Donate for the Cryptome archive of files from June 1996 to the present

2 March 2013. The BOA files malware alert should not detract from the value of the great release. Delete the pest, extoll the rest.

1 March 2013. Source of BoA malware email:

http://par-anoia.net/assessment/us/bofa/allTexts/emails/55. 1_13_2012 - EWT - TACTO.txt

Inactive link is deliberate. This email contains active malware, do not run if downloaded. AV may automatically delete if downloaded:

Here is a neutered version in PDF (scanned OK by Norton AV):

http://cryptome.org/2013/03/boa-malware-neutered.pdf

It is peculiar that the BoA security team did not appear to recognize that attaching malware to an email, or including it in body text, can infect the email servers handling the email as well as networked servers and extended networks. The same peculiarity applies to HBGary, for example, which regularly exhanged malware attachments to email or within body text "for analysis" without isolation in secure containers for transmission. That shoot-in-the-foot negligence can apply to those posting malware to IRC, drop boxes and pastes. Ironically, it could apply to Par-AnoIA and downloaders of infected BoA files that were not blocked by AV programs. Whether the peculiarity, negligence and lack of oversight is due to skills vanity, ignorance, accidental or deliberate is ponderable. To be sure, some cybersecurity wizards distrust commercial security products in favor of business to promote their home brews of 24x7 staffing armed with classified research and secret means and methods, i.e., CyberCommand and its contractors.

1 March 2013

Malware in Bank of America Files


A reports that Par-AnoIA's release of Bank of America files contained malware in the two BankOfSpooks files (and that there may be others):  

[Image]

Cryptome confirmed the malware in BankOfSpooks.tar.gz, but its version of BankOfSpooks.tgz did not have that email, jumping from email 54 to email 56 (both files downloaded on 28 February 2013).

It is to be expected that security reports reference malware and may contain the malware as examples, active or neutered. The HBGary files contained numerous examples of malware, including Stuxnet and other APTs.

In addition, security experts plant malware, genuine and spoofed, as poison pills or APTs to trace, combat and counterattack attackers, to deceive and scare downloaders and to muddle publicity about attacks. Competitors plant malware to disparage products and services. AV firms plant malware to boost the market. Governments plant malware to increase fear, doubt and dependency on national security. Hackers plant malware for lulz and braggardy. Malware -- and reports of malware -- can be an attention-getting hoax as with any form of fear-driven security.

Malware can be invented, planted and discovered by cybersecurity and AV experts to exploit fearful clients, governments, citizens, users and in complicity with other experts and their witting and unwitting hackers -- cyberwarfare is booming thus mostly war-time profligate waste, duplicity, treachery and chicanery.

It has not been determined if the BoA malware is genuine, benign, spoofed, neutered, poison pill, APT or cyberwarfare run amok by dreams of BoA accumulated wealth.

Cryptome reported the malware to Par-AnoIA:

To: submissions@par-anoia.se
Date: February 28, 2013
Subject: Reported Virus in BoA Files

You have probably heard already about a reported virus in your two BankOfSpooks files. Email infection is reported for:

55. 1_13_2012 - EWT - TACTO.txt

Our copy of .tgz does not have 55, but it is in .tar.gz, both downloaded today.

Someone reports the virus in both .tgz and .tar.gz.

Great release, congrats

John Young
Cryptome.org