Bitcoin Forum

Other => Beginners & Help => Topic started by: chris267 on May 31, 2013, 07:06:40 PM



Title: Be careful what you're running! - .Jar instant stealer
Post by: chris267 on May 31, 2013, 07:06:40 PM
Just a heads up to all your people who have a wallet.dat saved on your computer.

New virus coded in java will automatically send your funds to an address without you even knowing,

demonstration video:http://www.youtube.com/watch?feature=player_embedded&v=7Qx9x780RE0

Since compiled size of this .jar file is just 4KB you are very susceptible to online web exploits with such a small file,

It's also FUD meaning its fully undetectable by all antiviruses, since it is also coded in java and not your standard executeable (.exe) it is harder for AV's to pickup detections making the file stay undetected for a very long time..




My best advice:

Anti-viruses will not save your ass in such a scenario, I personally know that viruses are able to bypass AV's, the best freeware available is malwarebytes, have a full scan of your syste,

Malwarebytes PRO is even better - there is constant filesystem protection and website scanning as you browse your computer, it works much better in comparison to ALL AV's (believe me I've tested it) and also allows you to do flash scan to analyze memory and autorun objects.


If anyone requires any help with cleaning their system or Q's post here/PM and ill do my best to help


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: Birdy on May 31, 2013, 07:09:43 PM
How about just deactivating java in your browser?


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: chris267 on May 31, 2013, 07:12:38 PM
How about just deactivating java in your browser?

That wouldn't be an option, deactivating java in your browser doesn't stop 0day exploits from downloading/executing .jar files onto your system


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: Ethicoin on May 31, 2013, 07:19:25 PM
How about just deactivating java in your browser?

That wouldn't be an option, deactivating java in your browser doesn't stop 0day exploits from downloading/executing .jar files onto your system

Are you sure about this? I mean you did say in your OP "it's also FUD" which actually means it is just misinformation trying to scare people!

 :D

Just thought that was particularly funny  ;)


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: chris267 on May 31, 2013, 07:28:55 PM
How about just deactivating java in your browser?

That wouldn't be an option, deactivating java in your browser doesn't stop 0day exploits from downloading/executing .jar files onto your system

Are you sure about this? I mean you did say in your OP "it's also FUD" which actually means it is just misinformation trying to scare people!

 :D

Just thought that was particularly funny  ;)

I don't see the joke? Well English isn't my first language.. I try  ;D


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: h3x on May 31, 2013, 07:33:13 PM
My 2 cents (as an experienced systems administrator and bitcoin newbie):

Nothing will help better than safe browsing practices and an up to date anti-virus solution. The cat and mouse game of the virus creators and the anti-virus companies will always be an issue. That virus creator only has to be right once to get his hands on your important data.

I have a blockchain.info account but I keep my main wallet on a Windows 7 Virtual Machine. The VM has full disk encryption (truecrypt), all Microsoft security patches are installed, and it is turned off when not in use. It only runs armory, bitcoin-qt and anti-virus. Only downside is it usually only takes about 30-60 minutes to sync back up with the blockchain after being turned off for a few days

I also plan on setting up a completely offline wallet using ubuntu on an older netbook that I can stash in a safe.

I don't have too much money in bitcoin right now but I hope to see my mining and monthly deposits reach some serious worth.

I like to think I am very security conscious but maybe I am just paranoid


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: escrow.ms on May 31, 2013, 07:37:07 PM
That's why i don't use JAVA..





Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: Ethicoin on May 31, 2013, 07:44:36 PM
My 2 cents (as an experienced systems administrator and bitcoin newbie):

Nothing will help better than safe browsing practices and an up to date anti-virus solution. The cat and mouse game of the virus creators and the anti-virus companies will always be an issue. That virus creator only has to be right once to get his hands on your important data.

I have a blockchain.info account but I keep my main wallet on a Windows 7 Virtual Machine. The VM has full disk encryption (truecrypt), all Microsoft security patches are installed, and it is turned off when not in use. It only runs armory, bitcoin-qt and anti-virus. Only downside is it usually only takes about 30-60 minutes to sync back up with the blockchain after being turned off for a few days

I also plan on setting up a completely offline wallet using ubuntu on an older netbook that I can stash in a safe.

I don't have too much money in bitcoin right now but I hope to see my mining and monthly deposits reach some serious worth.

I like to think I am very security conscious but maybe I am just paranoid

No this isn't paranoid - this is smart :)

You could just use Electrum in your Windows VM to get around the blockchain syncing problem.

Also you could make a paper wallet and send your coins there :)


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: OpenYourEyes on May 31, 2013, 08:21:23 PM
How about just deactivating java in your browser?

That wouldn't be an option, deactivating java in your browser doesn't stop 0day exploits from downloading/executing .jar files onto your system

Are you sure about this? I mean you did say in your OP "it's also FUD" which actually means it is just misinformation trying to scare people!

 :D

Just thought that was particularly funny  ;)
Can't tell if that is sarcasm or not, but FUD in the security scene = Fully Undetectable


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: nqzdepofltr on May 31, 2013, 08:43:52 PM
This scam is also running with Bitcoin "Wallet hackers". Usually it includes a smtp stealer which sends your wallet to the scammer.


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: escrow.ms on May 31, 2013, 08:45:49 PM
This scam is also running with Bitcoin "Wallet hackers". Usually it includes a smtp stealer which sends your wallet to the scammer.

Yup..

http://cache.gyazo.com/49ce344a388a9b8e9ab1834ef2968867.png


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: chris267 on May 31, 2013, 08:47:56 PM
How about just deactivating java in your browser?

That wouldn't be an option, deactivating java in your browser doesn't stop 0day exploits from downloading/executing .jar files onto your system

Are you sure about this? I mean you did say in your OP "it's also FUD" which actually means it is just misinformation trying to scare people!

 :D

Just thought that was particularly funny  ;)
Can't tell if that is sarcasm or not, but FUD in the security scene = Fully Undetectable

Exactly what I thought.


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: chris267 on May 31, 2013, 08:53:46 PM
My 2 cents (as an experienced systems administrator and bitcoin newbie):

Nothing will help better than safe browsing practices and an up to date anti-virus solution. The cat and mouse game of the virus creators and the anti-virus companies will always be an issue. That virus creator only has to be right once to get his hands on your important data.

I have a blockchain.info account but I keep my main wallet on a Windows 7 Virtual Machine. The VM has full disk encryption (truecrypt), all Microsoft security patches are installed, and it is turned off when not in use. It only runs armory, bitcoin-qt and anti-virus. Only downside is it usually only takes about 30-60 minutes to sync back up with the blockchain after being turned off for a few days

I also plan on setting up a completely offline wallet using ubuntu on an older netbook that I can stash in a safe.

I don't have too much money in bitcoin right now but I hope to see my mining and monthly deposits reach some serious worth.

I like to think I am very security conscious but maybe I am just paranoid

Hi sir, I take it you're not fully aware of remote administration tools? If you are sorry..

Ok, an up to date anti-virus will be near to nothing when it comes to being effective against a virus. Those who create viruses are also aware of how to change variables and methods of injecting a file so that the anti-virus will not pick up any data, this can vary from simply changing icon to binding a program so that when virus is ran a fake program is ran too.

My point is that you can still be infected if you have up to date antivirus.

On the discussion of a remote administration tool, it gains unathorised access to your whole computer, meaning the hacker can scavage throughout all your files, and search for files which the hacker may deem valuable, in this case wallet.dat or whatever other crypto-currency data files you may have. Your idea of keeping the wallet offline is the only true method of being 100% protected, where the computer doesn't have an internet connection it is more likely to remain safe.



Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: rashly on May 31, 2013, 08:55:40 PM
Make sure to encrypt your wallet with a very long, complex password.


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: chris267 on May 31, 2013, 08:58:56 PM
Make sure to encrypt your wallet with a very long, complex password.

Makes no difference if you encrypted your wallet with the password Password1 or encrypted your wallet with the Password vutHAspaSPaf3#J A keylogger records all strokes and thus the hacker if gains remote access can not only steal your wallet but also know your encryption password.

Thanks


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: chris267 on May 31, 2013, 10:26:35 PM
Make sure to encrypt your wallet with a very long, complex password.

Makes no difference if you encrypted your wallet with the password Password1 or encrypted your wallet with the Password vutHAspaSPaf3#J A keylogger records all strokes and thus the hacker if gains remote access can not only steal your wallet but also know your encryption password.

Thanks

Bit of a noob question, but when I have to enter a password I tend to create it by cutting/pasting/rearranging from existing text. Am I wasting my time or does this help to throw keyloggers?

Hi since keyloggers only record keystrokes, what you're doing is a very good idea, something I do myself too. Also, I tend to use on-screen keyboard which can be found on all computers running windows. It prevents any keyloggers from recording precious data, I only use this when entering passwords (obviously)

This may seem a bit over the top.. but remote administration tools can view your whole computer screen, a few youtube searches of RAT's will reveal to you just how powerful they are once hackers have access to your computer. So cutting and pasting there's still that risk thrown in


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: escrow.ms on May 31, 2013, 10:29:34 PM
I received this in an email today!   :-\

can you please forward it to me at my email escrowms@gmail.com for analysis.


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: h3x on June 01, 2013, 05:38:51 PM
My 2 cents (as an experienced systems administrator and bitcoin newbie):

Nothing will help better than safe browsing practices and an up to date anti-virus solution. The cat and mouse game of the virus creators and the anti-virus companies will always be an issue. That virus creator only has to be right once to get his hands on your important data.

I have a blockchain.info account but I keep my main wallet on a Windows 7 Virtual Machine. The VM has full disk encryption (truecrypt), all Microsoft security patches are installed, and it is turned off when not in use. It only runs armory, bitcoin-qt and anti-virus. Only downside is it usually only takes about 30-60 minutes to sync back up with the blockchain after being turned off for a few days

I also plan on setting up a completely offline wallet using ubuntu on an older netbook that I can stash in a safe.

I don't have too much money in bitcoin right now but I hope to see my mining and monthly deposits reach some serious worth.

I like to think I am very security conscious but maybe I am just paranoid

Hi sir, I take it you're not fully aware of remote administration tools? If you are sorry..

Ok, an up to date anti-virus will be near to nothing when it comes to being effective against a virus. Those who create viruses are also aware of how to change variables and methods of injecting a file so that the anti-virus will not pick up any data, this can vary from simply changing icon to binding a program so that when virus is ran a fake program is ran too.

My point is that you can still be infected if you have up to date antivirus.

On the discussion of a remote administration tool, it gains unathorised access to your whole computer, meaning the hacker can scavage throughout all your files, and search for files which the hacker may deem valuable, in this case wallet.dat or whatever other crypto-currency data files you may have. Your idea of keeping the wallet offline is the only true method of being 100% protected, where the computer doesn't have an internet connection it is more likely to remain safe.



Thanks for your reply. I completely agree that an offline wallet is the safest thing.

I am also very aware of RATs though. My point was that by not using this system for anything other than hosting my wallet there I am greatly reducing my risk of such an infection. Someone would have to find a way to exploit the Armory or Bitcoin-qt through the open sockets it uses to communicate to drop such a RAT onto my wallet system. This risk is greatly lessened because both applications are open source so their code can be scrutinized. Or I suppose they could use a zero day to exploit the operating system itself, but keeping the system fulling patched and not running unnecessary Windows services further mitigates this risk. Not to mention the system is off most of the time so it has no attack surface in that state.

Except maybe if someone were to gain access to the system hosting the VM and copy the VM files to their own system. In this case the truecrypt encryption protecting the entire hard drive on the machine would prevent someone from firing it up and attacking it that way.

The anti-virus is just best practice for any Windows operating system and will help with known threats.


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: samo on June 01, 2013, 05:53:11 PM
I also use sandboxie so if by chance any crap has a chance to get onto my pc its stuck in a sandbox and not my pc unless i give it permission to.


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: JSMill on June 01, 2013, 05:56:29 PM
Thanks for the heads up!


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: BTCsckr on June 01, 2013, 06:57:25 PM
Thanks for the advice


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: ig0r.v on June 01, 2013, 09:52:21 PM
thank you for this useful info


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: g.mcfough on June 01, 2013, 11:48:18 PM
So what you're saying is that running noscript wouldn't be enough to defend against this?


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: chris267 on June 02, 2013, 09:04:51 PM
So what you're saying is that running noscript wouldn't be enough to defend against this?

No not necessarily, noscript functions by blocking javascript/java/flash and only allowing it on a list of trusted websites. Malware (especially RAT's) can spread many other ways, whether this be through simply inserting your USB into an infected computer and then inserting that same USB into a non-infected computer and at the same time infecting the computer which was clean before. There's many ways such files can be spreaded, even through being binded onto real applications which would lower suspicions drastically. It's a hard game trying to be protected when such malware exists, but it is you as an individual's responsibility to ensure you take sufficient steps into preventing such attacks onto your computer.



Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: MagicBit15 on June 02, 2013, 09:14:51 PM
My 2 cents (as an experienced systems administrator and bitcoin newbie):

Nothing will help better than safe browsing practices and an up to date anti-virus solution. The cat and mouse game of the virus creators and the anti-virus companies will always be an issue. That virus creator only has to be right once to get his hands on your important data.

I have a blockchain.info account but I keep my main wallet on a Windows 7 Virtual Machine. The VM has full disk encryption (truecrypt), all Microsoft security patches are installed, and it is turned off when not in use. It only runs armory, bitcoin-qt and anti-virus. Only downside is it usually only takes about 30-60 minutes to sync back up with the blockchain after being turned off for a few days

I also plan on setting up a completely offline wallet using ubuntu on an older netbook that I can stash in a safe.

I don't have too much money in bitcoin right now but I hope to see my mining and monthly deposits reach some serious worth.

I like to think I am very security conscious but maybe I am just paranoid

Hi sir, I take it you're not fully aware of remote administration tools? If you are sorry..

Ok, an up to date anti-virus will be near to nothing when it comes to being effective against a virus. Those who create viruses are also aware of how to change variables and methods of injecting a file so that the anti-virus will not pick up any data, this can vary from simply changing icon to binding a program so that when virus is ran a fake program is ran too.

My point is that you can still be infected if you have up to date antivirus.

On the discussion of a remote administration tool, it gains unathorised access to your whole computer, meaning the hacker can scavage throughout all your files, and search for files which the hacker may deem valuable, in this case wallet.dat or whatever other crypto-currency data files you may have. Your idea of keeping the wallet offline is the only true method of being 100% protected, where the computer doesn't have an internet connection it is more likely to remain safe.



Yeah, but it is very unlikely unless you are constantly using remote administration tools and happen to give someone access accidentally. Which in that case I would not keep any source of bitcoin on that computer regardless. Even something as simple as letting someone you know use teamviewer or even they just have your network password. Usually it is the USER that puts themselves in that spot to begin with. Not always, but most the time in that kind of scenario.


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: chris267 on June 02, 2013, 09:19:09 PM
My 2 cents (as an experienced systems administrator and bitcoin newbie):

Nothing will help better than safe browsing practices and an up to date anti-virus solution. The cat and mouse game of the virus creators and the anti-virus companies will always be an issue. That virus creator only has to be right once to get his hands on your important data.

I have a blockchain.info account but I keep my main wallet on a Windows 7 Virtual Machine. The VM has full disk encryption (truecrypt), all Microsoft security patches are installed, and it is turned off when not in use. It only runs armory, bitcoin-qt and anti-virus. Only downside is it usually only takes about 30-60 minutes to sync back up with the blockchain after being turned off for a few days

I also plan on setting up a completely offline wallet using ubuntu on an older netbook that I can stash in a safe.

I don't have too much money in bitcoin right now but I hope to see my mining and monthly deposits reach some serious worth.

I like to think I am very security conscious but maybe I am just paranoid

Hi sir, I take it you're not fully aware of remote administration tools? If you are sorry..

Ok, an up to date anti-virus will be near to nothing when it comes to being effective against a virus. Those who create viruses are also aware of how to change variables and methods of injecting a file so that the anti-virus will not pick up any data, this can vary from simply changing icon to binding a program so that when virus is ran a fake program is ran too.

My point is that you can still be infected if you have up to date antivirus.

On the discussion of a remote administration tool, it gains unathorised access to your whole computer, meaning the hacker can scavage throughout all your files, and search for files which the hacker may deem valuable, in this case wallet.dat or whatever other crypto-currency data files you may have. Your idea of keeping the wallet offline is the only true method of being 100% protected, where the computer doesn't have an internet connection it is more likely to remain safe.



Yeah, but it is very unlikely unless you are constantly using remote administration tools and happen to give someone access accidentally. Which in that case I would not keep any source of bitcoin on that computer regardless. Even something as simple as letting someone you know use teamviewer or even they just have your network password. Usually it is the USER that puts themselves in that spot to begin with. Not always, but most the time in that kind of scenario.


You don't quite understand what a RAT is. It is an illegal method for hackers to gain unpriviledged access to ones PC, gaining full access doing everything possibly bad that you could think of. You don't give someone access to a RAT, rather they gain without your permission.


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: exxe on June 02, 2013, 10:14:08 PM
I can confirm this. The email even contained some social engineering  ::)

Quote
From: Alforakh Exchange <alforakhex@yahoo.com>
Reply-To: Alforakh Exchange <alforakhex@yahoo.com>
Subject: Deposit
To: "support@1Broker.com" <support@1Broker.com>

---1370164771-1127361565-1370026907=:14869
Content-Type: text/plain; charset=us-ascii

Hello,


Please find attached receipt for my deposit. As usual, send me a confirmation when the money hit your account.


Best

Content-Type: application/java-archive; name="DSC34.jar"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="DSC34.jar"
[...]


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: MagicBit15 on June 02, 2013, 10:17:38 PM

Hi sir, I take it you're not fully aware of remote administration tools? If you.....

Quote from: chris267
You don't quite understand what a RAT is. It is an illegal method for hackers to gain unpriviledged access to ones PC, gaining full access doing everything possibly bad that you could think of. You don't give someone access to a RAT, rather they gain without your permission.


Hi Sir, I think you should learn first to choose your words carefully. A Remote Access Tool or (RAT), is typically associated with malicious software that gives access to hackers or other cyber-criminals to information on your computer without your knowledge. Which I believe you are speaking of. Remote Administration for the most part is associated with a large majority of legitimate and legal uses. I am quite aware of the differences in the IT world, since I work in it.... (Someone really needs to edit that wikipedia page BTW)

Remote Access Tools for the most part are all malicious and are extremely dangerous. People need to take severe caution. However, I would say, as you have also stated, Prevention is better than a Cure.

The number one way that a Trojan is installed onto a computer, is by novice users doing it themselves. Usually being completely unaware. In, I would say, 90% of cases. Typically, if there is something out there that is specific and new, that is when it becomes trouble.




Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: MagicBit15 on June 02, 2013, 10:31:46 PM
I can confirm this. The email even contained some social engineering  ::)

Quote
From: Alforakh Exchange <alforakhex@yahoo.com>
Reply-To: Alforakh Exchange <alforakhex@yahoo.com>
Subject: Deposit
To: "support@1Broker.com" <support@1Broker.com>

---1370164771-1127361565-1370026907=:14869
Content-Type: text/plain; charset=us-ascii

Hello,


Please find attached receipt for my deposit. As usual, send me a confirmation when the money hit your account.


Best

Content-Type: application/java-archive; name="DSC34.jar"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="DSC34.jar"
[...]


Hmmmm, who specifically is being targeted with the emails. Also, Was that the full email? If so thank you.


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: exxe on June 03, 2013, 12:10:28 AM
Hmmmm, who specifically is being targeted with the emails. Also, Was that the full email? If so thank you.
Target = 1broker.com support.

Yes that's the full email.


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: deadp00l on June 05, 2013, 11:21:01 PM
Lot of good suggestions in this thread. Might be kind of a novelty to have an application running that watched for attempts to access wallet.dat and sent a pop up alert. Assuming this would be useful as a honeypot  to track wallet stealing attempts and not a real form of protection. Could be possible to write a signature for something like Clam AV? Again I don't see it having much value and it would be more of a novelty than anything.


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: r.freeman on June 05, 2013, 11:22:56 PM
That's why i don't use JAVA..

Same here.
I don't have any program on my PC that requires it.

Actually java itself can be quite good.
It's the damn buggy java PLUGINS mostly.


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: Bataleon on June 05, 2013, 11:29:04 PM
I would suggest using Armory in offline mode if you don't have a need to send a lot of transactions.

https://bitcoinarmory.com/


Title: Re: Be careful what you're running! - .Jar instant stealer
Post by: ergofobe on June 10, 2013, 05:05:59 PM
I can confirm this. The email even contained some social engineering  ::)

Quote
From: Alforakh Exchange <alforakhex@yahoo.com>
Reply-To: Alforakh Exchange <alforakhex@yahoo.com>
Subject: Deposit
To: "support@1Broker.com" <support@1Broker.com>

---1370164771-1127361565-1370026907=:14869
Content-Type: text/plain; charset=us-ascii

Hello,


Please find attached receipt for my deposit. As usual, send me a confirmation when the money hit your account.


Best

Content-Type: application/java-archive; name="DSC34.jar"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="DSC34.jar"
[...]


Hmmmm, who specifically is being targeted with the emails. Also, Was that the full email? If so thank you.

I just got one of these as well.  Targeting PanamaBitcoins.com.  Of course, I don't read my email on any machine that could touch my Bitcoin, so at least I don't have to worry about that.