From: FromTheRafters on
"Leythos" <spam999free(a)rrohio.com> wrote in message
news:MPG.257d77cb5932f61b989fe2(a)us.news.astraweb.com...
> In article <4b1485c0.988859(a)EBCDIC>, me(a)privacy.net says...
>>
>> Leythos wrote:
>> >In all my decades of
>> >experience I have never...
>>
>> ...learned how to configure a safe web interface (browser) such that
>> one could
>> surf without fear, regardless of the site.
>
> You seem to have missed the article like Butts did - it was a
> sacrificial machine with the sole purpose of downloading files.

It is well known that downloading program files from the web can
potentially lead to malware problems. What interests me more (and from a
detection point of view) is how the initial lure gets to be displayed to
a user. Obfuscated HTML and/or script (I'm sure scripting was also
enabled and unrestricted) can be detected as suspicious (Avira may show
a heuristic detection of these) and 'nipped it in the bud'. This is
*not* the same as detecting the actual (various) malware being served
up. Does your goat log these lure attempts, and did the endpoint
protection slip up, or was it a new obfuscation technique it wasn't yet
equipped to handle? Are your downloads unattended, or is the user
required to say "yes" to whatever oddball rogue requests a click from
them?

I assume this was a goat network rather than a regular network that you
set up on "opposite day". :o)


From: Leythos on
In article <hf0e3t$3fl$1(a)news.eternal-september.org>,
erratic(a)nomail.afraid.org says...
>
> "Leythos" <spam999free(a)rrohio.com> wrote in message
> news:MPG.257d77cb5932f61b989fe2(a)us.news.astraweb.com...
> > In article <4b1485c0.988859(a)EBCDIC>, me(a)privacy.net says...
> >>
> >> Leythos wrote:
> >> >In all my decades of
> >> >experience I have never...
> >>
> >> ...learned how to configure a safe web interface (browser) such that
> >> one could
> >> surf without fear, regardless of the site.
> >
> > You seem to have missed the article like Butts did - it was a
> > sacrificial machine with the sole purpose of downloading files.
>
> It is well known that downloading program files from the web can
> potentially lead to malware problems. What interests me more (and from a
> detection point of view) is how the initial lure gets to be displayed to
> a user. Obfuscated HTML and/or script (I'm sure scripting was also
> enabled and unrestricted) can be detected as suspicious (Avira may show
> a heuristic detection of these) and 'nipped it in the bud'. This is
> *not* the same as detecting the actual (various) malware being served
> up. Does your goat log these lure attempts, and did the endpoint
> protection slip up, or was it a new obfuscation technique it wasn't yet
> equipped to handle? Are your downloads unattended, or is the user
> required to say "yes" to whatever oddball rogue requests a click from
> them?
>
> I assume this was a goat network rather than a regular network that you
> set up on "opposite day". :o)

We have one machine we setup to download from the net, it's a machine
that has no access to our other machines by network connection and
firewall rules - the purpose is to download files, it's not a honeypot,
it's just a safe way of doing downloads.

In this case I was attempting to browse to a MS site and entered the
address incorrectly and was taken to a non-MS site and immediately
redirected to the malicious site.

SEPP didn't show anything at the time of entry or during the additional
items the malware downloaded, and the firewall was not setup to monitor
intrusions on that network/machine.

In this case there was no manual anything, as soon as the page started
to load the tattle-tale DOS box appeared and then closed, doing this
several times in a few seconds - as each new malware was loaded.

The reason I posted the events/information was to make people aware of
just how easy, even if you're using a NAT router, it is to get
compromised by accident, using all updates/patches, using commercial
antimalware tools, etc.... In all my years I've never had that happen,
but we don't normally allow that level of access on our networks or
customers networks - this machine was isolated and for good reason.

The point was that with a few simple protection methods, based on how I
believe the infection entered, it could have been prevented, something
that most people are not willing to do because of the limits it puts on
them while using their computers.

--
You can't trust your best friends, your five senses, only the little
voice inside you that most civilians don't even hear -- Listen to that.
Trust yourself.
spam999free(a)rrohio.com (remove 999 for proper email address)
From: FromTheRafters on
"Leythos" <spam999free(a)rrohio.com> wrote in message
news:MPG.257d90f2f0d8adb1989fe4(a)us.news.astraweb.com...
> In article <hf0e3t$3fl$1(a)news.eternal-september.org>,
> erratic(a)nomail.afraid.org says...
>>
>> "Leythos" <spam999free(a)rrohio.com> wrote in message
>> news:MPG.257d77cb5932f61b989fe2(a)us.news.astraweb.com...
>> > In article <4b1485c0.988859(a)EBCDIC>, me(a)privacy.net says...
>> >>
>> >> Leythos wrote:
>> >> >In all my decades of
>> >> >experience I have never...
>> >>
>> >> ...learned how to configure a safe web interface (browser) such
>> >> that
>> >> one could
>> >> surf without fear, regardless of the site.
>> >
>> > You seem to have missed the article like Butts did - it was a
>> > sacrificial machine with the sole purpose of downloading files.
>>
>> It is well known that downloading program files from the web can
>> potentially lead to malware problems. What interests me more (and
>> from a
>> detection point of view) is how the initial lure gets to be displayed
>> to
>> a user. Obfuscated HTML and/or script (I'm sure scripting was also
>> enabled and unrestricted) can be detected as suspicious (Avira may
>> show
>> a heuristic detection of these) and 'nipped it in the bud'. This is
>> *not* the same as detecting the actual (various) malware being served
>> up. Does your goat log these lure attempts, and did the endpoint
>> protection slip up, or was it a new obfuscation technique it wasn't
>> yet
>> equipped to handle? Are your downloads unattended, or is the user
>> required to say "yes" to whatever oddball rogue requests a click from
>> them?
>>
>> I assume this was a goat network rather than a regular network that
>> you
>> set up on "opposite day". :o)
>
> We have one machine we setup to download from the net, it's a machine
> that has no access to our other machines by network connection and
> firewall rules - the purpose is to download files, it's not a
> honeypot,
> it's just a safe way of doing downloads.
>
> In this case I was attempting to browse to a MS site and entered the
> address incorrectly and was taken to a non-MS site and immediately
> redirected to the malicious site.

Common typo squatters!

> SEPP didn't show anything at the time of entry or during the
> additional
> items the malware downloaded, and the firewall was not setup to
> monitor
> intrusions on that network/machine.

Browser exploit webpage must have had something that worked on your
setup.

> In this case there was no manual anything, as soon as the page started
> to load the tattle-tale DOS box appeared and then closed, doing this
> several times in a few seconds - as each new malware was loaded.

Why do you run this special isolated machine as admin?

> The reason I posted the events/information was to make people aware of
> just how easy, even if you're using a NAT router, it is to get
> compromised by accident, using all updates/patches, using commercial
> antimalware tools, etc.... In all my years I've never had that happen,
> but we don't normally allow that level of access on our networks or
> customers networks - this machine was isolated and for good reason.

Compartmentalization is the essence of what the term "firewall" used to
be all about.

> The point was that with a few simple protection methods, based on how
> I
> believe the infection entered, it could have been prevented, something
> that most people are not willing to do because of the limits it puts
> on
> them while using their computers.

You mean - like not running as admin when you don't need to?


From: tommy on



Leythos wrote:
> In article <hf0e3t$3fl$1(a)news.eternal-september.org>,
> erratic(a)nomail.afraid.org says...
>>
>> "Leythos" <spam999free(a)rrohio.com> wrote in message
>> news:MPG.257d77cb5932f61b989fe2(a)us.news.astraweb.com...
>>> In article <4b1485c0.988859(a)EBCDIC>, me(a)privacy.net says...
>>>>
>>>> Leythos wrote:
>>>>> In all my decades of
>>>>> experience I have never...
>>>>
>>>> ...learned how to configure a safe web interface (browser) such
>>>> that one could
>>>> surf without fear, regardless of the site.
>>>
>>> You seem to have missed the article like Butts did - it was a
>>> sacrificial machine with the sole purpose of downloading files.
>>
>> It is well known that downloading program files from the web can
>> potentially lead to malware problems. What interests me more (and
>> from a detection point of view) is how the initial lure gets to be
>> displayed to a user. Obfuscated HTML and/or script (I'm sure
>> scripting was also enabled and unrestricted) can be detected as
>> suspicious (Avira may show a heuristic detection of these) and
>> 'nipped it in the bud'. This is *not* the same as detecting the
>> actual (various) malware being served up. Does your goat log these
>> lure attempts, and did the endpoint protection slip up, or was it a
>> new obfuscation technique it wasn't yet equipped to handle? Are your
>> downloads unattended, or is the user required to say "yes" to
>> whatever oddball rogue requests a click from them?
>>
>> I assume this was a goat network rather than a regular network that
>> you set up on "opposite day". :o)
>
> We have one machine we setup to download from the net, it's a machine
> that has no access to our other machines by network connection and
> firewall rules - the purpose is to download files, it's not a
> honeypot, it's just a safe way of doing downloads.
>
> In this case I was attempting to browse to a MS site and entered the
> address incorrectly and was taken to a non-MS site and immediately
> redirected to the malicious site.
>
> SEPP didn't show anything at the time of entry or during the
> additional items the malware downloaded, and the firewall was not
> setup to monitor intrusions on that network/machine.
>
> In this case there was no manual anything, as soon as the page started
> to load the tattle-tale DOS box appeared and then closed, doing this
> several times in a few seconds - as each new malware was loaded.
>
> The reason I posted the events/information was to make people aware of
> just how easy, even if you're using a NAT router, it is to get
> compromised by accident, using all updates/patches, using commercial
> antimalware tools, etc.... In all my years I've never had that happen,
> but we don't normally allow that level of access on our networks or
> customers networks - this machine was isolated and for good reason.
>
> The point was that with a few simple protection methods, based on how
> I believe the infection entered, it could have been prevented,
> something that most people are not willing to do because of the
> limits it puts on them while using their computers.

seems like firefox with noscript might have prevented that. [ its happened
to me before, thats why i use ff ]
--
Tommy


From: FromTheRafters on
"tommy" <tommylee9_2000(a)removeyahoo.dropcom> wrote in message
news:hf0jbr$sme$1(a)news.eternal-september.org...

> seems like firefox with noscript might have prevented that. [ its
> happened
> to me before, thats why i use ff ]

A malicious website can host a wide variety of exploits covering many
different clients. The way to get the user to visit the site varies
(some using script), but this was just a misstep that landed Leythos in
a bad place (with the keys to the machine dangling out of his pocket).

Sometimes the user's choice of client only changes the website's choice
of exploit(s).