Saturday, October 27, 2012

Malware and domains search

I've put together a custom google search for malicious software, known bad sites and dangerous ip addresses, it can be found here:

Examples of the sites on the list include:

I will be constantly updating the search engine.

Monday, September 3, 2012

Attacks on the stock market: some thoughts

I have recently been thinking about stock markets and possible attacks on them; Die Hard 4 (, Hackers and any number of hacker movies have some very complicated looking system with great looking Angelia Jolie lookalikes or other attractive people who have these super elite skills and can hack the Gibson or do some increasingly complex attack to bring the main system down etc.

These attacks are certainly entertaining and also complex, and have a greater likelihood of being detected and also failing. What if there was a simpler way to launch attacks without directly attacking the market itself?

Let's look at day-traders as an example:

  • When launching trades, you need to use trade execution software
  • Most of these pieces of software are proprietary in nature and supplied either by brokerages or independent software houses
  • Since these pieces of software have a smaller market share, I began to think about how many people actually check to see whether the software they are downloading is really what it is supposed to be. How many people actually check the md5/sha-1 hash to see if there is a match?

An attacker could conceivably put a link on a legitimate vendor page that re-directs clients to a malicious piece of software (for a temporary period of time) or offer a 'free' version that works just as well. 

Another plausible scenario could have an attacker flooding various message boards and other locations that he/she is leaking a great new algorithm that is similar to or used by traders at a large firm like Goldman and watch to see how many people download this just to get an edge in their trading strategies. 

This malicious code could behave in a manner similar to which the the user expects or remains dormant until several trades have gone through and when the traders funds are in their account, execute its own trades and transfer an amount to a another brokerage or western union account.

If these transfers are randomized or if the malicious code monitors the traders' behavior and carries out transactions that appear similar to the traders own activity,  or deletes itself after x number of successful trades or transfers, this can make things much more difficult to detect.

Saturday, April 14, 2012

IIT Guwahati and the Market Intelligence Search

In February, I had the privilege of speaking at the Indian Institute of Guwahati as part of the ISEA 2012 workshop and conference. I had a wonderful time, enjoyed amazing hospitality, got some very encouraging and positive feedback and made some great new friends.

I have put together a custom search for stocks, bonds and related securities. While there are a number of different sites and blogs that provide market intelligence this engine leverages various sources to bring a large amount of relevant information in one place with the ease of a simple Google search.

The engine can be found here:

Monday, January 30, 2012

i2p, and onion/ tor search

I have put together a custom search for the hidden web. This search goes through various sources to leverage and scour through various i2p and onion/ tor sites. The advantage here is that even if you do not have tor installed, or do not want it installed you can still search for the information you need and then using your results either dig deeper by installing tor or take any actions you need to. I do not link directly to any of the sites in question.

Sunday, January 29, 2012

Black Hat Abu Dhabi - Amazing

I was at Black Hat Abu Dhabi 2011 last month and had an amazing time. I got to listen to some very interesting research, had the pleasure of meeting some very cool people, made great new friends and got some excellent feedback on my presentation.

I just came across the following article from the Wharton school of business, which briefly mentioned me and some of my work, which I thought was really nice.

I have also updated all three searches with new sites.