Kyle and Stan Malicious Advertising Network

OxCERT have been made aware of malicious adverts, placed on legitimate websites, which redirect to a network of sites that download malware. The malware served is bundled with legitimate applications, it varies based on the user agent and is known to target both Windows and Mac machines accordingly.

The adverts are understood to have first appeared in early May 2014, and have been displayed on several popular websites including and

To help protect yourself, please remember:

  • Be cautious, even when visiting a site you trust
  • If a download begins unexpectedly, do not open the received file
  • Ensure anti-virus is installed and up to date*

* Please note, the “Kyle and Stan” network serves a subtly unique package of software every time, this interferes with anti-virus detection – proving that while anti-virus programs are important, they are by no means a panacea for all ills.

For further information please see Cisco’s excellent blog post:

Beware unexpected diversions credit: Daniel Lobo

Beware of unexpected diversions
credit: Daniel Lobo

Posted in Current Threats | Leave a comment

Scam Calls Claiming to be from IT Services

OxCERT have been made aware of scammers, calling from international numbers, claiming to be from “IT Services at 146 Banbury Road”. These calls seem to be in a similar vein to the “Microsoft” scam calls described here:

Please note, the IT Services helpdesk does not make unsolicited phone calls. If you receive a call claiming to be from a representative of IT Services please exercise caution, especially if any of the following points apply:

  • You are not a member (or previous member) of the University
  • The call is unsolicited
  • The call comes from a number outside of the UK

If in doubt; we suggest asking the caller for a contact number, if they refuse to supply one, or give a non-Oxford (01865) number, it is highly likely to be a scammer.

If you are a member of the University of Oxford, and believe you may have fallen for this scam, please contact:

Further details will be added to this post as they become available.

A new twist on an old scam. credit: Frédéric BISSON

A new twist on an old scam
credit: Frédéric BISSON

Posted in Current Threats | Leave a comment

New e-Mail Malware Campaign, “Order Number…”

OxCERT have received a large number of reports regarding a large-scale malware distribution campaign currently targeting University staff and users.

This campaign operates by email, with the distinctive subject line ‘Order Number 86514719983′; the number seems to be random and many users are reporting many different numbers:

If you receive a mail like this, DELETE IT!

If you receive a mail like this, DELETE IT!

These emails universally offer a malicious attached .zip file with a string of random numbers in the name; the zip file contains a .dat and a .bat file, which contain strains of malicious software that are currently undetectable to most Anti Virus products.

To reiterate:    most antivirus packages are currently ineffective against this malware.

The only defence is common sense; do not download attachments from emails with the subject line similar to ‘Order Number: 86514719983′ unless you have absolute faith that it is an expected and legitimate attachment. We are submitting samples to Sophos who will begin to update their signature database in due course, but the VirusTotal scores for this malware are still very poor:


Only a minority of AV packages detect this malware

Do not download these attachments, delete them from your machine if you already have.

Becoming infected by this malware depends on several factors:

  • You are running a Windows-based machine; Linux, Mac and others are unaffected
  • You have received and downloaded the .zip attachment
  • You have unpacked the .zip attachment, and executed the .bat file

If you have not run the files as described, you are likely not affected. If any users are concerned that they may indeed have run the compressed attachment, it is important to contact OxCERT immediately as your personal files and University credentials may be at risk. Please inform colleagues as appropriate.

UPDATE: The malware in question seems to be the well-known ransomware package CryptoLocker . This malware encodes all of the documents on the infected machine and then demands payment from the user in order to unlock the files again. If you see a screen such as the one below, your machine is infected with CryptoLocker. It is essential that you contact local IT Support.


I wouldn’t pay them a penny, either

UPDATE 2: A new variant of this campaign is being widely reported by University users, in which the .zip file is instead replaced by an .arj file containing the malicious .exe . It is important to note that very few cloud-based antivirus engines scan .arj files as they are quite obscure and deprecated compared to the popular formats .zip, .gz and .rar. This format is currently affecting the personal email accounts of certain staff, particularly Google users as Gmail does not scan .arj files either.


Stay safe out there.

Further Reading:

Posted in Current Threats, Email, General Security | Comments Off

Scam Emails Offering Legal Practice Course Funding

We’ve just been made aware of scam emails having been received by students at other Universities who have completed their law degree.  The scam falsely states that True Personal Injury Solicitors is a government body that can assist students by partially funding their LPC course.

No reports of the scam being received by Oxford students as of yet but law students should keep an eye out.  For more details see the Solicitors Regulation Authority Alert.

Posted in Current Threats | 1 Comment

2014 FIRST Conference: Friday

Imperial Ballroom, Boston Park Plaza

Imperial Ballroom, Boston Park Plaza

The final day of the conference began with a keynote from Bruce Schneier of Co3 Systems, generous sponsors of the banquet on Wednesday. This was entitled “The Roles of People and Technology in Incident Response”. He discussed the types of attacks seen today, the contribution of network effects (and of vendor lock-in) in the IT market – arguably less of a problem in the security market, especially when it comes to incident response tools, but it is hard to identify the best products and they are generally not the most successful. He went on to discuss how humans can be bad at dealing with risks, especially when it comes to investing in mitigation against things that might not happen. Nevertheless, there is a growing realisation that security incidents are not a matter of “if” but “when”, and management are more willing to invest when they are scared. During questions Bruce touched on the subject of encryption, stating that while one-click email encryption with PGP exists, it is one click too many for most users.
Sailing on the Charles River

Sailing on the Charles River

For the final talks I attended, Mikko Karikytö of Ericsson gave a high-level overview of an incident involving telecommunications fraud through one of their partners. This was followed by Jake Kouns and Carsten Eiram on “Evidence Based Risk Management and Incident Response”. While we may often be critical of the time it takes major software vendors to patch vulnerabilities, the situation can be far worse with manufacturers of SCADA (supervisory control and data acquisition) systems, who are relatively new to the security concepts long learned by the major IT companies. In one case a delay of 451 days was observed between the reporting of a vulnerability and patches being released.

Prudential Tower and Quest Eternal

Prudential Tower and Quest Eternal

The conference closed with a summary of some of the activities during the conference, thanks to all involved in making it a success, and not least the raffle for numerous vendor prizes. As is traditional, Masato Tereda presented the final results of his attempts to meet all conference attendees, and described this in the manner of a spreading malware infection, complete with CVSS scores and data in the STIX format for exchange of threat information.

As usual the conference has been a great success, and has included a number of enlightening talks on a huge range of topics, as well as the opportunity to meet with people from a wide range of countries, organisations and perspectives. For me some the most interesting presentations have been regarding the non-technical aspects of incident response, in particular effective collaboration between multiple teams, and the importance of regular incident response drills covering a range of scenarios, so that the organisation can respond more effectively when a major incident is for real.

Posted in FIRST Conference | Comments Off

2014 FIRST Conference: Thursday

Downtown Boston from the Arnold Arboretum

Downtown Boston from the Arnold Arboretum

Day four of the conference started with a keynote from Intel’s Malcolm Harkins, “Business Control Vs. Business Velocity – Practical Considerations for Business Survivability in the Information Age”. This looked at the relationship between security teams and the needs of their businesses as a whole, with a philosophy of “protect to enable”. If security measures are seen by users as obstructive, they will work around them and potentially increase the overall business risk.

Johan Berggren of Google then spoke about digital forensics, in particular a tool named GRR (Google Rapid Response) devised to enable system forensics to be run across their systems, regardless of operating system or physical location, without the need for additional physical resources. Olivier Thonnard of Symantec followed this with a talk on the evolution of targetted attacks over the past three years. These themes then continued with Junghoon Oh of Ahnlab looking at forensic analysis of lateral movement of a targetted attack in a Windows environment, using some of the methods discussed earlier in the week.

Paul Revere: effective communicator

Paul Revere: effective communicator

Peter O’Dell of Swan Island Networks spoke on the theme of “Cyber Security for Board of Directors and Senior Management”, looking at how to ensure that appropriate attention is given to cybersecurity risks at the top level within an organisation, with clear and effective communication of the risks, and realistic cost-effective proactive measures that can reduce them.

The final talk of the day looked at pBot botnets, something of an unusual family in that they take control of webservers as opposed the desktop and laptop systems targetted by most botnets. Vulnerabilities in popular content management systems such as WordPress and Joomla are exploited using remote file inclusion attacks to take control of the systems, with a command and control infrastructure based upon IRC but generally running on ports more usually associated with other protocols.

USS Constitution

USS Constitution

Presentations concluded early for the day in order to make way for the FIRST Annual General Meeting. This is always an important part of the conference and the need for all teams to be represented, either in person or by proxy, is repeatedly stressed. As well as elections for the steering committee, this year’s saw the approval of a major change to the structure of the organisation. Reports were presented on all major aspects of FIRST’s activities. Of particular interest to me was a comment by Seth Hanford on Cisco regarding the well-known Common Vulnerability Scoring System. Back in April, the Heartbleed bug struck, prompting Bruce Schneier to comment “On the scale of 1 to 10, this is an 11.”. The current version of CVSS (version 2) scored Heartbleed a mere 5.0 (out of 10), which served both to highlight the need for an updated system, but also to demonstrate that a single numeric score cannot always summarise the full risk and impact of a particular vulnerability.

Posted in FIRST Conference | Comments Off

2014 FIRST Conference: Wednesday

Charles River and city skyline

Charles River and city skyline

The third full day of the conference began with a keynote presentation by Andy Ozment of the Department of Homeland Security, entitled “The Role of DHS in Securing our Nation’s Cyberspace”, exploring the business of protecting US government, businesses and critical national infrastructure, and the challenges of outreach at board level – a question raised far too frequently is “why would anyone want to hack us?”.

Next for me was a talk on open-source security issues, followed by one on identification of the “root” cause of reported incidents. The aim of this project is to produce a simple taxonomy through which, with the aid of a flowchart, the underlying cause of a security incident can quickly be identified as belonging to a number of basic categories, including zero-day exploits and socially-engineered vulnerabilities. We already use a system of standard incident categories which are based on the consequences of incidents; such a taxonomy should help us to record at a basic level the cause of each incident too, although inevitably a substantial number are likely to be of unknown cause.

Faneuil Hall

Faneuil Hall

After lunch was a talk by Paul Vixie on the Operations Security Trust project, which aims to create a thriving community of trusted security colleagues through which sensitive and confidential information can be shared, without fear that the information may be used irresponsibly. I followed this with a talk by Pascal Arends of Fox-IT with the title “Investigator of Interest – Our Philosophy of Adaptive Incident Response to Turn
the Tables During an Investigation”. This considered how to respond effectively to a major intrusion while unsure as to the extent of the intrusion or to which the attackers are watching your response. Some tactics give far less away than others. For example, running tools such as tcpdump on a compromised server may be readily visible to the attackers; taking a copy of the traffic through a network tap is less noticeable but will require a temporary disconnection of the link; enabling a SPAN port on a switch will likely go unnoticed.

The penultimate talk of the day was one by Robert Pitcher from the Canadian Government regarding security exercises, and how to ensure that all those likely to be involved in response to a real-life incident can become familiar with their role through table-top exercises and incident simulations. This proved a most illuminating talk; it is evident that the University’s response to major incidents has at times been less than perfect and there is definite value in being better prepared so that when such incidents do strike, we can respond more quickly and effectively.

The concluding talk covered a malware analysis framework named Dorothy2. Malware analysis is a topic of particular interest to us, and while this may not be our chosen path as we develop our capabilities, it is interesting to hear about the alternatives available.

Not quite the Boston Symphony Orchestra...

Not quite the Boston Symphony Orchestra…

Traditionally, the Wednesday evening of the FIRST conference is the conference banquet, and previous years are hard acts to follow, not least after the elephants last year. This year’s chosen venue was the seemingly more sedate Boston Symphony Hall, from the hotel a gentle walk through the Back Bay area of the city. The dinner itself took place in the main auditorium, and while it was only natural that there be a musical theme to the after-dinner entertainment, few of us quite knew what to expect. We were treated to a performance by local band Decades by Dezyne, featuring a variety of popular soul and R&B numbers, several costume changes and one or two surprise “guest appearances” including James Brown. In all a most enjoyable evening’s entertainment.

Posted in FIRST Conference | Comments Off

2014 FIRST Conference: Tuesday

Massachusetts State House

Massachusetts State House

Day two of the conference began with a keynote from Gene Spafford, professor of computer science at Purdue University. Gene was a keynote speaker on FIRST’s previous visit to Boston for the 1994 conference, and compared the situation today with that of twenty years ago. Incident response teams are less the equivalent of the fire brigade and more that of janitors, always clearing up other people’s mess. He sees the security incident as applying layer upon layer of defences trying to address critical deficiencies in computer systems and in the previous layers of defences, with systems ultimately collapsing under the sheer weight of patches; there is too little incentive for software authors to produce secure systems in the first place.

I followed the keynote with a couple of technical talks, the first by Tim Slaybaugh of Northrop Grumman entitled “Pass-the-Hash: Gaining Root Access to Your Network”. This described means of obtaining and replaying password hashes on Windows systems, avoiding the need to crack the hashes in the first place, and how to detect where such tools have been used. The following talk, by Tomasz Bukowski of CERT Polska, looked at sinkholing domains as a means of subverting malware command and control channels, and identifying infected systems and examining their behaviour. OxCERT make frequent use of a basic form of sinkholing, as well as making use of data provided by other organisations maintaining sinkholes, but we could take the process significantly further.

Swan Boat, Public Garden

Swan Boat, Public Garden

After lunch, Mitsuaki Akiyama of NTT-CERT discussed “honeytokens”, taking the concept of “honeypot” systems further to use decoy credentials, database entries and documents to track malicious behaviour and to explore the links between attackers. This was followed by Peter Kruse talking on the Tinba banking trojan, its means of propagation and the intelligence that can be gained on the command and control infrastructure and on those behind it. While Tinba was new to me, we encounter similar malware on almost a daily basis. Finally, a group funded by the US Department of Energy discussed the challenges of data-sharing and the conversion of data between the many different formats in use by different teams.
"Make way for ducklings", Public Garden

“Make way for ducklings”, Public Garden

The final talks of the day were a sequence of “lightning” talks, run to a strict five-minute time-limit, offering a brief insight into a wide range of of topics, including the activities of several teams around the globe, the challenges of scaling vulnerability identifiers to cope with more than 10,000 vulnerabilities per year, and FIRST regular Masato Terada on his annual project to meet as many conference attendees as possible. This was followed with a vendor showcase reception, offering the opportunity to socialise and to speak to a wide range of security vendors, both familiar and new to us, about the wide range of products and services on offer.

Posted in FIRST Conference | Comments Off

2014 FIRST Conference: Monday

Park Street Church from Boston Common

Park Street Church from Boston Common

Once again it’s time for the annual FIRST Conference. This year it’s in Boston, one of the oldest cities in North America and packed with history at almost every turn. The venue is the Park Plaza hotel, previously the venue of the 1994 FIRST Conference, almost an eternity ago when it comes to computer security.

The conference started yesterday evening with a reception, a welcome opportunity to catch up with familiar faces and to meet new people. This year sees a record turnout, with well over seven hundred attendees.

The presentations began early Monday morning with a special keynote by two members of the FBI Boston Division concerning the response to the Boston Marathon bombing in April 2013, a sombre reminder that for some, security is literally a life-and-death matter.

Tributes to the Boston Marathon victims, Arlington Street Church, August 2013

Tributes to the Boston Marathon victims, Arlington Street Church, August 2013

Following a break, the presentations split into three streams. Often two or more presentations of interest will coincide and today was no exception; I eventually decided upon those I considered to offer the most to OxCERT as a whole in spite of considerable personal interest in the alternatives. First up was David Bianco of FireEye, speaking on Enterprise Security Monitoring. This introduced such topics as the “Cyber Kill Chain” and the “Pyramid of Pain”, and how best to use them to gain the most insight and threat intelligence. I followed this with Pawel Pawlinksi of the Polish national CERT on automated data processing, a topic of considerable interest to us as we struggle to keep on top of the information we receive.

Marathon Sports, Boylston Street

Marathon Sports, Boylston Street

After lunch, two members of the JPCERT Co-ordination Center discussed the problems of open DNS resolvers and their approach to mitigation of the problem with the aid of a simple check website. This was followed by Ben April of Trend Micro on Bitcoin for the Incident Responder, a good introduction to the best-known “crypto-currency” and the workings of transactions.

Following a panel discussion on “Developing Cybersecurity Risk Indicators – Metrics” was what for me proved the most interesting talk of the day, from Steve Zaccaro, professor of psychology at George Mason University. This stressed the need not only for effective teamwork within incident response teams but to take teamwork a stage further, with effective working between multiple teams. Steve followed this by leading a “Birds of a Feather” session on CSIRT Effectiveness, which prompted much discussion as to approaches that do and do not work among the wide variety of incident response teams represented. These two sessions, and subsequent discussions with other delegates, have for me prompted much reflection on OxCERT’s own processes and our working relationships with other teams, both within IT Services and across the University.

Posted in FIRST Conference | Comments Off

FIRST Technical Colloquium 2014, Amsterdam

In April two members of OxCERT were fortunate enough to attend the FIRST Technical Colloquium in Amsterdam, kindly hosted by Cisco at their Campus offices. The event was well attended by representatives from national CERTs and SOC teams, including a significant presence from Cisco themselves. As always the talks were both interesting and informative, this post will touch on a few of the highlights.

Jeremy Junginger of Cisco gave an enlightening and entertaining talk entitled Threat Actor Techniques. He discussed the ‘workflow’ of an attack, detailing how an attacker can use an initial foothold to gain further privileges. Based on a real-world scenario, Jeremy’s hands-on demonstration of privilege escalation gave the audience a unique (yet somewhat chilling) insight into how simple, everyday choices made by system and security administrators can quickly lead to the complete takeover of an otherwise locked-down system. Emphasising the value of ‘lateral movement’ within a compromised network, Jeremy quickly directed his attack around standard defences rather than through them, eventually leading to a compromise of administrator credentials and exfiltration of arbitrary data within the short timeframe of the presentation; free of the obligation to present and explain, the attack could have been successful in under 10 earth minutes.


By contrast. Dave Jones, also from Cisco, gave a presentation on mitigating attacks that target administrator or ‘root’ credentials. This followed on neatly from his talk at the Bangkok FIRST conference. Dave focused on the application of two-factor and multi-factor security and how widely it can, and arguably must, be deployed in order to preserve the sanctity of administrative privilege. Whilst many of the techniques presented should not be new information to most security professionals, few of us can truly claim to follow all of them as rigorously as we should and being reminded to keep our house in order is no bad thing!

Henry Stern of Farsight gave an interesting talk about DNStap, a tool which allows for efficient logging of DNS transactions without the need for packet capture. The capturing stage of traditional DNS monitoring has always proven the most resource-intensive, as many of the system functions involved are fundamentally blocking in nature. DNS logging at gigabit line speeds is challenging enough, and traditional approaches simply do not scale efficiently enough once the 10G barrier is breached. DNStap achieves its goals of efficient DNS logging by integrating directly with the DNS architecture itself, bypassing the need to create and analyse intermediate packet captures; this approach supports many common implementations and may represent the future standard approach to the hard-problems of tracking and monitoring malicious domains, such as the ‘fast-flux’ algorithms employed by the Gameover-ZeuS malware networks.

Seth Hanford, also of Cisco, talked about CVSS (Common Vulnerability Scoring System) version 3. Classification of vulnerabilities may not feature in most security professional’s top ten most interesting subjects, but every single vulnerability report and security bulletin you read will refer to that standard CVSS number somewhere in the reference trail. The integrity and relevance of the CVSS system has kept it in regular use by the entire IT industry for over a decade; having a standard way to quickly assess the severity of a given vulnerability is very valuable and something which OxCERT regularly make use of.

Martin Lee, again of Cisco, gave a presentation about a concept of great debate within Cisco, in fact it is literally postered across many of the walls of the Cisco campus; the “Internet of Things”. Distinct yet intertwined with the network of servers and information content we know and understand, the Internet of Things refers to the growing percentage of networked devices which are real-world functional obects. With the advent of IPv6 and aggressing conservation of IPv4 via NAT, everything from your phone and smartwatch to your fridge and air conditioning is becoming globally addressable, and therefore accessible. The recently publicised attacks against Smart TVs with internet connectivity are a haunting vision of things to come, as the costs of storage and processing power continue to fall steadily we can expect to see connectivity become a pervasive element of nearly all electrical appliances. Martin went on to highlight some of the benefits of this expansion; smart building that can monitor and regulate their own power usage and temperature, intelligent transport networks that can re-configure to avoid congestion. Of course, being a security talk, the meat of the presentation consisted of the potential risks of creating a network of newly automated devices with the influence of the operator strongly diminished; what if a malicious person attacked your data center’s environmental systems and switched off the alerts, promptly followed by the air conditioning? A reliance upon a tiny ARM9 core and a Broadcom wireless chip to tell you about fifty million pounds worth of burning silicon seems foolish in this scenario.


Overall the attendance of the TC was thoroughly worthwhile, and confirmed to us the value of the smaller format as compared to the FIRST Conference. The more proximate surroundings permitted the exchange of some frank questions and answers that may not have found expression in a wider setting, and the talk certainly gave our delegates plenty to think about and report back.

Posted in Uncategorized | Comments Off