Perimeter
11/8/2010
02:51 PM
Commentary
Commentary
Commentary
Connect Directly
RSS
E-Mail
50%
50%
Repost This

The Politics Of Malware

I recently saw a provocative tweet from @mikkohypponen that reminded me malware is still quite often politically motivated.

I recently saw a provocative tweet from @mikkohypponen that reminded me malware is still quite often politically motivated.

Just got a phone call. Had to remove an image from my last blog post: http://bit.ly/c1S94U Sorry if you missed it.

Of course, I just had to click through to see what was removed and why. Mikko's post deals with the evolution of a Firefox zero-day found on the Nobel Peace Prize website in late October. This time around, attackers are exploiting interest in the Peace Prize via an Adobe Reader/Acrobat exploit (CVE-2010-2883. The exploit is contained in a PDF attachment carried by the email, which masquerades as an invite to the Nobel Prize ceremony.

The removed image that Mikko referenced in his Twitter post was the red herring file displayed when a victim opened the PDF. Curiosity seekers can still see a copy of the decoy in this Contagio blog. Basically, it's a very convincing-looking invitation to "celebrate human rights and the universal message of Liu Xiaobo".

Mary Landesman is an antivirus professional and senior security researcher for ScanSafe, now part of Cisco. In 2009 she was awarded a Microsoft MVP for her work in consumer security.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6212
Published: 2014-04-19
Unspecified vulnerability in HP Database and Middleware Automation 10.0, 10.01, 10.10, and 10.20 before 10.20.100 allows remote authenticated users to obtain sensitive information via unknown vectors.

CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2013-6215
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 10.01 and 10.10 allows remote authenticated users to execute arbitrary code via unknown vectors, aka ZDI-CAN-1977.

CVE-2013-6218
Published: 2014-04-19
Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.0x, 9.1x, and 9.2x allows remote attackers to execute arbitrary code via unknown vectors.

Best of the Web