InterviewSolution
| 1. |
Solve : Seems as though Firefox is now being targeted by phishers? |
|
Answer» Just sharing this here to bring to the attention of all. I suspect the attachment has a payload to it to infect Firefox or the system as a whole, notice the URL and patch are not from Mozilla but instead eekumyoutube ( dot ) org. I was at Wowhead looking up a Reins of the swift Spectral Tiger Mount when all of a sudden one of the ads in the corner of wowhead took over and brought me to what you see in this screenshot. This is the first time ever i have seen Firefox targeted to try to trick someone into running a so called "patch". System I am on has no infections. AVG is clean and Malwarebytes shows clean to, so thats why I am thinking there is a rogue ad associated with wowheads website that trying to get people to click and infect themselves if on firefox. Perhaps this phishing is using the browser detection script in which depending on browser they have a number of different payloads to infect you with. In one case the user had even used their own personal E-mail, (connected to paypal, amazon, Steam, Facebook, etc.) so I went ahead and E-mailed his family members from his account confessing some rather questionable feelings. Laughing so hard, but yes in order to authenticate the info would be in the source. Shaking my head why they didnt just use an alias to stay hidden. Although to have an alias paypal I suppose they would have had to have had a stolen identity or some means of creating a alias that appears to be a real person with the rabbit hole going deeper into someone opening an account with a bank with fake id / stolen identity etc. Does .Net hide better against antimalware and antivirus's? Maybe I'm wrong, but I thought the basis of .Net was to make for better healthier programs that wont BSOD systems etc. Memory managements and tighter execution layer controls etc. So I always thought that if you want to make a program that is going to be naughty it was best to code it up in something that wasnt based around .Net that more readily would allow for you to target memory addresses outside of where the program should be operating etc and overflow conditions etc.Quote from: DaveLembke on July 05, 2016, 01:40:29 PM Laughing so hard, but yes in order to authenticate the info would be in the source. Shaking my head why they didnt just use an alias to stay hidden. Although to have an alias paypal I suppose they would have had to have had a stolen identity or some means of creating a alias that appears to be a real person with the rabbit hole going deeper into someone opening an account with a bank with fake id / stolen identity etc. For the most part they seem to be teenagers. I'm not certain what their goals are but in terms of Minecraft they were just trying to steal username/passwords. I don't know how those are valuable given that they can just be password reset and the MC username/password doesn't give access to the connected E-mail (or even let you know what that e-mail is). Quote Does .Net hide better against antimalware and antivirus's?The .net framework includes a lot of LIBRARY functions for features such as encryption. Typically the .NET program will have an encrypted resource which it decrypts, saves as an executable, and runs. Sometimes that inner executable is a straight-up RAT but other times it's another .NET program with the actual payload (eg. trying to read a password file and E-mail it). Quote Maybe I'm wrong, but I thought the basis of .Net was to make for better healthier programs that wont BSOD systems etc. Memory managements and tighter execution layer controls etc. So I always thought that if you want to make a program that is going to be naughty it was best to code it up in something that wasnt based around .Net that more readily would allow for you to target memory addresses outside of where the program should be operating etc and overflow conditions etc.Only driver software can BSOD. Running a .NET Executable doesn't "sandbox" it in any way beyond what would happen for a typical executable. unsafe{} and unchecked{} code blocks can be used to run C# code that uses pointers, pointer arithmetic, unbounded arithmetic operations, unchecked array access, etc. Win32 processes cannot access memory outside of their virtual address space- only driver software can access physical memory directly in that manner. Those abilities don't really matter except for exploits. If you run an executable it can read any file accessible to your user account which will include things like saved passwords for databases, Internet Explorer, Firefox profiles, Outlook, etc. and it can send an E-mail with that info if it wants. (Software firewall might see the E-mail I suppose). |
|