McAfee(R) AVERT Research Expert Discusses Malicious Media Files at Virus Bulletin 2004

WHAT:      Marius van Oers, anti-virus research engineer with McAfee AVERT (Anti-virus and Vulnerability Emergency Response Team) at McAfee, Inc. will discuss malware in a presentation titled, “Malicious Media Files – ASF Scripting.” As part of the presentation, van Oers will teach IT administrators and virus researchers about the .ASF file structure and the possible security issues related to it.

WHEN:      Thursday, Sept. 30, 2004 from 2:40 PM – 3:20 PM Eastern Time at the Fairmont Chicago, Chicago, Illinois

WHERE:     For more information and to register, please visit:

JPEG exploit could beat antivirus software

Antivirus software could be ill-prepared to protect corporate networks from the latest Windows vulnerability–innocent-looking JPEG files that contain security attacks.

According to Mikko Hypponen, director of antivirus research for F-Secure, antivirus software will strain to find JPEG malware because by default it only searches for .exe files.

“Normal antivirus software by default will not detect JPEGs,” Hypponen said. “You can set your antivirus scanner to look for JPEG, but the trouble is that you can change the file extension on a JPEG to so many things.”

Anti-Phishing: KeyBank – ‘Technical services: Account Update Request’

Anti-Phishing: KeyBank – ‘Technical services: Account Update Request’

Email title: ‘Technical services: Account Update Request’
Scam target: KeyBank customers
Email format: HTML e-mail
KeyBank – Customer Care Department <keysupport.6381508.148055.0 @>
Sender spoofed? Yes
Scam call to action: ‘Technical services of the bank are carrying a planned software upgrade… We earnestly ask you to visit the following link to start the procedure of confirmation of your personal data…’
Scam goal: Getting victim’s username/password, credit/debit card information
Call to action format: URL link
Visible link: image link
Called link : h++p://
Phish website IP:


KeyBank’s customers are the new phish target. This is the first phish against them we get reported, but probably won’t be the last one. It is not a sophisticated one, but it doesn’t need it to be dangerous – this bank’s customers are probably not as vigilant as the more targeted banks’ customers.

Anyway, the message looks nice – with bank logo, spoofed sender and hidden link destination, even a ‘legal’ footer:

More in

JPEG “Virus” Facts

by LURHQ Threat Intelligence Group


Release Date
September 28, 2004

***JPEG “Virus” Facts***

A great deal of attention is being paid to a supposed “JPEG virus” discovered in a couple of Usenet postings. Because many people are still not familiar with the workings of the current MS04-028 exploits, much misinformation is being spread in public forums. This advisory is being sent to clear up the facts surrounding this posted JPEG exploit. If you have been following Threat #49 in the LURHQ Sherlock Enterprise Security Portal (MS04-028 Jpeg Comment Buffer Overflow Analysis), you may already be aware of most of this information.

Here are the simple details of this incident:

-It’s not a virus. The posted JPEG is actually a trojan downloader. It has no ability to spread on its own.

-It only affects users with Windows XP Service Pack 1.
-It’s does not automatically execute on reading the message. The JPEG must be saved into a local folder, then the mouse pointer must be moved over the JPEG file’s icon.

-The file is detected by all major antivirus engines with current virus definition files. Because of the nature of the JPEG format, it is impossible to disguise an infected JPEG file. So current signatures should detect ALL future attempts to exploit this vulnerability.

Read more of the “facts” at

Jpeg Of Death.c v0.5

Jpeg Of Death.c v0.5

You knew it was coming. And now it’s here – the latest evil spurred by the latest Microsoft security hole.

It’s called the JpegOfDeath.c v0.5, but jpg isn’t all it threatens.

“[…] for the people out there who think you can only be affected through viewing or downloading a jpeg attachment.. you’re dead wrong,” says K-OTIC’s John Bissell aka HighT1mes.

“All the attacker has to do is simply change image extension from .jpg to .bmp or .tif or whatever and stupid Windows will still treat the file as a JPEG :-p…”

Security Firms Tackle Content Threat

Traditional security methods aren’t robust enough to cope with today’s multiple threats, and vendors need to up their game to help carriers and enterprises deal with the new techniques being deployed by hackers.

So says independent consultant Simon Hill, who has been examining the security market for a Light Reading Webinar, or online seminar, entitled “Multi-Layered Security: Security in an Insecure World,” due to be given tomorrow (Wednesday). Anyone interested in the Webinar can still sign up for free –

Some security system suppliers, such as Fortinet Inc. and Radware Ltd., have already reacted to the challenge.


Panda Software Debuts

Site Offers Computer Users the Ability to Double Check Their Antivirus Security

GLENDALE, Calif., Sept. 28 /PRNewswire/ — Panda Software, one of the leading developers of virus and intrusion prevention solutions, today announced the launch of Panda Challenge ( is designed for computer users to double check the performance of their antivirus solutions.  As users take the panda challenge Panda Software analyzes and repairs damage done to computers for free.  A special offer is also available for those wishing to purchase solutions from Panda Software.

Norman adds spyware protection to its extensive portfolio

Oslo, Norway, 28 September 2004

Award-winning antivirus vendor Norman, together with anti-spyware leader Lavasoft, introduces Norman Ad-Aware SE Plus and Professional respectively for single users and organizations. These new programs from Norman are made available to protect computers against undesired programs installing themselves while connected to the Internet.

SpywareNuker Reaches 6,000,000 Users

TrekEight, LLC announced today that over 6,000,000 users have used the SpywareNuker line of PC protection software, and 1,300,000 customers have utilized the latest version, SpywareNuker 2004, to check their personal computers for spyware and adware.

Spyware and adware are applications and files that can allow hackers and advertising companies to track your PC’s activity. Though usually used for marketing purposes, (such as tracking the websites you visit and the items that you buy online and then directing advertisements to you), spyware can have the capability to record your credit card number, personal identification numbers, and all of your passwords.

Related info
“Note on SpywareNuker & pcOrion:  Spyware Nuker and pcOrion are re-branded clones of one another; both are distributed by TrekBlue/TrekData. Spyware Nuker and pcOrion were listed on this page on this page primarily because of issues surrounding Version 1 of Spyware Nuker, because of TrekBlue’s murky relationship with the adware distributor BlueHaven Media, and because of objectionable advertising that used to appear on the pcOrion home page.

Version 1 of Spyware Nuker had a deservedly poor reputation. It was a clone of BPS Spyware & Adware Remover, which itself is a rip-off of Ad-aware (1, 2) and Spybot Search & Destroy (1, 2, 3, 4, 5). Moreover, it was prone to ridiculous false positives, like the other clones of BPS Spyware & Adware Remover. (Contrary to allegations on the Net, no version of SpywareNuker or pcOrion, so far as we can tell, has itself installed adware or spyware.)

In the late spring or early summer of 2004, TrekBlue released a new version of SpywareNuker (version 2, also known as SpywareNuker 2004) which is not built on the codebase licensed from BPS (1). Testing with this new version  — also released under the name pcOrion — indicates that it does detect and remove spyware and adware. Moreover it is not prone to inexcusable false positives, as its predecessor was. Thus, the new SpywareNuker 2004 is a significant improvement on the justly discredited original version of SpywareNuker. Still further, the objectionable advertising on the pcOrion home page has been removed, and TrekBlue/TrekData has taken steps to clarify the history of its relationship with BlueHaven, which is no longer a TrekBlue/TrekData company. (1, 2)

Given that the issues surrounding Spyware Nuker and pcOrion have been addressed by the TrekBlue/TrekData, we can no longer consider Spyware Nuker or pcOrion to be “rogue/suspect” anti-spyware.”