In this blog CERT.at's employees can post research and thoughts. This is done with least possible oversight, so opinions in blogposts are not necessary opinions of CERT.at
Alternatively you can receive CERT.at's blog as a feed.
Jul 30
Completed: Maintenance work on Tuesday, July 30th, 2013
Because of necessary changes in our power-infrastructure, all Internet-reachable services of CERT.at will be unavailable for some time on Tuesday (July 30th, 2013). An "emergency" website with restricted functionality will be made available.In urgent cases please contact us by telephone: +43 1 505 ...
Jul 17
Maintainance work on Wednesday, July 17th, 2013
Because of urgent changes in our power-infrastructure, all Internet-reachable services of CERT.at will be unavailable for some time tomorrow (July 17th, 2013). An "emergency" website with restricted functionality will be made available.In urgent cases please contact us by telephone: +43 1 505 64 ...
Jun 18
ProcDOT 1.0 released
I am happy to announce that the first release (1.0) of my visual malware analysis tool ProcDOT (I already mentioned the beta in a recent blog post) is now available.Get it for free from our website: ProcDOT 1.0Author: Christian Wojner
Apr 12
Lessons from the Stophaus/CloudFlare/Spamhaus DDoS for ISPs
Update: our full report on this incident is now available (in German)No, the Internet is not breaking down, we did not have a doomsday scenario over the last week. We did have an interesting situation, there were some disruption in some parts of the Internet, and there were a good number of ...
Mar 19
ProcDOT - Visual Malware Analysis
Dear like-minded people,I'm very proud to announce that our latest contribution to the malware analysis community is finally available as open beta.It's called ProcDOT - I already gave a preview of the alpha version some months ago at SANS Forensics Summit in Prague - and it is an absolute ...
Sep 21
Spikes in Austrian CCM number in Q4/2011
Microsoft's Security Intelligence Report 12 uses the computers cleaned per mille (CCM) metric to compare the infection rates over time and between countries.This is, of course, no perfect measurement of the actual infection rates due to a number of factors, but nevertheless an interesting data-point. ...
Dec 19
IE6 Death Watch
Internet Explorer 6 has outlived its "good-before"-date for years now and both Web-programmers (living hell to support) and Microsoft (a security-nightmare for them) were keen to put a stake through its heart for the last years.It finally seem to have worked: Austria is now at < 1% IE6 according ...
Apr 26
Tipping our Hats
It's not an everyday occurrence that an Austrian Company finds an important security issue. If they then follow responsible disclosure towards the vendor and also inform the local CERT, that's something that should be openly acknowledged.Thus: A round of applause from CERT.at goes to Johannes Greil ...
Nov 04
Enabling DNSSEC Validation
This week, Comcast announced that they will enable DNSSEC validation on their production resolvers. One thing one might want to keep in mind if you do that:People make mistakes. Some domain owners will break their DNSSEC signatures. We've seen a good number of these in 1010, including TLDs like ...
Nov 03
Yet another current fake AV infection
Tiny report of a yet another current fake AV infection which is being spammed out via Email.
Warning: do not try to reproduce these results on a Windows PC unless you know what you are doing. As of the time of this writing, the URLs mentioned in this report are live and contain malware.
Background
Today the following Email (with attached Javascript file) caught my attention: