18
Mar

New IE Zero-Day Exploit

There is currently in the wild an HTML script that exploits an unpatched vulnerability in Microsoft Internet Explorer. The vulnerability is in the way IE handles thousands of script handlers such as onClick on a single Web page. This causes the browser to crash. Other browsers like FireFox are reportedly not affected by this.

Trend Micro’s HTML_SCRIPTACT.A is the detection for pages that exploit this vulnerability, while McAfee’s detection is Exploit-ScriptAction.

Security Focus cites a demonstration page. Try clicking this if you dare.

17
Mar

The First Crossover Virus

First, it was a rumor. It even caused a minor controversy. And finally it was confirmed. Ladies and gentlemen, a virus (specifically a worm) that can jump from a PC to a Windows handheld is now a reality.

On February 28, 2006, a relatively new organization named Mobile Antivirus Research Association (MARA) announced that it has in its possession a virus that can cross over from a PC to a Windows handheld (News.com). Contrary to the usual practice, wherein an antivirus company who has a copy of a new malware shares it with those who don’t, MARA refused to share the code unless interested AV companies join their organization (Security Focus).

And now, at least 3 major AV companies have published their descriptions for the crossover worm: Trend Micro’s WORM_CXOVER.A, Symantec’s MSIL.Cxover.A, and F-Secure’s Cxover.A.

First, it checks the OS version. If it finds itself in a desktop computer, it searches for an open ActiveSync connection to a mobile device. Once found, it copies itself in the mobile device. If it finds itself in the mobile device, it deletes all files and folders found in the My Documents folder.

A more detailed analysis can be found here.

Included in its code is a direct challenge to security experts and AV companies:

The great walls of China that separated the domains between wired and wireless, desktop and handhelds have been reduce to ruble. Vxers are entering a new era of greater vx possibilities with the chance of reaching more systems around the world than ever before. The viruses of the past are nothing compared to what the future holds. 2006 marks the establishment of a New Cyberworld Order with vxers around the world united at the forefront. The time is now to prepare and defend, are you ready?

Are we ready?

16
Mar

Impeachment Redux: What Citizens Can Do

Opposition congressmen Francis Escudero and Gilbert Remulla announced in a foreign media meeting that the opposition will file an impeachment case against Gloria Arroyo with at least 79 endorsers, so that it can immediately be sent to the Senate. The charges will be the same as what was filed last year (which was junked by the pro-Arroyo majority).

The so-called middle forces should now concentrate on helping the opposition in this endeavour. It should indulge less on harping and protesting and instead focus on this constitutional move. Already, Philippine Commentary hopes that the charge of violation of Republic Act 4200 (The Anti-Wiretapping Act) be included in the impeachment case. This action should be emulated by those who believe Arroyo should be impeached.

How can we help in this action?

  • If you think Arroyo should be impeached, talk/write to your congressman, and tell him that you want him/her to support the impeachment case by signing as an endorser. These representatives should begin to listen to the people that they represent. This is the most important action that any pro-impeachment citizen should do.
  • If you were a witness to election cheating, talk to a lawyer if your testimony and/or evidence will help the impeachment.
  • Law/lawyer groups should help the opposition at the House of Representatives in drafting the complaint.
  • The impeachment complaint, once drafted, should be open for all to comment on. This way, possible flaws, loopholes, and unsubstantiated complaints could be corrected or stricken out.

These are just some suggestions on my part. What do you suggest we can do?

15
Mar

Two Microsoft Security Bulletins for March 2006

Microsoft released today two security bulletins, addressing vulnerabilities in Microsoft Windows and Microsoft Office.

Microsoft Security Bulletin MS06-011, Permissive Windows Services DACLs Could Allow Elevation of Privilege (914798), is rated Important. Affected OS are Windows XP Service Pack 1, Windows Server 2003, and Windows Server 2003 for Itanium-based systems. This vulnerability can allow an escalation of user privilege.

Microsoft Security Bulletin MS06-012, Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (905413), affects users of Office 2000 Service Pack 3, Office XP Service Pack 3, Office 2003 Service Pack 1 or 2, Works Suites, Office X and Office 2004 for Mac. This vulnerability allows remote code execution, and is rated critical.

Users of the said software are advised to update their computers.

14
Mar

A Blogger’s Survival Manual (Updated)

PCIJ is once again on the gunsight of Mike Defensor’s stoogie Jonathan Tiongco, who is hell bent on shutting down PCIJ. PCIJ was slapped a TRO before, courtesy of Tiongco’s wife, and now, Tiongco may be at it again. (Side note: The linked blog entry was numbered 464.) The page that was TROd discussed the life of Tiongco and his rise to infamy.

PCIJ has learned that there was an attempt by Tiongco to file a search warrant against – you guessed it right – PCIJ.

Now, there is jurisprudence about this; what this means is that if it was done before, it can be done again. And with the incessant efforts by Gloria Arroyo and her generals to stifle dissent, bloggers will be next in line after the mainstream news organizations. Bloggers are not yet targets because they do not command yet the attention that news organization gets; the Internet penetration, much less availability of computers at home, is still low. If a computer and an Internet connection is as available as a TV set, Arroyo would have to address the “problem”. I believe Web sites that fits her “destabilizer” label will be targeted, but not yet soon. I hope I am wrong; the Internet is such a free place, and I hope it will remain so.

Anyway, it is better to be prepared. How can we survive? Too pessimistic. How can we mitigate such actions? Here are some suggestions:

  • Get another blog provider. Repost your entries there. But do not link to it. The key is to have it unknown to the casual reader. I know this will mean redundancy and extra effort. WordPress users can use the LiveJournal Cross Poster plugin, if you have a LiveJournal account.
  • Hire a lawyer, or at least know the laws that has bearing on blogging. Make sure your blog entries are not contrary to the law, if you feel like being lawful. After all, you exercise your freedom, you are responsible for that.
  • Try not to disclose your true identity. After all, you cannot be sued if they don’t know who you are. (John Doe? Jane Doe? Duh!)
  • Ask someone/others to repost your problematic/questioned blog entry. (Make sure you give them a copy.)

That’s all I can think of at the moment.

UPDATE: YugaTech had a blog post that addressed this issue: Is your blog safe from the DOJ?

14
Mar

Bad McAfee Pattern Tags Legit Files as Malware

Last Friday, McAfee released DAT pattern 4715. Later, users of McAfee antivirus products reported that some of their files were deleted/quarantined by the McAfee product. Some of the files deleted/quarantined include EXCEL.EXE (which is the main executable file of Microsoft Excel).

If you are a McAfee user and your current DAT is 4715, update immediately to the latest DAT file. McAfee has a tool that will recover quarantined files; you may want to use it. McAfee has also provided a list of files (in PDF) that is wrongly tagged by DAT 4715. Here is McAfee’s press release on DAT 4715.

Sources:

13
Mar

What gives, Noli?

Is Noli de Castro beginning to distance himself from Gloria Arroyo? Or is it another good-cop, bad-cop routine on the part of the Fortress by the Pasig?

In the past few days, de Castro issued several statements, one of which called for the lifting of Proclamation 1017. Then, he asked Arroyo to face the Hello Garci issue squarely, which was rejected by Minister of Propaganda Ignacio Bunye.

Has he realized that Arroyo is showing her true colors to him? Or he is acting in behalf of his political backers? Or is he a Trojan horse all along?

12
Mar

The People of the Lie

I am currently rereading M. Scott Peck’s The People of the Lie, and here are some thoughts that make an impact and apply to the current situation:

There is another reaction that the evil frequently engender in us: confusion. Describing an encounter with an evil person, one woman wrote, it was “as if I’d suddenly lost my ability to think”. Once again, this reaction is quite appropriate. Lies confuse. The evil are the ‘people of the lie’, deceiving others as they also build layer upon layer of self-deception. (p. 74)

If evil people cannot be defined by the illegality of their deeds or the magnitude of their sins, the how are we to define them? The answer is by the consistency of their sins. While usually subtle, their destructiveness is remarkably consistent. This is because those who have ‘crossed over the line’ are characterized by their absolute refusal to tolerate the sense of their own sinfulness. (p.79)

A predominant characteristic, however, of the behaviour of those I call evil is scapegoating. Because in their hearts they consider themselves above reproach, they must lash out at anyone who does reproach them. They sacrifice others to preserve their self-image of perfection…..

Scapegoating works through a mechanism psychiatrists call projection. Since the evil, deep down, feel themselves to be faultless, it is inevitable that when they are in conflict with the world they will invariably perceive the conflict as the world’s fault. Since they must deny their own badness, they must perceive others as bad. They project their own evil onto the world.

Evil, then, is most often committed in order to scapegoat, and the people I label as evil are chronic scapegoaters..In other words, the evil attack others instead of facing their own failures. (p. 82)

Some things to think about. When I finish reading the book, I might post an entry on how the thoughts expressed by Scott Peck apply to the situation we are in now. Here are some ideas:

  • Some episodes of those epistolary battles (what MLQ3 calls the battle of the epistles) are pure scapegoating.
  • Gloria Arroyo is projecting her faults at her critics and detractors.
  • Some of those who chose to be apathetic or be in the sidelines are confused; they cannot separate the truth from the lies. Which, for me, is evil in itself. I might elaborate on this if my brain gets some exercise.
11
Mar

The Money Train that is a Botnet

How easy is it for a newbie to set up his own botnet?

A botnet is a jargon term for a collection of software robots, or bots, which run autonomously. It is used by malicious users to gain control over remote computers, and use these computers for various purposes, like delivering adware for commission, or performing denial of service (DoS) attacks. A user controls these bots using a command and control infrastructure, most notably via Internet Relay Chat (IRC); IRC bots are most common.

To answer the question: very easy. All a knowledgeable user has to do is to download source code from somewhere, make few modifications, and he is set to go! Script kiddies do this all the time, especially if there are new software vulnerabilities to exploit. (More on vulnerability exploits and zero-day exploits in a separate blog post.)

In an interview with a certain hacker, Brian Krebs concluded that script kiddies no longer hack for fun (like defacing Web sites, though some still do); they do so for profit:

the chief distinguishing feature of this generation being that instead of using Web site flaws to deface as many Web sites as possible, these guys are breaking into thousands of home and work PCs and taking them for a virtual joyride, often times all the way to the bank.

The most daring makes sure his actions are known; but those who wanted to earn a profit are more dangerous, since they will try their best to remain hidden. That’s why some bots use rootkits to avoid detection. And why derail the money train?

11
Mar

A Society of Mediocrity

We Filipinos tend to settle for the mediocre; this is best exemplified by the phrase “Pwede na yan” (that would be Ok). This characteristic was again reinforced when I sat down as a member of the panel that checked on software projects of several students.

When I am about to begin expressing my sadness over the mediocrity of a project, I ask the students to sing the first two lines of that James Ingram staple, Just Once:

I did my best,
But I guess my best wasn’t good enough

And after singing, their eyesights go to the floor. I have made my point.

Then I begin my comments, from asking probing questions to exposing false arguments and glaring mistakes. I appear angry, but deep inside I feel so frustrated and sad for them. For most of them did good software projects, but they tend to do shortcuts, thus making the entire process suspect. They had the right idea, but they always fail to express them. Even if you ask them leading questions, you’ll get unsatisfying answers. Obviously, they did not prepare well; some of them crammed (who didn’t, anyway?).

One time I asked a student why did they made the project; the answer didn’t shocked me. He said that he made the project to comply with the requirements for graduation. I always ask that question; never in four years being in the academe that I have heard a student answered “To excel”.

To excel. To do your best. When I was a teacher, I never fail to exhort my students to do well, for that value is highly prized in the workplace, and it will do you wonders. I tell them to never settle for 100%; if they think they have reached 100%, I tell them to aim for 101%. I tried to instill in them the passion for never settling for anything less than what their talents and skills can achieve. I always feel heartbroken to see a student fail to realize the potentials that he has.

The culture of mediocrity that hovers over us is palpable. We are always criticized for settling for the mediocre, from the work that we turn in to the leaders that we elect. We abhor quality audits and quality monitoring for it exposes our weaknesses, our laziness, our mediocrity syndrome. We enjoy watching love stories being repeated in variation ad nauseam in the television. The evidence is there, loads of them.

I have a theory why we had turned out this way. I think Jose Rizal had already touched on this issue. I think it was because we don’t live in a society that values merit over relationships. We had all have experienced, in one way or another, how a deserving person was bypassed for promotion because that person had not enough connections. We had seen a student self-destructed because his performance was not recognized, in contrast to what happened to the teacher’s pet. Why aspire for the best when it will not be rewarded anyway?

No wonder we are a society of mediocrity.

It is time we end this senselessness. It’s time we value merit as we value relationships. It’s time we tell our students that effort is not enough. It’s time to tell our leaders that we want transparency and good government. It’s time that we ask our actors to be actors and not hearthrobs. It’s time that we tell ourselves “Di na pwede ang pwede na” (It’s not OK to settle for less).

When was the last time you worked on something and did the best that you can? Isn’t it about time to do so again?