Careful -- cuetable.com and pool.bz flagged as hosting malware
Guys:
Be VERY CAREFUL with anything you click inside either the pool.bz or cuetable.com website.
Without getting into a long propeller-head discussion (information security is my day-job gig), suffice to say that both sites have been flagged by Google (e.g. the Chrome browser) as well as several anti-virus, anti-malware, and content management companies as having been successfully attacked to the point of hosting malware. (See screenshots below.)
The reason is that cuetable.com and pool.bz do not have sufficient content-management measures in place to prevent someone from uploading malware (which has already happened and been reported), as well as links or cross-site-scripting hacks that, again, propellerhead-speak suppressed, use *your* PC or Mac as a drone to send out spam or attack other sites. There were a couple very dangerous Trojan Horses found on cuetable.com/pool.bz -- ones of the class "rootkits."
(Meaning, your PC or Mac is attacked and penetrated at the kernel level, which make disinfection or cleaning extremely difficult, if not impossible, and make your PC or Mac completely "remote controllable" as long as you're connected to the Internet.)
Don't click on any links inside any of the cuetable.com/pool.bz forums, as you have no guarantee of the site you're being redirected to. A lot of makes up "forum spam" is exactly this -- what's called "drive by" or phishing attacks. If you *have* to use the WEI table, be very cognizant and careful of what you click on!
The obvious warnings and precautions apply:
- Make absolutely sure your anti-virus is up-to-date. In fact, you should invoke your AV's "update" feature manually, just to make sure it's so. (Don't rely upon the "auto-update" feature -- that is one of the first things that malware will turn off, or insert code that makes it "look like" it's updating successfully.)
- Install an anti-malware specialist, like Malwarebytes
- If you are responsible for a corporate environment, you should investigate comprehensive content management, like WebSense, N2H2, etc. -- many of these hook directly into firewalls such as the Cisco ASA.
- Again, on the topic of managing corporate networks, you might want to investigate a specialized threat management solution, such as EMC's NetWitness, or better yet, FireEye.
These phishing attacks are getting so sophisticated, that they've evolved a new term -- spear-phishing (i.e. targeting certain types of folks to be infected, as well as sites and companies that the now-successfully-droned PC or Mac will attack, like banks, governments, etc.).
Be careful out there. Unfortunately, that also means heightened awareness with one of our most beloved tools, the WEI table!
-Sean
<-- your friendly neighborhood white-hat and gray-hat information security specialist
P.S.: the below are *photos*, not actual "clickable" pages.