Page 1 of 2 12 LastLast
Results 1 to 16 of 22

Thread: Do people just run anything they get emailed?

  1. #1
    Seething Cauldron of Hatred TheAnimus's Avatar
    Join Date
    Aug 2005
    Posts
    17,168
    Thanks
    803
    Thanked
    2,152 times in 1,408 posts

    Do people just run anything they get emailed?

    So a mate of mine was infuriated to find out a client he supports had run a executable they had been emailed..... However this particular one takes advantage of the fact you don't need admin privs to piss off the user.

    The lady in question was using her home laptop for work, so had no backups when:
    http://arstechnica.com/security/2013...0-in-bitcoins/

    struck.

    It's a crypto-ransom-thing. Basically a $300 mistake, as all your document files (that you have write access too) become encrypted, the only way to get the access is to pay the ransom. Or you know, use the backup plan you have which of course involves cold versions right? Right?!

    The main thing here is because it doesn't install itself in any dodgy ways, it doesn't trigger UAC, after-all your restricted user can write the document files you work on....

    Well we figured we should do a little audit, I made a quick dummy virus, basically it looped:

    And pressing CTRL+ALT+DELETE would be enough to stop it.

    Turns out my farther had it up on screen for 25 min, before rebooting the PC. He then proceeded to run the same phising email again. ergh.
    throw new ArgumentException (String, String, Exception)

  2. #2
    Account closed at user request
    Join Date
    Aug 2003
    Location
    Elephant watch camp
    Posts
    2,150
    Thanks
    56
    Thanked
    115 times in 103 posts
    • wasabi's system
      • Motherboard:
      • MSI B85M-G43
      • CPU:
      • i3-4130
      • Memory:
      • 8 gig DDR3 Crucial Rendition 1333 - cheap!
      • Storage:
      • 128 gig Agility 3, 240GB Corsair Force 3
      • Graphics card(s):
      • Zotac GTX 750Ti
      • PSU:
      • Silver Power SP-S460FL
      • Case:
      • Lian Li T60 testbanch
      • Operating System:
      • Win7 64bit
      • Monitor(s):
      • First F301GD Live
      • Internet:
      • Virgin cable 100 meg

    Re: Do people just run anything they get emailed?

    Email .exes are a pain. Even bigger are email .zips, Most places I've worked we've blocked them as they might contain an .exe. This causes an ongoing trench war with irritated users.

    But yes, a very large percentage of users will just run them. Even if they don't know the sender and the filename on the exe is blatantly suspicious.

    I'm beginning to think whitelisting executables for end users is the way forward, although I only principle hate the walled garden approach.

  3. #3
    HEXUS.social member
    Join Date
    Feb 2006
    Posts
    2,562
    Thanks
    102
    Thanked
    320 times in 213 posts

    Re: Do people just run anything they get emailed?

    Also, don't leave your computer unlocked when TheAnimus is around...

    Can't remember whose computer it was that got "Hoffed" at a LAN once.

  4. #4
    Seething Cauldron of Hatred TheAnimus's Avatar
    Join Date
    Aug 2005
    Posts
    17,168
    Thanks
    803
    Thanked
    2,152 times in 1,408 posts

    Re: Do people just run anything they get emailed?

    oooh I should set it as their wallpaper... What, What!
    throw new ArgumentException (String, String, Exception)

  5. #5
    The late but legendary peterb - Onward and Upward peterb's Avatar
    Join Date
    Aug 2005
    Location
    Looking down & checking on swearing
    Posts
    19,378
    Thanks
    2,892
    Thanked
    3,403 times in 2,693 posts

    Re: Do people just run anything they get emailed?

    Worse are the xxxx.pdf............................................................................................ .................................................................................................... .........exe

    files - the exe is usually hidden by most e mail clients, so the user opens what they think is a pdf file - but is an exe.

    I had a new twist today - purportedly from dropbox telling me my password had expired.

    If I am uncertain about an e mail, I usually examine it on a linux machine, in a directory that doesn't have execute privileges - some measure of protection.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  6. #6
    OilSheikh
    Guest

    Re: Do people just run anything they get emailed?

    Did your client pay the $300 ransom ?

  7. #7
    Registered+
    Join Date
    Feb 2013
    Posts
    32
    Thanks
    1
    Thanked
    1 time in 1 post

    Re: Do people just run anything they get emailed?

    NOD32 should be made mandatory.

  8. #8
    Seething Cauldron of Hatred TheAnimus's Avatar
    Join Date
    Aug 2005
    Posts
    17,168
    Thanks
    803
    Thanked
    2,152 times in 1,408 posts

    Re: Do people just run anything they get emailed?

    Quote Originally Posted by OilSheikh View Post
    Did your client pay the $300 ransom ?
    Not my client. A buddies'

    Quote Originally Posted by noodles2k View Post
    NOD32 should be made mandatory.
    That wouldn't have helped, it was at least 2+ days before most anti-virus vendors updated their profiles to detect it.
    throw new ArgumentException (String, String, Exception)

  9. #9
    Seething Cauldron of Hatred TheAnimus's Avatar
    Join Date
    Aug 2005
    Posts
    17,168
    Thanks
    803
    Thanked
    2,152 times in 1,408 posts

    Re: Do people just run anything they get emailed?

    Quote Originally Posted by peterb View Post
    If I am uncertain about an e mail, I usually examine it on a linux machine, in a directory that doesn't have execute privileges - some measure of protection.
    No. Use a VM or something easily wipeable.

    There is absolutely no technical reason why this kind of attack wouldn't work on most linux distributions, some vectors included packing the executable in text documents n such.

    The main issue is that this attack works in user mode. Most users have write privilege to the files they are working on, all you need is a mechanism to trick the user. A drive by user mode exploit in a web browser is also kinda common.
    throw new ArgumentException (String, String, Exception)

  10. #10
    Account closed at user request
    Join Date
    Aug 2003
    Location
    Elephant watch camp
    Posts
    2,150
    Thanks
    56
    Thanked
    115 times in 103 posts
    • wasabi's system
      • Motherboard:
      • MSI B85M-G43
      • CPU:
      • i3-4130
      • Memory:
      • 8 gig DDR3 Crucial Rendition 1333 - cheap!
      • Storage:
      • 128 gig Agility 3, 240GB Corsair Force 3
      • Graphics card(s):
      • Zotac GTX 750Ti
      • PSU:
      • Silver Power SP-S460FL
      • Case:
      • Lian Li T60 testbanch
      • Operating System:
      • Win7 64bit
      • Monitor(s):
      • First F301GD Live
      • Internet:
      • Virgin cable 100 meg

    Re: Do people just run anything they get emailed?

    Quote Originally Posted by TheAnimus View Post

    The main issue is that this attack works in user mode. Most users have write privilege to the files they are working on, all you need is a mechanism to trick the user
    Like Google Chrome installs you mean?

  11. #11
    Senior Member
    Join Date
    Jul 2009
    Location
    West Sussex
    Posts
    1,721
    Thanks
    197
    Thanked
    243 times in 223 posts
    • kompukare's system
      • Motherboard:
      • Asus P8Z77-V LX
      • CPU:
      • Intel i5-3570K
      • Memory:
      • 4 x 8GB DDR3
      • Storage:
      • Samsung 850 EVo 500GB | Corsair MP510 960GB | 2 x WD 4TB spinners
      • Graphics card(s):
      • Sappihre R7 260X 1GB (sic)
      • PSU:
      • Antec 650 Gold TruePower (Seasonic)
      • Case:
      • Aerocool DS 200 (silenced, 53.6 litres)l)
      • Operating System:
      • Windows 10-64
      • Monitor(s):
      • 2 x ViewSonic 27" 1440p

    Re: Do people just run anything they get emailed?

    CryptLocker is possibly the most scary virus yet*. Lots of small business who though they had backups (but who really only had multiple copies spread over various drives and shares) are going to get into serious trouble with this.

    I know, if their business depends on their files they really should have proper backups with revisions, but the fact is lots of places do not and this will really bring that fact out.

    The old "Look at Celebrity.JPG.EXE" trick has been around for ages though and I think we can pretty much blame Microsoft for that one. In their quest to make Windows easier, they introduced that feature (Windows XP or was it even 98?. Unlike on the mac with its embedded filetypes that didn't really work. And since people still have at least a vague idea about file extensions (hence the ".JPG" bit) this has been happening ever since.

    *The other would be (so far mostly proof of concepts) BIOS rootkits. But I guess, the exploit the concept ones used was mainly piggybacking off the actual BIOS (can't remember the vendor) and UEFI should have put a stop to that.

  12. #12
    The late but legendary peterb - Onward and Upward peterb's Avatar
    Join Date
    Aug 2005
    Location
    Looking down & checking on swearing
    Posts
    19,378
    Thanks
    2,892
    Thanked
    3,403 times in 2,693 posts

    Re: Do people just run anything they get emailed?

    Quote Originally Posted by TheAnimus View Post
    No. Use a VM or something easily wipeable.

    There is absolutely no technical reason why this kind of attack wouldn't work on most linux distributions, some vectors included packing the executable in text documents n such.

    The main issue is that this attack works in user mode. Most users have write privilege to the files they are working on, all you need is a mechanism to trick the user. A drive by user mode exploit in a web browser is also kinda common.
    I said examine - not run - and if the execute bit isn't set on the file, linux won't run it - and while the attack is possible on a linucx machine, it is unlikely that an attack written for windows would run on linux. (I meant file rather than directory)

    But I'd agree that a VM or live disk would be even safer.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  13. #13
    HEXUS.social member Agent's Avatar
    Join Date
    Jul 2003
    Location
    Internet
    Posts
    19,185
    Thanks
    739
    Thanked
    1,614 times in 1,050 posts

    Re: Do people just run anything they get emailed?

    I just block attachments on the parents machine. Any images and such I need to send just get uploaded somewhere and linked.

    It doesn't stop a standard hyperlink attack, but these seem to be filtered out very quickly now by AV and browsers blocking the URL.
    Quote Originally Posted by Saracen View Post
    And by trying to force me to like small pants, they've alienated me.

  14. #14
    Registered+
    Join Date
    Feb 2013
    Posts
    32
    Thanks
    1
    Thanked
    1 time in 1 post

    Re: Do people just run anything they get emailed?

    I knew there was a good reason for XP Mode!

    Quote Originally Posted by TheAnimus View Post
    That wouldn't have helped, it was at least 2+ days before most anti-virus vendors updated their profiles to detect it.
    Eset are usually pretty quick, they added the signature on the 7th September. When'd this happen?

  15. #15
    Account closed at user request
    Join Date
    Aug 2003
    Location
    Elephant watch camp
    Posts
    2,150
    Thanks
    56
    Thanked
    115 times in 103 posts
    • wasabi's system
      • Motherboard:
      • MSI B85M-G43
      • CPU:
      • i3-4130
      • Memory:
      • 8 gig DDR3 Crucial Rendition 1333 - cheap!
      • Storage:
      • 128 gig Agility 3, 240GB Corsair Force 3
      • Graphics card(s):
      • Zotac GTX 750Ti
      • PSU:
      • Silver Power SP-S460FL
      • Case:
      • Lian Li T60 testbanch
      • Operating System:
      • Win7 64bit
      • Monitor(s):
      • First F301GD Live
      • Internet:
      • Virgin cable 100 meg

    Re: Do people just run anything they get emailed?

    Quote Originally Posted by peterb View Post
    I said examine - not run - and if the execute bit isn't set on the file, linux won't run it - and while the attack is possible on a linucx machine, it is unlikely that an attack written for windows would run on linux. (I meant file rather than directory)

    But I'd agree that a VM or live disk would be even safer.
    This kind of attack isn't for people like you. It is for people who will seriously read through an email purported to be from Barclays even though they don't have an account with Barclays.

  16. #16
    Mostly Me Lucio's Avatar
    Join Date
    Mar 2007
    Location
    Tring
    Posts
    5,163
    Thanks
    443
    Thanked
    448 times in 351 posts
    • Lucio's system
      • Motherboard:
      • Gigabyte GA-970A-UD3P
      • CPU:
      • AMD FX-6350 with Cooler Master Seldon 240
      • Memory:
      • 2x4GB Corsair DDR3 Vengeance
      • Storage:
      • 128GB Toshiba, 2.5" SSD, 1TB WD Blue WD10EZEX, 500GB Seagate Baracuda 7200.11
      • Graphics card(s):
      • Sapphire R9 270X 4GB
      • PSU:
      • 600W Silverstone Strider SST-ST60F
      • Case:
      • Cooler Master HAF XB
      • Operating System:
      • Windows 8.1 64Bit
      • Monitor(s):
      • Samsung 2032BW, 1680 x 1050
      • Internet:
      • 16Mb Plusnet

    Re: Do people just run anything they get emailed?

    We've had a spate of those infections at work, what makes that virus particularly nasty is the presence of shared folders and it targeting DBF files, taking out an entire company via one employee making a mistake.


    I'm interested in people's opinions on this thought, should someone get fired for being stupid enough to click on a virus attachment? After all, the cost of the action could run to tens of thousands of pounds in a small company, and for those improperly prepared, actually take the company out of business.

    (\___/) (\___/) (\___/) (\___/) (\___/) (\___/) (\___/)
    (='.'=) (='.'=) (='.'=) (='.'=) (='.'=) (='.'=) (='.'=)
    (")_(") (")_(") (")_(") (")_(") (")_(") (")_(") (")_(")


    This is bunny and friends. He is fed up waiting for everyone to help him out, and decided to help himself instead!

Page 1 of 2 12 LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •