Results 1 to 10 of 10

Thread: Gmail, Yahoo and Hotmail’s CAPTCHA Broken

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Unhappy Gmail, Yahoo and Hotmail’s CAPTCHA Broken

    FYI...

    - http://www.websense.com/securitylabs...php?BlogID=174
    Feb 22 2008 - "Websense Security Labs has discovered that Google’s popular web mail service Gmail is being targeted in recent spammer tactics. Spammers in these attacks managed to created bots that are capable of signing up and creating random Gmail accounts for spamming purposes. Websense believes that from the spammers’ perspective, there are four main advantages to this approach. First, signing up for an account with Google allows access to its wide portfolio of services. Second, Google’s domains are unlikely to be blacklisted. Third, they are free to sign up. And fourth, it may be hard to keep track of them as millions of users worldwide are using various Google services on a regular basis... Websense believes that these accounts could be used by spammers at any time for abusing Google’s infrastructure. A wide range of attacks could be possible as the same account credentials can be used to target various services offered by Google... It is observed that at this stage bots (or bot-infected machines) are trying to sign up as many accounts as possible with Gmail mail services. One of the main concerns here is attacking CAPTCHA. Unfortunately, spammers seem to have success with it. The bot is signing up an account feeding all the prerequisites or input data that goes into the signup page and successfully creating a mail account. Considering the normal / routine process involved in signing up a web mail account (Gmail), CAPTCHA authentication is a must for a successful signup. Since a bot is creating an account successfully, it is obvious that CAPTCHA is broken... Unlike Live Mail CAPTCHA breaking*, which involved just one botted host doing the entire job (signing up, filling in details, getting the CAPTCHA request), the Gmail signing process involves two botted hosts (or CAPTCHA breaking hosts)..."
    * http://www.websense.com/securitylabs...php?BlogID=171

    (Screenshots available at both URL's above.)

    Last edited by AplusWebMaster; 2008-02-26 at 01:46.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  2. #2
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  3. #3
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Orkut Scraps Propagating Malicious Code

    FYI...

    Orkut Scraps Propagating Malicious Code
    - http://www.symantec.com/enterprise/s...02/post_7.html
    February 26, 2008 - "...A worm was discovered spreading malicious code through Google’s Orkut service. This isn’t the first worm on Orkut*, and the worm works in a similar manner to its predecessors by using “scraps”- messages considered part of a “scrapbook”. A user receives a scrap from an acquaintance containing a pornographic image that is designed to look like a Flash movie. If the user clicks on the image file, in an attempt to play the “movie”, they are directed to a malicious Web site...
    The scraps are received from known members on the friend’s list, which makes it makes it easier to surpass a user’s suspicions about the legitimacy of the messages. This could also be easily used as a vector for targeted malicious code attacks... Symantec Security Response observed this attack lasting for a couple of hours, and then the malicious URL was redirected to a non-malicious Web page. As we write this we have a few more reports of the same malicious code being served through different domain links."
    * http://www.itsecurity.com/security.h...2f04eda5e3fc7c
    2006-06-17

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  4. #4
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation

    Uh, oh... more:

    Tracking cybercrime leads us to Google
    - http://www.ugnn.com/2008/02/google_caught_denies.html
    Feb 24, 2008 - "After reporting literally hundreds of abuse situations to Google, I've finally come to the conclusion that there's no one there responsible for keeping watch..."
    ...and here: http://www.techsurvivors.net/forums/...hp/t18227.html
    ...and here: http://www.castlecops.com/Downloadab...pam116153.html
    ...and here: http://www.castlecops.com/MaxHerbal_spam120920.html

    ...from here: http://isc.sans.org/diary.html?storyid=4022
    Last Updated: 2008-02-25 23:42:09 UTC

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  5. #5
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Google Orkut Scraps Propagating Malicious Code

    FYI...

    - http://preview.tinyurl.com/2kxkys
    02.29.08 (Symantec Security Response Weblog) - "Due to some confusion with this particular threat, we’ve decided to provide some further details on the Orkut worm we blogged on earlier in the week. The worm, recently renamed to W32.Scrapkut, uses active code injection as a vehicle to propagate to the Orkut friends of its unfortunate victim. Initially, a malicious scrap is posted to the victim’s scrapbook, containing a link to what appears to be a YouTube video. When a victim clicks on the link, they are redirected to an external site which prompts them to download the file “flashx_player_9.8.0.exe”... When executed, flashx_player_9.8.0.exe retrieves the files windosremote.exe, logservicess.exe and win32chekupdate.exe from hxxp: //[REMOVED].ifastnet. com. These files download additional files that perform a variety of malicious actions, but logservices.exe is the main executable for further propagation. Logservices.exe first copies itself as maindwxp.exe to four different locations on the system to ensure it is executed on startup. Maindwxp.exe then checks in with the command and control server via a GET request with specific parameter values... Maindwxp.exe then executes and begins checking for an active browser window, waiting for the victim to visit Orkut. Once the victim is in an authenticated Orkut session, maindwxp.exe injects Javascript code into the active Orkut web session. This Javascript code which is actually based on a popular Greasemonkey script is then executed within the context of the Orkut domain and the user’s authenticated session, resulting in the malicious scrapbook entry being sent to all the victims’ friends, and the cycle begins again..."

    (Screenshots available at the URL above.)

    - http://www.symantec.com/security_res...949-99&tabid=2
    Discovered: February 28, 2008
    Updated: February 29, 2008 4:26:42 AM
    Type: Worm...

    Last edited by AplusWebMaster; 2008-03-01 at 14:31.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  6. #6
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Google - porn invasion on Google Groups

    FYI...

    Hard core porn invasion on Google Groups
    - http://sunbeltblog.blogspot.com/2008...on-google.html
    March 02, 2008 - "We’ve just started seeing a hard-core porn invasion on Google Groups. So far, we have identified approximately 270 Google Groups pages with this porn... These pages push other porn pages for profit. While not all of the redirects go to malware sites, we did observe some redirects to a site which ultimately pushes a fake codec trojan, which if installed, results in a VirusHeat infection... We have alerted Google to the presence of these pages."

    (Screenshots available at the URL above [offensive content has been obfuscated].)

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •