Saturday, 25 February 2017

Android malware on the rise



Recently, a friend of mine encountered an interesting phishing attempt:


The message reads:
DHL has attempted to deliver the parcel no.: 1993747, but nobody was available. Please arrange re-delivery using our mobile app: http://dhl-tracking[.]online/app.apk

In this blog post, we'll analyse the malware in question (Marcher, banking trojan) and provide disinfection and prevention advice. Click on any of the relevant links below according to your needs:

Analysis
Disinfection
Prevention
Conclusion
Resources


Analysis

When you visit the link, a file called app.apk gets downloaded with the following characteristics:

MD580c797acf9bdbe225e877520275e15f5
SHA1f255de54ffbff87067cfa7bc30d6d87a00aded8f
SHA256fcd18a2b174a9ef22cd74bb3b727a11b4c072fcef316aefbb989267d21d8bf7d
Package nameijrtc.jwieuvxpjavuklczxdqecvhrjcvuho


The application presents itself as 'DHL Express Mobile' while being installed and will ask for device administrator rights:

Figure 1 - System service




















Basically, the app can do anything it desires:

Figure 2 - Permissions; this includes & reading text messages

Figure 3 - Permissions; note the 'modify system settings'


































The payload, or the actual malware that is installed, is the Marcher banking trojan. Recently, it has been masquerading as applications for package delivery, such as DHL in the example above, Posta Online or an app called Alza.

Marcher checks if any of the following antivirus or security products are installed:


Figure 4 - AV list

























... And targets the following applications:

Figure 5 - Targeted apps










Besides targeting antivirus applications, Marcher also uses some nasty tricks to avoid removal:

  • Marcher installs itself as Device Administrator, effectively making the user unable to force the process to stop or uninstall the application normally;
  • When you attempt to force uninstall the application, it will show you the device administrator prompt, as seen in Figure 1, which will continue to pop-up.

All in all, the malware isn't obfuscated much, but still proves to have particular persistence mechanisms. One does not exclude the other.

If you are only here for Indicators of Compromise, please find below:



You may also want to check out my blog post which provides a plethora of options and software/tools on how to analyze Android malware:
Analysing Android files


Disinfection

Marcher proves more difficult to remove as outlined above. The best way in this case is to back up your files and reinstall your operating system.

There is an excellent article on MakeUseOf on how to get to your phone's 'safe mode', create a back-up and finally factory restore or reinstall your operating system:
Dealing with System Problems in Android: Safe Mode, Factory Reset & Restoring Backups

Alternatively, you may try the following steps to remove Marcher, which also involves going into safe mode:



  • Hold down the Power button on the side of your phone until a popup appears.
  • On the menu that shows up, hold down the Power Off option until a popup appears.
  • Tap OK to reboot into Safe Mode.
  • You should now be in Safe Mode.
  • Go to Settings > Security > Device administration > Device administrators or Phone administrators.
  • Tap on the malicious application.
  • Tap Deactivate in the next screen. In our example:


Figure 6 - deactive the app




















  • Now, go to  Settings > Applications or Apps > Manage applications > tap the malicious app > Uninstall.

For normal applications that don't have device administrator rights, only the last step is sufficient.

Afterwards, change all your passwords and notify your bank to be on lookout for any fraudulent transactions. Do this also if your bank is not listed (affected banks pictured in Figure 5).

Additionally, you may want to run a scan with an antivirus or antimalware product for Android. If you're unsure which antivirus to run, you can try Avast (it also detects the Marcher version discussed in this blog post).

You may want to have a look at other antivirus products if Avast does not suit your needs. A good comparison can be found on AV-test's website: The best antivirus software for Android.

Note that the best course, in any case, is to backup your files and reinstall your device! Don't forget to change passwords and notify your bank.



Prevention

  • Don't root your Android device(s).
  • Don't just install any app. Use common sense. When in doubt, do not install the app.
  • Be wary of suspicious-looking apps even when they have a lot of positive feedback. These may be fake comments. Ask friends, colleagues or Google. Still not sure? Do not install the app.
  • Download from official app stores only. Even though malware may exist on Google's Play store, chances are less likely.
  • Use the default, built-in security in Android. For example, do not allow installation of apps from unknown sources and Encrypt Device.
  • Always verify app permissions. Depending on the app, it should not be able to directly call other phone numbers.
  • Back up your files. If something like this ever happens to you, simply reinstall and restore.
  • Install an antivirus. This may be a resident one, meaning no active protection and scanning only.

More useful links are listed below in the Resources section.


Conclusion

While Windows malware still takes the biggest portion, malware for other operating systems is becoming more and more common. In regards to Android, make sure to follow the prevention tips above to stay safe.

Worth noting that, as always, prevention is better than disinfection. Create (and test) back-ups.



Resources

Analysing Android files - Blaze's Security Blog
Dealing with System Problems in Android: Safe Mode, Factory Reset & Restoring Backups - MakeUseOf
DevicePolicyManager - Android developer area
F-Secure Freedome VPN  - F-Secure
How Do I Delete Applications from My Android Device? - Lifewire
The best antivirus software for Android - AV-Test
What Is A Nandroid Backup and How Exactly Does It Work?  - MakeUseOf

IOCs

Wednesday, 22 February 2017

How to Speak Wenja : Ull's Scenes

After a brief break and an annoying and lengthy bout of the flu, we return in our journey through the cinematic scenes of Far Cry Primal. In honor of my being sick (swarga) and being plagued by a sickness (swargati), today we'll look at the head honcho of the Udam : Ull.

Ull is played by DeLaRosa Rivera, who is an awesome actor and awesome guy.




Udam Provocation


Since their scenes overlap, I'm reposting the Udam provocation here from our discussion of Sayla's scenes.

Sayla:

Winja wantar pacha, Udam shanti hasa.
Wenja hunter see, Udam near to-be.
Wenja hunter saw Udam nearby.
(Literally, "Wenja hunter sees, an Udam nearby to be.")

Gwamarsh ha waykarsh. Ma Winja chimashta.
Come-they so-that attack-they. But Wenja ready.
They come to attack. But Wenja are ready.

Ull!

Ull:

May malshashar Winja mana. U laykwa!  Shuta marita!
Don't soft-blood Wenja stay. COMMAND leave! Or see-you!
Softblood Wenja can't stay. Leave! Or you die!
(The word "softblood" is a compound of malsha "soft" and hasar "blood". Note that Ull is speaking directly to Takkar here by saying marita [vs. maritan "y'all die"])

U say salway gwan!
COMMAND them all kill!
Kill them all!
(This is curious -- the Udam lord is using an super archaic salway for "them all". In normal Wenja, the only pronoun that makes a difference between singular and plural is sa say "he, she, it" / "them")

Villager:

Palhu Udam!
Many Udam!
Lots of Udam!

Sayla: 

Palhu hasmas!  Nu Takkar masi-ha yawda!
Many are-we! Now Takkar us-with fight!
We are many! Now Takkar fights with us!
(Note once again Sayla is using the "high" or "prestigious" form of Wenja by saying masiha "with us", vs. the more normal masha)


Prison Scene


Let me begin by saying: I LOVE THIS SCENE. One of the best in the game in my opinion.

You'll note some differences in Ull's language (and in the Udam's in general).

Udam have trouble saying "sh" sounds, and they usually pronouncing them as "ch" -- "mal-chah-sahr" (for malshasar).

Their rhythm is extremely staccato and broken. Ull has no problem throwing words together (i.e., making contractions) if it results in the staccato rhythm that he likes. Hence "N'Udam" and "T'Ull". 

Izila prisoner.:

Sakwi me.  Ke ne godeimi!  Ke ne godeimi!
Help me. Here not belong-I! Here not belong-I!
Help me. I don't belong here! I don't belong here!
(Our first Izila. Note that the word for "help" in Izila is the same in Wenja "sakwi". Ke ne godeimi in Wenja would be "Na cha gadayam.")

Ull:

T'Ull malshasar damshasu pacham.
Then-Ull softblood home-in see-I.
I see you in Wenja softblood home.
(Remember the rule from last time that damsha-su should be damshu? Well, the Udam don't. In fact, they "violate" all sorts of rules in their language. This is because we had originally conceived of their language as being a creole based on Wenja)

N'Udam dijamim gwashta.
Now-Udam land-throughout walk-you.
Now you walk in Udam land.
(Literally "throughout Udam land")

Udam kapalpurha swarga. Udam cha mari. 
Udam skull-fire-with sick. Udam here die.
Udam sick with skull fire. Udam die here.

Ayshta Ull Udami pan.  Malshasar krawhas Udam bal daha.
SUBJUNCTIVE Ull Udam-to feed. Softblood flesh Udam strong make.
Maybe Ull feed you to Udam. Softblood flesh make Udam strong.
(Literally "Were-you Ull to-Udam feed", this is a common use of the "subjunctive marker" aysh to mean "maybe")

T'Ull Winja malshasar gwijar.
Then-Ull Wenja softblood destroy.
Then Ull destroys Wenja softbloods.


Ull's Death


Ull:

Nuha!
Rawr!
(This was a word that DeLaRosa made up in our rehearsals.  It literally doesn't mean anything other than "Now in order to!"  Sounds cool, though.)

Nu Ull mari. Udam putila miha gwama.
Now Ull die. Udam child me-with comes.
Now Ull dies.  Udam child comes with me.

Udam swargatibi mari. Winja palhu mansim gwayfa.
Udam sickness-from die. Wenja many months-for lives
Udam die from sickness. Wenja live for many moons.

U shlaka. U shlaka.
Protect. Protect.
(Interesting cultural fact here. The Udam's verb for "protect" was shlaka which means to "protect (offensively)". The Wenja always use paska which means "to protect (defensively)". Just another way that we encoded different cultural worldviews in their language.)


Takkar:

U shlawdra gwash.
COMMAND free walk
Walk free.
(Takkar also says this after the mammoth's death in the first scene.)







Sunday, 19 February 2017

SEO Keywords: How Better Keyword Research Gets You Better Results


What Are SEO Keywords?
Your SEO keywords are the key words and phrases in your web content that make it possible for people to find your site via search engines. A website that is well optimized for search engines "speaks the same language" as its potential visitor base with keywords for SEO that help connect searchers to your site. Keywords are one of the main elements of SEO.

In other words, you need to know how people are looking for the products, services or information that you offer, in order to make it easy for them to find you—otherwise, they'll land on one of the many other pages in the Google results. Implementing keyword SEO will help your site rank above your competitors.

This is why developing a list of keywords is one of the first and most important steps in any search engine optimization initiative. Keywords and SEO are directly connected when it comes to running a winning search marketing campaign. Because keywords are foundational for all your other SEO efforts, it's well worth the time and investment to ensure your SEO keywords are highly relevant to your audience and effectively organized for action.

Settling on the right SEO keywords is a delicate process involving both trial and error, but the basics are easy to understand. Here we’ll walk you through researching what your customers are looking for, discovering those keywords that will help you rank on a search engine results page (SERP), and putting them to work in your online content.

Finding Your Best Keywords for SEO
Most beginning search marketers make the same mistakes when it comes to SEO keyword research:

Only doing SEO keyword research once,
Not bothering to update and expand their SEO keyword list, or
Targeting keywords that are too popular, meaning they’re way too competitive.
Basically, SEO keyword research should be an ongoing and ever-evolving part of your job as a marketer. Old keywords need to be reevaluated periodically, and high-volume, competitive keywords (or “head” keywords, as opposed to long-tailed keywords) can often be usefully replaced or augmented with longer, more specific phrases designed not to bring in just any visitor but exactly the right visitors. (Who visits your site – particularly if they’re people who are actively looking for your services – is at least as important as how many people visit.)

And you’ve got to diversify. Here’s a tongue-twister that’s absolutely true: diversity is a key word in the keyword world. You’re not going to stand out if you find yourself using all of the same keywords as your competitors. Not only should you try new keyword search tools and keep track of the results, but you should feel free to experiment based on your own research – who else uses your keywords? And how do you make yourself stand out? By providing great content that truly answers the questions your prospective customers are asking with their keyword searches.

Making Your SEO Keywords Work for You
Now that you’ve found the best keywords, you need to put them to work in order to get SEO results (search-driven traffic, conversions, and all that good stuff).

So: how to proceed? On the one hand, SEO best practices recommend that you include relevant keywords in a number of high-attention areas on your site, everywhere from the titles and body text of your pages to your URLs to your meta tags to your image file names. On the other hand, successfully optimized websites tend to have thousands or even millions of keywords. You can't very well craft a single, unique page for every one of your keywords; at the same time, you can't try to cram everything onto a handful of pages with keyword stuffing and expect to rank for every individual keyword. It just doesn't work that way.

So how does it work? The answer is keyword grouping and organization. By dividing your keywords into small, manageable groups of related keywords, you’ll cut down on your workload (significantly), while still creating targeted, specific pages.

For example, let’s say you were running the website of an online pet store. You might be wise to create one keyword grouping for all your dog-related products, then one for all of your parakeet-related projects, etc. The next step would be to segment each individual group into smaller subgroups (parakeet cages, parakeet toys, parakeet snacks) and then even smaller groups for each type of product (low-fat parakeet snacks, luxury parakeet snacks… you get the idea). Now your pet store can create individual pages optimized for each small keyword group.

A marketer attempting to optimize a web page for the "gourmet parakeet snacks" keyword group should consider doing most if not all of the following:

Using the keyword in the title of the page
Using the keyword in the URL (e.g., online-petstore.com/parakeets/snacks/gourmet)
Using the keyword, and variations (e.g., "gourmet parakeet snacks"), throughout the page copy
Using the keyword in the meta tags, especially the meta description
Using the keyword in any image file paths and in the images' alt text
Using the keyword as the anchor text in links back to the page from elsewhere on the site
When optimizing your web pages, keep in mind that keyword relevance is more important than keyword density in SEO.

Manual keyword grouping can be very time-consuming, of course. Some of our own tools, which may prove helpful in a pinch, include our Keyword Niche Finder, which works just like a regular SEO keyword tool, but returns you suggestions pre-grouped into relevant clusters. We also provide a Keyword Grouper, which groups preexisting lists automatically.

Source: https://www.wordstream.com/

Tuesday, 14 February 2017

Trainer Sniper Elite 4




------------------------DONLOAD
--------------------------DONLOAD

 -------------------------DONLOAD------------------------DONLOAD

Saturday, 11 February 2017

Showing a PowerPoint file in your blog

This article is about options for showing the contents of a PowerPoint file inside your blog.


Previously I've described how to load content from MS Word to your blog.

But some people have material in PowerPoint (or other presentation software) files, that they want to show in their blog.   So far, I've identified three options for doing this.

These approaches should work on any PowerPoint formatted presentation, no matter what tool it was prepared with - except of course if it was Google Docs in which case you go straight to option 2.


Option 1: Each slide as an image

Follow these steps:
  • In PowerPoint, choose Save-as, and choose an image format (eg .png).   
  • When the system asks if you want all slides or just the current one, choose All.
  • Upload all the image files that were created to your blog - it's your choice whether you put them all in the same post, or one-per-post.
    I usually upload them firstly to Picasa web albums or another picture-hosting service, and then just link from my blog to there)

At first, I thought that this was a backward approach.  But recently I wrote an article based on a presentation that I gave several years ago.   After trying various ways of displaying the presentation and  the article, I realised that I was trying to find a way to include all the comments that I made when I used the presentation face-to-face.  To do this, I needed to show each slide individually, so I used this option because it gives full control over what commentary goes with each picture.


Option 2: Convert to a Google Docs Presentation

This is described in detail in  Using Google Docs's publish-and-embed option - I believe it's better than trying to use Google Web-elements, because it achieves much the same thing, and takes one piece (web-elements) out of the equation.


Option 3 Copy and Paste

As with MS Word, copy-and-paste from PowerPoint to Blogger is NOT recommended, because the PowerPoint content can have all sorts of extra HTML codes attached to it, and these can cause negative effects in your blog.

But you may want to copy-and-paste, either because you don't want the content as images, or because you want other things like presenter notes etc that are not stored in the presentation slides.

To do this, you need to:
  • Copy from PowerPoint, 
  • Paste into a text-editor (eg Notepad in Microsoft Windows)
  • Copy again from the text-editor
  • Paste into your blog.

An alternative may be to export the presentation as an outline (ie rich-text or RTF format), and then convert it via Google Docs in the same way that you would for a Word document.   You would need to test this to check if it brings in the items that are stored outside of the slides.


Option 4   Use a slideshow host

Another approach would be to set up on account on SlideShare or a similar service that allows you to upload slideshows and gives you code that you can add to your blog in the usual way, which embeds the slideshow in your blog.  

I haven't tried this one out myself, but in theory at least it should work.




Related Articles

Showing a PowerPoint presentation as a slideshow in your blog

Converting from MS Word to Blogger, via Google Docs

File hosting options - places to keep your files on-line

Tools for applying copyright protection to your blog

Putting embed code from an outside service into your blog
.