Saturday, October 07, 2006

Worm automates Google AdSense fraud

Virus writers have crafted a malware threat that serves up expensive Google AdSense web pages related to mesothelioma, a rare cancer caused by exposure to asbestos.

Industry workers affected by the disease have launched a series of lawsuits, a factor that means "ambulance chasing" lawyers pay through the nose to get a mention when searches for the term "mesothelioma" are made. The cost-per-click for the term "mesothelioma" is among the highest in the online ads business ranging from $4 to $13 and higher on various keyword bidding networks.
This, in turn, makes the term a prime target for click-fraud. Google AdSense allows online publishers to make revenue by displaying Google ads relevant to the content of their site. Because Google pays the host Web site based on the number of clicks on their ads, the process can be susceptible to "click-fraud".

The KMeth worm, which targets Yahoo! Messenger users, directs infected users to a web site serving a barrage of Google AdSense advertisements related to mesothelioma. Financially-motivated malware writers apparently hope to cash on the ruse through shares in the resulting advertising commissions which we doubt will materialise. Fraud detection mechanisms employed by Google are more than likely to identify rogue sites generating suspiciously high returns using such illicit tactics but that doesn't eliminate the other security risks consumers face from the worm.

KMeth exploits IE vulnerabilities to infect surfers who visit malware infested sites controlled by hackers, promoted through IM messages sent to the Yahoo! Messenger contacts of infected users. The "status message" in Yahoo! Messenger can also be also hijacked, presenting potentially enticing messages to their contacts, such as "check out my blog" in order to trick potential marks into becoming infected, IM security firm FaceTime reports.

Meanwhile an infected user's IM control panel is disabled, and their home page is hijacked to point towards rogue web sites designed to generate maximum revenue through click fraud. Using malware to perpetrate click-fraud is an established technique but the KMeth worm extends this idea by employing a battery of social engineering techniques.

"Typically, financially-driven malware attacks use botnets to fraudulently increase traffic to specific online advertisements," said Chris Boyd, director of malware research for FaceTime Security Labs. "In this case, the hackers have cleverly borrowed tactics from botnet-creators to create a bot-less network of hijacked PC users to drive traffic to sites populated with these specific Google AdSense advertisements. Introducing the human factor into the scenario makes these 'bot-less nets' much more difficult to detect."

MySpace acquisition a $20 billion fraud?

Brad Greenspan, one of the original founders of the MySpace universe, published a report that claims that News Corp.'s 2005 acquisition of MySpace may have defrauded shareholders by "more than $20 billion." Greenspan has requested further investigation by the Securities and Exchange Commission, the U.S. Department of Justice and the U.S. Senate Committee on Finance.

Greenspan claims that records he obtained indicate "one of the largest merger and acquisition scandals in U.S. history." According to the former chairman and chief executive officer of Intermix Media, which invested $1 million into the creation of MySpace, shareholders "were blatantly misled into voting for a quick and unfair sale" and "deliberate steps were taken to withhold and manipulate information." He also claims that money was improperly gained and laws were broken.

Greenspan hopes that MySpace's $580 million acquisition by News Corp. in July 2005 will be "unwound" and MySpace will be independent. "An independent MySpace is significantly better for its users and shareholders," he said. The report, freely available at freemyspace.com, lists several quotes - which Greenspan says are taken from email conversations between the parties involved in the acquisition: If authentic, the emails could provide some evidence that the negotiating individuals were aware of a much higher value of MySpace, and profited from the deal later on.

A key accusation of Greenspan is that Intermix and News Corp. withheld information about the revenue of MySpace, which grew "at a 1200% annualized rate" and was on track hitting $250 million for the year. "Shareholders were forced to trust the recommendation of Intermix' Board and were under the impression MySpace was unable to turn its massive traffic into revenues," Greenspan writes.

So how does Greenspan fit into this picture?

Greenspan, who founded eUniverse, claims to have had the idea for MySpace and is believed to have spent about $1 billion to get MySpace with his firm off the ground back in 2003. Other key people involved in the founding included by Tom Anderson and Chris DeWolfe, the current chief executive of MySpace. After arguments - which included accounting issues - with board members, Greenspan was forced to the leave the company, which changed its name to Intermix Media after his departure. Greenspan tried at least twice to claim back his company in proxy proceedings, which, however, were unsuccessful. Greenspan ended up with a $47 million check from the News Corp. acquisition of Intermix.

His claim that MySpace was worth substantially more than the $580 million News Corp. paid, could either increase his check or hand him back a social networking site that currently has more than 110 million members, a $900 million Google advertising deal as well as recently announced music distribution agreements for its members.

Greenspan now aims his accusations at Richard Rosenblatt, who took over at eUniverse and Intermix as CEO after Greenspan's departure. "In addition to Rosenblatt's stunning and incriminating emails, the two highest non-director senior executives, chief financial officer Lisa Terrill and chief operating officer Sherm Atkinson, have come forward through their legal counsel indicating significant breaches of fiduciary duty by Rosenblatt and the directors as part of the News Corp. transaction," Greenspan said. "The MySpace Report" shows that Richard Rosenblatt knew before the transaction that MySpace was well on its way to becoming worth at least $20 billion."

MySpace did not comment on Greenspan's accusations.

Google Code Search - Good/ Bad

Google on thursday unvieled Code search as a tool to help simplify life for developers, can also be misused to search for software bugs, password information, and even proprietary code that shouldn't have been posted to the Internet in the first place, security experts said Friday.

Unlike Google's main Web search engine, Google Code Search peeks into the actual lines of code whenever it finds source-code files on the Internet. This will make it easier for developers to search source code directly and dig up open-source tools they may not have known about, but it has a drawback.

"The downside is that you could also use that kind of search to look for things that are vulnerable and then guess who might have used that code snippet and then just fire away at it," said Mike Armistead, vice president of products with source-code analysis provider Fortify Software Inc.

Attackers could also search code for vulnerabilities in password mechanisms, or to search for phrases within software such as "this file contains proprietary," possibly unearthing source code that should never have been posted to the Internet.

Security experts say that the security implications of Google Code Search are noteworthy, if not earth-shattering.

Skilled hackers may already be able to do this type of search with Google's Web search engine, but Code Search is "another tool that makes it a tad easier for the attacker," said Johnny Long, a security researcher with Computer Sciences Corp, in an e-mail interview.

For its part, Google did not have much to say about possible misuse of its new product. "Google recommends developers use generally accepted good coding practices including understanding the implications of the code they implement and testing appropriately," the company said in a statement.

Google has never said much about the steps it takes to cut down on this kind of misuse of its search engine, though the issue comes up from time to time. In July, Websense Inc. used a little know binary search capability within Google Inc.'s search engine to look for malware on the Internet.

While Google Code Search will probably not have much of an effect on popular open-source projects, which are already heavily scrutinized, it could help ferret out vulnerabilities in lesser known pieces of code, according to Lev Toger, a software developer with Beyond Security Ltd.

"Using Google's code search, it's much easier to find interesting code portions," he said via e-mail. "If your task is to find vulnerability in some random code, this filtering can save you a lot of time. "

Google to buy YouTube for $1.6 billion

Google is close to buying YouTube for $1.6bn, according to reports. Props for the scoop, if the talks pan out, go to TechCrunch, the Red Herring of the Web 2.0 Generation, which today reported this "completely Unsubstantiated Google/YouTube Rumor". The WSJ today also says that Google and YouTube are negotiating and mention $1.6bn as the price. But this could merely mean that the two publications have the same source.

According to the WSJ, the talks are at a sensitive stage and could break off. Which would be madness on YouTube's part, if it was doing the breaking. This enormously popular bazaar of video pratfalls, US government propaganda and stolen TV and film clips, needs a sugar daddy.

At some point the VC money will run out, and at some point, it will be landed with a big copyright suit. Google has voluminous pockets; it has the servers and the bandwidth, and it is willing to tough it out with just about any copyright holder that gets its way. And while it may be the daddy of text search, it trails far behind YouTube, when it comes to video.

YouTube's owners would be daft not to cut and run. ®

Google subpoenas rivals in copyright suits

Google is planning to subpoena Yahoo, Microsoft, and Amazon for documents pertaining to the copyright infringement suit brought against Google over its book-scanning project.

Microsoft and Yahoo announced plans for similar projects in 2005. They are part of the Open Content Alliance, an organization devoted to creating a permanent archive of various texts. It includes Britain's National Archives and the University of California.

Through the subpoenas, Google hopes to find information, including the copyright status, of books that have been scanned and are a part of the projects from the rival sites. Amazon allows viewers to see selected material from books before purchasing them, although publishers must consent to this beforehand.

Publishers and authors have sued Google because they have been posting copyrighted material from books on their site, without permission. Google contends that the entire scope of the project is in compliance with copyright law because only partial content is available to the public.

"We have also made clear to these organizations that we will work with them to address any concerns about their confidential information," said Google spokeswoman Megan Lamb.

Subpoena notices were filed on 26 and 29 September. A U.S. District Judge ordered that the acquired information be confidential and used for litigation purposes only.

Google's book scanning project currently includes books from seven libraries, including Stanford and Harvard. Google apparently has published content without consent from the individual copyright holders of the books, but the company says say that publishers may opt out of the project. This is unlike MSN's project, which focuses exclusively on out-of-copyright and non-copyrighted material, and similar projects from Amazon and Yahoo, which require consent from the publishers ahead of time.

Security Vendors Reject Microsoft's Call for Innovation

Microsoft contends that its partners should embrace the security features being added to its Vista operating system instead of complaining about them, but software makers including Symantec and McAfee said that the company's mandate for new product innovation only benefits its own interests.

At the crux of the dispute is Microsoft's contention that controversial security features included in Vista, its next-generation Windows OS, have been added merely to provide an adequate "baseline" of protection for users.

Meanwhile, its oldest and largest security software partners, including Symantec and McAfee, said that the tools have been designed to put their products at a disadvantage and give favor to rival technologies made by Microsoft.

When presented with the security companies' issues, Microsoft defends that it has taken the opportunity with Vista to blend much needed security protection into Windows, which has long been the primary target of virus writers and other hackers.

The features may make it harder for its partners to build new products that work with Vista, but the addition of security features is an evolutionary development demanded by users' need for onboard OS protection, Microsoft leaders said.

Rather than protesting that its work has made new product development more difficult, Symantec and McAfee need to think of new ways to build their applications to build off of innovations offered in Vista, which is due out in November 2006, said Ben Fathi, corporate vice president of the Microsoft's Security Technology Unit.

"What we haven't heard is how those companies that are complaining will do that themselves, and raise the bar to improve their own products," said Fathi.

"Basically they are saying they have had this market and their products, and that they want all that to stay the same. I'm sorry, but the world has moved on and we now have a more secure platform; that's the way the computing world works."

Pushed further, Fathi makes no secret of his belief that the security vendors are merely trying to defend revenue streams that may be threatened by the features added in Vista, which include the addition of anti-malware tools to fight spyware and phishing that have typically been provided by aftermarket companies such as Symantec and McAfee.

"They're asking us to ship a less secure operating system to keep the patients sick so they can keep serving up the medicine; but instead of doing that they need to innovate just like we have," Fathi said.

The dispute revolves specifically around Microsoft's use of its PatchGuard and Windows Security Center features in Vista, both of which have already been offered by the software giant in other versions of its products, Fathi points out.

PatchGuard, which forbids Windows applications from accessing the Vista kernel in the 64-bit iteration of the OS, will keep security technologies such as behavior monitoring systems from working as well as they have in the past, when they have been allowed to touch the kernel, claim the security vendors.

Microsoft, based in Redmond, Wash., maintains that locking down the kernel is a necessity to fight malware such as rootkits, and that its own security technologies won't access the kernel either.

Windows Security Center—meant to help consumers ensure they have necessary software patches in place and keep their security applications updated, and maintain valid licenses for the programs—will block similar features offered in existing anti-virus packages from Symantec and McAfee, executives from those companies said.