Last Updated: 2006-03-14 15:49:13 UTC
by Patrick Nolan (Version: 3)
Update: 21:37 UTC - One of our readers, JD, tells us that McAfee has devleoped a tool that will restore files that were quarantined by DAT 4715. Customers are encouraged to contact their technical assistance manager. The tool may be posted on the McAfee website at some point (though it doesn't appear to be there for public download at the moment). --JAC
Update 2: 02:43 UTC 2006-03-13 - McAfee has release a list of (supposedly) all the files affected by DAT 4715. It includes some other interesting ones in addition to excel.exe, like setup.exe, uninstall.exe, shutdown.exe, and reg.exe to name just a few, but is clearly incomplete since it doesn't include any of the Oracle binaries that have been reported to be affected by some of our readers. The list can be found here. --JAC
Update 3: 15:48 UTC 2006-03-14 - The tool is now available. See here. --JAC
McAfee DAT 4716 corrects the problem, references W95/CTX and says;
"Users who have moved detected files to quarantine should restore them to their original location. Windows users who have had files deleted should restore files from backup or use System Restore .
Virusscan Online users can restore the falsely detected file from the Manage Quarantined Files.."
ISC participants report excerpts;
VirusScan Enterprise 8.0i
VirusScan Enterprise 7.1
VirusScan Enterprise 7.0
Managed VirusScan 4.0
Managed VirusScan 3.5
VirusScan Online 11
VirusScan Online 10
VirusScan 7.03 (consumer)
At this time you should cancel any scheduled on-demand scans until the release of the 4716 DATs."
"Some example files are graph9.exe and excel.exe from office 2000" "....3700 files have been quarantined on over 100 pcs."
"We think McAfee's latest DAT file may be bad. They improved the detection for several variants of the W95/CTX virus, and now our scanners are detecting supposedly infected executables all over our network, including on an original Microsoft Office 11 CD. Our guess is that this is a false positive. If so, and your readers have quarantine or delete set as the default action, the Virusscan will do more damage than a real virus would."
"anything that was in the PATH environment variable was targeted."
"Not only did it attempt to remove files in the %ORACLE_HOME%\bin directory, but also in the .patch_storage folder - so as far as oracle files, this was not limited to the PATH environment variable."
"This was also capable of navigating mapped drives, so if you had a file server setup as a common install location, if filesystem permissions permitted modification of such files, you'll want to refresh the installation files from the downloaded, compressed source file."
"We had over 3700 quarantine events. I counted 297 individual file names."
Last Updated: 2006-03-12 15:05:01 UTC
by Swa Frantzen (Version: 1)
Arms Race ?
As with anything the bad guys do, they react to anything we do to try to prevent them from having success. One of the things we told our users was to ignore alerting messages that their bank (and any other bank they are not a customer of) seems to send them and tells them their account has been abused. It seems that it is finally having it's effect as the phishers are changing tactics.
These kind of arms races require us to increase awareness constantly and to make users more resilient all the time. If we fail this our users, customers, ... will fall prey and we will have failed our users and/or customers in the end.
Example of one of these new phishing attempts
From: Chase Manhattan Bank
Subject: [ $20 Reward Survey ]
Dear Chase Bank Customer,
You have been chosen by the Chase Manhattan Bank online department
to take part in our quick and easy 5 question survey.
In return we will credit $20 to your account - Just for your time!
Helping us better understand how our customers feel benefits everyone.
With the information collected we can decide to direct a number of
changes to improve and expand our online service.
We kindly ask you to spare two minutes of your time
in taking part with this unique offer!
SERVICE: Chase Online? $20 Reward Survey
EXPIRATION: March - 13 - 2006
Confirm Now your $20 Reward Survey with Chase Online? Reward
The information you provide us is all non-sensitive and anonymous
No part of it is handed down to any third party groups.
It will be stored in our secure database for maximum of 3 days
while we process the results of this nationwide survey.
Please do not reply to this message. For any inquiries, contact
Document Reference: (87051203)
Copyright 1996 - 2006 Chase Bank, N.A. Member FDIC Copyright © 2006
It was formatted much more fancy in html, but I chose not to show that here.
Of course the link in there doesn't go to anything owned by JPMorgan Chase & Co.
Now let's have a look at that website collecting so called "non-sensitive and anonymous" information.
It starts out all rather innocent
but then it goes on to ask you more details. Details that are far from non-sensitive and anonymous. But remember the psychology: the user just has answered a whopping 5 questions and is now going to get his 20 bucks. He'll even sell his mother for it, or at least tell them her name along with what is going to cost him much more than that 20 bucks he'll never get.
The details they want to know:
New tactic: better serversUnfortunately they are also getting better on the technology side:
- "premium" service from a well known name on the Internet
- very redundant DNS service
- lots of servers
chaseonline.new-reward-survey.us. 600 IN CNAME premium.geo.yahoo.akadns.net.
premium.geo.yahoo.akadns.net. 300 IN A 22.214.171.124
premium.geo.yahoo.akadns.net. 300 IN A 126.96.36.199
premium.geo.yahoo.akadns.net. 300 IN A 188.8.131.52
premium.geo.yahoo.akadns.net. 300 IN A 184.108.40.206
premium.geo.yahoo.akadns.net. 300 IN A 220.127.116.11
premium.geo.yahoo.akadns.net. 300 IN A 18.104.22.168
premium.geo.yahoo.akadns.net. 300 IN A 22.214.171.124
premium.geo.yahoo.akadns.net. 300 IN A 126.96.36.199
The not so good news goes on:Worst of all the responses you receive when reporting these things to the abuse contacts of some service providers is so far below par that getting this shut down in a hurry isn't likely. I hope the banks have a bit more pull than this handler.
Yes I know that exposing this more publicly will increase the odds that other rivaling groups will start to use these techniques as well, but after having received half a dozen of these myself my guess is that they already know.
Swa Frantzen - Section 66