Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Microsoft Security Firefox Google Internet Explorer Software The Internet News

New Malware Imitates Browser Warning Pages 143

Jake writes with this excerpt from Ars: "Microsoft is warning about a new piece of malware, Rogue:MSIL/Zeven, that auto-detects a user's browser and then imitates the relevant malware warning pages from Internet Explorer, Firefox, or Chrome. The fake warning pages are very similar to the real thing; you have to look closely to realize they aren't the real thing. The ploy is a basic social engineering scheme, but in this case the malware authors are relying on the user's trust in their browser, a tactic that hasn't been seen before. Beyond the warning pages, the actual malware looks like the real deal: it allows you to scan files, tells you when you're behind on your updates, and enables you to change your security and privacy settings. Performing a scan results in the product finding malicious files, but of course it cannot delete them unless you update, which requires paying for the full version. Attempting to buy the product will open an HTML window that provides a useless 'Safe Browsing Mode' with high-strength encryption. To top it all off, the rogue antivirus webpage looks awfully similar to the Microsoft Security Essentials webpage; even the awards received by MSE and a link to the Microsoft Malware Protection Center have been copied."
This discussion has been archived. No new comments can be posted.

New Malware Imitates Browser Warning Pages

Comments Filter:
  • Possible solution (Score:4, Interesting)

    by OnePumpChump ( 1560417 ) on Friday September 03, 2010 @01:03PM (#33466412)
    The first time the browser is used, create a security image like bank websites use. Store that image or the word used to generate it someplace where the malware will presumably not be able to access it.
  • by ackthpt ( 218170 ) on Friday September 03, 2010 @01:21PM (#33466618) Homepage Journal

    Firefox will have it fixed within hours.
    Chrome will have it fixed within days.
    Microsoft will issue a patch with in months.

  • Re:Bit of Advice (Score:2, Interesting)

    by RJHelms ( 1554807 ) on Friday September 03, 2010 @01:38PM (#33466820)

    I was going to post exactly this. The sample Google Chrome image in the article is immediately obvious as a fake because real Chrome warning pages have proper subject-verb agreement and don't have character encoding images. I imagine Firefox warning pages don't have the two buttons overlapping.

    I'm really forced to wonder this about a lot of malware and phishing scams - I somewhat frequently get e-mails telling me I won an "iPhone-4G" on "Facebooks", how hard it is to get those right?

    At the same time, I think you hit on exactly why they don't bother with this. The bottom side of the intelligence bell curve is still half of the people who will see the page, and they are the same people who are more likely to fall for it even when there are no errors with the English. I imagine it simply doesn't pay to shell out any amount of money for proofreading.

  • by tepples ( 727027 ) <tepples.gmail@com> on Friday September 03, 2010 @01:41PM (#33466864) Homepage Journal

    The biggest security hole is Microsoft's version of the javascript interpreter.

    IE 9 will not use Windows Script Host's JavaScript interpreter. I predict that this change will make it easier for Microsoft to maintain the integrity of the sandbox.

  • Re:Not new... (Score:2, Interesting)

    by _133MHz ( 1556101 ) on Friday September 03, 2010 @01:54PM (#33467086)
    Another way to make these really obvious is to use your operating system with any language other than English. Malware writers don't bother with localization, so their fake error messages always display in English regardless of your actual OS language. Even the USB autorun viruses are dead easy to spot, you know something's fishy when there's a lonely English menu option in the Autorun dialog, usually "Open folder to view files" while the rest aren't.

    Amazingly, most people still click on the damned things.
  • by ideonexus ( 1257332 ) * on Friday September 03, 2010 @02:15PM (#33467392) Homepage Journal
    What offends me most about these malware tactics is that I'm savvy enough to recognize the spoof, but the low income kids and old people in my neighborhood aren't. I know not to click on anything that pops up in my browser when I'm surfing, but every week I get people on my porch needing help cleaning out their infected systems, which I do and they get infected again within a week. How can these malware authors take pride in preventing little kids and old people access to the Internet or their software? Where's the sport? What pathetic losers.
  • Seen it (Score:2, Interesting)

    by ReederDa ( 1874738 ) on Friday September 03, 2010 @02:38PM (#33467820)
    I've actually seen this malware in action. If you're infected and it decides to start running, there's not really much you can do. Disables the task manager as well. Library computers are most at risk.
  • Re:Themes (Score:4, Interesting)

    by bheer ( 633842 ) <rbheer AT gmail DOT com> on Friday September 03, 2010 @04:34PM (#33469548)

    I don't understand; how does theming your window manager help against this? [microsoft.com] I'm assuming the malware bit is *inside* the Google Chrome window, so even if you themed your windows with say a Pikachu theme, the *insides* of the Chrome window would still contain the rogue site, imitating Chrome's red and white-colored malware block UI.

    The only way out of this is if crucial error pages are protected with some sort of "sign-in seal", like Yahoo uses for its login screens.

     

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...