The password is mE0w

At first I thought this was a joke:

Bank of America will require Internet clients to register their computers and assign a digital image, such as a photo of a pet, to their accounts in an effort to cut down on fraud, the bank announced.

The free service, called SiteKey, lets clients pick an image, write a brief phrase and select three challenge questions.

The image will appear on the site every time a customer has to enter a password.

Apparently, this is serious. I’ve heard stupid security proposals before, but this may be the stupidest ever. Does someone really think that confused Internet users would fall for fewer phishing scams if they had a picture of a puppy in front of them? I shudder to think that it might take off and I will have to upload a picture of my cat every time I want to register for something online. I would be tempted to use this picture:

Bill2

(Via Backup Brain)

Update: In the comments, Prof. Michael Froomkin says I’m missing the point and this is a good thing. I’m a B of A customer, so I guess I’ll get a chance to see this feature in action soon.

Block tracking cookies the easy way

Prof. Froomkin (welcome back!) links to a tracking cookie opt-out page:

With a few clicks you can block cookies from Doubleclick and six other Internet tracking/marketers. Ironically, you must allow the site to set a “no thanks” cookie, so cookie blockers must be turned off to make this work.

Although this site was a good idea once upon a time, this rigmarole is completely unnecessary. Tracking cookies are, by definition, third-party cookies. I can think of no good reason to allow third-party cookies on my computer, and so I block all of them. You’ll find the detailed instructions in this article I published in January of this year: How to completely eliminate tracking cookies.

The article includes instructions for Internet Explorer and Firefox. I just checked my system, and despite the fact that I have not deleted any cookies in the past year I have no tracking cookies from DoubleClick, Atlas DMT, 24/7 Real Media or any of the other sites listed on this page.

Feds flunk the cyber-security test

Brian Krebs at the Washington Post reports:

The Department of Homeland Security today received more lumps for failing to implement programs to protect the nation’s most vital computer systems from attack or disruption. The Government Accountability Office issued a report today concluding that the department’s failure to make meaningful progress on its myriad cyber-security programs was due largely to organizational and staffing problems.

The GAO report has a section entitled “DHS Has 13 Key Cybersecurity Responsibilities.” Things like “Develop a national plan for critical infrastructure protection that includes cybersecurity.” And “Support efforts to reduce cyber threats and vulnerabilities.” And “Integrate cybersecurity with national
security.”

Unfortunately, the auditors say: “DHS has not yet developed national cyber threat and vulnerability assessments or developed and exercised government and government/industry contingency recovery plans for cybersecurity, including a plan for recovering key Internet functions.”

Gee. Maybe the Department of Homeland Security would get better results if they spent more time actually protecting, you know, homeland security instead of busting people trading movies over BitTorrent. Which, by the way, isn’t anywhere on that list of 13 key scybersecurity responsibilities.

War games

This AP story appeared this morning:

The CIA is conducting a secretive war game, dubbed “Silent Horizon,” this week to practice defending against an electronic assault on the same scale as the Sept. 11 terrorism attacks.

The three-day exercise, ending Thursday, was meant to test the ability of government and industry to respond to escalating Internet disruptions over many months, according to participants. They spoke on condition of anonymity because the CIA asked them not to disclose details of the sensitive exercise taking place in Charlottesville, Va., about two hours southwest of Washington.

Yesterday, my broadband provider, Cox Communications, was responding erratically all day. At the end of the day, it went offline in my neighborhood for more than an hour. When I called support, a recorded message described similar outages throughout the greater Phoenix area.

Coincidence? You tell me. Given the reverse Midas touch that U.S. intelligence services have demonstrated in recent years, I’m inclined to think they could screw up the Internet more effectively than any group of cyber-terrorists.

AP tries to stir up security fears

Associated Press Technology Writer Ted Bridis tries to stir up panic with an alarming story headlined “Hackers Holding Computer Files ‘Hostage'”:

Computer users already anxious about viruses and identity theft have new reason to worry: Hackers have found a way to lock up the electronic documents on your computer and then demand $200 over the Internet to get them back.

Security researchers at San Diego-based Websense Inc. uncovered the unusual extortion plot when a corporate customer they would not identify fell victim to the infection, which encrypted files that included documents, photographs and spreadsheets.

A ransom note left behind included an e-mail address, and the attacker using the address later demanded $200 for the digital keys to unlock the files.

“This is equivalent to someone coming into your home, putting your valuables in a safe and not telling you the combination,” said Oliver Friedrichs, a security manager for Symantec Corp.

The FBI said the scheme, which appears isolated, was unlike other Internet extortion crimes. Leading security and antivirus firms this week were updating protective software for companies and consumers to guard against this type of attack, which experts dubbed “ransom-ware.”

This is just dumb. “Hackers have found a way to lock up the electronic documents on your computer…”? Viruses and other forms of hostile code capable of deleting, encrypting, scrambling, stealing, or corrupting files have been around for as long as I can remember. An ICSA report documents this significantly more widespread extortion attempt from 1989, for instance:

[T]he Aids Trojan … was concealed on diskettes labelled “Aids Introductory Information Diskette” offering information on the human AIDS virus. The diskettes were mailed worldwide from London in December 1989, and when installed displayed a licence agreement and printed invoices for $189 or $378. Users were instructed to send the money to a fictitious PC Cyborg Corporation at an actual PO Box number in Panama, otherwise their PC would cease to function. This was no empty threat; after a variable number of power-ups since its installation the Trojan rendered the PC inoperable. At the end of January 1990, Joseph Popp was arrested by the FBI in Ohio, extradited to London and charged with 11 counts of blackmail… [I]t was estimated that this Trojan was intended to extort at least … 6 million [pounds].

This AP story takes an incident that the reporter acknowledges is “isolated,” which was reported by a publicity-seeking security software firm, and tries to turn it into a trend story. He doesn’t bother talking to any independent security researchers and instead interviews spokespeople for three companies that clearly stand to benefit financially from security-based panic. And I just about lost it when I read that the evil hacker asked for … gasp! Two hundred dollars! Clearly, this is not Dr. Evil we’re dealing with.

The story ends with this paragraph that basically cuts off its own legs:

Experts said there were no widespread reports the new threat was spreading, and the Web site was already shut down where the infection originally spread. They also said the hacker’s demand for payment might be his weakness, since bank transactions can be traced easily.

Oh. I see. Never mind.

There’s no trend here, folks. It’s one of the most fundamental principles of security: If you let someone else install software on your computer, it’s not your computer anymore.

Bridis deserves extra demerits for this lame story.

Update: Add Brian Krebs of the Washington Post to the Dishonor Roll. In his usually trenchant Security Fix blog at washingtonpost.com, Krebs falls overboard for this one:

In what could be a harbinger of the next big fad in online crime, Internet scammers are now trying to extort money from Microsoft Windows users by scrambling text files on victims’ PCs and then requesting payment for a computer program needed to decode the documents.

“Harbinger of the next big fad in online crime”? I doubt it. And “scammers” (plural)? Nope. One isolated incident. He does note, correctly, that this example exploits a security flaw in Internet Explorer that was patched last July.

Yet another update: More uncritical sources continue to pick this story up and fling it around the Internets. Neowin reprints the story unquestioningly, and so does Ed Oswald at Betanews (although an alert commenter quickly provided Betanews readers with a link to this page – thanks, Zaine!). And alas, a scan of Google News reveals that the story has been picked up by more than 400 sources.

“Poisoned” media files wrap-up

The other day I mentioned Microsoft’s new Security Advisory service. The first update in the series has been released, and (surprise!) Microsoft Security Advisory (892313) covers the issue of Windows Media files that can serve as vehicles for delivering unwanted software:

In March 2005, Microsoft issued an update to Windows Media Player to address the issue discussed in this advisory. Microsoft was made aware that malicious attackers can potentially create media files that could then trigger the launch of a Web site without further user interaction. This Web site could potentially then try and trick the user into downloading and executing malicious software add-ons, such as spyware. This social engineering attack abuses a by-design feature in Microsoft Windows Media Player Digital Rights Management (DRM) technology that requires users to have a license to playback a media file.

It’s an excellent summary of an issue I’ve been writing about since the beginning of the year, and I hope it’s a sign of a new awareness about this sort of security issue.

(And a tip of the hat to Eric L. Howes, Ben Edelman, Andrew Clover, Suzi at Spyware Warrior, and Ryan Naraine at eWeek for their input on this issue.)

Microsoft kicks off new security service

Ryan Naraine at eWeek has word of a new Microsoft security service:

Microsoft plans to unveil a new security advisories service next Tuesday as part of an aggressive long-term effort to revamp the way it reacts to publicly reported software vulnerabilities.

The pilot project, which is independent of the scheduled monthly security bulletins, represents a major shift in the way the Redmond, Wash.-based software maker communicates with customers when information on security flaws is published by gray hat hackers and private research outfits.

The new offering, dubbed Microsoft Security Advisories, gives engineers at the MSRC (Microsoft Security Research Center) an outlet for providing instant feedback, guidance and mitigations when researchers jump the gun and release vulnerability details before a patch is available.

This is very good news, good enough to warrant interrupting a vacation! In this new program, security experts at Microsoft will be able to issue advisories with detailed advice without having to wait for a formal update to work its way through the Microsoft bureaucracy.

According to Ryan Naraine’s story, the impetus for this new program was a pair of embarrassing episodes – one in which a patch was issued but not properly documented, and the other involving the issue of “poisoned” Windows Media files, for which a patch was issued only after three months.

When it comes to security, transparency is a very good thing.

Gmail blocks phishers

I just received yet another “phishing” attempt from someone trying to get me to give up my eBay account information. It came to my Gmail account, and like most such attempts it was a painfully obvious fraud.

What was most impressive, though, was how Gmail handled the message. For starters, it landed in my Spam folder, with a big red banner at the top of the message warning me “This message may not be from whom it claims to be.”

Ebay_phish

Even better, the URL in the message had been disabled. I was able to dig deep into the Gmail interface and find the HTML source code of the original message, where a link to the phisher’s Web site was buried. But that clickable link didn’t survive in the message that actually landed in my Inbox. And finally, the More Options button on the message window included a Report Phishing link, which I used.

Very nice work, Google!

Oh, and I have yet another stack of 50 Gmail invites, so if you’re looking for your own Gmail account, send a note to edbott (at) gmail.com and I’ll send you an invite.

Finally, a (partial) solution for “poisoned” Windows Media files!

Update: The original version of this post contained an error. According to my testing, the most recent version of Windows Media Player 10 does not include all of the fixes referred to in this article. The Windows Media FAQ offers this confusing explanation: “If you installed the latest update to Windows Media Player 10 (version 10.00.00.3802 or later), clearing [the Acquire Licenses Automatically] setting will potentially affect all protected files that you try to play, burn, or synchronize. If you have not installed the latest update to Windows Media Player 10, this setting will only affect certain types of protected files.” See the updated instructions below.

Microsoft has finally released an update that protects some users of Windows Media Player 9 Series from media files that try to install spyware/adware by exploiting a flaw in the license acquisition process. (For background on this issue, see How to fumble a security update.)

The procedure for fixing this issue varies depending on your Windows version and which version of Windows Media Player you’ve chosen to use. Microsoft has done a terrible job of getting out the word that an update is available, and as a result most Windows users are still unprotected. The full version of this post contains detailed instructions and is a must-read for any Windows user.

Continue reading “Finally, a (partial) solution for “poisoned” Windows Media files!”

More on Firefox Critical Updates

In the comments to my previous post, Ryan Walters notes that he’s running Firefox 1.0 and doesn’t see any update icon. That’s not good.

Here’s what the generic icon looks like:

Ff_update_icon

When you click the green icon, it checks for updates. After it completes the check it displays this dialog box:

Ff_update

The dialog box tells you there’s a Critical Update, and you should install it immediately. At that point it even turns the update icon red. But none of that information appears until you specifically click that oh-so-subtle icon.

So why didn’t Ryan see that icon? I don’t have a copy of Firefox 1.0 installed, so I can’t say. It’s possible that the Auto Update option isn’t enabled on his computer. (Click Tools, Options, click the Advanced icon, and select the Firefox check box under the Periodically check for updates heading.)

Update: As I was writing this, a pop-up notice (“Updates available”) appeared in the tray area at the lower right side of the screen. Windows developers call this sort of notice “toast.” Unfortunately, it went away almost immediately.

Like I said earlier, this isn’t an acceptable update mechanism for software that is intended for use by a broad-based, non-technical audience. If Firefox wants to preserve its reputation as the secure alternative to IE, it has to protect every single user from exploits that can install unwanted software.