Whaling in Singapore?

Singapore appears to be the source of a virus cleverly designed to hoodwink U.S. executives by appearing to be an emailed subpoena which mentions them by name, as well as their title.

The SANS Storm Center said three days ago that

We’ve gotten a few reports that some CEOs have received what purports to be a federal subpoena via e-mail ordering their testimony in a case. It then asks them to click a link and download the case history and associated information.

One problem, it’s total bogus. It’s a “click-the-link-for-malware” typical spammer stunt. So, first and foremost, don’t click on such links. An interesting component of this scam was that it did properly identify the CEO and send it to his e-mail directly. It’s very highly targeted that way.

The report says that the server that the trojan reports back to is “hard-coded to an ISP in Singapore at this time,” from where, according to Ars Technica, it “steals copies of any security certificates installed on the system.”

(This, by the way, is calling whaling, since it is like phishing but is more targeted, and going for bigger phish, so to speak.)

The Inquirer says that the web servers delivering the emails are based in China, and, in language too loose to take seriously, “the cyber ruffians who later nefariously take control of the victims’ computers, based in Singapore.”

There’s no evidence the “cyber ruffians” are based in Singapore, as far as I can work out. The only possible connection could be the English and errors in the emails, which, John Markoff of the NYT reports, “led several researchers to believe that the attackers were not familiar with the United States court system and that the group might be based in a place that used a British variant of English, such as Hong Kong.”

That said, just because an ISP may have been compromised doesn’t mean that those involved are physically located in Singapore. Indeed, it would seem very unlikely they are; if they’re smart enough to launch an attack like this, you’d have to bet against them being anywhere near the ‘command and control’ center itself.

Still, it’s unsettling that an ISP may have been compromised. So far we don’t know much more, though I’ve put in requests for more information. (The source of the information about Singapore appears to have come from someone at Verisign, whose Asian PR address bounces. So don’t expect something anytime soon.)

Anti-virus Vendor, Er, Hacked. Serves Up, Er, Viruses

The Japanese arm of antivirus vendor Trend Micro has announced its website had been hacked and its pages modified to service up viruses. In other words, if someone had visited their website chances are they’d have picked up a virus.

Not the sort of thing you expect from an antivirus manufacturer, and they’re not being very forthcoming about it, either. While the company has announced that some of their website pages are found to be modified from March 9th to 12th, this is so far only in Japanese, according to asiajin. And that was yesterday. Nothing on their U.S. website yet.

Gen Kanai suggests it was because the company is using Windows 2000, and rips into TrendMicro both for the length of the breach and the lack of transparency: “If a security services/software firm can’t keep their own web servers secured, and left their own hacked website up for 3 days, there’s no logical reason to expect that their own security services are any better.”

Not very reassuring. I’ve often recommended HouseCall but until this is sorted out and Trend Micro comes clean about this, I’m steering clear.

Update: Blasting the Worm

 From the guys at Security Magazine, an update on the Blaster worm, or LovSan, as they call it:
  • Malware writers have spawned multiple variants of the Lovsan worm, the most dangerous of which installs a remote-access Trojan on infected systems.
  • LovSan “is similar in magnitude to Code Red and Nimda, but its ramifications are much greater because it targets a wide range of
    Microsoft OSes instead of just Web servers,” says Forrester analyst Michael Rasmussen.
  • “Pretty much the entire world will have to run the update to Windows XP and 2000,” said David Perry, global director of education for antivirus software vendor Trend Micro. “I think it will take a year or more to get the word out to people.”
  • Computer Economics estimates that Lovsan.A has already caused $500 million globally and $100 million in the U.S. in damages and lost productivity.