Showing posts with label Twitter. Show all posts
Showing posts with label Twitter. Show all posts

Thursday, 17 August 2017

Top 50 Forex Twitter Accounts (2017 Edition)


Here is the list of my 50 favorite twitter accounts. This is a new update of my old post.
  1. @eFXnews - provides global FX strategies and analyses from leading investment banks worldwide
  2. @Investingcom - top financial web portal that offers news, technical analysis,  real-time quotes, charts
  3. @Tarantula  - forex senior analyst & educator at Admiral Markets
  4. @marketpulsecom - A global team of securities analysts & strategists provide 24/7 coverage of the largest financial markets, with a focus on forex, commodities & global indices.
  5. @DailyFX - providing forex trading news, currency forecasts, analysis,education, and strategy.
  6. @Fxflow - real time analysis of Forex market, market predictions of BKForex 
  7. @FXStreetNews - 24/5 real-time forex news
  8. @TopForexNewsCom - latest forex news
  9. @ForexLive - news, updates, insights from Forex market
  10. @50Pips - independent professional Forex coach and mentor
  11. @FXTraderUpdates - the latest and hottest NEWS and TIPS
  12. @piptrain - forex trading using technical analysis
  13. @ForexTweets - your First Stop for Forex Trading News
  14. @tipstoforex - independent full time forex and futures trader
  15. @CVecchioFX - currency analyst at DailyFx
  16. @gregmikeFX - chief currency analyst at FXDD
  17. @newsinvesting - real time news from currency and stock markets
  18. @PipCzar - independent trader and currency strategist
  19. @IlyaSpivak - global macro strategist at DailyFX
  20. @JStanleyFX - strategist at DailyFX
  21. @Francesc_Forex - president and founder at FXStreet
  22. @JoelKruger - currency strategist and trader
  23. @forexcrunch - Forex news opinions, forecasts
  24. @chrislorifx - foreign exchange fund manager
  25. @craig_forex - senior market analyst at marketpulsecom and OANDA
  26. @JMahony_IG - market analyst providing fundamental & technical analysis
  27. @FX_Button - currency analyst and editor at ForexLive
  28. @kathylienfx - forex analyst
  29. @FXDIRK - forex trades provider 
  30. @EdMatts - senior technical strategist at Capital Management
  31. @caseystubbs - forex trader
  32. @GregaHorvatFX - Forex, Futures and Stock trader
  33. @MWellerFX - senior technical analyst at Forex.com
  34. @2ndSkiesForex - forex trader
  35. @ValBednarik - forex analyst
  36. @AidanFX - full time forex trader, technical analyst and signal provider
  37. @PLTfx - Forex trading advisory and fund management
  38. @ElliottForecast - Elliot wave forecasts with swing trading ideas
  39. @PhillipKonchar - forex analyst
  40. @Darlington_Dick - forex news and opinions
  41. @FXstreetReports - 24/5 real-time forex research
  42. @thepoundlive  - forex portal
  43. @hantecfx - forex broker
  44. @Forextellcom - delivers trade ideas from pro traders and insights from the institutional side of FX
  45. @aspentrading10 - forex and stock advisory
  46. @MCarrilloFX - forex analyst
  47. @MilanCutkovic - forex trader
  48. @ItsForexTime - official twitter page of FXTMt
  49. @TradersLog - portal for active traders and investors
  50. @saxobank - international investment bank
Happy trading !!!

Monday, 19 May 2014

Top 50 Forex Twitter Accounts


Every decent Forex Trader must have a twitter account because it provides immediate news, analysis, charts and many interesting articles. In order to help you to find the right accounts to follow, here is the list of my 50 favorite twitter accounts.
  1. @eFXnews - provides global FX strategies and analyses from leading investment banks worldwide
  2. @Investingcom - top financial web portal that offers news, technical analysis,  real-time quotes, charts
  3. @FOREXcom - actionable Forex trade ideas, analyses and more
  4. @marketpulsecom - A global team of securities analysts & strategists provide 24/7 coverage of the largest financial markets, with a focus on forex, commodities & global indices.
  5. @DailyFX - providing forex trading news, currency forecasts, analysis,education, and strategy.
  6. @Fxflow - real time analysis of Forex market, market predictions of BKForex 
  7. @FXStreetNews - 24/5 real-time forex news
  8. @marcwalton - Foirex mentor and professional Forex trader
  9. @ForexLive - news, updates, insights from Forex market
  10. @50Pips - independent professional Forex coach and mentor
  11. @CharmerCharts - Technical Analysis for the professional futures & Forex trader
  12. @piptrain - Forex trading using technical analysis
  13. @JamieSaettele - technical strategist at DailyFX
  14. @tipstoforex - independent full time Forex and Futures trader
  15. @CVecchioFX - currency analyst at DailyFx
  16. @gregmikeFX - chief currency analyst at FXDD
  17. @newsinvesting - real time news from currency and stock markets
  18. @PipCzar - independent trader and currency strategist
  19. @IlyaSpivak - global macro strategist at DailyFX
  20. @FGoria - financial journalist
  21. @Francesc_Forex - president and founder at FXStreet
  22. @JoelKruger - currency strategist and trader
  23. @forexcrunch - Forex news opinions, forecasts
  24. @chrislorifx - foreign exchange fund manager
  25. @leanco - independent professional Forex trader
  26. @MBForex - trader and currency strategist at DailyFX
  27. @kathylienfx - market predictions and real time analyses at BKForex
  28. @tradingfloorcom - Forex and Stocks trading community
  29. @currencynews - currency news and Forex fundamental information
  30. @forexmagnates - latest retail and institutional Forex news
  31. @RenaTrader - full time Forex and Futures trader
  32. @GregaHorvatFX - Forex, Futures and Stock trader
  33. @MWellerFX - senior technical analyst at Forex.com
  34. @dfxplussignals - trading signals from DailyFX
  35. @WEnglandFX - trading instructor at DailyFX
  36. @AidanFX - full time Forex trader, technical analyst and signal provider
  37. @PLTfx - Forex trading advisory and fund management
  38. @ElliottForecast - Elliot wave forecasts with swing trading ideas
  39. @EasyForexDR - latest Forex trading news
  40. @Darlington_Dick - Forex news and opinions
  41. @Craig_AlpariUK - market analyst at Alpari UK
  42. @Joshua_AlpariUK - research Forex analyst at Alpari UK
  43. @fx4you - Forex broker offering charts and analysis
  44. @ForexFreshNews - hot news about Forex market
  45. @aspentrading10 - Forex and stock advisory
  46. @MCarrilloFX - Forex analyst
  47. @edjmoya - chief technical analyst at World Wide Markets
  48. @EdMatts - senior technical strategist at Capital Management
  49. @FXDIRK - Forex trades provider 
  50. @saxobank - international investment bank
Happy trading !!!

Link to Top Twitter accounts - 2017 edition

Thursday, 24 October 2013

Twitter account suspended


This is just a small post to indicate that my Twitter account was suspended last week. (15 October 2013)
(don't worry, if you haven't been following, it's back up already since the 18th)

I received the following mail from Twitter:
Mail from Twitter










My account was inaccessible until the 18th of October, when they "un-suspended" it. Luckily my followers & following were recovered. As to this date, I haven't had any reply from Twitter, despite replying to their ticket.

As to the cause of my suspension? I'm unsure. I often tweet about malicious things, but I do keep maliciours URLs out of them, even obfuscated ones. (easier just redirecting on Pastebin)

I have noticed however that I was tweeting about an account which was massively spamming Twitter. That tweet is still deleted. Not sure if it had anything to do with it, but I don't see too many other possibilities.


It appears I'm not the first to have had this situation. Mikko Hypponen from F-Secure had it as well somewhere in 2009:


You can't send any links in DMs anymore, so I guess Twitter is getting more restrictive. Which is a good thing. I just hope they won't produce any more false positives ;-) .

Michael Krigsman from ZDNet had also written a short article on Mikko's suspension:
http://www.zdnet.com/blog/projectfailures/twitter-suspends-security-researchers-account-as-a-threat/6327


I will update when I receive any news from Twitter.

Tuesday, 17 September 2013

How to set up Twitter's "view summary" cards to work with Blogger posts

This article shows how to install Twitter Cards into Blogger - and explains why you might do this if Twitter could be an important source of visitors for your blog.


What are Twitter Cards

Recently, Neil Patel explained why having social sharing tags installed into your blog can be important, and I've written a little more about it specifically for Facebook and Blogger here.

Twitter, for reasons best known to themselves, have developed their own version of social media meta-tags, called "Twitter Cards".    (Apparently they do make some use of Open Graph tags - but not for Twitter cards displays.)


Two things happen inside Twitter when someone tweets a message including a link to a website or blog that has Twitter-cards installed.  

Firstly, the message has the words "View Summary" under it, instead of just "Expand".





Secondly, when someone in Twitter clicks the View Summary link, more information (ie a "Twitter Card") is shown about the contents of the link - like this:




In his post, Neil Patel also stated that if you don't use Wordpress,
"you’ll need to manually generate meta tags for each page on your site"
but fortunately for Blogger users who are brave enough to edit their template that's not quite true.


How to install Twitter Cards into a blog made with Blogger

There are two simple steps needed to set up Twitter sharing tags for your blog:
  • Adding the code to your template, and then 
  • Asking Twitter if you've got it right.    
The 2nd step is necessary because (for whatever reason) Twitter won't use the tags you have installed until you've tested them in Twitter's own validation tool.


Step 1   Add the Twitter Card meta-tags to your template


Edit your template in the usual way.


Find the   </head   statement, and just before it add the following lines of code:

<!--  START - TWITTER CARD TAGS   -->
<meta name="twitter:card" content="summary"/> 
<meta name="twitter:site" content="@YOUR-TWITTER-ACCOUNT-NAME"/> <meta name="twitter:domain" content="YOUR-BLOG-URL"/>

<b:if cond='data:blog.pageType == &quot;item&quot;'><meta name="twitter:title" expr:content='data:blog.pageName'/><b:else/>
<meta expr:content='data:blog.homepageUrl' name='twitter:url'/>
<meta expr:content='data:blog.pageTitle' name='twitter:title'/></b:if>
<b:if cond='data:blog.postImageThumbnailUrl'><meta name="twitter:image:src" expr:content='data:blog.postImageThumbnailUrl'/><b:else/><meta name="twitter:image:src" content='URL-FOR-IMAGE-YOU-WANT-TO-USE-IF-THERE-IS-NOT-A-THUMBNAIL-PHOTO-IN-THE-POST' /></b:if> 
<b:if cond='data:blog.metaDescription'><meta name="twitter:description" expr:content='data:blog.metaDescription'/><b:else/><!-- Still looking for a way to use the post snippet if there's no description --></b:if>

<meta name='twitter:url' expr:content='data:blog.canonicalUrl'/>
<!--  END - TWITTER CARD TAGS   -->


Except, you need to replace a few items with your own values:
  • YOUR-BLOG-URL - with your blog's address (eg for me, it's blogger-hints-and-tips.blogspot.com)
  • YOUR-TWITTER-ACCOUNT-NAME - with the Twitter account name for your blog. (This line is optional)
  • URL-FOR-IMAGE-YOU-WANT-TO-USE-IF-THERE-IS-NOT-A-THUMBNAIL-PHOTO-IN-THE-POST - with the web-address of an alternative picture to use if the post doesn't have a thumbnail image.

Save the template changes.


(Twitter also have a code-generator - but it's for websites in general, while I have configured the code above to use some of the values that Blogger makes available to us.)


Step 2   Validate your domain


After you have done the first step, go  https://dev.twitter.com/docs/cards/validation/validator.  This is Twitter's validating tool, where they check if your code meets their requirements.


Log in using your Twitter account.  
You do need to have a Twitter account yourself - or at least one that is dedicated to the blog - to use the validator and thus to install Twitter Cards.


Click the Validate and Apply tab.


Enter the address of a post from your blog and press Go.


If you're using a browser that supports showing Twitter Cards, then a preview of the card for your post will be shown in the right side of the screen.   Check that this looks correct.


Look at the list of results of your Twitter-card values shown on the left of the screen.   If any of them show a red-dot, then there is a problem that you need to fix.   Typically this will be because you've accidentally left out a quote mark when you were adding your custom values.



Fix any problems, and enter the blog-post URL again - keep going until you get a green dot at the top of the list.    (Some of the twitter card values are option, so it doesn't matter if they show as grey because they're irrelevant for a Blogger site.)


Enter the URL of your blog overall  (ie not a specific post).
  • If you do nothave a custom domain (ie your blog is  myBlog.blogspot.com), then make sure you enter the blogspot.com URL, not the country-specific one (eg   myBlog.blogspot.in).   This is important later in the validation process.
  • Fix any problems for this as well.   (There shouldn't be any, but I think it's worth double-checking, especially if you modify the twitter-cards code in any way.)


Press the Request Approval button at the top of the left hand sidebar.


Confirm the administrative details on the screen that opens - by default it will be filled in with details from your Twitter account.   You may be asked for:
  • Contact information for the person responsible for administering cards on your website (name, email address, Twitter handle)
  • Website information:   the URL (ie the domain), and a description.   Note:  if you are based outside the USA and don't have a custom domain, then most probably your country-specific address will be shown here.    Change it to the blogspot.com   address.
  • Whether your site publishes images or videos that may contain sensitive content (eg nudity, violence, or medical procedures) - so that Twitter can warn viewers before showing them.
  • The website's Twitter-name.




Press Submit Request.


After a moment, if your details are correct, Twitter shows a message saying 
"Thanks for applying to be part of Twitter's cards service. We'll review your request as soon as possible. Expect a few weeks for turn-around time. You will receive an email when your request has been reviewed."

I'm not sure if they apply this to all (or indeed any) countries or Twitter accounts:   when I installed Twitter Cards for this site, I got an email in a few minutes saying .
Your Twitter card is ready!
We've activated the summary card for blogger-hints-and-tips.blogspot.com.
If you want to use other kinds of Twitter cards (and we know you do), please make another request.

And the cards themselves were activated on a test-tweet that I did a few minutes after that.


What your readers see

If you have installed the Twitter Cards correctly, your current readers should see nothing different when they visit your blog or when they read your posts via email or and RSS feeder.

But when they include a reference to your blog in something that they send out inside Twitter, the content that they (and their followers) see is a nicely formatted card rather than an ugly-url.





Troubleshooting


Search Descriptions

Twitter cards will only work properly if you have enabled Search Descriptions for your blog, and if you have entered one for every post that is tweeted.    I looked for ways around this using the post-snippet, but haven't found a way to make this work yet.


Country-specific redirects

Neil Patel suggested one tag that is not included in the standard Twitter Cards documentation: twitter:url

Using it gets around the problems associated with country-specifc URLs for blogspot domain blogs, by changing any Tweets of them to the blogspot.com page, instead of having your tweets split across multiple urls.

I've included it in my list of tags, customized to take its value from Blogger.    However I'm not yet 100% sure if it will work - and will update this article accordingly.


Pictures

I've set up the image tag to use the thumbnail picture for each post - because that is the only one that you can access on a systematic way for each post.

Twitter's rules say that pictures must be less than 1mb in file size, at least 60px by 60px, and that ones larger than 120px by 120px will be resized.    However Blogger may have a thumbnail photo for some of your posts that is less than 60-by-60.   For these it is likely that your default image will be used instead.

The only way to over-ride this is to use a post-specific Twitter meta-tag which points to a larger photo like:
<b:if cond='data:blog.postURL == &quot;URL-OF-THE-POST&quot;'><meta name="twitter:image:src" content='URL-FOR-IMAGE-YOU-WANT-TO-USE-FOR-THIS-POST' />
</b:if>

Domains

Twiter's documentation was initially a little sketchy about which specific domain should be validated. Some people reported having to validate all three possible URLs, ie
www.your-blog.blogspot.com
your-blog.blogspot.com
/*your-blog.blogspot.com
although it is possible that this has now been resolved.


What other problems have you encountered with Twitter Cards?




Related Articles:


Adding Facebook's Open Graph tags to your blog

How to edit your template


Monday, 1 April 2013

Stop Twitter's "follow-me" spam in its tracks

This article is about how to stop the annoying email messages that Twitter sends when an acquaintance joins Twitter and decides that they think you should follow them there too.



What happens if a "friend" invites to you follow them on Twitter

A few weeks ago, I got an email message saying that Helen Someone had just signed up to Twitter, and had provided my email address as someone who followed her elsewhere, and who she thought should follow her here too.

But I'm already on Twitter, and my account there is linked to a different email address than the one which Ms Someone "generously" chose to share with Twitter. And frankly, I get enough email from her already, the last thing I want her doing is bugging me on Twitter too.

So what did I do? Like any sensible person, I deleted the email.

But now, every few days, I get an email message like this :

---------------------------- Original Message ----------------------------
Subject: Helen Someone is still waiting for you to join Twitter...
From: "Twitter"
Date: Fri, March 29, 2013 4:26 am
To: me@email.com
--------------------------------------------------------------------------

Helen Someone is still waiting for you to join Twitter...

Twitter helps you stay connected with what's happening right now and with the people and organizations you care about.

Accept invitation     https://twitter.com/i/535c9c20b....5487e4f01449c029

------------------------

This message was sent by Twitter on behalf of Twitter users who entered your email address to invite you to Twitter.
Unsubscribe: https://twitter.com/i/o?t=1&iid=05f4a3...d=68+26+20130328

Need help?
https://support.twitter.com


Or like this, if I look at it an email client that shows the graphics - notice that the "how to un-subscribe" message is in very small print, down the bottom of the page.




How to stop these messages

At first I just ignored these messages: I figured that Twitter would give up and leave me alone after one or two reminders. But that hasn't happened: they keep reminding me, and I'm getting sick of deleting the same message over and over again.

So today I went looking for how to stop the reminders from happening.   Basically there are two options:

Option 1:  Sign up to Twitter

Accept the invitation, sign up for a new twitter account, turn off all email notifications for this account - and never uses the account again.

Advantage: this stops the annoying messages - and makes sure you won't get them from any other "friends" who give Twitter the same address.

Disadvantage: other friends (who maybe you do want to follow in Twitter) may enter the same email address, and Twitter may connect them to this same Twitter-account that you never use.   You won't get a notification.



Option 2:  Use the un-subscribe link that's provided

If you look at the email contents, there is actually an unsubscribe link near the bottom of the message - f your email client shows the graphic version of the message it's right down in the ultra-small print at the bottom.

Click the link provided - or copy-and-paste it to a web-browser.

This will turn off the annoying messages from this person - and it will also stop your email address from getting messages if other people join Twitter and suggest you should follow them there.




Is this Ok


Which option would you recommend?

More importantly - do you think it's ok to share other people's addresses with social networking sites that you sign up to, in the way that Ms Someone gave my address to Twitter?



Related Articles:

Put a "follow me on Twitter" link into your blog

Showing an email address in Blogger

Tools for linking your blog to social sharing websites

Wednesday, 6 March 2013

How to find Original Twitter Account of a Celebrity ?

How to find Original Twitter Account of a Celebrity ?

If you are searching for your favorite celebrity on internet and want to follow him / her on Twitter, then you will find a number of accounts with same name. Then how will you find the real one. Its quiet easy !
Twitter was aware of this problem from a long time. In year 2009 they introduced a new thing in twitter called "Verified Accounts".
Suppose you are searching for Sachin Tendulkar's twitter account using twitter search, then you will see following results :


The original account contain a blue color button with a tick mark. It verifies that this account is real account.
Each and every person can't get a verified twitter account. It is only available famous celebrities of any field.
For more information about verified twitter accounts you can check the following page :
Twitter Verified Accounts

Bestrix.blogspot.com will bring you more tips and tricks in future. Keep Visiting !

Thursday, 20 January 2011

Twitter worm spreading virally

Since today there's a Twitter worm spreading virally with the name "m28sx" . People and bots tweeting links that end with m28sx.html or have only an URL in their tweet are common today on the social network platform.

At time of writing this threat still persists, although Google has already disabled a lot of URLs. (URLs used in this attack are mainly t.co and goo.gl)


After different redirects starting at:

to

and eventually landing on

Presents you with a nice message that you are infected:

Immediately you receive the well known fake scan page:


Infected search terms on Twitter also include:
50th anniversary of JFK's inauguration
John F. Kennedy inaugural address
Love the new homepage

Check out these search results for m28sx (be careful with the links on these pages, some of them might still be active ! ) on Twitter:
https://twitter.com/#!/search/links/m28sx.html or
https://search.twitter.com/search?q=m28sx.html

Dropped files:

pack.exe
Result: 3/43 (7.0 %)
MD5: bae499fc5844d814f942e870900c9d57

pack(2).exe
Result: 3/43 (7.0 %)
MD5: 921b903e2ff6ae23833301aa2961be95

They payload is a rogueware called 'Security Shield'.

When executing either of the dropped files:

A warning that Security Shield was installed successfully.



Security Shield rogueware finding (non-existant) infections.



Conclusion

Pretty straightforward: do not click on any of the links ! ( You also might want to use a 3d party application to browse on Twitter, like Echofon or Twhirl. )

Always be careful when clicking on a URL that you do not recognize or is shortened so you cannot see the real URL.

If you do happen to land on one of these rogueware pages presenting you a fake scan of your disks, open Task Manager and end your browser's process.

Sunday, 24 October 2010

The Botnet Wars: a Q&A

The Botnet Wars: a Q&A
A Q&A written by @bartblaze

Note: you can also download this article as a PDF on MediaFire.

Introduction


Picture of a botnet with the Command & Control server and botnet herder

Botnet kits. Crimeware kits. Exploit kits. Who hasn't heard these words nowadays? Sold in underground forums, they are becoming more popular due to a drop in prices and the fact you do not need to be a technological wonder to use them.

But what are these kits exactly? Which features does it have? Who develops them? How do they get used? More importantly, how can we stop the spreading of these kits and how can users protect themselves against the dangers they pose?

In today's article (which will be a Q&A, a question & answer), I hope to be able to clear up the mystery behind these kits. I have been able to interview experts in the anti-malware world. They will each give their opinion on this particular subject.

I will pose my question and place the answer of each expert right beneath it, for your convenience.

Included is a link to their website, and a link to their Twitter page. If you have Twitter, I strongly advise you to follow them if you aren't already. The experts are the following:

Iftach Ian Amit - Security Art VP Business Development - @iiamit
Luis Corrons - PandaLabs Technical Director - @Luis_Corrons
David Harley - Eset Anti-malware researcher/author - @DavidHarleyBlog
Mikko H. Hypponen - F-Secure Chief Research Officer - @mikko
Paolo Milani - isecLAB Malware/Threat researcher - @paolo_milani
David Sancho - Trend Micro Senior Malware Researcher - @dsancho66
Steve Santorelli - Team Cymru Malware/Threat Researcher - @teamcymru
Lenny Zeltser - Savvis Security Consultant & Malware/Threat Researcher - @lennyzeltser

Note: Mr. Harley did not have much time as he was travelling, but succeeded in providing me answers anyway. Thanks !




Iftach Ian Amit provides us with the difference between an exploit kit and a crimeware kit:

The exploit kits are usually focused on serving the attack vector of drive-by downloads and browser exploitations where criminals "reach out" to get their victims abused. An example for an exploit kit is Mpack, IcePack, Neosploit, etc…

The crimeware kits (or more specifically the Trojan kits) serve the more persistent part of the attack and are the ones being deployed after the exploit kit managed to gain access to the victim's system. Trojan kit examples are Limbo, ZeuS, SpyEye, Sinowal, etc…

Now, time to fire off those questions ! Each expert will give their opinion and elaborate.
(You can also immediately skip to the conclusion if you'd like.)



a) Let us start with a basic question. What is, in your opinion, an exploit kit ? Which features does it have and which risks pose they?




Iftach Ian Amit:An exploit kit specifically is an aggregation of "weaponized" exploits geared towards ease of use in deployment. These usually have a basic installation script (DB backed), and a management interface. Some exploit kits include multiple-user support and a granular permission system to allow users from different "groups" to manage their own data. The exploit kit does NOT contain a payload (usually a Trojan, Spyware, or a rootkit), but allows the manager to set one up to be used on PCs it successfully exploits.

The risk that exploit kits pose is from an ease-of-use perspective, as they enable even the most non-technical criminal to start utilizing the internet as a venue for their fraud.



Luis Corrons:It is a “kit for infecting computers for dummies.” Pretty popular nowadays, we are just talking about a software package very easy to use, that enables anyone to create their infection spread platform. They come with a number of exploits for different software, they usually include tech support & updates (if you pay for it), statistics, etc. You can even decide which users you want to infect (per country, language, etc.) and some also include a module to infect websites injecting iframes which will point to the exploit kit server, where the software is installed and where the exploits are launched from.



David Harley:I’d actually favour quite a lax definition: some “exploit kits” are not much more than Proof of Concept code that illustrates a vulnerability. Not that information about a vulnerability is a trivial issue. In fact we had to be rather careful in our research into Stuxnet not to make too much information available about currently unpatched vulnerabilities that we’ve turned up during our analysis work, though it’s difficult to strike a balance between releasing enough generally useful information and too much info for comfort. The prompt take-up of the CVE-2010-2568 vulnerability originally found in Stuxnet by other malware families illustrates the problem.

The risks here are generally indirect as far as the user is concerned: they depend on the ability of criminals to turn a specific kit to their advantage: however glamorous the bug, it can still be the quality of the social engineering that makes it successful.



Mikko H. Hypponen:An exploit kit is a collection of multiple exploits, targeting various different vulnerabilities. Most of these focus on drive-by-attacks, targeting web surfers.



Paolo Milani:I think an exploit kit can be all sorts of different things, and will become yet more varied as time goes by. Cybercrime is developing into a service economy, with many specialized actors with completely different levels of technical sophistication, and different levels of involvement into illegal activities, who provide services to one another. So some people develop and sell 0-days, others operate and rent botnets, and others provide software tools for different parts of this ecosystem, from ready-to-use bot code to tools for drive-by download exploits or blackhat search engine optimization. Any of these software tools can in the wider sense be called "exploit kits".



David Sancho:Exploit kits are web front-ends whose main objective is to infect the users when they access the page. In order to do this, they identify the user's browser and send the right exploits to make sure they get infected. In addition to this, modern exploits have logging capabilities that crunch the numbers so that the owner can see how many users have been infected, what country they were coming from, what vulnerabilities are the most successful ones and other similar items.

Exploit kits ultimately mean that a criminal can put up a malicious web site to infect users. They can do this with a minimal programming effort, with low cost and with good reporting stats that will allow them to tweak their attacks to maximize the number of infections.

These are similar to botnet kits, which allow the criminals to create botnets. Botnet kits have both server and client side and can be customized so that the information they steal from the victim's pc is automatically reported to the command and control console so that the botnet's owner can access it. Botnet kits have automated botnet creation and maintenance in such a way that it has impulsed malware growth enormously. Proliferation of malware is in part due to the ease which criminals have access to automated tools to infect new victims.





Steve Santorelli:A package that contains everything needed to infect and leverage those infected machines without needing to know much coding, if any. One of the major problems is that this enables a far broader base of criminals to adopt and use these kits as a lack of technical knowledge is no longer a barrier. There is also often centralized, highly reactive and highly experienced development and technical support available to the exploit kit users. Advertising, pricing and reputation all come into play here, just as with any other type of sales 'in real life'.



Lenny Zeltser:An exploit kit is a toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser. Common exploit targets have been vulnerabilities in Adobe Reader, Java Runtime Environment and Adobe Flash Player.

A key characteristic of an exploit kit is the ease with which it can be used even by attackers who are not IT or security experts. The attacker doesn’t need to know how to create exploits to benefit from infecting systems. Further, an exploit kit typically provides a user-friendly web interface that helps the attacker track the infection campaign.

Some exploit kits offer capabilities for remotely controlling the exploited system, allowing the attacker to create an Internet crimeware platform for further malicious activities.





b) Do you suspect that the phenomena of an exploit kit disabling one another, will appear more? In other words, do you think the authors of these kits will more and more start to target each other to infect more users or to steal each other's botnets?

Iftach Ian Amit:I'm assuming here you either refer to Trojan-builders or auto-pawn tools (which infect legitimate websites with the malicious code from exploit kits). These two tool categories have shown over the last few years (at least 3-4 years from my personal experience) that the competition is fierce in the online criminal world, as they have been added with features to disable/uninstall "competing" tools.

I'm definitely expecting the competition in the Trojan market to step up in terms of gaining more marketshare - especially if it’s affecting a competing botnet.



Luis Corrons:We have seen malware disabling other malware since a long time ago. Some of you may remember the fight that the Netsky and Bagle authors had 6 years ago, they were at that time creating some variants that were disabling or uninstalling each other’s malware. The exploits kits are used to install malware, so from a criminal point of view it is useful to remove other malware that is present there and could interfere with their business.



David Harley:I don’t know if it will increase, but it’s not unlikely: piggybacking and botnet theft have long been prevalent at the malicious application level, and it makes sense that such targeting is seen as a selling point for exploit kits too.



Mikko H. Hypponen:Exploit kits are often commercial in the sense that they are being sold in the underground between hackers. This means that there's concrete competition between these criminals. As a result we do see cases where particular attacks will try to disable previous attacks from a machine in order to gain control of them.



Paolo Milani:That's quite possible, we've seen this back in the day of network worms that were scanning for each other's backdoors. Also, security researchers have been known to take over botnets that do not use strong authentication for bot commands. However, in the future I expect increasing professionalism and sophistication on the part of the bot masters, who I think will more and more use standard cryptography or other sound technical means to ensure they maintain control of their bots.



David Sancho:Botnet kits have had a tendency lately of disabling each other. This is possibly a sign of rivalry between the programmers of each kit. Stealing other botnet's clients is definitely a possibility and if they haven't thought of it, they will pretty soon. I actually think this will become commonplace because once a bot takes over a victim machine, if it was previously infected, that bot belongs to both botnets. Checking this eventuality and preventing it purely denies competing botnets access to their own resources.



Steve Santorelli:SpyEye has had a 'Kill Zeus' option for a while now. Most evolution of tools and techniques in the Underground Economy is driven by business/economic need and a desire to maintain a low risk and high reward ratio. As such if you approach a position where the majority of infect-able machines are already infected, it's logical to assume that miscreants will start to fight over the pool of available machines: they are making good money so they won't stop just because it's becoming slightly harder to do business.
They will adapt and overcome: we see this constantly in the Underground Economy.



Lenny Zeltser:I may be defining an exploit kit more narrowly than how you use the term. In my mind, the exploit kit is the launching platform used to deliver other payload, which may include a bot, a backdoor, spyware or another type of malware. In this context, exploit kit authors and distributors compete for customers.

Overall, it’s not uncommon for criminals of all shapes and sizes to battle one another for control. I’m not surprised we’re seeing such battles in the Internet world as well. Though there are a lot of potential targets for competing attackers to infect, it’s natural for the attacker to wish to assert full control over newly-compromised system. If the host is already infected, the new attacker will need to remove the presence of a competing entity. It’s a variation of a children’s game called King of the Hill, though obviously with more severe repercussions.








c) More and more exploit kits are sold in underground forums, which is increasing the use of these kits. Do you expect that the source of attacks will be more widespread, i.e. more countries getting involved instead of the traditional ones? (Russia, China, ..)

Iftach Ian Amit:Definitely - even the forums are opening up more and more to members that are not specifically from the "local" countries. We have been seeing that in the pricing models used for selling such tools (speaking Russian/Chinese usually means a lower price), as well as in the openness tosell to foreigners that identify themselves as such (whereas in the past you had to "prove" some locality to get the really tricked up kits).

This, in addition to more criminal venues finding the online market a major additional revenue source, and the limping economy which brings more people to try and find ways to make a quick buck, is a sure way to see continued growth in the popularity of exploit kits and Trojan creation/management kits.



Luis Corrons:This should makes us think a few things. It seems that if you are a good developer and you’re living in the US, Europe or Japan, you’d work any good IT company that will pay you really well. But if you are living in China or Russia, and you need food to eat, for you and your family, and you are a really good developer but with no choice to work for an IT company, what would you do? Those are the guys that can make a lot of money developing these kits and selling them, it’s an easy way to make a lot of money really fast.

So answering the question, even though these attacks happen everywhere, and from each and every country, I don’t think we’ll see anytime soon a major change in the actual situation where certain countries are the ones attacking the most. Explanation: Easy money + little risk + no other choices



David Harley:While certain kinds of attack are particularly and popularly associated with certain regions, I don’t actually think that regionalization has ever been such a hard and fast issue, and in a depressed economic climate the old differences between hobby malware and malware for profit have tended to dissipate, and I’d expect the trend to be upward.



Mikko H. Hypponen:We do expect most of these kits continue to be from the usual suspects. Russia, Ukraine, Belarus, China etc.



Paolo Milani:Hard to say. I think this type of patterns can also change dramatically with the legal and regulatory framework around the internet and internet crime in individual countries (like the recent change in the domain registration policies in china).



David Sancho:This is already happening. The Mariposa botnet surfaced in February 2010 in Spain, which is a country not normally tied to these kinds of attacks. There have been other instances of new botnets surfacing everywhere else and this is no doubt caused by the wide availability of botnet kits and other software designed to make criminals' lives easier.



Steve Santorelli:We are already seeing it: miscreants from multiple countries and regions, all co-operating irrespective of any cultural, language or even religious differences that might separate them in real life: they are all primarily and overwhelmingly interested in making money whilst maintaining a low risk and high reward equation.



Lenny Zeltser:I haven’t researched geographic patterns associated with the usage of exploit kits. Certainly some of the toolkits are developed and marketed in a specific country and, therefore, will be used more widely by attackers who speak that language or who hang out in those forums. However, the “beauty” of exploit kits is that they can be developed in Country A, sold in Country B, and used in Country C to attack Country D by using systems hosted in Country E. My point is that it’s hard to attribute malicious activity to actors located in a particular country by simply looking at IP addresses observed during the immediate attack.




d) Additionally, the kits are getting cheaper and more options are available. Is it acceptable to presume that more and more users with low or no technical skills will use these kits for profit? For example look at the Mariposa case, where the botnet operators had little knowledge about technical subjects.

Iftach Ian Amit:Of course. In a lot of the cases that we have been seeing, the botnet herder wasn't really technically savvy. The kits are designed to focus on the "business" side of things and takes care of all the major technical aspects of running a successful botnet. As I mentioned before, criminal operations that seek to enter the online market find it very easy to just buy a kit, have a few henchmen run it, and if needed take the fall for it (see Mariposa again).

Luis Corrons:Yes, of course, these packages are point – and click, as I was saying it is for dummies, you don’t need to be an expert, not even an average user to learn how to use them.



David Harley:I’d agree with that, in general.



Mikko H. Hypponen:Yes, most of the exploit kit customers have limited technical skills and would be unable to create the exploits themselves.



Paolo Milani:Yes, I think this is part of the specialization of the industry. More technologically savvy actors develop malicious software, which in many countries is not in and of itself a crime. Other actors, who may not be as technically competent but are more willing to take risks, actually go out and use the software to commit crimes.



David Sancho:Exactly. I don't even think the cost is a factor anymore. Zeus is a very popular botnet kit that is not precisely cheap but a resourceful criminal can amortize the cost in no time. This is becoming such a bountiful market that a high license fee, say between $5,000 and $10,000, is a reasonable investment for cybercriminals.



Steve Santorelli:Yes, as answered in a), this is one of the major problems - it is a package that contains everything needed to infect and leverage those infected machines without needing to know much coding. This enables a far broader base of criminals to adopt and use these kits as a lack of technical knowledge is no longer a barrier.



Lenny Zeltser:Indeed, the ease of use and affordability of exploit kits makes it possible even for people with low technical skills to become a “hacker,” be it for profit, politics or other reasons.








e) And, last but not least, how can we prevent these exploit kits to spread and what are the best practices for users to protect themselves against mischief?

Iftach Ian Amit:Fortunately, most of the kits do not contain 0-day exploits. Unfortunately, most home (as well as business) users do not patch their systems and are left an easy prey for those kits. It's a combined effort from both software vendors to quickly patch (and test!) their software, as well as users to be more responsible in terms of making sure they are running the latest version of the software available to them. The numbers speak for themselves, and right now most kits have a good enough success rate without the true need for 0-days in them. If the status-quo will change and we will see more resilient software that updates itself quickly and seamlessly, as well as users that demand a secure operating environment, the exploit kits would have a hard time maintaining their reign over us.

Luis Corrons:Most of the exploit kits use known exploits that are not 0-day, so that means that there is a patch for each one. If people would patch, which means to update each and every piece of software installed in a computer, the kits would be useless.



David Harley:I don’t see this as (primarily) an area in which users can do much except to take the usual precautions (sound security software properly updated, patching, caution against social engineering and so on.) The most effective preventative measures are almost invisible to end users: anti-malware technology, of course, but also at the level of cooperation with law enforcement, ISPs and so forth at an international level, takedown of exploit resources, unobtrusive monitoring of new families and trends, etc.



Mikko H. Hypponen:Security companies must be very active in gaining access to the latest versions of various kits and then build generic detections against all the exploits they can generate. Alternatively, generic exploit-detection technologies help.




Paolo Milani:
I'm not sure we can prevent exploit kits from spreading. Insofar as they are traded on mostly open forums, security practitioners can do some amount of monitoring of what happens in these markets (see recent work at our lab: http://seclab.tuwien.ac.at/papers/underground_dimva.pdf).

Once the bad guys take the trading onto private channels, nothing short of police infiltration can really make a dent, and we know how hard that is across national jurisdiction boundaries.

David Sancho:Botnet kits and exploit kit sales happen in the underground so it's key that security companies keep an eye on what's happening there. Law enforcement agencies around the world are especially keen on apprehending the criminals so it's in their own interest that information flows. This is already happening and security professionals gather in private and public forums to exchange intelligence so that we can be on top of the attacks as soon as they happen.

From the user's perspective, if they don't want to become a victim they need to be aware of the tactics that the criminals use to infect and always be protected with an antivirus suite.

Steve Santorelli:Wow - this answer would take up a book. At a basic, user level, follow our tips here:

http://www.team-cymru.org/ReadingRoom/Tips/. At a network Administrator level, ping us at outreach[AT]cymru[DOT]com... We've got over 30 different community services that we offer at no cost that can help network admins protect their users but above all: DON'T PANIC and leverage the IT Security Community to help you. Some very smart folks (much smarter than me) have been working to combat these problems for years and they relish the opportunity to help anyone else who is willing to fight the good fight!

Lenny Zeltser:Though some exploit kits target zero-day vulnerabilities, a large number of exploits go after vulnerabilities for which patches exist. End-users and organizations should look closely at how they keep up with security patches on the desktop. End-users at home can use auto-update mechanisms of the targeted applications or specialized tools such as Secunia PSI. Enterprise environments should use automated tools to identify vulnerable systems, install relevant patches and validate that the patches are installed. It’s also important to lock down the environment so that when an individual system is affected, the attack is contained and discovered quickly.








Conclusion

I think we may come to the conclusion that Exploit Kits these days are easy-to-use and as one expert said; "it is a kit for infecting computers for dummies.” They usually exist of web front-ends to infect the user.

Will malware authors be targeting each other ? This is of course hard to predict, but it might be more common in the future.
A new development is however happening, as posted by Brian Krebs:
"Leading malware developers within the cyber crime community have conspired to terminate development of the infamous ZeuS banking Trojan and to merge its code base with that of the up-and-coming SpyEye Trojan, new evidence suggests."

Will the attacks be more wide spread ? Yes, most experts think it will. One expert noted:
"However, the “beauty” of exploit kits is that they can be developed in Country A, sold in Country B, and used in Country C to attack Country D by using systems hosted in Country E. "

Will more and more users with bad intentions use these kits for profit ?
Yes, as been said before, take a look at the Mariposa case. The botnet herders weren't exactly technical savvy - the ease of use "is part of the specialization of the industry." Also, "The kits are designed to focus on the "business" side of things and takes care of all the major technical aspects of running a successful botnet."

How can we protect ourselves and which countermeasures can we take against these kits ?
The answer is: PATCH PATCH PATCH. Keep your Operating System up-to-date and use an Antivirus with a strong Firewall.

"Security companies must be very active in gaining access to the latest versions of various kits and then build generic detections against all the exploits they can generate. Alternatively, generic exploit-detection technologies help."

"Law enforcement agencies around the world are especially keen on apprehending the criminals so it's in their own interest that information flows. This is already happening and security professionals gather in private and public forums to exchange intelligence so that we can be on top of the attacks as soon as they happen."

Security companies must work together, cooperate, unite even, against these kits and the authors/operators behind it:
"The most effective preventative measures are almost invisible to end users: anti-malware technology, of course, but also at the level of cooperation with law enforcement, ISPs and so forth at an international level, takedown of exploit resources, unobtrusive monitoring of new families and trends, etc."

I would like to thank the experts for their time and of course their professional insight on the subject.




About me
I currently work at Panda Security. Obviously, my main interest lies in Malware Research.
If you would like to learn more, don't hesitate to contact me on Twitter:
@bartblaze

Thank you for reading and until next time.