Namaskar from New Delhi – AVAR 2008

Recently I returned from the Association of anti-Virus Asia Researchers Conference (known as AVAR 2008)  in New Delhi, India. Microsoft was a Gold Sponsor of the conference, at which there were a number of interesting presentations. This was also a great opportunity to meet other researchers in the anti-malware industry. Subratam from MMPC Redmond also…

0

MSRT Review – Win32/FakeXPA and Win32/Yektel Rogues

As mentioned previously on this blog, we added two “rogue” families to MSRT this month: Win32/FakeXPA and Win32/Yektel. We’ve known that rogues in general have been growing in prevalence for some time and with two months of MSRT data (last month we added a family of rogues called Win32/FakeSecSen) we’re seeing that confirmed. In analysing…

0

The new IE exploits for Advisory 961051, Now Hosted on Pornography Sites

Two days ago, we blogged about attacks that involve exploits of the recently discovered vulnerability in Internet Explorer. We would like to give you a quick update about these attacks. Based on our stats, since the vulnerability has gone public, roughly 0.2% of users worldwide may have been exposed to websites containing exploits of this…

0

Limited Exploitation of Microsoft Security Advisory 961051

The MSRC released a security advisory yesterday about a vulnerability in Internet Explorer. Just like our colleagues at the MSRC, we’re tracking the situation very closely as we’ve observed the vulnerability exploited in the wild, however within a relatively limited context. Virtually all the malicious sites we’ve seen taking advantage of the vulnerability thus far…

0

Win32/Yektel – the Other Kind of Rogue

In addition to Win32/FakeXPA we added another rogue-related malware family to MSRT this month – Win32/Yektel. Win32/Yektel is a different kind of rogue. Like other rogues, it displays fake warnings about possibly malware or spyware, but rather than pretending to be a security product itself, it tries to blend in with its surroundings. There is a…

0

Now I’ve Seen It All (Maybe)

I’ve been coding anti-virus routines for 1, 2, 5… 10, 15, 20… a really long time.  Starting with the Apple II, before there was even an anti-virus industry, and continuing on the PC (and funnily enough, joining the industry wasn’t the obvious choice for me when I left school).  In between times, I’ve analysed viruses…

0

FakeXPA… Journey of a Rogue

Rogue security products have been around for some years, and now they seem to be everywhere. In my previous blog about Trojan:Win32/Antivirusxp I talked about the relationships between rogue products and various other threats. One common behavior of rogue products is their ever-changing domain names and user interfaces. Most rogue products emerge and then disappear…

0

O Come All Ye Malware

Well, after our last post, it certainly didn’t take long to see some examples of festive malware from the wild. (You’d almost think that we’ve seen this kind of behavior before – again and again and again…) In the last couple of days, we (and other AV vendors) have observed the arrival of several new…

0

General Anti-Malware Advice

As always, Microsoft continues to encourage customers to follow all of the steps of the “Protect Your PC” guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Unfortunately, technology alone cannot stop the impact of this malicious activity so Microsoft continues to recommend that people adhere to its online…

0

Merry Malware – You’d better watch out, you’d better think twice…

With visions of sugarplums dancing through my head constantly from around September onwards, I eagerly (and somewhat obsessively) await the festive season every year. As heralded by my son opening the first box on his advent calendar this morning to liberate the toy hidden within, as far as I am concerned, Christmas is (finally!) upon…

0