<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Andreas Baumhof &#187; Uncategorized</title>
	<atom:link href="http://www.tidos-group.com/blog/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.tidos-group.com/blog</link>
	<description>malware research, IT Security and life in general :-)</description>
	<lastBuildDate>Mon, 16 Nov 2020 18:25:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.9.40</generator>
	<item>
		<title>eBay user list confirmed non-legit</title>
		<link>http://www.tidos-group.com/blog/2014/05/23/ebay-user-list-confirmed-non-legit/</link>
		<comments>http://www.tidos-group.com/blog/2014/05/23/ebay-user-list-confirmed-non-legit/#comments</comments>
		<pubDate>Fri, 23 May 2014 00:34:24 +0000</pubDate>
		<dc:creator><![CDATA[abaumhof]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.tidos-group.com/blog/?p=546</guid>
		<description><![CDATA[What we suspected, turned out to be true&#8230; Ebay confirmed that the data is not legitimate. This is now also confirmed if you look at the data. We looked at is this email address associated with an ebay account? (worringly, one can easily check this at the ebay site) is this email address known in https://shouldichangemypassword.com/ [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>What we suspected, turned out to be true&#8230; Ebay confirmed that the data is <a href="http://www.marketwatch.com/story/ebay-says-reported-lists-of-hacked-accounts-not-legitimate-2014-05-22?siteid=rss&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A%20marketwatch%2Fmarketpulse%20(MarketWatch.com%20-%20MarketPulse)">not legitimate</a>. This is now also confirmed if you look at the data. We looked at</p>
<ul>
<li>is this email address associated with an ebay account? (worringly, one can easily check this at the ebay site)</li>
<li>is this email address known in https://shouldichangemypassword.com/ ?</li>
</ul>
<p>Out of 12,663 records,</p>
<ul>
<li>only 2,025 emails are registered with eBay and</li>
<li>3,720 emails are known hacked emails according to Should I change my password.</li>
</ul>
<p><a href="http://www.tidos-group.com/blog/wp-content/uploads/2014/05/ebay_emailregistered.png"><img class="aligncenter size-medium wp-image-547" src="http://www.tidos-group.com/blog/wp-content/uploads/2014/05/ebay_emailregistered-300x180.png" alt="ebay_emailregistered" width="300" height="180" /></a> <a href="http://www.tidos-group.com/blog/wp-content/uploads/2014/05/ebay_hackedemail.png"><img class="aligncenter size-medium wp-image-548" src="http://www.tidos-group.com/blog/wp-content/uploads/2014/05/ebay_hackedemail-300x192.png" alt="ebay_hackedemail" width="300" height="192" /></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.tidos-group.com/blog/2014/05/23/ebay-user-list-confirmed-non-legit/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A first look at the eBay user list for sale (unconfirmed whether its legitimate)</title>
		<link>http://www.tidos-group.com/blog/2014/05/22/a-first-look-at-the-ebay-user-list-for-sale-unconfirmed-whether-its-legitimate/</link>
		<comments>http://www.tidos-group.com/blog/2014/05/22/a-first-look-at-the-ebay-user-list-for-sale-unconfirmed-whether-its-legitimate/#comments</comments>
		<pubDate>Thu, 22 May 2014 17:56:20 +0000</pubDate>
		<dc:creator><![CDATA[abaumhof]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.tidos-group.com/blog/?p=542</guid>
		<description><![CDATA[UPDATE: Most likely this list is not legitimate. Too many things don&#8217;t add up. I would have loved to see eBay following good security practices and certainly do hope that this is the case for the &#8220;real&#8221; eBay dump. According to http://pastebin.com/vmvjGw3N, there exists a full ebay user database dump of 145,312,663 records. In order [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>UPDATE: Most likely this list is not legitimate. Too many things don&#8217;t add up. I would have loved to see eBay following good security practices and certainly do hope that this is the case for the &#8220;real&#8221; eBay dump.</p>
<p>According to <a href="http://pastebin.com/vmvjGw3N">http://pastebin.com/vmvjGw3N</a>, there exists a full ebay user database dump of 145,312,663 records.</p>
<p>In order to get the database, you need to send 1.4453 BTC (~ 755.27 USD as per coinbase). So far nobody has done this (https://blockchain.info/address/1e4aLP3jKD9wRAcSRNVb7VHbd7KbcdPfA)</p>
<p>The user provided a sample of 12,663 entries from the APAC region. We’ll look at these in this blog.</p>
<p>WARNING: We have no idea whether these users are really from ebay or whether this all is legitimate. Let’s just assume for a moment that it is.</p>
<p>The entries are like: &lt;&lt;NAME&gt;&gt; |pbkdf2_sha256$12000$&lt;&lt;SALT&gt;&gt;$&lt;&lt;VALUE&gt;&gt;|&lt;&lt;EMAIL&gt;&gt;|&lt;&lt;ADDRESS&gt;&gt;|&lt;&lt;PHONE&gt;&gt;|&lt;&lt;DOB&gt;&gt;</p>
<p>The good news is that the password uses <a href="http://en.wikipedia.org/wiki/PBKDF2">PBKDF2</a> (Password-Based Key Derivation Function 2) with SHA256 as hashing function with a 64 bit salt. That is the standard recommented salt length.</p>
<p>It seems that eBay uses 12,000 iterations for this algorithm. When the standard was written in 2000, the recommended minimum number of iterations was 1000, so this is 12x of that which seems good.</p>
<p>Because of the salt, rainbow tables can’t really used against this, so each password need to be computed individually (the salt per password prevents rainbow tables to be used against all at once).</p>
<p>So overall if this turns out to be legitimate, I think one can honestly say that ebay followed good security practices.</p>
<p>The email, address , phone and date of birth are in there in plain text however.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.tidos-group.com/blog/2014/05/22/a-first-look-at-the-ebay-user-list-for-sale-unconfirmed-whether-its-legitimate/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>browser extensions, a better attack vector than drive-by-downloads?</title>
		<link>http://www.tidos-group.com/blog/2014/01/21/browser-extensions-a-better-attack-vector-than-drive-by-downloads/</link>
		<comments>http://www.tidos-group.com/blog/2014/01/21/browser-extensions-a-better-attack-vector-than-drive-by-downloads/#comments</comments>
		<pubDate>Tue, 21 Jan 2014 19:01:31 +0000</pubDate>
		<dc:creator><![CDATA[abaumhof]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.tidos-group.com/blog/?p=538</guid>
		<description><![CDATA[I came across this blog post (locally cached pdf) a couple of days ago of a developer of a Chrome extension who filled the gap after Google dropped support for the RSS reader. His Chrome extension was popular and gained more than 30,000 users. To cut the long story short, he sold it for a 4 [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I came across <a href="http://www.labnol.org/internet/sold-chrome-extension/28377/">this blog post</a> (locally cached <a href="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/chrome_extension_sold_to_adware.pdf">pdf</a>) a couple of days ago of a developer of a Chrome extension who filled the gap after Google dropped support for the RSS reader. His Chrome extension was popular and gained more than 30,000 users.</p>
<p>To cut the long story short, he sold it for a 4 figure amount to someone who then turn his extension into a adware riddled version and updated all 30,000 users.</p>
<p>That seems to be an awful efficient way of infecting a lot of users for very little money. His chrome extension was “Add to Feedly”.</p>
<p>Unfortunately these things occur more and more often. Another example is <a href="https://chrome.google.com/webstore/detail/tweet-this-page/ppilhaolhbpfembaoedfdbkegfedfgip/reviews">“Tweet this Page”</a> was taken down by Google due to it starting to hijack google searches. Apparently the developer sold it for $500! (from <a href="http://www.cio.com/article/746642/Spammers_Buy_Chrome_Extensions_and_Turn_Them_Into_Adware?taxonomyId=3089"><span style="text-decoration: underline;">here</span></a>)</p>
<p>In both cases, the bad guys talked the authors into selling by making nice claims such as “…they wanted the extension ‘for further development’”.</p>
<p>The funny thing is that Google (who is distributing Chrome) is making around <strong>97%</strong> of its revenue from <a href="http://www.stateofdigital.com/google-make-its-money/">online ads</a>, so it is not surprising that advertising within chrome extensions is neither prohibited nor discouraged.</p>
<p>“&#8230;Injected ads are allowed in Chrome extensions, but Google&#8217;s policy states that which app the ads are coming from must be clearly disclosed to the user, and they cannot interfere with any native ads or the functionality of the website.” (from <a href="http://arstechnica.com/security/2014/01/malware-vendors-buy-chrome-extensions-to-send-adware-filled-updates/?">here</a>)</p>
<p>For malware authors, hijacking legitimate and good extensions is an outstanding business model. First of all, they know exactly how many potential victims they can buy. Secondly, due to auto-updates they can infect these people nicely and thirdly it takes quite a while for google to remove “non-behaving” extensions from the store.</p>
<h2>What is the risk here? or What can a malicious chrome extension do?</h2>
<p>Google has automated screening capabilities that will minimize the distribution of malware through chrome extensions. However we all know that malicious actors have tools available to make sure their software is never be found to be malicious. But then again, launching an executable (malicious or not) in a completely transparent way is not so easy.</p>
<p>The much bigger risk is that the chrome extension has full control of the website content, including all form fields. This could mean that a malicious chrome extension can</p>
<ul>
<li>inject any kind of javascript into the website, effectively providing the same functionality as every sophisticated banking trojan out there. Should we call this Zeus-in-the-Extensions <img src="http://www.tidos-group.com/blog/wp-includes/images/smilies/icon_wink.gif" alt=";-)" class="wp-smiley" /> </li>
<li>sniff any provided input values into form fields. These could be usernames, password, one-time-password, tokens, email addresses, date of birth, SSN and much more.</li>
</ul>
<p>Google has already announced that their extension policy is due to change in June 2014 and the new policy will require extensions to <a href="http://blog.chromium.org/2013/12/keeping-chrome-extensions-simple.html">serve a single purpose</a>. It would never cross my mind that they do this to vastly increase the number of chrome extensions, but surely only to provide a good service to us.</p>
<p>Oh, they also make it easier to use payment options to extensions. I can already see the topic for a future blog post.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.tidos-group.com/blog/2014/01/21/browser-extensions-a-better-attack-vector-than-drive-by-downloads/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Why metadata matters&#8230;</title>
		<link>http://www.tidos-group.com/blog/2014/01/21/why-metadata-matters/</link>
		<comments>http://www.tidos-group.com/blog/2014/01/21/why-metadata-matters/#comments</comments>
		<pubDate>Tue, 21 Jan 2014 18:13:40 +0000</pubDate>
		<dc:creator><![CDATA[abaumhof]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.tidos-group.com/blog/?p=533</guid>
		<description><![CDATA[I know this is all over the web right now in the discussion about NSA and their natural hunger to collect whatever they can get their hands on. I don&#8217;t want to start a discussion on the legality or the ethnics of this, but the following slide from the EFF makes a very good point [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I know this is all over the web right now in the discussion about NSA and their natural hunger to collect whatever they can get their hands on. I don&#8217;t want to start a discussion on the legality or the ethnics of this, but the following slide from the EFF makes a very good point and to preserve it for my own good, here it is <img src="http://www.tidos-group.com/blog/wp-includes/images/smilies/icon_smile.gif" alt=":)" class="wp-smiley" /> </p>
<p><a href="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/metadata-1.jpg"><img class="aligncenter size-medium wp-image-534" alt="metadata-1" src="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/metadata-1-300x225.jpg" width="300" height="225" /></a></p>
<p>see https://www.eff.org/deeplinks/2013/06/why-metadata-matters for more details&#8230;</p>
<p>Also very relevant is the post by Kieran Healy on &#8220;Using Metadata to find Paul Revere&#8221; <a href="http://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/" target="_blank">here</a>. A local copy is available here as <a href="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/metadata-2.pdf">pdf</a>.<a href="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/metadata-2.pdf"><br />
</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.tidos-group.com/blog/2014/01/21/why-metadata-matters/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Example of a &#8220;well-done&#8221; phishing attack</title>
		<link>http://www.tidos-group.com/blog/2014/01/16/example-of-a-well-done-phishing-attack/</link>
		<comments>http://www.tidos-group.com/blog/2014/01/16/example-of-a-well-done-phishing-attack/#comments</comments>
		<pubDate>Thu, 16 Jan 2014 17:49:43 +0000</pubDate>
		<dc:creator><![CDATA[abaumhof]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.tidos-group.com/blog/?p=520</guid>
		<description><![CDATA[So I got the following email this morning in my inbox which made it happily past our gateway based spam filter and my outlook spam filter. The link is a phishing site (even though it is https:// &#8211; however no phishing filters have it in their list (e.g. google, firefox, microsoft, netcraft&#8230;) Clicking on it [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>So I got the following email this morning in my inbox which made it happily past our gateway based spam filter and my outlook spam filter.</p>
<p><a href="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/1.gif"><img class="aligncenter size-medium wp-image-521" alt="1" src="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/1-246x300.gif" width="246" height="300" /></a></p>
<p>The link is a phishing site (even though it is https:// <img src="http://www.tidos-group.com/blog/wp-includes/images/smilies/icon_wink.gif" alt=";-)" class="wp-smiley" />  &#8211; however no phishing filters have it in their list (e.g. google, firefox, microsoft, netcraft&#8230;) Clicking on it gets me here</p>
<p><a href="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/2.jpg"><img class="aligncenter size-medium wp-image-523" alt="2" src="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/2-300x253.jpg" width="300" height="253" /></a></p>
<p>Going through the process, they surely collect the hell of a lot of personal information. They also &#8220;check&#8221; each input values to be correct (e.g. you can&#8217;t continue by entering a non-valid credit card number). Looks really nice and clean.</p>
<p><a href="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/3.jpg"><img class="aligncenter size-medium wp-image-525" alt="3" src="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/3-300x253.jpg" width="300" height="253" /></a></p>
<p><a href="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/4.jpg"><img class="aligncenter size-medium wp-image-526" alt="4" src="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/4-300x253.jpg" width="300" height="253" /></a></p>
<p><a href="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/5jpg.jpg"><img class="aligncenter size-medium wp-image-527" alt="5,jpg" src="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/5jpg-300x253.jpg" width="300" height="253" /></a></p>
<p>And very nicely, they will try to log me into Amex straight away, so if I would have given them my &#8220;real&#8221; credentials, I would have been logged into my account&#8230;</p>
<p><a href="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/7.jpg"><img class="aligncenter size-medium wp-image-528" alt="7" src="http://www.tidos-group.com/blog/wp-content/uploads/2014/01/7-300x253.jpg" width="300" height="253" /></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.tidos-group.com/blog/2014/01/16/example-of-a-well-done-phishing-attack/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Wow what a certificate (verified.cm) &#8211; CA&#8217;s completely broken</title>
		<link>http://www.tidos-group.com/blog/2014/01/14/wow-what-a-certificate-verified-cm-cas-completely-broken/</link>
		<comments>http://www.tidos-group.com/blog/2014/01/14/wow-what-a-certificate-verified-cm-cas-completely-broken/#comments</comments>
		<pubDate>Tue, 14 Jan 2014 17:59:58 +0000</pubDate>
		<dc:creator><![CDATA[abaumhof]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.tidos-group.com/blog/?p=515</guid>
		<description><![CDATA[Looking at recent hacks, I had a quick look at the SSL certificate from verified.cm and who on earth is signing the certificate below? Oh yes&#8230; It is GlobalSign for sure&#8230; If we would need another argument why Certificate Authorities are broken, here it is&#8230; but then again we knew this for so long and they [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Looking at recent hacks, I had a quick look at the SSL certificate from verified.cm and who on earth is signing the certificate below? Oh yes&#8230; It is GlobalSign for sure&#8230; If we would need another argument why Certificate Authorities are broken, here it is&#8230; but then again we knew this for so long and they still exist&#8230;</p>
<p>So the SSL certificate for verified.cm has been issued to ssl2968.cloudflare.com. Cloudflare is of course a well-known cloud-based web firewall that is used by many good and shady sites.</p>
<p>This certificate has the following 40 (in words: <strong>FOURTY</strong>!) Alternative Names. Oh and don&#8217;t worry, it is also valid for 4 more years (until Jan 15, 2018). What could possible go wrong with this?</p>
<p>Did I mention that the domain that it was issued to doesn&#8217;t even resolve (ssl2968.cloudflare.com)?</p>
<p>Here are the fourty Alternative Names:</p>
<ul>
<li>ssl2968.cloudflare.com</li>
<li>*.verified.cm</li>
<li>verified.cm</li>
<li>*.lynnfieldcommons.com</li>
<li>*.seehawaiilive.com</li>
<li>*.seaislandshops.com</li>
<li>bluesafesolutions.com.au</li>
<li>larende.com</li>
<li>*.youractivistportal.com</li>
<li>*.calligraphyofchina.com</li>
<li>seaislandshops.com</li>
<li>*.uvioo.com</li>
<li>snipjournal.com</li>
<li>escortgps.xxx</li>
<li>*.larende.com</li>
<li>seehawaiilive.com</li>
<li>*.snipjournal.com</li>
<li>*.prestomarket.com</li>
<li>*.themeat.dk</li>
<li>*.d2haa.org</li>
<li>cargames.org.uk</li>
<li>d2haa.org</li>
<li>*.templatation.com</li>
<li>*.descansogardens.org</li>
<li>youractivistportal.com</li>
<li>*.bluesafesolutions.com.au</li>
<li>tipple.me</li>
<li>calligraphyofchina.com</li>
<li>*.cargames.org.uk</li>
<li>*.tipple.me</li>
<li>landisgyr.com</li>
<li>prestomarket.org</li>
<li>*.prestomarket.org</li>
<li>uvioo.com</li>
<li>*.escortgps.xxx</li>
<li>templatation.com</li>
<li>prestomarket.com</li>
<li>*.landisgyr.com</li>
<li>lynnfieldcommons.com</li>
<li>descansogardens.org</li>
<li>themeat.dk</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.tidos-group.com/blog/2014/01/14/wow-what-a-certificate-verified-cm-cas-completely-broken/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Another phishing warning that wasn&#8217;t correct</title>
		<link>http://www.tidos-group.com/blog/2013/10/02/another-phishing-warning-that-wasnt-correct/</link>
		<comments>http://www.tidos-group.com/blog/2013/10/02/another-phishing-warning-that-wasnt-correct/#comments</comments>
		<pubDate>Wed, 02 Oct 2013 08:49:52 +0000</pubDate>
		<dc:creator><![CDATA[abaumhof]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.tidos-group.com/blog/?p=511</guid>
		<description><![CDATA[As an update to the last post, I came across a link to www.thisdaylive.com which is a nigerian newspaper. Chrome jumped up and down to alert me that this is a phishing site. To the best of my knowledge this site is clean. Even Google&#8217;s own &#8220;Safe Browsing diagnostics page&#8221; says there are no issues. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>As an update to the last post, I came across a link to www.thisdaylive.com which is a nigerian newspaper.</p>
<p>Chrome jumped up and down to alert me that this is a phishing site.</p>
<p><a href="http://www.tidos-group.com/blog/wp-content/uploads/2013/10/phishing.png"><img class="aligncenter size-medium wp-image-512" alt="phishing" src="http://www.tidos-group.com/blog/wp-content/uploads/2013/10/phishing-300x160.png" width="300" height="160" /></a>To the best of my knowledge this site is clean. Even Google&#8217;s own &#8220;<a href="http://www.google.com/safebrowsing/diagnostic?site=http://www.thisdaylive.com/articles/rising-threat-to-e-banking-and-bank-customers/160444/&amp;amp;output=embed" target="_blank">Safe Browsing diagnostics page</a>&#8221; says there are no issues.</p>
<p>Is it just me or are these things happening more often?</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.tidos-group.com/blog/2013/10/02/another-phishing-warning-that-wasnt-correct/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How I missed doing Research</title>
		<link>http://www.tidos-group.com/blog/2013/09/19/how-i-missed-doing-research/</link>
		<comments>http://www.tidos-group.com/blog/2013/09/19/how-i-missed-doing-research/#comments</comments>
		<pubDate>Thu, 19 Sep 2013 06:08:10 +0000</pubDate>
		<dc:creator><![CDATA[abaumhof]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.tidos-group.com/blog/?p=482</guid>
		<description><![CDATA[I can&#8217;t believe that the last post on this blog was in 2011&#8230; what a ride the last two years almost have been&#8230; I have the best intentions to provide more insights into some of the work that I&#8217;m doing and hope it is interesting / inspiring to someone.]]></description>
				<content:encoded><![CDATA[<p>I can&#8217;t believe that the last post on this blog was in 2011&#8230; what a ride the last two years almost have been&#8230;</p>
<p>I have the best intentions to provide more insights into some of the work that I&#8217;m doing and hope it is interesting / inspiring to someone.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.tidos-group.com/blog/2013/09/19/how-i-missed-doing-research/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Quality Assurance in Trojans (Spyeye)</title>
		<link>http://www.tidos-group.com/blog/2011/06/13/quality-assurance-in-trojans-spyeye/</link>
		<comments>http://www.tidos-group.com/blog/2011/06/13/quality-assurance-in-trojans-spyeye/#comments</comments>
		<pubDate>Mon, 13 Jun 2011 13:26:05 +0000</pubDate>
		<dc:creator><![CDATA[abaumhof]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.tidos-group.com/blog/?p=357</guid>
		<description><![CDATA[In my day-to-day work, I focus quite heavily on the configuration files and the way trojans work in a particular circumstance. Spyeye is obviously one of the trojans that is high on the radar as it is believed that the authors behind Zeus and Spyeye have &#8220;merged&#8221;. This has been supported by findings that Zeus [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>In my day-to-day work, I focus quite heavily on the configuration files and the way trojans work in a particular circumstance.</p>
<p>Spyeye is obviously one of the trojans that is high on the radar as it is believed that the authors behind Zeus and Spyeye have &#8220;merged&#8221;. This has been supported by findings that Zeus and Spyeye trojans can now talk to the same backend system. (All trojans need a C&amp;C server where they report their stolen data to. In this case, the C&amp;C backend can handle data from Zeus and Spyeye).</p>
<p>The Spyeye trojan has a plugin structure that is extensible and makes sure that the trojan can adapt to new situations.</p>
<p>Well known Plugins are:</p>
<ul>
<li>webfakes (alter web content in HTTP and HTTPS requests&#8230; this is to compromise any website)</li>
<li>ddos (denial of service)</li>
<li>ccgrabber (credit card grabber&#8230; scans POST request for credit card numbers (using Luhns algorithm) and steals the info)</li>
<li>backconnect (either via RDP or SOCKS5. provides a means for the fraudster to connect to your computer)</li>
</ul>
<p>But one plugin was new to me</p>
<ul>
<li>bugreport</li>
</ul>
<p>This plugin takes care of any crashes of the Spyeye trojan and more details to the problem will be sent to the fraudster. The fraudster can also define what should happen in this case.</p>
<p>WOW&#8230; A built-in mechanism that allows the perpetrators to collect critical QA information from client systems to help them to make the trojan better? How many commercial software applications do have a similar system?</p>
<p><a href="http://www.tidos-group.com/blog/wp-content/uploads/2011/06/spyeye_crash.png"><img class="alignnone size-medium wp-image-358" title="spyeye_crash" src="http://www.tidos-group.com/blog/wp-content/uploads/2011/06/spyeye_crash-300x162.png" alt="" width="300" height="162" /></a></p>
<p><a href="http://www.tidos-group.com/blog/wp-content/uploads/2011/06/bugs2.png"><img class="alignnone size-medium wp-image-359" title="bugs2" src="http://www.tidos-group.com/blog/wp-content/uploads/2011/06/bugs2-204x300.png" alt="" width="204" height="300" /></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.tidos-group.com/blog/2011/06/13/quality-assurance-in-trojans-spyeye/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Poll: Is this the&#8221; real&#8221; Facebook site? What would you do?</title>
		<link>http://www.tidos-group.com/blog/2011/06/07/poll-is-this-the-real-facebook-site-what-would-you-do/</link>
		<comments>http://www.tidos-group.com/blog/2011/06/07/poll-is-this-the-real-facebook-site-what-would-you-do/#comments</comments>
		<pubDate>Tue, 07 Jun 2011 08:46:09 +0000</pubDate>
		<dc:creator><![CDATA[abaumhof]]></dc:creator>
				<category><![CDATA[Curiosities]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.tidos-group.com/blog/?p=341</guid>
		<description><![CDATA[]]></description>
				<content:encoded><![CDATA[<table border="1">
<tbody>
<tr>
<td>Note: There is a poll embedded within this post, please visit the site to participate in this post's poll.</td>
</tr>
</tbody>
</table>
<p style="text-align: center;"><a href="http://www.tidos-group.com/blog/wp-content/uploads/2011/06/iphone_cert_1.png"><img class="size-medium wp-image-330 aligncenter" title="SSL warning for https://www.facebook.com" src="http://www.tidos-group.com/blog/wp-content/uploads/2011/06/iphone_cert_1-200x300.png" alt="" width="200" height="300" /></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.tidos-group.com/blog/2011/06/07/poll-is-this-the-real-facebook-site-what-would-you-do/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
