[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.44.0509161207340.5174-100000@bugsbunny.castlecops.com>
Date: Fri, 16 Sep 2005 12:08:06 -0400 (EDT)
From: Paul Laudanski <zx@...tlecops.com>
To: Times Enemy <times@....org>
Cc: bugtraq@...urityfocus.com
Subject: Re: CastleCops ramps up fight against CoolWebSearch/HomeSearch
Microsoft has a research team that seeks out new spyware threats for the
MSAS database. They write up their own analysis so the threats listed in
our database most likely have a different name and method for identifying
malware BHOs. The experts here at CCSP do share information on new
threats we find with all Antivirus, Antispyware, AntiTrojan vendors
(including MSAS) so that everyone has protection as soon as possible.
Microsoft has enormous resources to find new threats and they additionally
rely on their Spynet community and their new technology codenamed Strider
using HoneyMonkeys to automatically crawl the web to find new malware
threats.
http://www.microsoft.com/athome/security/spyware/software/about.mspx
[quote]Stop new threats faster with SpyNet.. The voluntary, worldwide
SpyNet. community plays a key role in determining which suspicious
programs are classified as spyware. SpyNet. participants help to discover
new threats quickly so everyone is better protected. Any user can choose
to join SpyNet. and report potential spyware to Microsoft.
.
Spyware expertise you can rely on. A dedicated team of Microsoft
researchers scours the Internet to discover new spyware and develop
methods to counteract it.[/quote]
'Honeymonkeys' Find Web Threats
http://www.informationweek.com/story/showArticle.jhtml?articleID=168600939
On Thu, 15 Sep 2005, Times Enemy wrote:
> Greetings.
>
> I am not professionally involved with this, merely curious, which is my
> excuse for my current ignorance in this area.
>
> Does the Microsoft (Giant) Antispyware application utilize the CasteCops
> list(s) of BHOs?
>
> Up front, i am being lame and not rtfm'ing/researching this myself.
>
> .times enemy
>
>
> Paul Laudanski wrote:
>
> >CastleCops keeps and maintains various databases on malware and legitimate
> >items for browser helpers objects, toolbars, startups, services, and
> >activex objects.
> >
> >Thanks to the collaboration of many Team CastleCops Expert members, CC is
> >frequently among the first to indentify and analyze a new emerging pest,
> >and hence to add information on its components to the various Lists. We
> >were for example the first to spot and categorize a new BHO co-responsible
> >for an all new version of SpySheriff/PsGuard/SmitFraud, one of the most
> >insidious and prevalent pests around:
> >
> >http://castlecops.com/tk6387-hp_tmp_random_char_or_digit.html
> >
> >CastleCops is also in progress of entering all BHOs pertaining to the
> >notorious CoolWebSearch/HomeSearch parasite variant to its CLSID database
> >list. That information is used to power publicly accessible applications
> >such as (in addition to researcher based utilities):
> >
> >BHODemon - http://www.definitivesolutions.com/bhodemon.htm
> >BHOList - http://merijn.org/downloads.html
> >
> >The BHO database in its entirety is made available to the public here:
> >
> >http://castlecops.com/CLSID.html
> >
> >Source:
> >http://castlecops.com/a6249-CastleCops_ramps_up_fight_against_CoolWebSearch_HomeSearch.html
> >http://castlecops.com/article-6249-nested-0-0.html
________ Information from Computer Cops, L.L.C. ________
This message was checked by NOD32 Antivirus System for Linux Mail Server.
part000.txt - is OK
http://castlecops.com
Powered by blists - more mailing lists