<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; general security</title>
	<atom:link href="https://securitywandering.com/?cat=8&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Ultrasonic more then bugs talking…….or &#8220;bab bios&#8221; or should it be sound gaps not air gaps</title>
		<link>https://securitywandering.com/?p=516</link>
		<comments>https://securitywandering.com/?p=516#comments</comments>
		<pubDate>Fri, 01 Nov 2013 15:12:28 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=516</guid>
		<description><![CDATA[<p>Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent.   Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=516">Ultrasonic more then bugs talking…….or &#8220;bab bios&#8221; or should it be sound gaps not air gaps</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h1 class="heading" style="list-style: none; padding: 0px; margin: 0px; -webkit-font-smoothing: antialiased; text-rendering: optimizelegibility; font-family: NoticiaBold, 'Times New Roman', serif; text-decoration: none; color: #263034; font-size: 30px; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps</h1>
<h2 class="standalone-deck" style="list-style: none; padding: 0px 0px 12px; margin: 0px 0px 8px; color: #657b83; font-size: 16px; font-weight: normal; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #dddddd; font-family: Arial, sans-serif; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent.</h2>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;"> </p>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;"><span class="Apple-style-span" style="color: #000000; font-family: Helvetica; line-height: normal; font-size: medium;"><img title="badbios.jpg" src="http://securitywandering.com/wp-content/uploads/2013/11/badbios.jpg" alt="Badbios" width="600" height="337" border="0" /></span>Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused. He also found that the machine could delete data and undo configuration changes with no prompting. He didn&#8217;t know it then, but that odd firmware update would become a high-stakes malware mystery that would consume most of his waking hours.</p>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">linked from:<br /> <a href="http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/">http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/</a></p>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">it was just a matter of time before microcode injections into the controller on various sub systems of a computer would be targeted.<br />This is a very troubling discovery for many people. </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=516">Ultrasonic more then bugs talking…….or &#8220;bab bios&#8221; or should it be sound gaps not air gaps</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=516</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tools boast easy cracking of Microsoft crypto for businesses</title>
		<link>https://securitywandering.com/?p=454</link>
		<comments>https://securitywandering.com/?p=454#comments</comments>
		<pubDate>Mon, 30 Jul 2012 19:55:26 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=454</guid>
		<description><![CDATA[<p>Over on CNET News.com &#8211; Threats the post &#8220;Tools boast easy cracking of Microsoft crypto for businesses&#8221; contains this text: &#8220;ChapCrack and CloudCracker reveal sensitive corporate communications &#8212; including passwords &#8212; protected by the popular PPTP encryption protocol, which is based on an algorithm from Microsoft, a researcher says at Defcon.&#8220;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=454">Tools boast easy cracking of Microsoft crypto for businesses</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href="http://news.cnet.com/">CNET News.com &#8211; Threats</a></em> the post &#8220;<em><a href="http://rss.feedsportal.com/c/32447/f/475521/s/21cfe058/l/0Lnews0Bcnet0N0C830A10E10A0A90I30E574818550E830Ctools0Eboast0Eeasy0Ecracking0Eof0Emicrosoft0Ecrypto0Efor0Ebusinesses0C0Dpart0Frss0Gsubj0Fnews0Gtag0F25470E10I30E0A0E20A/story01.htm">Tools boast easy cracking of Microsoft crypto for businesses</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;ChapCrack and CloudCracker reveal sensitive corporate communications &#8212; including passwords &#8212; protected by the popular PPTP encryption protocol, which is based on an algorithm from Microsoft, a researcher says at Defcon.<img src="http://rss.feedsportal.com/c/32447/f/475521/s/21cfe058/mf.gif" alt="" width="1" height="1" border="0" /><img src="http://feeds.feedburner.com/~r/CNETNewsSecurity/~4/sPNAlpWTClM" alt="" width="1" height="1" />&#8220;</em></p></blockquote>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=454">Tools boast easy cracking of Microsoft crypto for businesses</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=454</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Flame malware: So big, so overlooked &#124; Security &amp; Privacy &#8211; CNET News</title>
		<link>https://securitywandering.com/?p=449</link>
		<comments>https://securitywandering.com/?p=449#comments</comments>
		<pubDate>Tue, 29 May 2012 22:29:54 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=449</guid>
		<description><![CDATA[<p>Over on the post &#8220;Flame malware: So big, so overlooked &#124; Security &#38; Privacy &#8211; CNET News&#8221; contains this text: &#8220; CNET News HomeReviews News Download CNET TV How To Marketplace Log In &#124; Join CNET News Security &#38; Privacy Flame malware: So big, so overlooked The most &#8216;complex malware ever found&#8217; &#8212; Flame &#8212; [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=449">Flame malware: So big, so overlooked | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://news.cnet.com/8301-1009_3-57442675-83/flame-malware-so-big-so-overlooked/?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">Flame malware: So big, so overlooked | Security &amp; Privacy &#8211; CNET News</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;</em></p></blockquote>
<p>CNET News</p>
<p>HomeReviews News Download CNET TV How To Marketplace Log In | Join</p>
<p>CNET News Security &amp; Privacy Flame malware: So big, so overlooked The most &#8216;complex malware ever found&#8217; &#8212; Flame &#8212; has taken the information security world by surprise. Given that it is said to have been around for years, how did everyone miss it?</p>
<p>by Michael Lee May 29, 2012 4:53 AM PDT 8 CommentsFacebook24Twitter71Linked In19More</p>
<p>The most &#8216;complex malware ever found&#8217; &#8212; Flame &#8212; has taken the information security world by surprise. Given that it is said to have been around for years, how did everyone miss it? Several security research firms, including Symantec, Kaspersky, and McAfee, have been hard at work analyzing a specific piece of malware in the past few days after the Iranian Computer Emergency Response Team posted an alert about malicious code designed to steal and exfiltrate information from infected computers back to a network of at least 10 command and control servers. However, as Budape&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=449">Flame malware: So big, so overlooked | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=449</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New malware strain locks up computers unless ransom is paid &#124; Security &amp; Privacy &#8211; CNET News</title>
		<link>https://securitywandering.com/?p=443</link>
		<comments>https://securitywandering.com/?p=443#comments</comments>
		<pubDate>Mon, 07 May 2012 19:47:13 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=443</guid>
		<description><![CDATA[<p>Over on the post &#8220;New malware strain locks up computers unless ransom is paid &#124; Security &#38; Privacy &#8211; CNET News&#8221; contains this text: &#8220; CNET News HomeReviews News Download CNET TV How To Marketplace Log In &#124; Join Breaking news Oracle v. Google jury returns partial verdict, favoring OracleShare: CNET News Security &#38; Privacy [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=443">New malware strain locks up computers unless ransom is paid | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://news.cnet.com/8301-1009_3-57429139-83/new-malware-strain-locks-up-computers-unless-ransom-is-paid/?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">New malware strain locks up computers unless ransom is paid | Security &amp; Privacy &#8211; CNET News</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;</em></p></blockquote>
<p>CNET News</p>
<p>HomeReviews News Download CNET TV How To Marketplace Log In | Join</p>
<p>Breaking news Oracle v. Google jury returns partial verdict, favoring OracleShare: CNET News Security &amp; Privacy New malware strain locks up computers unless ransom is paid A type of &#8216;ransomware&#8217; hitting users across Europe demands payment for alleged copyright violations, according to a Swiss security blog.</p>
<p>by Lance Whitney May 7, 2012 8:50 AM PDT 20 CommentsFacebook54Twitter71Linked In23More (Credit: abuse.ch) A campaign of &#8216;ransomware&#8217; is locking people out of their computers unless they pony up the right amount of money. Spotted by security blog abuse.ch, the malware taps into an exploit kit known as &#8216;Blackhole.&#8217; Sold underground, Blackhole is used by criminals to infect computers through security holes in the browser or third-party plug-ins, such as Java and Adobe Reader. If the version of Java, for example, is not up to date with the latest patches, the downloaded file will exploit the software'&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=443">New malware strain locks up computers unless ransom is paid | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=443</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab</title>
		<link>https://securitywandering.com/?p=440</link>
		<comments>https://securitywandering.com/?p=440#comments</comments>
		<pubDate>Thu, 03 May 2012 13:02:21 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[general security]]></category>
		<category><![CDATA[software issues]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=440</guid>
		<description><![CDATA[<p>Over on the post &#8220;Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab&#8221;  &#60;&#60;&#60; Wednesday, May 2, 2012 &#62;&#62;&#62;   Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster Posted by Sean @ 14:25 GMT &#124; Comments So how bad was last month&#8217;s Mac Flashback outbreak and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=440">Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://www.f-secure.com/weblog/archives/00002355.html">Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab</a></em>&#8221; </p>
<p>&lt;&lt;&lt; Wednesday, May 2, 2012 &gt;&gt;&gt;   Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster Posted by Sean @ 14:25 GMT | Comments So how bad was last month&#8217;s Mac Flashback outbreak and who suffered the most? Our guess: it was bad, and university IT help desks. And it looks like our guess might not be far off the mark.</p>
<p>Oxford University Computing Services&#8217; network security team (aka OxCERT) has written that they dealt &#8216;with what is probably the biggest outbreak since Blaster struck the Windows world all the way back in the summer of 2003.&#8217;</p>
<p>OxCERT dealt with around 1000 incidents for Blaster. They&#8217;ve seen several hundred Flashback incidents… &#8216;and they keep on coming.&#8217;</p>
<p>Other institutions, such as The University o&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=440">Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=440</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Microsoft detects new malware targeting Apple computers &#8211; Computerworld</title>
		<link>https://securitywandering.com/?p=434</link>
		<comments>https://securitywandering.com/?p=434#comments</comments>
		<pubDate>Thu, 03 May 2012 12:56:57 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=434</guid>
		<description><![CDATA[<p>Over on the post &#8220;Microsoft detects new malware targeting Apple computers &#8211; Computerworld&#8221; contains this text: &#8220;Skip the navigation Computerworld White Papers Webcasts Newsletters Solution Centers Events Magazine Twitter Facebook RSS Topics News In Depth Reviews Blogs Opinion Shark Tank IT Jobs More IT Verticals Security App Security&#124;Business Continuity&#124;Cybercrime and Hacking&#124;DRM and Legal Issues&#124;Data Security&#124;Malware [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=434">Microsoft detects new malware targeting Apple computers &#8211; Computerworld</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://www.computerworld.com/s/article/9226777/Microsoft_detects_new_malware_targeting_Apple_computers?source=rss_security&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+computerworld%2Fs%2Ffeed%2Ftopic%2F17+%28Computerworld+Security+News%29">Microsoft detects new malware targeting Apple computers &#8211; Computerworld</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Skip the navigation</em></p></blockquote>
<p>Computerworld White Papers Webcasts Newsletters Solution Centers Events Magazine Twitter Facebook RSS</p>
<p>Topics News In Depth Reviews Blogs Opinion Shark Tank IT Jobs More IT Verticals Security App Security|Business Continuity|Cybercrime and Hacking|DRM and Legal Issues|Data Security|Malware and Vulnerabilities|Privacy|Security Hardware and Software</p>
<p>74  </p>
<p>3   1 Submit 6 Email</p>
<p>Home &gt; Security &gt; Malware and Vulnerabilities News Microsoft detects new malware targeting Apple computers Apple users should be sure their Mac version of Office has up-to-date patches</p>
<p>By Jeremy Kirk May 2, 2012 12:18 AM ET2 Comments . What&#8217;s this? IDG News Service &#8211; Microsoft has detected a new piece of malware targeting Apple OS X computers that exploits a vulnerability in the Office productivity suite patched nearly three years ago.</p>
<p>The malware is not widespread, wrote Jeong Wook Oh of Microsoft&#8217;s Malware Protection Center. But it does show that hackers pay attention if it&#8217;s found pe&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=434">Microsoft detects new malware targeting Apple computers &#8211; Computerworld</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=434</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Windows Remote Desktop worm &#8220;Morto&#8221; spreading &#8211; F-Secure Weblog : News from the Lab</title>
		<link>https://securitywandering.com/?p=294</link>
		<comments>https://securitywandering.com/?p=294#comments</comments>
		<pubDate>Tue, 30 Aug 2011 14:07:38 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=294</guid>
		<description><![CDATA[<p>Over on the post &#8220;Windows Remote Desktop worm &#8220;Morto&#8221; spreading &#8211; F-Secure Weblog : News from the Lab&#8221; contains this text: &#8221; &#60;&#60;&#60; Sunday, August 28, 2011 &#62;&#62;&#62;   Windows Remote Desktop worm &#8220;Morto&#8221; spreading Posted by Mikko @ 13:23 GMT &#124; Comments We don&#8217;t see that many internet worms these days. It&#8217;s mostly just [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=294">Windows Remote Desktop worm &#8220;Morto&#8221; spreading &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.f-secure.com/weblog/archives/00002227.html">Windows Remote Desktop worm &#8220;Morto&#8221; spreading &#8211; F-Secure Weblog : News from the Lab</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8221; &lt;&lt;&lt; Sunday, August 28, 2011 &gt;&gt;&gt;   Windows Remote Desktop worm &#8220;Morto&#8221; spreading	Posted by Mikko @ 13:23 GMT | Comments We don&#8217;t see that many internet worms these days. It&#8217;s mostly just bots and trojans. But we just found a new internet worm, and it&#8217;s spreading in the wild.</p>
<p> </p>
<p>The worm is called Morto and it infects Windows workstations and servers. It uses a new spreading vector that we haven&#8217;t seen before: RDP.</p>
<p>RDP stands for Remote Desktop Protocol. Windows has built-in support for this protocol via Windows Remote Desktop Connection. Once you enable a computer for remote use, you can use any other computer to access it.</p>
<p>When you connect to another computer with this tool, you can remotely use the computer, just like you&#8217;d use a local computer.</p>
<p>Once a machine gets infected, the Morto worm starts scanning the local network for machines that have Remote Desktop Connection enabled. This creates a lot of traffic for port 3389/TCP, which is the RDP port.</p>
<p>When Morto finds a Remote Desktop server, it tries logging in as Administrator and tries a series of passwords:</p>
<p></em></p>
<p><em> admin  password  server  test  user  pass  letmein  1234qwer  1q2w3e  1qaz2wsx  aaa  abc123  abcd1234&#8243;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=294">Windows Remote Desktop worm &#8220;Morto&#8221; spreading &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=294</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Enterprise Security Today &#124; Pentagon Discloses Largest-Ever Cybertheft</title>
		<link>https://securitywandering.com/?p=278</link>
		<comments>https://securitywandering.com/?p=278#comments</comments>
		<pubDate>Tue, 19 Jul 2011 19:00:35 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=278</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Enterprise Security Today &#124; Pentagon Discloses Largest-Ever Cybertheft&#8221; contains this text: &#8221; Pentagon Discloses Largest-Ever Cybertheft By Robert Burns and Lolita C. Baldor July 18, 2011 7:50AM The Defense Department has revealed that 24,000 files containing Pentagon data were stolen from a defense industry computer network in a single intrusion [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=278">Enterprise Security Today | Pentagon Discloses Largest-Ever Cybertheft</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.enterprise-security-today.com/story.xhtml?story_id=79370">Enterprise Security Today | Pentagon Discloses Largest-Ever Cybertheft</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8221;	Pentagon Discloses Largest-Ever Cybertheft By Robert Burns and Lolita C. Baldor July 18, 2011 7:50AM<br /> <span style="font-style: normal;"><em></p>
<p style="display: inline !important;"><span style="font-style: normal;"><em> </em></span></p>
<p><em></p>
<p style="display: inline !important;">The Defense Department has revealed that 24,000 files containing Pentagon data were stolen from a defense industry computer network in a single intrusion in March. The Pentagon believes the attacker was a foreign government. This is part of the reason for the new cyber-defense strategy unveiled, which is oriented toward defensive measures.   Related Topics 	Pentagon 	Defense Department 	Cyberattack 	Cybersecurity 	Cyberwar 	Hackers Latest News 	LulzSec Takes Out Murdoch Servers 	Largest-Ever Cybertheft Disclosed 	Pentagon To Publish Cyberwar Rules 	Israeli App Merges Facebook, Google+ 	Microsoft Bluetooth Vulnerability Seen</p>
<p></em></em></span><em></p>
<p> </p>
<p></em></p>
<p>The Pentagon on Thursday revealed that in the spring it suffered one of its largest losses ever of sensitive data in a cyberattack by a foreign government. It is a dramatic example of why the military is pursuing a new strategy emphasizing deeper defenses of its computer  networks, collaboration with private industry and new steps to stop &#8220;malicious insiders.&#8221; William Lynn, the deputy secretary of defense, said in a speech outlining the strategy that 24,000 files containing Pentagon data were stolen from a defense industry computer network  in a single intrusion in March. He offered no details about what was taken but in an interview before the speech he said the Pentagon believes the attacker was a foreign government. He didn&#8217;t say which nation.</p>
<p></em></p>
<p><em>&#8220;We have a pretty good idea&#8221; who did it, Lynn said in the interview. He would not elaborate.&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=278">Enterprise Security Today | Pentagon Discloses Largest-Ever Cybertheft</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=278</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Botnet Called &#8216;Practically Indestructible&#8217; &#8211; Computerworld</title>
		<link>https://securitywandering.com/?p=276</link>
		<comments>https://securitywandering.com/?p=276#comments</comments>
		<pubDate>Mon, 18 Jul 2011 13:16:42 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=276</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Botnet Called &#8216;Practically Indestructible&#8217; &#8211; Computerworld&#8221; contains this text: &#8220;Massive botnet &#8216;indestructible,&#8217; say researchers By Gregg Keizer July 18, 2011 06:00 AM ET1 Comment Computerworld &#8211; A new and improved botnet that has infected 4.5 million Windows PCs is &#8220;practically indestructible,&#8221; security researchers say. TDL-4, the name for both the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=276">Botnet Called &#8216;Practically Indestructible&#8217; &#8211; Computerworld</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.computerworld.com/s/article/357532/Botnet_Called_Practically_Indestructible_?source=rss_security&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+computerworld%2Fs%2Ffeed%2Ftopic%2F17+%28Computerworld+Security+News%29">Botnet Called &#8216;Practically Indestructible&#8217; &#8211; Computerworld</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Massive botnet &#8216;indestructible,&#8217; say researchers By Gregg Keizer July 18, 2011 06:00 AM ET1 Comment Computerworld &#8211; A new and improved botnet that has infected 4.5 million Windows PCs is &#8220;practically indestructible,&#8221; security researchers say.</em></p></blockquote>
<blockquote><p><em> </em><em></p>
<p style="display: inline !important;"><span style="font-style: normal;"><em> </em></span></p>
<p><em></p>
<p style="display: inline !important;">TDL-4, the name for both the bot Trojan that infects machines and the ensuing collection of compromised computers, is &#8220;the most sophisticated threat today,&#8221; reported Kaspersky Labs researcher Sergey Golovanov late last month.</p>
<p></em></em><em></p>
<p> </p>
<p></em></p></blockquote>
<blockquote>
<p><em>&#8220;[TDL-4] is practically indestructible,&#8221; Golovanov said.&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=276">Botnet Called &#8216;Practically Indestructible&#8217; &#8211; Computerworld</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=276</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Enterprise Security Today &#124; Security Experts Warn of Microsoft Bluetooth Vulnerability</title>
		<link>https://securitywandering.com/?p=274</link>
		<comments>https://securitywandering.com/?p=274#comments</comments>
		<pubDate>Fri, 15 Jul 2011 18:41:43 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=274</guid>
		<description><![CDATA[<p>Over on the post &#8220;Enterprise Security Today &#124; Security Experts Warn of Microsoft Bluetooth Vulnerability&#8221; contains this text: &#8220;Security Experts Warn of Microsoft Bluetooth Vulnerability By Jennifer LeClaire July 13, 2011 1:07PM There&#8217;s danger on the wireless front, in the form of a Bluetooth stack vulnerability. Amid an otherwise mild Patch Tuesday for Microsoft, security [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=274">Enterprise Security Today | Security Experts Warn of Microsoft Bluetooth Vulnerability</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.enterprise-security-today.com/story.xhtml?story_id=79342">Enterprise Security Today | Security Experts Warn of Microsoft Bluetooth Vulnerability</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Security Experts Warn of Microsoft Bluetooth Vulnerability By Jennifer LeClaire July 13, 2011 1:07PM</em></p></blockquote>
<blockquote><p><em> </em><em></p>
<p style="display: inline !important;"><span style="font-style: normal;"><em> </em></span></p>
<p><em></p>
<p style="display: inline !important;">There&#8217;s danger on the wireless front, in the form of a Bluetooth stack vulnerability. Amid an otherwise mild Patch Tuesday for Microsoft, security researchers said the Bluetooth problem could be used to launch a targeted attack by sending specific malicious data to the targeted computer while establishing a Bluetooth connection.   Related Topics 	Microsoft 	Patch Tuesday 	Bluetooth 	Symantec 	Wireless Security Latest News 	Pentagon To Publish Cyberwar Rules 	Israeli App Merges Facebook, Google+ 	Microsoft Bluetooth Vulnerability Seen 	Rupert Murdoch Drops Bid for BSkyB 	Julian Assange Fighting Extradition</p>
<p></em></em><em></p>
<p> </p>
<p></em></p></blockquote>
<blockquote>
<p><em>After a heavy June release, Microsoft on Tuesday issued a mere four security  bulletins to address 22 vulnerabilities. Only one is rated critical. Still, security researchers agree there is an element of danger present on the wireless  front. &#8220;An attacker could use the Bluetooth stack vulnerability to launch a targeted attack,&#8221; said Joshua Talbot, security intelligence manager at Symantec Security Response. &#8220;However, it&#8217;s unlikely it could be used in a widespread attack because an attacker would have to be within Bluetooth range to exploit it. A specific target would likely already have to be identified and that person&#8217;s whereabouts known to the attacker.&#8221;&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=274">Enterprise Security Today | Security Experts Warn of Microsoft Bluetooth Vulnerability</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=274</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
