- This topic is empty.
-
AuthorPosts
-
January 9, 2006 at 5:00 pm #591946
Anonymous
Inactivehttp://www.casinoaffiliateprograms.com/bb/trojan-found-from-gam-website.9347.html?
WTF?
Enquiring drones want to know what kind of blackhat cloaking this guy is doing.
I don’t want to scare him off, I want him to feel safe and spill some more beans.
Anyone here have any idea what he is doing?
January 9, 2006 at 5:28 pm #680188Anonymous
InactiveIt sounds like it is not ClarkPromotions website (from what he says), but he obviously understands cloaking pretty well if that is what is going on. I’m not going to check out the website because I don’t need anything loaded onto my PC accidentally or otherwise.
All we can do is try to pry it out of him and see what he knows. I’m sure we can get information out if we are careful. However, we would need a very diplomatic person to try… Not all of us are like that
January 9, 2006 at 5:54 pm #680189Anonymous
InactiveDon’t worry about it – it is NOT a virus. It is simply a small exploit in IE that allows a page to be cloaked based on certain conditions. I don’t want to go into details about what exactly the exploit does and why a webmaster would want to use it (all I need is a bunch of affiliate drones using my tricks to compete with me) – but I will say that it’s nothing to worry about and in no way jeopardizes your computers privacy or security.
All I need is a bunch of affiliate drones using my tricks to compete with me?
January 9, 2006 at 5:57 pm #680190Anonymous
InactiveGood point
I read that part, then somehow modified my own thought after reading his second post. I read them on 2 separate occasions… But, I AM getting old
Yes – we should find out what this person is doing, but I still maintain that we need someone who is very diplomatic to do so. If not, then he/she will be scared away and we will know nothing.
January 9, 2006 at 6:01 pm #680192Anonymous
InactiveWell, he is talking about selective cloaking – he has a program figuring out if you are an engine or a visitor.
January 9, 2006 at 6:04 pm #680193Anonymous
InactiveYes – But what is he cloaking? What exactly is he ‘feeding’ to the search engines? Is it a direct scraping of any of our sites?? Or is it just spam for the SE containing a lot of keyword-heavy html? That’s the kind of info I would be interested in knowing.
January 9, 2006 at 10:00 pm #680212Anonymous
InactiveSame thing 888 does if I had more time I would look into it. I working on my site all week I promised. greek39
Which person are we talking about here?
Anyway the newest wave of viruses the latest and the worst one i have seen in years is the one Jeff from Wager profits got. Here’s the facts
Vulnerability Note VU#356600
Microsoft Internet Explorer DHTML Editing ActiveX control contains a cross-domain vulnerability
Overview
A cross-domain vulnerability exists in the DHTML Editing ActiveX control. An attacker may be able to execute arbitrary script in the Local Machine Zone or read or modify data in other domains. For example, the attacker could execute arbitrary commands with parameters, download and execute arbitrary code, read cookies, spoof content, or modify form behavior.
I. Description
The Cross-Domain Security Model
IE uses a cross-domain security model to maintain separation between browser frames from different sources. This model is designed to prevent code in one domain from accessing data in a different domain. The Internet Security Manager Object determines which zone or domain a URL exists in and what actions can be performed. From Microsoft Security Bulletin MS03-048:One of the principal security functions of a browser is to ensure that browser windows that are under the control of different Web sites cannot interfere with each other or access each other’s data, while allowing windows from the same site to interact with each other. To differentiate between cooperative and uncooperative browser windows, the concept of a “domain” has been created. A domain is a security boundary – any open windows within the same domain can interact with each other, but windows from different domains cannot. The cross-domain security model is the part of the security architecture that keeps windows from different domains from interfering with each other.
The DHTML Editing ControlThe DHTML Editing Control is a wrapper for the MSHTML editor. It is an ActiveX control that provides the ability to perform text and HTML editing functions. The control is marked “safe for scripting,” which means that the DHTML Editing Control could be called from Internet Explorer. The LoadURL method, which is traditionally used to open web page content in the DHTML Editing Control, will only open documents in the same domain as the host page. When used with a certain combination of script commands, the DHTML Editing Control can open the content of an arbitrary web page in any domain, regardless of the domain of the host page.
The Problem
The DHTML Editing Control is vulnerable to a cross-domain violation. When the DHTML Editing Control opens the content from a website, it appears to operate within the security context of that website. While the DHTML Editing Control has the security context of the opened site, the DHTML Editing Control is under full control of the page that hosts it. Working indirectly through the DHTML Editing Control, a website in one domain has the ability to access information in another domain or zone.
II. Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker may be able to execute script in the Local Machine Zone. Script that executes in the Local Machine Zone can be used to download and execute arbitrary code. An attacker may obtain full access to web content in another domain, which may reside in a different security zone. The impact is similar to that of a cross-site scripting vulnerability. This includes the ability to spoof or modify web content, access website information such as cookies, or retrieve data from an encrypted HTTPS connection. For a more detailed description of the impact of cross-site scripting vulnerabilities, please see CERT Advisory CA-2000-02.
III. Solution
Install an update
Install the update referenced in MS05-013. With this update, the cross-domain security model is enforced with the DHTML Editing ControlIn a sense it could be viewed as a virus.
When I cruise the net I always disable my active scripting. This person your are referring to I believe is a scumbag and has no place on this forum. He’s been here for a while and his dirty tricks are now exposed. He’s many things scraper, black hatter and a fuckin no head. This guy pissed me off beyond my tolerances. Fuckin Idiot,its his fuckin deed!!! :Pisser:
January 10, 2006 at 4:23 am #680244Anonymous
InactiveHere’s some more this is the one I invited in last week.
Currently, security firms are warning that machines can be attacked if users do any of the following:
open a malicious .WMF file in Windows Picture and Fax Viewer
open a malicious .WMF file in Windows Picture and Fax Viewer
or preview a malicious .WMF file in Windows Explorer
However, the number of attacks could increase dramatically if malicious hackers find more automated ways to target systems, such as using e-mail, instant messages or file sharing, according to Ken Dunham, director of the rapid response team at VeriSign’s iDefense.
Attacks so far have been limited to installation of adware and spyware on compromised machines, but “you’re probably going to see Trojans and more sinister code develop and emerge in the next few days,” Dunham said in an interview.
There is no patch for the security hole. While some workarounds are being suggested on the Web, Dunham is only validating this one for disabling .WMF file handling: First, users should click on the Start button on the taskbar. Then they should click on Run, type “regsvr32 /u shimgvw.dll” and click “Ok” when the change dialog appears.
However, Dunham warns that recent vulnerabilities related to .WMF have also included .EMF files and that “it is possible that exploitation might still be possible through alternative file types such as EMF,” he wrote in an e-mail alert. “For now, the WMF disabling workaround may help mitigate attacks against vulnerable Windows XP/2003 computers. This workaround may impact the display of thumbnails or other images on the computer.”
Microsoft is investigating “new public reports of a possible vulnerability in Windows,” said a company spokesman. “Upon completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a fix through our monthly release process or issuing a security advisory, depending on customer needs.”
In the meantime, Microsoft encourages its customers follow its recommended security practices, he wrote. Users who believe they have been affected can contact Microsoft’s product support team, he wrote. Ways to make this contact vary depending on where users are based. More information can be found on the Microsoft website.Dunham characterises the threat as “significant,” while Secunia rates it “extremely critical.” Symantec Corp. labels it as a “level two” threat, on a scale in which “level four” is the most critical.
Secunia lists the vulnerable operating systems as Windows Server 2003 Datacenter Edition, Windows Server 2003 Enterprise Edition, Windows Server 2003 Standard Edition, Windows Server 2003 Web Edition, Windows XP Home Edition and Windows XP Professional.January 10, 2006 at 5:10 am #680250Anonymous
InactiveGreek,
One of the reasons I mentioned that we should be a bit political/diplomatic in finding out more information is the old phrase ‘Keep your friends close and your enemies closer’.
I doubt he will respond to your allegations, but I also believe that he is probably (while very likely allowing an exploit) NOT sending out a virus. Not everyone knows how to use the exploits of IE or any other browser.
I believe that he is probably cloaking and maybe scraping. However, by shutting him up… we will likely not ever know the true extent of it.
For example, we may know of his one site… But if he is a BH, then he likely has a shit-load of sites that we could have uncovered.
If we were able to uncover those sites, we could have shut them ALL down… Not only that, but if we created a bit of an alliance, we could have checked for his ‘pattern’ and occasionally grouped up and searched for his new sites.
So….. sorry to say, but try not to let someone like that get under your skin so quickly. We need to know who they are to shut them down (and ALL their sites).
kw
January 10, 2006 at 5:29 am #680252Anonymous
InactiveWell I kinda figured that out I couldn’t help myself. It all makes sense now! I sent him two pm no responses.
How he pull theses tricks off is the way I mentioned. He used the technique I mentioned and he’s been watching me or us for quite sometime.
I want this fellow in the worst way possible. I have a hunch he is part of the 888 thing as well.
Sorry if I got carried away a little in the public forum. But in my PM I sent him to my chollegues site hopefully for some whipping. I doubt that he went.
I can spell worth shit right now, but I know he the one behind this scheme. He manipulated me for information and I am pissed.
Oh yeah I found this in his source code the whole code is java combinned with activex
action=”index.aspx?src=o&kwd=cs” language=”javascript” onsubmit=”if (!ValidatorOnSubmit()) return false;” id=”form5″>
I’M going after this guy on my own I have the facts and he wasted 8 hours of my time. Location Israel he is connected to 888 as well. greek39
January 10, 2006 at 1:10 pm #680268Anonymous
InactiveI hate it when people put a bunch of letters and numbers all together like that :laughcry:
Seriously, I know a lot of coding and I have no idea what that is all about.
January 10, 2006 at 3:06 pm #680279Anonymous
Inactivewell I didn’t want to start my day with this. The entire page I visited last night was all in javascript. I only copied a piece if code the letters is a mask for the real coding language its hidden from public view. Also notice the activex.
The site is for sure a scaper site I recorded the IP’s and some aff tags. The site was created on December 21/05 its exactly the the type of code used to exploit as I mentioned in a couple of my previous posts. The server provider severs 3 sites probalbly all of his.
I received after visiting 60 adware and spyware crap on my computer. On a interesting note remeber last week some casino affiliates got a nasty worm with a .wmp extension. I think it was lauched by this guy it just too much of a coincidence they all received the same worm on the same day directly addressed to them.
But it appears this gut won’t be returnning. He has still not reposted nor pm me back. I hope he visited the site I told him to go to.
I won’t involve CAP for obvious reasons. greek39
January 10, 2006 at 3:36 pm #680285Anonymous
InactiveDominique wrote:I don’t want to scare him off, I want him to feel safe and spill some more beans.Can we please stick with this?
Ok, for one thing he is implanting cookies me thinks. Are these cookies going to tell the site what to show the visitor? I think so. It will show the visitor one thing and the search engine another.
a text file in the default cookies folder explicitly being accessed
Right?
But in a sinister way:
was infected by the Exploit-IEPageSpoof trojan and has been deleted …
Plus a smart way of cloaking:
Magic – he has been listed on adwords for the every one of the largest poker keywords for the past 8 weeks yet Google has never taken him down for gambling content. The only thing black hat about him is he’s figured out how to get around all PPC monitoring and 99.9% of affiliates haven’t!
I want to keep this guy talking, please.
I am no tech and a lot of you understand this a lot better and I wish some would come forth and explain here.
January 10, 2006 at 4:25 pm #680290Anonymous
InactiveWhat is happening is cloaking then scraping. Cloaking is a different version of a web site the cloaked site is a black hatter scraped site. This is done by activex ( active scripting ).
So say a person goes to my site under cetain conditons it will show a different site for some people who have not patched the hole in their IE firewall. This hole in the firewall is a newly discovered one, found in December 2005. So for this to work you must have a unpatched firewall and the virus.
Alot of no good people are jumping on this expliotation to lauch such attacks. The virus already mentioned does the following according to microsoft
The DHTML Editing Control is vulnerable to a cross-domain violation. When the DHTML Editing Control opens the content from a website, it appears to operate within the security context of that website. While the DHTML Editing Control has the security context of the opened site, the DHTML Editing Control is under full control of the page that hosts it. Working indirectly through the DHTML Editing Control, a website in one domain has the ability to access information in another domain or zone.
II. Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker may be able to execute script in the Local Machine Zone. Script that executes in the Local Machine Zone can be used to download and execute arbitrary code. An attacker may obtain full access to web content in another domain, which may reside in a different security zone. The impact is similar to that of a cross-site scripting vulnerability. This includes the ability to spoof or modify web content, access website information such as cookies, or retrieve data from an encrypted HTTPS connectionThis I believe enables your browser to do. So the people infected or who not updated the firewall patch when browsing are seeing different web pages.
By updating the IE firewall this closes this hole. This could explain the defensive nature of this guy.
Also this guy has never droppoed his url I wish he would. Closely read what microsoft had to say about this latest virus. It does alot more, an attacker can gain access too web content in another domain in a different security zone (possible firewall), modify web content, access website cookies ect..
Hey Dom I thought you were on holidays?
greek39
This is speculation!
January 10, 2006 at 6:10 pm #680299Anonymous
InactiveJust got back. Wasn’t a holiday – I went to a conference in Vegas, attended one lecture that interested me and came back home.
And since I have a brand new forum to watch over I made a huge exeption and took my laptop. Usually I regard travelling as an excuse to get away from it all and ignore the existance of laptops and hotel internet connections.
I understand about a third of the above.
Is this the vulnerability that is supposed to have a fix on the 10th or another?
If it already has a fix, do you have a link?
-
AuthorPosts