Sunday, 25 February 2018

Fake Steam Desktop Authenticator steals account details


In this blog post, we'll have a quick look at fake versions of Steam Desktop Authenticator (SDA), which is a "desktop implementation of Steam's mobile authenticator app".

Lava from SteamRep brought me to the attention of a fake version of SDA floating around, which may be attempting to steal your Steam credentials.

Indeed, there are some fake versions - we'll discuss two of them briefly.


Fake version #1

The first fake version can be found on steamdesktopauthenticator[.]com. Note that the site is live, and appears at the top of Google Search when searching for "Steam Desktop Authenticator".

Figure 1 - Fake SDA website













When downloading the ZIP file from the website, and unzipping it, we notice the exact same structure as you would when fetching the legitimate package - with one difference: the main executable has been modified.

File details:
Name: Steam Desktop Authenticator.exe
MD5 hash: 872abdc5cf5063098c87d30a8fcd8414
File size: 1,4446 KB
Version: v1.0.9.1

Note that the current and real SDA version is 1.0.8.1, and its original file size is 1,444 KB - 2 bytes of difference can mean a lot. Figures 2 and 3 below show the differences.



Figure 2 - Sending credentials to steamdesktopauthenticator[.]com

















Figure 3 - Sending credentials to steamdesktop[.]com






















Indeed, it appears it also attempts to upload to another website - while digging a bit further, we can also observe an email address associated with the domains: mark.korolev.1990@bk[.]ru

While I was unable to immediately find a malicious fork with any of these domains, Mark has likely forked the original repository, made the changes - then deleted the fork. Another possibility is that the source was downloaded, and simply modified. However, it is more than likely the former option.



Fake version #2

This fake version was discovered while attempting to locate Mark's fork from the fake version above - here, we have indeed a malicious fork from GitHub, where trades/market actions appear to be intercepted, as shown in Figure 4 below.

Figure 4 - Malicious SDA fork (click to enhance)











Currently, when trying to access the malicious site lightalex[.]ru with a bogus token, a simple "OK" is returned - it is currently unknown whether market modifications would be successful.

Interestingly enough, when digging deeper on this particular domain, which is currently hosted on 91.227.16[.]31, it had hosted other SteamStealer malware before, for example cs-strike[.]ru and csgo-knives[.]net.

The malicious fork has been reported to GitHub.



Disinfection

Neither fake SDA versions reported here appear to implement any persistence, in other words; remove the fake version by deleting it, and perform a scan with your current antivirus and a scan with another, online antivirus, or with Malwarebytes for example.

Additionally, de-authorize all other devices by clicking here and select "Deauthorize all other devices".

Now, change your password for Steam, and enable Steam Guard if you have not yet done so.



Prevention

Prevention advise is the usual, extended advise is provided in a previous blog post here.

You may also want to take a look at SteamRep's Safe Trading Practices here.

Always download any software from the original source - this means the vendor's website, or in this case, the official SDA repository on GitHub:
https://github.com/Jessecar96/SteamDesktopAuthenticator



Conclusion

SteamStealer malware is alive and well, as seen from my January blog post. This is again another form of attempting to scam users, and variations will continue to emerge.

Follow the prevention tips above or here to stay safe.


Indicators


WAScan - Web Application Scanner


WAScan - Web Application Scanner
   WAScan (Web Application Scanner) is a Open Source web application security scanner. It is designed to find various vulnerabilities using "black-box" method, that means it won't study the source code of web applications but will work like a fuzzer, scanning the pages of the deployed web application, extracting links and forms and attacking the scripts, sending payloads and looking for error messages,..etc. WAScan is built on Python 2.7 and can run on any platform which has a Python environment.

Install and use
   git clone https://github.com/m4ll0k/WAScan (Install WAScan)
   cd WAScan 
   pip install -r requirements.txt (Install the required modules)
   python wascan.py (Run WAScan)

Features
   Fingerprint
    * Detect Server
    * Detect Web Frameworks (22)
    * Check Cookie Security
    * Check Headers Security
    * Detect Language (9)
    * Detect Operating System (OS - 8)
    * Detect Content Management System (CMS - 6)
    * Detect Web Application Firewall (WAF - 54)

   Attacks
    * Bash Command Injection (ShellShock)
    * Blind SQL Injection
    * SQL Injection via Cookie,Referer and User-Agent Header Value
    * Cross-Site Scripting (XSS) via Cookie,Referer and User-Agent Header Value
    * Buffer Overflow
    * HTML Code Injection
    * PHP Code Injection
    * LDAP Injection
    * Local File Inclusion (lfi)
    * OS Commanding
    * SQL Injection
    * XPath Injection
    * Cross Site Scripting (XSS)

   Audit
    * Apache Status
    * WebDav
    * PHPInfo
    * Robots Paths
    * Cross-Site Tracing (XST)

   Bruteforce
    * Admin Panel
    * Backdoor (shell)
    * Backup Dirs
    * Backup Files
    * Common Dirs
    * Common Files

   Disclosure
    * Credit Cards
    * Emails
    * Private IP
    * SSN
    * Detect Warnings,Fatal Error,...

Example: Full scan of LuongTheVinh.com.vn
   python wascan.py -u http://luongthevinh.com.vn -s 5

Trainer Dragon Ball FighterZ



------------------------DONLOAD
--------------------------DONLOAD



 -------------------------DONLOAD

[Android App Review] Step Counter Pedometer Free & Calorie Counter

Such a beautiful app that will help you to count your every step and calculate the amount of calorie burned.


App info:-
Ratings:- 4.7
Size:- 5.45 MB

Features:-
  • It will count your every step with a built-in sensor.
  • Don’t need your GPS tracking.
  • Don’t consume extra battery power.
  • All features are free. So, you don’t need to pay for them.
  • For using it you don’t need any types of sing in.
  • At any time you can start, pause and reset.
  • It is beautifully designed.
  • You can back up and restore at any time from your google drive.


Download from below:-

For setup follow the screenshots
 step-1: Select your gender
step-2: Give your correct height and weight. Then click start.





N: B: To make sure the accuracy of step counting, you have to input your correct information in the setting

Install OpenVAS Vulnerability Scanner on Kali Linux


Vulnerability scanning is a crucial phase of a penetration test and having an updated vulnerability scanner in your security toolkit can often make a real difference by helping you discover overlooked vulnerable items. For this reason, we’ve manually packaged the latest and newly released OpenVAS 8.0 tool and libraries for Kali Linux. Although nothing major has changed in this release in terms of running the vulnerability scanner, we wanted to give a quick overview on how to get it up and running.

Setting up Kali for Vulnerability Scanning
   apt-get update (Update Kali Linux)
   apt-get dist-upgrade (Upgrade Kali Linux)
   apt-get install openvas (Install package of OpenVAS)
   openvas-setup (Auto setup for OpenVAS)

root@kali:~# apt-get update
root@kali:~# apt-get dist-upgrade

root@kali:~# apt-get install openvas
root@kali:~# openvas-setup
/var/lib/openvas/private/CA created
/var/lib/openvas/CA created

[i] This script synchronizes an NVT collection with the 'OpenVAS NVT Feed'.
[i] Online information about this feed: 'http://www.openvas.org/openvas-nvt-feed
...
sent 1143 bytes received 681741238 bytes 1736923.26 bytes/sec
total size is 681654050 speedup is 1.00
[i] Initializing scap database
[i] Updating CPEs
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2002.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2003.xml
...
Write out database with 1 new entries
Data Base Updated
Restarting Greenbone Security Assistant: gsad.
User created with password '6062d074-0a4c-4de1-a26a-5f9f055b7c88'.


   Remember, passwords are randomly generated in the User created with password. Example: with User created with password '6062d074-0a4c-4de1-a26a-5f9f055b7c88', the password is 6062d074-0a4c-4de1-a26a-5f9f055b7c88

   Once openvas-setup completes its process, the OpenVAS manager, scanner, and GSAD services should be listening:

root@kali:~# netstat -antp
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:9390 0.0.0.0:* LISTEN 9583/openvasmd
tcp 0 0 127.0.0.1:9391 0.0.0.0:* LISTEN 9570/openvassd: Wai
tcp 0 0 127.0.0.1:9392 0.0.0.0:* LISTEN 9596/gsad

Starting the OpenVAS services
   openvas-start (Run OpenVAS)
   openvas-check-setup (Check OpenVAS)

root@kali:~# openvas-start
Starting OpenVas Services
Starting Greenbone Security Assistant: gsad.
Starting OpenVAS Scanner: openvassd.
Starting OpenVAS Manager: openvasmd.

Connecting to the OpenVAS Web Interface
   Point your browser to https://127.0.0.1:9392, accept the self signed SSL certificate and plugin the credentials for the admin user. The admin password was generated during the setup phase (look at the output above if you missed it).
   Remember, login account is admin