Paypal donate button can be used to get technical help as well.

First, you need to click on the $0.00 and change it to the amount you want to donate. Then, once you fill in the dollar amount, you can then choose to donate with paypal, or with a credit card. Thank you for your help. Once you donate, I may contact you to thank you and offer my services, if you choose to leave a contact method, but this is not required. I am available for both hardware and software services, please inquire for more info.





We are currently creating docker containers, and nodejs applications, but just inquire with your needs, we do it all. Thanks Again.

Sincerely, James

Microsoft releases fix-it for IE 8 0-day- Hackers Steal 45 million from ATMs

2 Big Stories today I want to mention…. Microsoft once again rushed to release a hotfix for all of its’ Windows XP users that were stuck on Internet Explorer 8, as there was a zero (0-day) day vulnerability found last week that was utilizing around 9 different popular websites to redirect unsuspecting users to Exploit Kit Malware attacks. This 0-day was so important because any business or home user that still has a 32-bit Windows XP computer is forced to use Internet Explorer 8 for Windows Updates. This exploit was first seen on the United States’ Department of Labor website. All a user had to do while browsing with IE8 is visit a specific frame and they were automagically redirected to a malicious black-hole website that served up enough malware to take over their computer. Brian Krebs reported ” several security vendors reported that the U.S. Department of Labor Web site had been hacked and seeded with code designed to exploit the flaw and download malicious software.” If you are running Internet Explorer 8, or if you are on WIndows XP then you need to go and download and run this Microsoft Fix-It before your computer becomes part of a botnet…. or you could risk it and wait until Tuesday. This exploit is already part of Metasploit and at least 8 other websites have been fingered as also hosting this attack.

In other news, most likely one of the most profitable ATM hacks in history has been thwarted and it is now being reported that 1 young hacker is dead and 7 more face trial after being busted after stealing $45 million in a cyberheist that had cybercrooks actually going to thousands of ATMs with hacked debit or credit cards and collecting cash all over the world. It looks like they actually were able to lift the daily limits that are placed on credit/debit cards, and were able to literally collect as much money as the ATM’s had in them before being caught. Nakedsecurity.com explains the heist rather well, so i will pass it off to them and you can read it here…

Cleaning Up after Citadel – Department of Justice Ransomware (FakeDRM.bj)

Citadel Malware Screen

Citadel Malware Ransomware Screen

A client of mine was hit with a variant of the Citadel Ransomware yesterday. He was just surfing the web and looking for a movie to watch, when he was hit by the drive-by download. It placed a big old warning message with Your Computer Has Been Blocked on the left and The United States Department OF Justice warning on the right, and a picture of a naked girl in a sexual position near the bottom, while asking for a moneypak payment to unlock the computer.
Upon receiving the computer, I rebooted and used a Kaspersky Rescue CD to boot and scan the harddrive. It found the following files… 4 files labeled as “Trojan.Downloader.WMA.FakeDRM.bj” and 10 files labeled as “Win32.Katusha.n”. The exact filenames don’t matter because they are just a bunch of random letters and numbers. After I deleted these 14 items with Kaspersky, I took out the cd and rebooted.

Upon reboot, the computer came on and about a minute after being on, the warning screen came back on, which I was happy about because I wanted to get a closer look and a picture. Upon looking at the bottom of the screen I noticed there was a small black square that was blurry but changing and I moved aroung and noticed a picture of me there, as the web cam was recording and putting my picture right in the page next to the naked girl porno warning. I covered up the webcam with some tape and started to begin experimenting with the computer to see what I could do. After taking a picture of the screen for documentation purposes, I tried to do a few things and was surprised that it actually let me open up some windows and folders, I immediately noticed that it had created another false partition and a bootsect.bak. I rebooted into safemode and deleted all the recent temporary files and then used RogueKiller to run a quick scan and removal of about 8 registry keys and a batch file. I was still not out of the woods, but I was in total control of this bad boy at this point.

I downloaded MalwareBytes and let that scan and it found 15 items, mostly in the ProgramData folder. Check out the pictures for more detailed info. After deleting everything MalwareBytes found I uninstalled Microsoft Security Essentials and installed BitDefender. This is not the first time I have seen Microsoft Security Essentials fail to protect against older known malware. After removing everything to this point and rebooting, the computer seems back to normal, I am still searching through the registry and all folders for any remaining traces. Bitdefender and MalwareBytes are both returning completely clean and it really wasnt that difficult to remove this so I am still wary that there may be traces left behind. Scan findings 1Kasperskyrescuescan

Mark Russonovich demonstration of Stuxnet, Flame, & more.

In between troubleshooting Windows Server 2008 SysVol Replication errors this week, I remember wanting to mention Mark Russonovich’s videos on Technet from when he demonstrated Stuxnet and Flame in Virtual Machines last year. I think I forgot to post the link so here it is, it was pretty entertaining. You can watch the video from June 11,2012 at TechEd here: http://video.ch9.ms/teched/2012/na/SIA302.wmv

I solved a pretty annoying problem today when I finally found the solution to my SYSVOL replication error on a 2008 Server Domain Controller that was being improperly labeled with a \?C:WindowsSysVolSysvolDomainname.
The solution was simple but took me awhile to find it. All you have to do is go into ADSIEdit on the 2008 Domain Controller and maneuver to the msDFSR root path then edit the path that has the question mark and delete the first three characters. For the exact steps just check out the link at the end… Here is one of the technet articles that helped me get to the bottom of this.

Here is a link to the workaround which enables you to remove the bloody questionmark that was causing me grief.

HackInTheBox Security Conference Slides (PDFs)

Here is the Schedule And Presentation Calendar
D1T1 – Barisani and Bianco – Practical Exploitation of Embedded Systems.pdf
D1T1 – Chris Wysopal – Data Mining a Mountain of Vulnerabilities.pdf
D1T1 – Lucas Adamski – Firefox OS and You.pdf
D1T1 – Petko Petkov – History of the JavaScript Security Arsenal.pdf
D1T1 – Philippe Langlois and Emmanuel Gadaix – 6000 Ways and More.pdf
D1T1 – The Pirate Bay – Data is Political – NO SHOW
D1T2 – Don Bailey – Hackers, The Movie – A Retrospective.pdf
D1T2 – Haroon Meer – You and Your Research.pdf
D1T2 – Marc Heuse – IPv6 Insecurity Revolutions.pdf
D1T2 – Mark Dowd & Tarjei Mandt – iOS6 Security.pdf
D1T2 – Meder Kydyraliev – Defibrilating Web Security.pdf
D1T2 – Wes Brown – Supercomputing, Malware and Correlation.pdf
D1T3 – Charlie Miller – Attacking NFC.pdf
D1T3 – F Raynal & G Campana – An Attack Path to Jailbreaking Your Home Router.pdf
D1T3 – John Draper – A Historical Look at the Personal Computer and Phreaking.pdf
D1T3 – Jose Nazario – Tracking Large Scale Botnets.pdf
D1T3 – Paul Sebastian Ziegler – Hacking in the Far East.pdf
D1T3 – The Grugq – OPSEC – Because jail is for wuftpd.pdf
D2T1 – Chris Evans – Element 1337 in the Periodic Table – Pwnium.pdf
D2T1 – Katie Moussouris – How to Get Along with Vendors Without Really Trying.pdf
D2T1 – Ollie Whitehouse – Finding the Weak Link in Binaries.pdf
D2T1 – Paul Vixie – Silo Busting in Information Security – NO SLIDES
D2T1 – Rodrigo Branco – A Scientific Study of Malware Obfuscation Technologies.zip
D2T1 – Shreeraj Shah – XSS and CSRF Strike Back Powered by HTML5.pdf
D2T2 – Fyodor Yarochkin and Vladimir – Messing up the Kids Playground.pdf
D2T2 – Jeremiah Grossman – Why Web Security is Fundamentally Broken.pdf
D2T2 – Raoul Chiesa – Information Warfare and Cyberwar.pdf
D2T2 – Saumil Shah – Innovative Approaches to Exploit Delivery.pdf
D2T3 – Emmanuel Gadaix – Something MEGA.pdf
D2T3 – Felix FX Lindner – Hacking Huawei VRP.pdf
D2T3 – Mikko Hypponen – Behind Enemy Lines.pdf
D2T3 – OPENBOTTLE PANEL – NO SLIDES
D2T3 – Stefano Zanero – Behaviour-Based Methods for Automated Scalable Malware Analysis.pdf
D2T123 – IOS SECURITY PANEL – NO SLIDES

Thank YOU to Security Monkey’s Chief Monkey for the links…

I recently was given a job of cleaning up an HP Laptop with 38 pieces of malware.

  Malware Creators

Just last week I faced a job of removing the malware from a Windows 7 64bit HP Laptop, and getting the computer back to a usable condition. It was only 6 months old, and the owner complained that they could not do anything on the internet because the computer kept shutting itself off. She even talked about being ready to send it back to HP. I asked her if she had antivirus and kept it up-to-date, and she said she had installed AVG about a week after she brought the laptop home, and it often updated itslef while she was trying to use the computer. The first thing I did when I received the laptop was simply attempt to go online with each of the browsers. The computer had only 19 gb used out of 750, yet it had about 12 toolbars, and rebooted 5 minutes after I started trying to browse the web. I immediately installed MalwareBytes, and started to run a scan, while i proceeded to remove each of the different toolbars and I installed CCleaner so I would be able to clean the cache, cookies, and temporary files. MalwareBytes immediately found 30 malicious items in the first 5 minutes of the scan. I started looking at the AVG logs and settings to see why AVG had let this happen to the computer. I thought that maybe AVG was not turned on or had not run a scan in a while. However, I noticed that AVG was set to scan everyday at 5pm, and it had indeed run 20 times in the last month but had not found any malware. I checked the logs and found out that the only things AVG reported was actually files related to Microsoft .Net Framework 3.0 and 3.5 SP1 (which it labeled as a probable rootkit).

Malware Bytes finished its scan finding 45 malicious items (7 tracking cookies and 38 malicious trojans and toolbars). Next I ran an AVG scan (just to see if it would find any of these same items, before I removed them with Malware Bytes. I updated AVG’s signatures and then AVG scanned the entire system in about 15 minutes, and found nothing yet again. At this point, I had found an ASCII to UTF converter with a chinese logo, and an instance of LogMein rescue hidden in the temporary files folders. I called up the woman and asked if she had evr had anyone try to help her by remotely logging in to her computer and she said no, never. I realized that one of those toolbars she had installed had likely been a trojan with an Asian hacker on the other end that had been remotely running commands on her computer. I used the Netstat utility but did not see any current activity. At this point I had to do some proprietary investigation and forensics, in order to prevent this hacker from ever accessing this computer again. I completed this in an hour or two and ran a ComboFix Scan.

Okay, I then decided that either this AVG install was corrupted, or that AVG is no longer an effective player in the Anti-Virus industry. Well ,I did not have time to further investigate, as i needed to have this computer back to new condition by tomorrow. I removed all of the items found by Malware Bytes, then I restarted and deleted all the system restore points. I checked each of the browsers for any left over debris, (firefox, IE, and Chrome) and I rebooted the system. I next typed “MRT” in the search box which ran the Microsoft Malicious Software Removal Tool, but it did not find anything. I then ran a portable BitDefender scan on the entire system, as well as an online scan by ESET. The system was coming up clean. I completely removed all remnants of AVG except for the AVG secure search bar, (because utilizing the AVG safe search couldn’t hurt the owner.)

Next, I installed Microsoft Security Essentials, and set MalwareBytes’ real-time protection to off. MSE’s real-time protection will hopefully be good enough to protect the owner in the near future. I ran a full system scan, which came up clean, and used Revo Uninstaller to uninstall any leftover programs that the owner did not need. I then went ahead and tweaked all of the browsers’ settings and configured her firewall, and updated her Adobe Reader, Flash player, and her Java (which apparently had come installed on the laptop when she bought it. ( I used Secunia PSI to notify me of updates available for all installed programs.) Then I went online and tried to perform some everyday tasks to verify that the computer was back to a usable condition. Note: I had documented all of my work, and I handed over the documentation to the owner when I gave back the computer. In the end, the laptop was back to its OOBE (Out of the Box Experience), and the owner was very appreciative.

Security Startups Focusing On Threats, Not Malware

According to Robert Lemos of Dark Reading,
Stopping malware is so yesterday. Eclectic groups of security people have banded together to make life difficult for attackers… Well, I enjoy studying malware, and I don’t have as many years of experience working in CyberSecurity yet, so I will continue doing what I enjoy for now, Hunting, Studying, and Destroying Viruses and Malicious code. Here’s Mr. Lemos’ story anyway, its interesting
Jimmy G
Jun 14, 2012 | 06:06 PM |

By Robert Lemos, Contributing Writer
Dark Reading

Security consultant Dino Dai Zovi hacked Macs and co-authored a book on how to secure them. Tillmann Werner researched ways to detect the Conficker worm on infected networks and advocated an offensive approach to dealing with the threat. Shawn Henry chased cybercriminals during his 23-year career at the FBI. And Dan Guido teaches at NYU Poly and espouses a “Know Your Attacker” philosophy.
All four have left previous positions and joined startups that are creating services and products that focus on ways to make attacks more painful for the attackers. Rather than continue finding vulnerabilities or pointing out ways attackers can infiltrate networks, groups of well-known researchers are increasingly coming together to find better ways to identify and hinder attackers.

As attackers become more skilled at quiet, targeted attacks, traditional defenses are failing to catch them. While some security companies, for example, can search their logs of blocked programs for evidence that their products stopped Flame, it took the antivirus industry at least four years to detect the attack.

The lack of success has frustrated a number of researchers, such as Guido. With Dai Zovi and former VMWare researcher Alexander Sotirov, the one-time security consultant and occasional professor created Trail of Bits, a company focused on analyzing attacks and finding the best ways to help its clients defend their networks and data.

[ The White House’s first cybersecurity coordinator says it’s time for the federal government to begin implementing its blueprints for secure identities and its international strategy for cybersecurity. See Former White House Cybersecurity Czar Calls For Security Action. ]

Similar reasons drove George Kurtz to start up CrowdStrike with Dmitri Alperovitch, former vice president of threat research at McAfee, and Gregg Marston, formerly of Foundstone, a company Kurtz co-founded in the late ’90s. There is still a lot of work to be done, but CrowdStrike is developing the ability to help companies understand who is attacking them and why they are being targeted so that they can martial their defenses around those actual threats, Kurtz says. Companies are tired of trying to keep up with the large number of threats that may be targeting them.

“There is only so many fingers that they can put into the dike, and they want to know who is in their network and how to get them out of the network,” Kurtz says. “They want to understand what they are ultimately after. By switching from a focus on … malware to moving toward figuring out who is attacking and how they are doing it, you can basically put up better defenses.”

Both companies are investing in creating intelligence on threats to better inform their clients’ defenses. And both companies hope that doing so will help companies drop out of the rat race of trying to keep up with attackers’ ability to change their code. The fact that the firms exist and have attracted a bevy of smart researchers is likely due to the high level of frustration among defenders aimed at the unending success of attackers. Such frustration led Shawn Henry — recently the executive assistant director of the Criminal, Cyber, Response, and Services Branch of the FBI — to head up CrowdStrike’s services branch.

“The problem with existing technologies and threat-mitigation tactics is they are too focused on adversary tools — malware and exploits — and not on who the adversary is and how they operate,” Henry stated in written testimony (PDF) to the U.S. House Subcommittee on Homeland Security in April. “Ultimately, until we focus on the enemy and take the fight to them to raise their cost of attack, we will fail because they will always get thorough.”

Companies have enough information to understand attackers and gain better information on the threats to their business, but lack the tools to turn that data into a strategy for stopping attackers, Guido says.

“In reality, data on attackers is widely available in published security industry reports, but many organizations have trouble interpreting this data and making it actionable,” he says. “The difficulty in achieving this vision will be in making the knowledge and tools to perform this analysis widespread.”