Bugtraq mailing list archives

Re: CastleCops ramps up fight against CoolWebSearch/HomeSearch


From: Paul Laudanski <zx () castlecops com>
Date: Fri, 16 Sep 2005 12:08:06 -0400 (EDT)

Microsoft has a research team that seeks out new spyware threats for the 
MSAS database.  They write up their own analysis so the threats listed in 
our database most likely have a different name and method for identifying 
malware BHOs.  The experts here at CCSP do share information on new 
threats we find with all Antivirus, Antispyware, AntiTrojan vendors 
(including MSAS) so that everyone has protection as soon as possible.

Microsoft has enormous resources to find new threats and they additionally 
rely on their Spynet community and their new technology codenamed Strider 
using HoneyMonkeys to automatically crawl the web to find new malware 
threats.

http://www.microsoft.com/athome/security/spyware/software/about.mspx

[quote]Stop new threats faster with SpyNet.. The voluntary, worldwide 
SpyNet. community plays a key role in determining which suspicious 
programs are classified as spyware. SpyNet. participants help to discover 
new threats quickly so everyone is better protected. Any user can choose 
to join SpyNet. and report potential spyware to Microsoft.
.       

Spyware expertise you can rely on. A dedicated team of Microsoft 
researchers scours the Internet to discover new spyware and develop 
methods to counteract it.[/quote]

        'Honeymonkeys' Find Web Threats
http://www.informationweek.com/story/showArticle.jhtml?articleID=168600939

On Thu, 15 Sep 2005, Times Enemy wrote:

Greetings.

I am not professionally involved with this, merely curious, which is my 
excuse for my current ignorance in this area.

Does the Microsoft (Giant) Antispyware application utilize the CasteCops 
list(s) of BHOs?

Up front, i am being lame and not rtfm'ing/researching this myself.

.times enemy


Paul Laudanski wrote:

CastleCops keeps and maintains various databases on malware and legitimate 
items for browser helpers objects, toolbars, startups, services, and 
activex objects. 

Thanks to the collaboration of many Team CastleCops Expert members, CC is 
frequently among the first to indentify and analyze a new emerging pest, 
and hence to add information on its components to the various Lists. We 
were for example the first to spot and categorize a new BHO co-responsible 
for an all new version of SpySheriff/PsGuard/SmitFraud, one of the most 
insidious and prevalent pests around: 

http://castlecops.com/tk6387-hp_tmp_random_char_or_digit.html 

CastleCops is also in progress of entering all BHOs pertaining to the 
notorious CoolWebSearch/HomeSearch parasite variant to its CLSID database 
list. That information is used to power publicly accessible applications 
such as (in addition to researcher based utilities): 

BHODemon - http://www.definitivesolutions.com/bhodemon.htm
BHOList - http://merijn.org/downloads.html

The BHO database in its entirety is made available to the public here: 

http://castlecops.com/CLSID.html 

Source: 
http://castlecops.com/a6249-CastleCops_ramps_up_fight_against_CoolWebSearch_HomeSearch.html
http://castlecops.com/article-6249-nested-0-0.html


________ Information from Computer Cops, L.L.C. ________
This message was checked by NOD32 Antivirus System for Linux Mail Server.

  part000.txt - is OK
http://castlecops.com


Current thread: