anonymous
New spear phishing attack bypasses two factor authentication http://www.esecurityplanet.com/network-security/new-spear-phishing-attack-bypasses-two-factor-authentication.html
新的魚叉式網絡釣魚攻擊繞過雙因素身份驗證
攻擊更簡單,更便宜,推出比傳統矛釣魚攻擊,並且也可以是危險的有效。
賽門鐵克的研究人員警告一個新的魚叉式釣魚攻擊,針對移動用戶繞過雙因素認證,並接管受害者的電子郵件帳戶的宗旨。
“這個社會工程攻擊是非常有說服力的,我們已經證實,人都愛上了它,”在賽門鐵克研究工程師斯瓦沃米爾Grzonkowski報告博客文章詳細介紹了威脅 。
所有的需要發動攻擊目標的電子郵件地址和手機號碼。
攻擊者只需利用電子郵件提供商的密碼恢復功能,它允許誰已經忘記了自己的密碼由具有發送到他們的手機驗證碼驗證其身份的用戶。
為了獲取代碼,攻擊者然後將受害人單獨的SMS消息說類似“谷歌已經檢測到異常活動您的帳戶。 請回應發送到您的移動設備來阻止未經授權的活動的代碼。“
事主回复的代碼,而攻擊者可以訪問受害者的電子郵件帳戶。
作為Grzonkowski指出,重置賬戶密碼後,攻擊者可以發送受害者一條短信說,“非常感謝您確認您的谷歌帳戶。 臨時密碼為[臨時密碼。“
“這使得網絡釣魚攻擊更加可信,”Grzonkowski寫道。 “受害人認為,通信必須合法和他們的帳戶現在安全的。”
大多數賽門鐵克觀察到的情況下受影響的Gmail,Hotmail和雅虎郵箱的用戶。
Grzonkowski說,大多數攻擊似乎集中在收集有關受害人,而不是經濟利益的信息。
“這個簡單而有效的攻擊方法是顯著比傳統的魚叉式網絡釣魚,在那裡一個攻擊者需要註冊一個域名,建立一個釣魚網站更經濟,”Grzonkowski指出,“在這種情況下,唯一的成本,壞人SMS消息。 這種方法也更加難以檢測,因為這將不得不由用戶的移動軟件或由該移動運營商完成。“
為了避免成為受害者,Grzonkowski建議用戶將可疑短信詢問驗證碼,尤其是當它們沒有要求之一。 “從密碼恢復服務的合法郵件會直接告訴你的驗證碼,並不會要求你以任何方式回應,”他寫道。
這個星球電子安全本文提供了戰鬥的電子郵件安全威脅5個技巧。
圖片提供存在Shutterstock 。
======
Anonymous
Password recovery scam tricks users into handing over email account access
Attackers are compromising Gmail, Hotmail, and Yahoo Mail accounts with just text messages and a little social engineering.
Created 16 Jun 2015
Some of the most effective scams are often very
simple; take for example dressing up as a police officer and asking
someone to hand over the keys to their car. The average person on the
street would probably hand them over without question and this is why
impersonating a police officer is classed as a very serious crime the
world over. This scam has two things going for it: its simplicity and
the fact that people have an overwhelming tendency to trust figures of
authority. These two qualities work just as well in the world of
cybercrime and we recently came across a case that proves just that.
Lately we have observed an increase in a particular
type of spear-phishing attack targeting mobile users. The purpose of the
attack is to gain access to the victim’s email account. This social
engineering attack is very convincing and we’ve already confirmed that
people are falling for it.
To pull off the attack, the bad guys need to know
the target’s email address and mobile number; however, these can be
obtained without much effort. The attackers make use of the password
recovery feature offered by many email providers, which helps users who
have forgotten their passwords gain access to their accounts by, among
other options, having a verification code sent to their mobile phone.
The majority of cases we observed affect Gmail,
Hotmail, and Yahoo Mail users. Using Gmail as an example, the following
steps describe how the attack works.
See the attack in action
We have made a video that shows you how attackers pull off this attack against unsuspecting users.
We have made a video that shows you how attackers pull off this attack against unsuspecting users.
Description of attack
- Our victim, Alice, registers her mobile phone number with Gmail so that if she forgets her password Google will text her a verification code and she can access her account.
Figure 2. Password recovery setup
- Our bad guy—let’s call him Malroy—wants to get into Alice’s account but doesn’t know her password. He does know Alice’s email address and phone number though. Malroy visits the Gmail login page and enters Alice’s email address and then clicks on the “Need help?” link. This link is used when people have forgotten their login credentials.
Figure 3. First step in password recovery process
Figure 4. Victim’s email address is entered
- Malroy is offered several options, including “Enter the last password you remember” and “Confirm password reset on my [MAKE AND MODEL] phone,” but skips these until he is given the option “Get a verification code on my phone: [MOBILE PHONE NUMBER].”
Figure 5. Attacker chooses to have verification code sent by text message
- Malroy accepts this option and an SMS message with a six-digit verification code is sent to Alice.
- Alice receives a message saying “Your Google Verification code is [SIX-DIGIT CODE].”
- Malroy then sends Alice an SMS message saying something like “Google has detected unusual activity on your account. Please respond with the code sent to your mobile device to stop unauthorized activity."
- Alice, believing that the message is legitimate, replies with the verification code.
- Malroy then uses the code to get a temporary password and gains access to Alice’s email account.
Figure 6. Attacker enters verification code
Figure 7. Ability to reset password is granted
We’ve also observed attackers interacting with their
victims when the verification code doesn’t work. The victim will
receive a message along the lines of:
“We still detect an unauthorized sign-in to your account. Google just re-sent a verification code via text message: Please respond with it to help secure your Google account”
When the attacker gains access to the account they could for example, among other things, add an alternate email to the account
and set it up so that copies of all messages would be forwarded to that
address. The temporary password could then be given to the victim and
they would have no idea their emails were being sent to the attacker. An
SMS would be sent to the victim, saying something like:
“Thank you for verifying your Google account. Your temporary password is [TEMPORARY PASSWORD]”
This makes the phishing attack all the more
believable. The victim thinks that the correspondence must be legitimate
and their account is now secure.
The cybercriminals carrying out these attacks do not
seem to be focused on financial gain such as stealing credit card
numbers. They appear to be looking to gather information about their
targets and are not targeting users en masse, instead going for specific
individuals. The way they operate is similar to the methods used by APT
groups.
This simple yet effective attack method is
significantly more economical than traditional spear-phishing, where an
attacker would need to register a domain and set up a phishing site. In
this case, the only cost to the bad guys is an SMS message. This method
is also more difficult to detect, as it would have to be done by the
user’s mobile software or by the mobile carrier.
The bad guys in this case are not impersonating a
police officer but instead are posing as the victim’s email provider.
Nevertheless, our overwhelming tendency to trust figures of authority,
or an organization in this case, helps criminals carry out this phishing
attack.
Mitigation
Users should be suspicious of SMS messages asking about verification codes, especially if they did not request one. If uncertain about an unexpected request, users can check with their email provider to confirm if the message is legitimate. Legitimate messages from password recovery services will simply tell you the verification code and will not ask you to respond in any way. Remember, just because someone looks like a police officer and sounds like a police officer, that doesn’t mean you should hand over your car keys without seeing some ID first.
Users should be suspicious of SMS messages asking about verification codes, especially if they did not request one. If uncertain about an unexpected request, users can check with their email provider to confirm if the message is legitimate. Legitimate messages from password recovery services will simply tell you the verification code and will not ask you to respond in any way. Remember, just because someone looks like a police officer and sounds like a police officer, that doesn’t mean you should hand over your car keys without seeing some ID first.
=====
Anonymous
ユーザーを欺いてメールアカウントにアクセスする、パスワード再発行詐欺
攻撃者は、テキストメッセージとちょっとしたソーシャルエンジニアリングを利用するだけで Gmail、Hotmail、Yahoo メールのアカウントを侵害しています。
作成日 16 Jun 2015
効果的な詐欺というものは、たいてい、ごくシンプルです。たとえば、警官の制服を着て、道行く人のひとりに「ク
ルマの鍵を貸してくれますか」と言えば、おそらく普通の人は疑いもせずに鍵を手渡すでしょう。だからこそ、警官になりすますことは世界中どの国でも重犯罪
に分類されているのです。この詐欺には 2 つの長所があります。シンプルであること、そして人は無条件に権威に従う傾向があるという事実です。この 2
つの性質は、サイバー犯罪の世界でもまったく同じように通用し、シマンテックは先日もそれを証明するケースを確認しました。
シマンテックは最近、モバイルユーザーを標的とする特定のスピア型フィッシング攻撃が増えていることを確認して
います。攻撃の目的は、標的のメールアカウントにアクセスすることですが、ソーシャルエンジニアリングのテクニックが巧妙なため、その手口に引っかかる人
がすでに現れていることも確認されました。
攻撃を実行するために、犯罪者は標的のメールアドレスと携帯電話番号を知る必要がありますが、これにたいした労
力は要りません。メールプロバイダの多くは、パスワードを忘れてアカウントにアクセスできないユーザーのためにパスワード再発行の機能を用意しており、た
いていは携帯電話の番号に確認コードを送信します。攻撃者はこの仕組みを利用するのです。
シマンテックが確認したケースのほとんどは、Gmail、Hotmail、Yahoo メールのユーザーに影響します。Gmail を例にとると、攻撃は以下の手順で実行されます。
攻撃の実際
シマンテックは、攻撃者が無防備なユーザーに対してこの攻撃を仕掛ける過程を説明する動画を作成しました。
シマンテックは、攻撃者が無防備なユーザーに対してこの攻撃を仕掛ける過程を説明する動画を作成しました。
攻撃の説明
- ここでは、被害者を Alice としましょう。Alice は Gmail に携帯電話番号を登録しているので、パスワードを忘れた場合でも Google から確認コードが送信され、アカウントにアクセスできるようになります。
図 2. パスワード再発行の設定
- ここで犯罪者が登場します。仮に Malroy としましょう。Malroy は Alice のアカウントに侵入しようと考えていますが、パスワードがわかっていません。ただし、Alice のメールアドレスと携帯電話番号はわかっています。Malroy は Gmail のログインページにアクセスし、Alice のメールアドレスを入力して 「お困りの場合」リンクをクリックします。これは、ユーザーがログイン情報を忘れたときに使うリンクです。
図 3. パスワード再発行プロセスの第 1 ステップ
図 4. 被害者のメールアドレスを入力する
- [覚えている最後のパスワードを入力してください]、または[端末 [機種とモデル番号] でのパスワード再設定の確認]などのオプションがありますが、Malroy はどれもスキップして、[確認コードを携帯端末(携帯電話番号の末尾)で取得します]というオプションが表示されるページまで進みます。
図 5. 攻撃者は、テキストメッセージで確認コードを送信してもらうオプションを選択する
- Malroy がこのオプションを選択すると、SMS メッセージで 6 桁の確認コードが Alice に送信されます。
- Alice は[Google 確認コードは [6 桁のコード] です]というメッセージを受け取ります。
- ここで Malroy は、Alice に SMS メッセージを送信します。「Google has detected unusual activity on your account. Please respond with the code sent to your mobile device to stop unauthorized activity(Google があなたのアカウントで異常なアクティビティを検出しました。不正なアクティビティを止めるために、モバイルデバイスに送信されたコードを返信してくださ い)」などという文面です。
- Alice はこれを正規のメッセージと考え、確認コードを送り返してしまいます。
- Malroy は、この確認コードを使って仮パスワードを手に入れ、Alice のメールアカウントにアクセスできるようになります。
図 6. 攻撃者が確認コードを入力する
図 7. パスワードをリセットする機能を使用できるようになる
さらには、確認コードでうまくいかない場合に、攻撃者が被害者とやりとりすることも確認されています。被害者は、次のような件名のメッセージを受け取ります。
We still detect an unauthorized sign-in to your account. Google just re-sent a verification code via text message: Please respond with it to help secure your Google account(あなたのアカウントに対して不正なサインインが続いています。Google はテキストメッセージで確認コードを再送しました。これにご返信いただかないと、Google アカウントを保護できません)
アカウントにアクセスできるようになった攻撃者はさまざまな操作が可能になりますが、代替メールをアカウントに追加し、あらゆるメッセージをそのメールアドレスに転送するように設定できる点は、特に注意が必要です。仮パスワードを被害者に送ることもでき、被害者は自分宛てのメールが攻撃者に送信されているとは思いもしません。次のような SMS が被害者に送信されます。
Thank you for verifying your Google account. Your temporary password is [TEMPORARY PASSWORD](Google アカウントをご確認いただき、ありがとうございます。仮パスワードは [仮パスワード] です)
こうなると、フィッシング攻撃の到達率はさらに高くなります。被害者は、これが正規の通信であり、自分のアカウントは安全であると信じ切ってしまうからです。
こうした攻撃を仕掛けるサイバー犯罪者は、クレジットカード番号を盗み出すような金銭の詐取を優先しているとは
思えません。標的に関する情報を集めようとしているらしく、しかも複数ユーザー全体ではなく、ひとりひとりの個人を狙っているようです。この攻撃のしかた
は、APT のグループが利用した手法に似ています。
この攻撃手法はシンプルでありながら効果が高く、ドメインを登録してフィッシングサイトも構築しなければならな
い従来型のスピア型フィッシングより、はるかに経済的です。上の例でも、犯人は SMS
メッセージのコストしか必要としません。そのうえ、ユーザーのモバイルソフトウェアや携帯事業者によって実行されるので、検出もいっそう困難です。
ここでお伝えした攻撃者は、警官になりすますのではなく、被害者のメールプロバイダに偽装しています。にもかかわらず、権威、この場合は組織に無条件に従ってしまうという我々の傾向が、フィッシング攻撃の成功を助長しているのです。
対処方法
確認コードに関する SMS メッセージには注意してください。要求していない場合には、特に警戒が必要です。要求したかどうかはっきりしない場合には、正規のメッセージかどうか、 メールプロバイダに問い合わせることができます。パスワード再発行サービスから送信される正規のメッセージは、確認コードが書かれているだけで、どんな形 でもそれを返信するように求めたりしません。警官のような身なりで警官のような口ぶりだからといって、警察手帳の提示を求めずにクルマの鍵を渡したりして はいけない、ということを忘れないでください。
確認コードに関する SMS メッセージには注意してください。要求していない場合には、特に警戒が必要です。要求したかどうかはっきりしない場合には、正規のメッセージかどうか、 メールプロバイダに問い合わせることができます。パスワード再発行サービスから送信される正規のメッセージは、確認コードが書かれているだけで、どんな形 でもそれを返信するように求めたりしません。警官のような身なりで警官のような口ぶりだからといって、警察手帳の提示を求めずにクルマの鍵を渡したりして はいけない、ということを忘れないでください。
* 日本語版セキュリティレスポンスブログの RSS フィードを購読するには、http://www.symantec.com/connect/ja/item-feeds/blog/2261/feed/all/ja にアクセスしてください。
=====
Anonymous
EU extends economic sanctions against Russia for 6 months - official
Published time: June 22, 2015The European Union has extended economic sanctions against Russian for a further six months, an EU official said. This follows the EU’s decision Friday to extend sanctions against Crimea for another year.
The decision to extend the sanctions against Russia was announced by the EU Council's press officer for foreign affairs, Susanne Kiefer.
The sanctions are being maintained until January 31, 2016 to ensure the Minsk agreement is implemented, she wrote in her Twitter account.
EU has extended economic sanctions against Russia until 31 January 2016, with a view to complete implementation of Minsk agreement.
The European Union will review the sanctions regime against Russia in six or seven months, Italian Foreign Minister Paolo Gentiloni told reporters in Luxembourg.
Dialogue with Russia, especially on Libya and Syria, is “crucially important” for the EU, Gentiloni added.
Russian Prime Minister Dmitry Medvedev ordered his chief of staff to ask President Putin for an extension of Russian counter-sanctions following the EU decision. The premier also ordered the preparation of a decree listing all categories of products and types of transactions covered by the restrictive measures.
Medvedev: I propose that restrictive measures on imports of certain food products to Russia be renewed
A document to extend the food embargo on EU products was submitted to the Presidential Administration by Monday evening, said government spokesperson Natalia Timakova. The list of goods is practically unchanged except for products needed for import substitution, she added.
It wasn’t Russia that began the restrictive measures in the first place, but it would answer reciprocally, Russian presidential spokesman Dmitry Peskov told reporters on Monday.
The policy of sanctions harms not only business activity in Russia, but European taxpayers as well, he added.
https://soundcloud.com/rttv/eu-sanctions
Agreement on the extension of sanctions was reached at a meeting of the EU Permanent Representatives Committee on June 17. In March, the EU Summit adopted a political declaration of intent to extend economic sanctions against Russia for another six months. In the document, the lifting of sanctions was linked to the full implementation of the conditions of the Minsk agreement, for the period up until the end of the year.
EU sanctions against Russia include restrictions on lending to major Russian state-owned banks, as well as defense and oil companies. In addition, Brussels imposed restrictions on the supply of weapons and military equipment to Russia as well as military technology, dual-use technologies, high-tech equipment and technologies for oil production. No sanctions were imposed against Russia’s gas industry.
The EU imposed sanctions against Russia on August 1, 2014, and tightened them in September the same year. In October, a separate decision by the EU Council loosened restrictions against European subsidiaries of Russian state banks.
As a countermeasure, Russia introduced a food embargo against countries that supported the sanctions, and has pursued a policy of import substitution since then.
The impact of the countersanctions on the EU economy is higher than initially forecast by Brussels, according to a recent study by the Austrian Institute of Economic Research (WIFO).
=======
Anonymous
歐盟擴大對俄羅斯的經濟制裁6個月 - 官員
發布時間:2015年6月22日07:30
編輯時間:2015年6月22日
編輯時間:2015年6月22日
歐盟已經對擴大中俄經濟制裁再延長6個月,歐盟官員說。 在此之前,歐盟週五決定延長制裁克里米亞一年。
擴大對俄羅斯實施制裁的決定是由歐盟理事會新聞官負責外交事務,蘇珊基弗宣布。
制裁被維持到2016年1月31日,以確保明斯克協議實施後,她在她的Twitter帳號寫道。
EU has extended economic sanctions against Russia until 31 January 2016, with a view to complete implementation of Minsk agreement.
歐盟將審查在六,七個月針對俄羅斯的制裁,意大利外交部長保羅Gentiloni告訴記者,在盧森堡。
與俄羅斯,尤其是在利比亞和敘利亞對話,是“非常重要”,為歐盟,Gentiloni增加。
俄羅斯總理德米特里·梅德韋傑夫下令他的參謀長問普京總統的俄羅斯反制裁之後,歐盟決定延長。 溫總理還下令法令列出所有類別的產品類型涵蓋了限制性措施交易的準備。
Medvedev: I propose that restrictive measures on imports of certain food products to Russia be renewed
文檔延長對歐盟產品的食品禁運週一晚間提交給總統辦公廳,政府說納塔利婭發言人Timakova。 貨物清單幾乎是不變的,除了需要進口替代產品,她補充說。
這不是俄羅斯開始擺在首位的限制性措施,但它會回答往復,俄總統梅德發言人佩斯科夫告訴記者,在星期一。
制裁的政策,不危害在俄羅斯唯一的業務活動,但歐洲的納稅人,以及,他補充說。
`url` parameter is not a valid SoundCloud URL. Learn more about using SoundCloud players.
SoundCloud.com
SoundCloud.com
協議對制裁的延長在歐盟常駐代表委員會6月17日的一次會議在3月達成,歐盟首腦會議通過的意圖的政治宣言,以經濟制裁延長對俄羅斯再延長6個月。 在文件中,取消制裁是有聯繫的全面實施明斯克協議的條件,期限,直到今年年底。
了解更多:“政治訛詐”:更新歐盟的制裁俄羅斯的抨擊,說措施是“無可救藥”
針對俄羅斯的歐盟的制裁包括到俄羅斯主要國有銀行對貸款的限制,以及國防和石油公司。 此外,布魯塞爾徵收石油生產武器和軍事裝備,以俄羅斯供應的限制以及軍事技術,軍民兩用技術,高科技的設備和技術。 沒有實施制裁對俄羅斯的天然氣工業。
歐盟徵收反制裁俄羅斯8月1日到2014年,並擰緊他們在同年九月,十月,由歐盟委員會單獨決定對放鬆俄羅斯國有銀行在歐洲的分支機構的限制。
作為對策,俄羅斯推出針對該支持制裁的國家糧食禁運,並從那時起一直奉行進口替代政策。
在countersanctions對歐盟經濟的影響比最初布魯塞爾的預測高,根據最近的一項研究經濟研究的奧地利研究所(WIFO)。
=======
*---By our dear Anonymous@YourAnonNews June 26) - News release -(1).@scryptcc2015 hacked, large amount of #Bitcoin stolen. DO NOT DEPOSIT! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html…]-(2).Unusual Exploit Kit Targets Chinese Users (Part 2)!-
(3).Huoqixiaoqiang: by the player set off a nationwide( (mainland-china) large-scale horse hung analysis!-[from the beginning by the end of May, 360 system to monitor cloud security to those who download a "plug-China alliance," the horse! infective dose surge. It is inconceivable that, download the passage of the Trojans turned out to be a variety of users millions or even billions of dollars of player clients. ]-
---由我們親愛的匿名@ YourAnonNews6月26日) - 新聞消息發布-
(1)。@ scryptcc2015黑客攻擊,大量#Bitcoin被盜。不要定金!
http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-
(2).Unusual漏洞利用工具包瞄準中國用戶(第二部分)! - (3).禍起蕭牆:由播放器引爆的全國性(大陸-china)大規模掛馬分析!--[從5月底開始,360雲安全系統監測到一個名為“中國插件聯盟”的下載者木馬感染量暴漲。令人匪夷所思的是,該木馬的下載通道竟然是多款用戶量上千萬甚至過億的播放器客戶端。]-
---Durch unser lieber Anonym @ YourAnonNews 26. Juni) - Pressemitteilung -
(1). @ Scryptcc2015 gehackt, große Menge von #Bitcoin gestohlen. KEINE Einzahlung! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-(2).Unusual Exploit Kit Ziele chinesischen Nutzer (Teil 2)! -(3) .Huoqixiaoqiang: vom Spieler löste eine bundesweit ((Festland-China) große Pferd hing Analyse - [von Anfang bis Ende Mai auf 360 System Cloud-Sicherheit für diejenigen, die eine "plug überwachen !. -China Allianz, "das Pferd Infektionsdosis Überspannungs Es ist unvorstellbar, dass, laden Sie die Passage der Trojaner entpuppte sich eine Vielzahl von Benutzern Millionen oder sogar Milliarden von Dollar an Spieler Clients]-
---私たちの愛する匿名@ YourAnonNews 6月26日によって) - ニュースリリース -(1)。@ハッキングscryptcc2015、#Bitcoinが大量に盗まれました。預金しないでください! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-(2).Unusualキットターゲット中国のユーザー(その2)を活用! -(3).Huoqixiaoqiang:!プレイヤーは、大規模な馬が分析をハング)全国((本土中国をオフに設定することによって - [最初から月の終わりまでに、360システムが「プラグをダウンロードした人に、クラウドのセキュリティを監視します!。 - 中国同盟、「馬感染量の急増は、トロイの木馬の通路は、ユーザー数百万やプレイヤークライアントのドルの十億の様々なことが判明しダウンロードすることは考えられません]。 -
---Par notre cher Anonyme @ YourAnonNews 26 Juin) - Nouvelles de presse -
(1).@Scryptcc2015 piraté, une grande quantité de #Bitcoin volé. NE PAS DÉPOSER! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-(2).Unusual Exploit Kit cible les utilisateurs chinois (Partie 2)! -(3) .Huoqixiaoqiang: par le joueur a déclenché une échelle nationale ((continent-china) cheval à grande échelle accrochée analyse - [depuis le début à la fin de mai, 360 système de surveillance de la sécurité en nuage pour ceux qui téléchargent un "plug !. alliance, Chine, "le cheval onde de dose infectieuse Il est inconcevable que, télécharger le passage des chevaux de Troie avéré être une variété d'utilisateurs millions voire des milliards de dollars de clients de lecteur].-
---우리의 친애하는 익명 @ YourAnonNews 6월 26일으로) - 보도 자료 -
(1). @ 해킹 scryptcc2015, #Bitcoin의 많은 양의 도난. 입금하지 마십시오! http://securityaffairs.co/wordpress/38059/cyber-crime/scryptcc-hacked.html...]-(2).Unusual 키트 중국 사용자 (2 부)를 표적으로 공격! -
(3) .Huoqixiaoqiang! 플레이어가 대규모의 말을 분석 걸려) 전국 ((본토 중국을 출발하여 - [처음부터 월 말까지, 360 시스템은 "플러그를 다운로드하는 사람들에게 클라우드 보안을 모니터링 !. - 중국 동맹, "말 감염성 용량 서지 그것은 트로이 목마의 통과 사용자 수백만 또는 플레이어 클라이언트 달러의 수십억의 다양한으로 밝혀졌다 다운로드하는 것이 상상도 할 수없는 것입니다]-**All The World Lauguage**-
http://melody-free-shaing.blogspot.com/2015/06/by-our-dear-anonymousyouranonnews.html*-Updated by - our dear "Anonymous@YourAnonNews "teaches us - how to "cancel sending" e-mail has been sent to your Gmail account! "-Our friendly moral anonymous lead people to Identify the authenticity! in their efforts to fighting "ISIS bug '' extreme behavior,Take the most famous Anonymous "DIGITASHADOW @DigitaShadow" Renowned Fame ! They are also to teach people the importance of conscience and human rights! thankyou for every Anonymous tribal great legion - ~ tiny Melody.Blog heartfelt sincerely ~
-更新由我們親愛的匿名@YourAnonNews"教導我們-如何“取消發送”已發送您的Gmail帳戶的電子郵件!"-我們的友好道德匿名教領人們辨別真偽!在他們努力對抗"ISIS小蟲的極端行為,就以最享有盛名的匿名"
DIGITASHADOW@DigitaShadow"!也教導人們良知和人權的重要性!在此感謝各位偉大匿名部落軍團~渺小的Melody.Blog衷心敬上~**All The World Lauguage**-
http://melody-free-shaing.blogspot.com/2015/06/by-our-dear-anonymousyouranonnews.html
*---By our dear Anonymous@YourAnonNews Retweet and NTDTV press release - "Shanghai people have been arrested protesters Anti PX,, thousands of people around the pro-government release (Video) !!" [Updated: 2015- 06-23] - published by the Apple Daily news - "[cross-strait] Guangdong rubbish headlines bridge collapse kills,, !!" Reviewed by Anonymous @ YourAnonNews share - "new spear phishing attacks to bypass the two-factor authentication!" - [http://www.esecurityplanet.com/network-security/new-spear-phishing-attack-bypasses-two-factor-authentication.html] - & - "EU enlargement on Russia's economic sanctions issued six months -official time: June 22, 2015] -
---Durch unser lieber Anonym@YourAnonNews Retweet und NTDTV Pressemitteilung - "Shanghai Menschen wurden festgenommen Demonstranten Anti PX ,, Tausende von Menschen auf der Pro-Regierungs-Release (Video) !!" [Aktualisiert: 2015- 06-23] - von der Apple Daily News veröffentlicht - "[die Taiwanstraße] Guangdong Müll Schlagzeilen Brückeneinsturz tötet ,, !!" Bericht von: Anonym@YourAnonNews Aktie - "neue Spear-Phishing-Angriffe, um die Zwei-Faktor-Authentifizierung zu umgehen!" - [http://www.esecurityplanet.com/network-security/new-spear-phishing-attack-bypasses-two-factor-authentication.html] - & - "EU-Erweiterung auf die russische Wirtschaftssanktionen erteilt 6 Monate -Offizielle Zeit: 22. Juni 2015] -
---私たちの愛する匿名@ YourAnonNewsリツイートとNTDTVのプレスリリースでは - "上海の人々は,,アンチPX親政府リリース(動画)周りの人々の何千もの抗議者を逮捕されました!!" [更新:2015- 6月23日] - アップルデイリーニュースによって公開 - 「[両岸]広東省ゴミの見出しの橋の崩壊は,,殺します!! "匿名@ YourAnonNewsシェアによるレビュー - 「新しいスピアフィッシング攻撃は、二要素認証をバイパスします! " - [http://www.esecurityplanet.com/network-security/new-spear-phishing-attack-bypasses-two-factor-authentication.html] - & - 半年-official時間を発行したロシアの経済制裁の「EU拡大:2015年6月22日]-**All The World Lauguage**-
http://melody-free-shaing.blogspot.com/2015/06/by-our-dear-anonymousyouranonnews.html
===Melody.Blog===Thanksgiving===>/
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
沒有留言:
張貼留言
window.___gcfg = {
lang: 'zh-CN',
parsetags: 'onload'
};