How To

Don’t fall prey to this Bitcoin phishing attack

We got the following email to our company’s main mailbox yesterday. I took a screenshot of it, so you can click on it to view it large (see below). It certainly sounds ominous, and to the layperson, enough “details” are included in the message to make them start to worry and God forbid, even consider paying the turd who sent this out.

First and foremost, I need to say that this is a templated phishing attack. In other words, it sounds personal, but no one person is being specifically targeted. The hacker who sent this out is hoping that enough people will feel guilty and scared to start paying him/her the fee, after which point he or she will keep asking for more money.

I looked at the email headers and they were “stripped”, meaning the actual routing information for this email wasn’t included, flagging this message right away as a fake. Sure, it looks like it’s coming from our email address, but the hacker is “spoofing” it, using software that makes it look as if it was sent from us, when in fact it was sent from them. I know this sounds complicated to most people, but don’t worry, read on, I’ll give you other reasons why this is all fake and I’ll tell you what you need to do to safeguard against actual occurrences of these things. You can’t eliminate the possibility of this actually happening, but you can minimize it through basic precautions and regular upkeep of your network security.

This is why it’s important to be confident in the security measures and precautions that you have implemented at home or at the office. For example, I know that:

  • I change my passwords fairly regularly and I use long, randomized passwords or passphrases. I store them in Keychain, the built-in app that comes with every Mac.
  • I have standard network security in place, such as a firewall, a router that uses NAT, and I don’t keep any ports open by themselves. Network devices can open ports, but the firewall only allows incoming traffic to those devices and only when they initiate it. This is fairly standard on all modern firewalls. I know my router doesn’t have software vulnerabilities. I know because I update its firmware whenever a new version comes out, which is something everyone should definitely do with their routers.
  • I have anti-virus software that checks my computers. I update it regularly. You should do the same. There are many options here, pick one that you like to use.
  • I use a network traffic analysis tool called Fingbox, which alerts me to unusual traffic patterns, ports and devices using my network. There are other similar devices on the market and everyone should have one of these things and should know how to use it.
  • The email account the hacker talks about isn’t hosted on our local network, it’s hosted offsite with my web hosting provider, who is in a different country and has some fairly serious security measures in place to detect the sort of behavior the hacker brags about. So even if they’ve hacked into it, that doesn’t give them access to the kind of data they’re talking about.

Making a “full dump of my disk” is a ridiculous and funny thing to say. I have about 12-16 TB of data connected to my computer at any given time. Good luck making a “full dump” of that! It would take weeks, nay months…

The hacker apparently “looked at my web traffic” and was “shocked”. “Sites for adults”, oh no… I’m not even going to gratify that accusation with a response except to say every single one of us can visit whatever sites we damn well please on the internet, but we also need to be ready to accept the consequences of those web visits. The consequences can include: the logging of your activities on the site, the activation of your webcam and surreptitious recording of your “activities” as you surf those sites, the installation of trojans, and in case you visit illegal websites, possible visits from law enforcement. Macs are less likely to be “vandalized” in these ways by bad websites, but Windows computers can easily fall prey to code attacks. Know what you’re getting into and be willing to accept the consequences.

It also helps to have something called a Privise webcam cover (it used to be called Privoo when I bought it). It’s inexpensive and is a sliding cover for the webcam, allowing you to keep prying eyes from looking at you through the webcam even if they’ve hacked into your computer.

The filthy, smelly little bug who sent the phishing message wanted payment in Bitcoin. It is of course untraceable and would force you to buy the currency in order to pay him/her. Law enforcement wouldn’t be able to trace the transaction, even if you filed a police report afterward. This is why I don’t like cryptocurrencies! Not only are they wildly speculative but the transactions are untraceable, making them perfect for modern-day highway robbers and thieves.

Don’t think for a moment that once you pay the turd his asking fee, whatever he/she’s got on you will “self-destruct automatically”. No, he’ll keep whatever he’s got and he’ll keep milking you for money — after all, you’re his cash cow now. Moo…

Like I said above, your best defense is to learn and implement basic network security measures, be confident in what you’re put in place and if you messed up, own it and accept the consequences, but never pay the hackers, you’ll only encourage them. And back up your data! That should be your #1 safety precaution against anything. Ideally, you should have one synchronous local copy (gets updated regularly), an asynchronous local copy (only gets updated 2-3 times a year) and an offsite copy (or two). If your data is important to you, back it up!

Standard
Thoughts

Bring back POP3 for Gmail, Apple

Due to some file corruption issues, I’ve recently had to re-install Snow Leopard on my MBP. Afterward, as I set up Mail, I found out there was no way to configure my Gmail account for POP3 access. IMAP was the only choice. I searched for this on the internet, and it’s a confirmed “design” behavior in Snow Leopard.

I really dislike it when I’m told by someone else how to manage my digital stuff. I’m an IT professional, and I like the POP3 protocol. I don’t care if IMAP is better. I use IMAP on my iPod Touch or iPhone or iPad or Nokia N95, and for those, it works great. But all I want to do on my laptop/desktop is to download my emails via POP3 and archive them by year, then move them into long-term digital storage. (I have an email archive going back to 1996.)

I also want to keep the emails in my Gmail account, so I have them in two places, just in case. You can’t do that with IMAP. You drag an email onto a local folder, and it’s gone from the cloud. I also dislike the fact that IMAP stores a local cache of the cloud emails, eating up space on my hard drive.

Thankfully, I was able to use Time Machine to retrieve a previous version of the Mail Preference file, restored it, and I was back in business with POP3. But everyone who chooses to do a fresh install of Snow Leopard (not an upgrade) is out of luck if they want to use POP3 for Gmail.

Now along comes Apple and says I can’t use POP3 for Gmail anymore, because they don’t feel like including it as a config option in Snow Leopard’s Mail. That really bugs me. It’s not like it cost them anything to have it in there. The code for POP3 was written more than a decade ago. It’s a simple, light protocol (much simpler than IMAP).

Apple, why are you forcing me to do something I don’t want to do? If I like using Mail and POP3 works for me, why take it away? That’s rude. Work on improving the OS, and making it do more, but don’t take away something as basic and simple as POP3!

Standard
Reviews

What the Duck on watermarks

Aaron Johnson, the creator of What the Duck, has apparently seen this post of mine, where I talk about image theft. He’s just sent me an email to let me know of today’s WTD, which handles the issue of watermarks and image theft in that wonderful, funny way that I’ve come to love.

Here’s the strip in question, reproduced with Aaron’s permission. Click through to view it at full size on WTD. And if you haven’t already, bookmark the site or subscribe to the RSS feed. If you like photography, then you’ll love WTD.

WTD on watermarks and copyright

Standard
Thoughts

Google to buy FeedBurner in next 2-3 weeks

I thought it odd that I got no reaction whatsoever from the FeedBurner folks when I compared their site stats service with Google Analytics back in April, and deemed FeedBurner superior. I keep in touch regularly with a couple of folks from FeedBurner, and when I write about them, I usually get a little note by email or a comment on my post. But I got nothing this time. I thought, “Hmm, something’s gotta be up. What’s going on between FeedBurner and Google? Did I ruffle some feathers?” The complete silence was unusual. I could hear virtual crickets chirping away…

Fast forward about a month, and I find out this afternoon from Beta News that Google and FeedBurner are in acquisition talks. The quoted price is $100 million. It’s a sane price, not a make-believe one, like the one paid for Doubleclick or that other ad company that MS purchased (those prices were absolutely and ridiculously inflated). I actually believe FeedBurner brings much more value to the table than those two companies combined, so the $100 million is a real bargain. I hope for FeedBurner’s sake the price is more than that in the end.

Anyway, if this does turn out to be true, I’m happy for the FeedBurner folks, and wish them all the best. May they teach Google a thing or two about feed management and other such fun stuff. Cheers, guys! Thanks for the awesome service!

Standard
Reviews

Google Apps for Your Domain gets going

In what I think is an astonishing twist, Google has turned their “private label” Gmail service offered about 6 months ago to companies and schools interested in the idea into Google Apps for Your Domain, an all-in-one solution that offers Gmail, Google Talk, Google Calendar and Google Pages for whatever domain you’d like. In typical Google fashion, they’ve also made it free! Now no one can complain that they can’t get their site going or email set up. All anyone needs is an internet connection and a domain name, and they’re set. Granted, the functionality of Google Pages isn’t quite full featured, but it’s plenty for the needs of most people.

All I can say is Wow, because I’m floored. It’ll take some time for this to sink in. Private label IM, free! Private label Gmail, free! Private label web calendaring, free! Wow!

Standard