Pages

Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

How to Protect Your Website Passwords in Chrome

Protect Your Passwords
A blog post published yesterday by software developer Elliott Kember caused quite a stir. Titled "Chrome's insane password security strategy," the post points out that anybody with access to your Windows account can view all of your Chrome-saved passwords in plain text. That's a huge security risk, and Chrome is not the only browser affected. To see the extent of the problem, launch Chrome's Settings page and click the link at the bottom that says "Show advanced settings..." Scroll down to the section titled Passwords and forms, then click the link titled Manage saved passwords.
It doesn't look so bad at first—just a list of the sites for which you've let Chrome save passwords. However, when you click on any item in the list a button labeled Show appears next to the password. Yes, clicking the button displays the password in plain text. You can see it, and anybody else who gets access to your computer can see it.

Firefox, Too
Is Firefox your preferred browser? In that case, you've got a little more security available. Select Options from the Tools menu and click the Security tab. Note the checkbox titled "Use a master password." If you've checked this and defined a strong master password, your credentials are safe from casual snooping. If not, they're even more exposed than in Chrome.
To see why, click the Saved Passwords button. Initially it just displays the websites and corresponding usernames, but with the click of a button you can show all the passwords at once.

Internet Explorer's Better
A recent study by NSS Labs revealed that Internet Explorer's default settings protect your privacy better than Firefox, Safari, or Chrome. In fact, Chrome came in last for privacy protection.
IE also handles saved passwords better. The encrypted passwords reside in the Registry, and there's no mechanism to display them in IE. However, there are plenty of free third-party utilities that will dump this password cache and make all the passwords visible.

Google Responds
In a response to the original post, Chrome browser security tech lead Justin Schuh defended Chrome's password-handling behavior. Schuh contends that once a malefactor gets into your Windows user account, it's already Game Over, so adding a master password or otherwise protecting the saved passwords is pointless.
The comment thread is entertaining; it's a virtual fistfight right on the page. I have to agree with those who point out that theft of your system by a hacker is just one possible scenario. Do you lock down your user account when you briefly leave a roomful of friends? They could grab a password to prank you, or a jealous ex could do some real harm.
Twitter is abuzz with comment. One wag tweeted, "@justinschuh if you think that's a response then Chrome is in trouble. It's worse than Steve Jobs 'Don't hold it that way' response." On a more serious note, Tim Berners-Lee himself weighed in, saying, "How to get all you big sister's passwords http://blog.elliottkember.com/chromes-insane-password-security-strategy... and a disappointing reply from Chrome team."

Protect Your Passwords!
Whichever browser you use, this simple four-step plan will protect your passwords from snooping.
  • Install a password manager
  • Import passwords saved by your browser
  • Delete all browser-saved passwords
  • Turn off password-saving in the browser
The mere fact that third-party password managers can import passwords from your browser should be a red flag. If they can do it, a malicious application that got past your antivirus could do it too.
LastPass 2.0 (free) and Dashlane 2.0 (inexpensive) do a great job with browser-saved passwords. Not only can they import from Chrome, Firefox, and Internet Explorer, they'll also delete those passwords from the browser and turn off the password-saving feature. Not surprisingly, both are Editor's Choice products in this category. Note that LastPass extends this feature to Opera and Safari as well.
In Chrome, Firefox, and IE, manual deletion of saved passwords starts with pressing Shift+Ctrl+Del. The dialog that appears lets you delete a variety of browsing history components. Use it to specifically delete passwords. Firefox and Chrome ask what time period to clear. In Firefox, choose "Everything"; in Chrome, select "from the beginning of time."
That just leaves turning off the password-saving feature. In Chrome, launch Settings, click the link for advanced settings, and un-check "Offer to save passwords...". In Firefox, click the Security tab in the Options dialog and un-check the box "Remember passwords for sites." For IE, you have to dig a little deeper. In the Internet Options dialog, click the Content tab and then click the Settings button in the AutoComplete panel. Un-check the "User names and passwords..." box to turn off this feature.

Improve Your Passwords
Now that you've gotten your passwords out of insecure, browser-based storage, take a little time to upgrade them. Both LastPass and Dashlane will provide you with a security report listing the weakest passwords and also identifying those you've used on multiple websites (a security risk). Take a little time each day to replace the worst passwords with strong ones—since you've got a password manager you can have it generate crazy-strong passwords like 5GZk8cpC*XYs (freshly generated by LastPass).

Top Ten Scariest Things We Saw At Black Hat

3.	Master Key Hides Android Hacks. 
You might think it's irresponsible for Black Hat presenters to reveal such dangerous security flaws.
In a very real sense, presenting this information publicly at Black Hat is an altruistic gesture. It's quite possible that the first discoverer of a security flaw could instead earn big bucks by quietly selling the information to the affected company. Facebook has paid over a million dollars in "bug bounty" payouts to researchers. Microsoft recently launched a similar program; Google, Mozilla, and others have been doing it for years. Of course, foreign governments and organized cybercrime might pay even more...

When we attend Black Hat, we carefully peruse all of the abstracts in advance to select the most interesting and scary talks.
Here are top ten alarming revelations from the 2013 Black Hat conference from pcmag.

1. Pwned iPhone. Nobody denies that Android phones are vastly easier targets for malware than iOS devices, which is one of the reasons I carry an iPhone. My sense of security was totally shattered by a talk demonstrating a technique to totally pwn an iPhone using a modified charging station. Dubbed Mactans (the scientific name of the black widow spider) this attack gives hackers complete and total control of your phone even after it's removed from the charger. The jaw-dropping demo started by hacking the iPhone and turning it off. Then, with nobody touching it, the phone turned on, swiped across for access, entered the passcode, and made a phonecall. The lesson is very clear: Don't plug your phone into a charger you don't own! 

2. Security Cameras Not So Secure. You install security cameras in your office to improve security, but doing so might have the opposite effect. Modern cameras let an administrator log in from anywhere to view the video feed. They also offer easy access for hacking, with seriously lame security. One session showed precisely how to gain full administrator and root access to four different popular brands of camera. The session culminated with an impressive demo in which the presenter set up a security camera to protect a bottle of beer, then hacked the camera and "stole" the beer. Note that with this level of access the hacker could gain access to other areas of your local network; very alarming! 

3. Master Key Hides Android Hacks. It's totally true that even newbie hackers can disassemble, Trojanize, and reassemble any Android app, but the modified app doesn't have the original developer's certification. Using a weakness they've dubbed "Master Key", a group from Georgia Tech demonstrated multiple ways to modify a program yet have Android still verify it as unchanged. In effect, Android verifies one program but runs another. Maybe you thought you could haunt those non-authorized Android appstores as long as you make sure the developer certificate is valid? You thought wrong 


4. Femtocell Hackers Capture Cell Traffic. I knew this would be a good talk when I saw the warning signs outside the hall saying "Cellular Interception Demonstration in Progress". Femtocells are sold as signal boosters, but they can be misused. The presentation demonstrated in real time a hack that let researchers capture all traffic passing through an affected smartphone, including voice, text messages, even images sent via text. Verizon has patched the weaknesses that allowed the exploits demonstrated here, but that doesn't mean we're safe. The presenters offered one possible solution: halt the manufacture of femtocells. They plan to release a tool that will put the phone into airplane mode rather than connect to any femtocell. 

5. Million Browser Botnet, Cheap! In order to launch a big Denial of Service attack, a botnet herder has to work hard getting malicious software installed on thousands of computers, right? Wrong. It turns out that by spending $50 or so on banner ads, researchers from White Hat Security managed to launch a DoS attack that successfully took down their test server. You may have been part of the test without even knowing it! The moment that ad showed up, your browser executed a snippet of Javascript, and the attack left no traces behind. 

6. Don't Trust Email from Friends. Phishing attacks spew spam to thousands or millions of people, hoping a few will be dumb enough to log into a fake bank site. Spear phishing is a more focused attack typically aimed at an individual with access to corporate assets. Scammers try to create an email that's apparently from a trusted source and that seems legitimate, so the victim will click on the poison link. New research shows that they can use your public tweets and other public posts to fine-tune such messages, mimicking your writing style. We used to warn against clicking links in messages from strangers; now you have to worry about links in messages apparently from friends. 

7. NSA Head Promises Truth. General Keith Alexander, head of the NSA, kicked off Black Hat with a keynote speech in which he promised nothing but the truth. "We need to hear your ideas," he said, "and you need to hear the facts." One heckler called the general a liar, and security confiscated an egg carton, but the audience was surprisingly accepting. I can't help but think we didn't get all the facts, though.

8. Even Bigger DDoS Attacks Likely. The biggest-ever Distributed Denial of Service (DDoS) attack took place earlier this year against antispam vigilante site Spamhaus. The attack was originally credited to a Dutch hacker, but apparently the true "mastermind" was a 15-year-old London boy, now in custody. The presentation included a very simple equation showing how with just a little effort the attack could have been ten or a hundred times as bad. All of the factors that went into the attack are still available to hackers, and can't easily be fixed. 30 terabyte per second DDoS attack, anyone? 

9. Flame-Throwing Women. Security company Rapid7 is known for throwing lavish parties at security conferences. For the RSA Conference in San Francisco, they typically take over the immense Ruby Skye night club. For Black Hat, Rapid7's invited guests descended on The Palms. They milled around the massive pool, lounged in the cabanas, and danced to the beats at the Rain nightclub. Entertainment included a group of steel drummers, three supremely talented break dancers, and a pair of dancers who showed off their pyrotechnic skills. They tossed flaming torches and spun a hula hoop on fire while dancing. Fortunately everyone managed to avoid spontaneous human combustion. OK, it's not security related, but it was pretty scary. 

10. The Death of Barnaby Jack. Hacker extraordinaire and long-time Black Hat presenter Barnaby Jack wowed audiences in past years. One year he hacked into an ATM on stage and caused it to spit out all its cash. He also demonstrated a vulnerability in commonly-used insulin pumps that could subject them to external control. Jack was scheduled to demonstrate a similar hack for pacemakers during Black Hat. However, the week before Black Hat he suddenly died. No foul play was reported, but Jack was just 35 years old. Unsettling! 
Source And Picture from pcmag.com
Top Ten Scariest Things We Saw At Black Hat

Intercepting Calls and Cloning Phones With Femtocells

There is an interesting article about Intercepting Calls and Cloning Phones With Femtocells from security watch.

The sign at the door is pretty ominous with its simple warning: "Cellular Interception Demonstration In Progress."

"While in this room, CDMA cell phone users may experience cellular interception, modification, or loss of service, including loss of 911 service. By entering this room, you acknowledge and consent to that interception, modification, or loss of service. If you use a CDMA device while in this room, you may only communicate with parties have consented to interception and modification of communications. If you wish to avoid interception or modification of your CDMA communications, please turn off your CDMA devices while in this room."
The sign was over the doorway to the room where researchers from iSec Partners demonstrated how they exploited a vulnerability in the way mobile devices connected to a femtocell, a miniature cell tower, to eavesdrop on people's conversations and impersonate their phones. If this sounds scary, it should. This is the Black Hat conference at Las Vegas, and researchers take pride in showing how practically any form of technology can be hacked.


Femtocells are network devices that people can get from their carrier to boost their cellular signal. For example, your office building or your house, may have really poor cell reception. You can request a femtocell from the carrier and plug it into your local network. The femtocell communicates with the carrier's internal network over a secure tunnel to become part of the cellular network. Mobile devices connect to the femtocell and function as if it was connecting to one of the cellular towers. Most users won't even notice the difference.

This is an automatic process, as phones connect to the tower with the strongest signal. That can be the cell tower, or it can be the femtocell, Doug DePerry, senior security engineer at iSec Partners said in his presentation. "This is not like joining an open WiFi network. There is no user interaction," he said, before adding, "You might be on ours right now."
Continue Reading this article here...

How Not to Get Hacked at Black Hat and DefCon

How is that for irony? Going to Black Hat and getting hacked? Here are some tips from our friends at Websense Security Labs and Qualys on how to make it hard for the hackers to make a fool out of you.
If you are at a security conference, you have to accept that there is someone probing the network for security vulnerabilities, sniffing network traffic to see who is sending sensitive data on the web without encrypting it, and pwning any attendees who didn't pick a strong password for their accounts. Some of the brightest minds in security are in attendance at Black Hat and DefCon. For the rest of us, it is in our best interests to be paranoid and exercise some caution.

Before You Even Get to Vegas
Security paranoia and best practices kick in long before you get to Las Vegas. First and foremost, make sure you have patched the operating system, browser, and installed software. Make sure your antivirus and security software are fully patched and up-to-date, too.
Go ahead and delete your cookies and clear the Web browser history and cache. Cookies contain a lot of information about you. If your notebook is stolen, the last thing you want is for the thief to be able to get access to information about you or your online activity.
If you don't already, encrypt sensitive files on your hard drive. If possible, go with full-disk encryption so that you don't miss an important piece of data.
Make a full backup of your computer and other devices and leave the backups at home (or if you trust the cloud, online). That way, if you accidentally lose your device, or if it gets stolen, you at least have your data waiting for you.

Black Hat 2013 Bug
When you get home, wipe your machine (in case you accidentally got hacked or infected) and revert back to this clean backup. While at the conference, consider saving to a cloud server or your own personal removable drive. Don't ask around for someone to give you a USB key at the conference; that's just asking to get an infected drive.
I actually just take a stripped down machine, with nothing on it from my normal usage. Just a patched OS, and whatever information I will need this week.

Just in General, Be Safe
While we are at it, while you are at Black Hat or DefCon, if you are prompted to install a patch or update, be really cautious. Odds are that it will be malicious.
We said it once, we will say it again. Do not accept storage devices, USBs or files from people you don't know. If you find a USB drive in your bag but you don't know how it got there, don't just pop it in to your laptop "to see what's on it."
Be careful about using ATMs, especially near Caesars Palace or Rio, where the conferences are. Anyone can install card skimmers. With Barnaby Jack's tragic death just last week, I am half-expecting someone to set up a fake ATM in his memory.

Device Security in Vegas
Keep an eye on all your devices. If you leave it behind, it may get stolen. It may also encourage someone to compromise it and leave behind a small present instead.
Turn off Bluetooth and Wi-Fi on all your devices. Make sure none of your applications can automatically turn them on. It may be best to leave any radio-frequency identification (RFID) enabled devices, such as your work badge, passport (some counties) or even some credit cards at home, or in your hotel room. If your phone has near-frequency-communications (NFC) chip, turn that off, too.
Do not charge phones, computers, or other devices in public charging stations. We've seen demonstrations at Black Hat where these stations can be hacked to link to your device and slurp data without your knowledge, or infect the device. An option is to invest in a portable battery pack that charges independently that you can use while on the go.

Network Security in Vegas
Be careful about connecting to wireless networks. It's not hard to set up a Wi-Fi Pineapple, a network access point that can sniff out your activity. "Be wary of the wireless networks throughout the venue, and your entire stay at Black Hat," Websense advises. In fact, when you can, stick to using a wired connection, especially in the hotel.

Use your VPN at all times! Connect to work servers over VPN, and if you don't have one, use any one of the VPN services we have looked at. We like VPNBook and Cyber Ghost VPN for free VPNs, although the ad-supported version of AnchorFree's HotSpot Shield is good, too.
Avoid sending sensitive data while onsite. "I avoid accessing data at all, but if you need to, use a VPN on a laptop to be safe," says Andrew Wild, CSO of Qualys.

"People think the cell phone is safe, but it's not. There are going to be two presentations this year where people are using a femtocell base station in a man-in-the-middle attack," says Wolfgang Kandek, CTO of Qualys. "Someone can put up a fake cell tower close to you, in the next room, so the air card would connect to it."

Consider sticking with 3G or 4G connectivity, if you can. I use my Android device as a portable hotspot, but that femtocell talk by iSec Partners this week may scare me off that option, too.
I grabbed a burner phone, because I didn't want to lose any information on my device. "If you are really paranoid, you can always leave your computer and devices at home (since hotel locks and even room safes can be hacked)," says Kandek.

But that's no fun. Black Hat and DefCon are full of great presentations and everyone is ready to share everything they know. Just be aware, think about security, and have a good time. Look for SecurityWatch if you are there and say hi.
A repost from pcmag.com
How Not to Get Hacked at Black Hat and DefCon

Hacked WordPress Sites & Security Countermeasures

Security on WordPress has, especially in the past couple of months, become a serious issue. Never before have I seen so many determined and sophisticated hacking attempts directed against the WordPress sites I own or manage.

These run the whole gamut of attack variations:
  • Blackhole Exploit Kit attacks
  • SQL Injection attempts
  • Login & Password access efforts
  • Link Injection & Phishing attacks, where links to bank fraud efforts are made
  • Etc…
Attacks are primarily initiated in Russia, Poland, Germany and India. The firewall software I use also identifies hosts being blocked from Australia, random European countries, plus sources that are unidentifiable due to IP address concealment etc.
Generally speaking, its easy to minimize the potential threat by a few minutes of pre-emptive efforts! In other words, an ounce of prevention is still easier to apply than a pound of cure!

WordPress Security Plugins

This is the first line of defense – a properly implemented security plugin will thwart the majority of hacking efforts – particularly the script-based automated ones! Where a human-driven attack is initiated, you can easily make it extremely difficult to gain access to the internals of your website. The more difficult it is, the greater the likelihood of the attacker giving up and seeking out a softer, easier target. Even in the hacking world, time is money…

There are multiple WordPress security plugin applications available, each with its own methodology or variation on a theme. Selection of one over the other will often be based on the server environment – some simply won’t install if the right PHP elements or server settings are not enabled. Those that I have direct and extensive personal experience with are:
Each has its peculiarities, peccadilloes and quirks! Each works…

Better WordPress Security
I’ve used Better WordPress Security a lot and do like the comprehensive way in which it tackles a broad range of prospective threats. Its evolution has been significant and rapid. Unfortunately, the new releases have been occurring at almost weekly intervals for the past couple of months. Upgrades sometimes culminate in a crisis on the site, such as 500 Server Errors. This issue is particularly problematic if you have WordPress running in a sub-directory! Such issues can only remedied by:
  • accessing the site via FTP
  • deactivating the BWS plugin by renaming or deleting the directory
  • editing the BWS code from the .htaccess file (or deleting .htaccess completely)
Obviously, that’s a pain in the proverbial, and is not an endearing aspect of the plugin! :-)
If your WordPress installation runs from the root directory, BWS will give you peace of mind, but you will need a good understanding of WordPress, security issues, and confidence in WordPress troubleshooting…

Minor Irritation
* The “Backup” option being ON by default – that interferes with any backup scheduling you already have in place, such as BackupBuddy or WP DB-Manager etc. That can sometimes culminate in 2 dozen copies of your site backup arriving in your email account overnight! LOL

Major Irritation
* Checking files outside the WordPress installation will give timeout errors and lock up Admin access if you’ve got other large software applications OR add-on domains. There is an “exclude directories” option, but it requires manual selection… Such a lockup is not recoverable and requires deactivation as above.

That said, it’s damned effective at preventing security breaches and I’ve not had a single unauthorized access on a site running BWS! Despite the irritations, I actually made a $50 donation towards the BWS cause, as it’s obviously taking up a huge amount of dedicated effort to get it right, and it’s getting better and better.

Wordfence
While I would prefer to use a single WordPress security plugin across all sites I manage, I’ve got Wordfence Security installed on multiple sites because of WP running from within a sub-directory, or in the case of add-on domains as mentioned above.

Wordfence has a relatively simple interface compared to BWS or BPS, and operates in a different way. It seems very robust, and the firewall settings are easy to configure. Basically, I recommend simply selecting the following setting;

“Level 4: Lockdown. Protect the site against an attack in progress at the cost of inconveniencing some users.”
That’s going to defeat the most determined of automated hacking efforts without impacting on the site’s usability! Wordfence can be configured to provide email warning of a variety of threats, including:
  • Alert on critical problems
  • Alert on warnings
  • Alert when an IP address is blocked
  • Alert when someone is locked out from login
  • Alert when the “lost password” form is used for a valid user
  • Alert when someone with administrator access signs in
  • Alert when a non-admin user signs in
Other important security aspects include:
  • Enable automatic scheduled scans
  • Scan core files against repository versions for changes
  • Scan for signatures of known malicious files
  • Scan file contents for backdoors, trojans and suspicious code
  • Scan posts for known dangerous URLs and suspicious content
  • Scan comments for known dangerous URLs and suspicious content
  • Scan for out-of-date plugins, themes and WordPress versions
  • Check the strength of passwords
  • Monitor disk space
  • Scan for unauthorized DNS changes
  • Scan files outside your WordPress installation
The fast alerts on the slightest hint of a problem are comforting. I especially like the “Scan core files against repository” function! If a file changes, or an extra one appears, the alarm bells start ringing!

Bullet Proof Security
This is also a robust security plugin application, and I’ve used Bullet Proof Security on 2 sites where the preceding plugins could not be installed. It’s comprehensive, but I personally find its interface to be somewhat daunting – it’s complicated and hard to understand. Maybe it’s just me…
However, it hasn’t ever crashed (unlike BWS) and it hasn’t ever been breached either. On that basis I’d recommend it, but you will need to read the directions!

Secure WordPress
Secure WordPress seems to be at the lower end of the complexity scale and again, I’ve got a couple of sites running it. Installation is neither difficult nor complicated. It’s going to require:
  • a (free) account at WebsiteDefender,
  • an ‘agent’ file upload to your site that verifies / authorizes the account
WebsiteDefender provides automated scanning of the site for you. Alert notices are emailed, and the 1st scan on one site even picked up on a link from the website to a page which had apparently been compromised!

WordPress Security Plugins Summary
One or other of these four plugins are sure to solve the particular security issues on your WordPress website. They provide a known base from which to start your countermeasures. There are several others that can be trialed.
My pick of the litter is Wordfence – that’s because it’s reliable, has that core code verification feature and notifies you immediately of any plugin upgrades!

Securing WordPress
There are several basic elements that need to be addressed as part of any recommendations on WordPress security.

Secure WordPress User ID
The default WordPress User ID is “Admin” and you should NOT use that on your site. Doing so immediately means half of the “site access equation” is known, and all that’s required is the password! That’s pretty reckless in this day and age…

A secure User ID ought to be a minimum of 10 characters containing a mix of upper and lower case and including numeric and/or special character variations e.g.; $The#1Boss
In addition, you should then assign a User Account “nickname” so that there is no clue as to the Admin identity if you inadvertently use the account to publish any pages or posts! Ideally, you should publish the pages and posts from a “Editor” level account…

Secure Passwords

Most people foolishly use a password related to their life in some guessable way. Phone numbers, wife’s name, child’s name, dog’s name etc. A little bit of research, a bit of trial and error on the part of a smart hacker or competitor and your site is wide-open!
There are several websites specializing in secure password generation:
* PCTools
* Strong Password Generator
* Online Password Generator
USE one of them!

Comment Spam & Bad Links
These contribute negatively to your website’s online profile. Eliminate the majority of potential issues by using the inbuilt automation options;
  • Don’t allow registration unless it’s absolutely necessary!
  • Don’t allow comments OR trackbacks on pages
  • Close comments on posts after 2 – 4 weeks
  • Don’t allow trackbacks on posts
Installing and configuring the built-in Akismet anti-spam plugin is not at all difficult and it effectively screens out the worst of the remaining garbage!

Maintaining WordPress & Plugins
It’s extremely important to diligently maintain WordPress and any plugin applications. When a security breach or flaw occurs, fixes are put in place, but word of the potential exploit quickly circulates amongst the hacking community. Hackers immediately start looking for sites that are at risk, and target them!
A ‘once a week’ login to your WordPress Admin should be a standard task, in order to check if there are upgrades available. Install any upgrades immediately! Having a plugin like Wordfence installed ensures you are notified immediately if upgrades available.

How to Deal With WordPress Hacking
Don’t panic, because it won’t help! Usually, the hacking efforts I’ve seen relate to exploits of inherent security weaknesses in:
  • JavaScript in plugins
  • permissions allowing concealment of phishing (most often bank fraud) code in a sub-directory
The first indication may be:
  • an email from Fraudwatch requesting you delete the offending content
  • a warning from your hosting company that the site is compromised and in danger of being shut down.
  • a tip from a friend or client that Google is displaying malware or virus warnings about your website.
These days, it’s rare to have an overt, immediately obvious hacking occur. It’s mostly an out-of-sight, deeply-planted problem that the hacker hopes won’t be discovered for weeks or months.
Dealing with the problem is usually a straightforward process, as per the next section.

WordPress Tech Support / Help Desk
Usually, the fastest way to deal with a known breach of WordPress is to:
  • Use the 1-click update in WordPress Dashboard / Updates to overwrite all core files that may have been compromised.
  • Where a plugin is implicated, delete the affected plugin directory, and then upload a new copy.
  • Where a Theme is implicated, copy your backup files across to replace the compromised files.
Follow that up by viewing the site’s files in your Control Panel file manager or an FTP application such as Smart FTP, and look for:
  • Files and directories that were altered or uploaded and don’t belong.
  • Inappropriate file permissions – e.g. directories should usually NEVER be set to 777 permissions, as this gives access to anyone to do anything. The correct directory permissions for most hosting accounts is 755, and some servers generate “Server 500″ errors if permissions are inadvertently set at 777.
  • Unexpected items in /uploads/ or /backups/ directories.
  • File Modified dates that don’t match up with any edits, uploads or changes you’ve made.
If you are using any of the WordPress Security plugins, run the included Scan option from within the site.
Use more than one online scanning service to examine your website. These all have strengths in different areas, and one may identify issues that another might not spot. Try VirusTotal – scan the Home page URL and get a quick report from multiple sources.
The overriding goal is:
  • deleting the compromised files and replacing them with the correct versions.
  • ensuring secure permissions across directories and files.
  • implementing a security plugin.
That must be followed by immediately by:
  • changing the WordPress admin password.
  • changing the Cpanel / Plesk / Hsphere admin password.
  • changing the FTP access password.
  • deleting any “extra” User or FTP accounts that may have been added to provide easy future access for the hackers.

Core File Compromises
If the /wp-config.php has been altered in any way, it is wise to reset the WordPress Database User Account password, and add the new password into the /wp-config.php file. This can be done through the Admin Control Panel access to MySQL Database management. In the case of Cpanel it’s very easy to change the MySQL password.

Backups
Having an automated monthly backup process scheduled, with off-server storage, makes sound business risk management sense.

WordPress Security Conclusions
* Avoiding the problem is not particularly difficult.
* Eliminating the problem is usually straightforward.

New Scareware Threat: Fake Disk Repair

Do you keep any important data on your computer? How would you feel if you turned it on and found all your files gone--your dissertation, your novel, the index of your comic book collection, everything! Sure, you meant to back it all up, but never got around to it, so now you're desperate. A new form of scareware aims to take advantage of that desperation.

This new threat, named "Trojan.HiddenFilesFraud.A" by Bitdefender's researchers, hides all files and folders on your machine and disables some standard keyboard shortcuts so you can't un-hide them. To further inflame your mania it displays error messages as-if from Windows reporting such worries as "damaged hard disk clusters."
Disk scareware hides files
Just when your frenzy is at its peak, the fake disk repair tool goes to work. It busily spins and flashes and eventually reports a plethora of errors. Want the problem fixed? All you have to do is register... for $80. The worst of it is, even when you do register it doesn't unhide your files. Click the small image below for a view of the threat in action.
Disk scareware fake fix
fake fix Of course, if you weren't crazed with worry you might notice one suspicious fact; if Windows is running, it can't be true that all of your files are missing. That's why the malware keeps the pressure on.

Malware Cooperation
How does this threat enter your system? A well-known worm that Bitdefender calls Win32.Brontok.AP@mm opens the door. Brontok spreads via infected removable drives and has been used to propagate other types of attacks.

The full report on Bitdefender's Malware City blog points out that traditional fake antivirus scareware has been on the decline in the last year. PCMag and other outlets have alerted users to the signs of scareware, and Google started filtering out some of the top-level domains strongly associated with scareware. Utility-type scareware is different enough that it may have success even with users who laugh off fake antivirus.

So, given that the fake hard disk fixer doesn't restore your files, what can you do if HiddenFilesFraud hits your system? I don't have a sample to experiment with, but I'd suggest opening a Command Prompt and entering "ATTRIB /S -H *.*" Who knows--it just might work!
For more from Neil, follow him on Twitter @neiljrubenking.