Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Crackers Unleash Spyware Tactics on IE Holes

    Written by

    Dennis Fisher
    Published July 2, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The rash of recent attacks exploiting vulnerabilities in Microsoft Corp.s Internet Explorer browser is evidence that crackers are adopting tactics favored by spyware purveyors and could just be the beginning of a wave of highly targeted, well-engineered attacks, security experts say.

      Because of its market dominance and its much publicized security holes, IE has long been a favorite target of crackers looking for a quick way to gain control of a users machine. To date, most of those attacks required users to take some action such as opening an e-mail message or visiting a malicious Web site.

      Now attackers have begun compromising Web servers and using them as platforms to install Trojans, keyloggers and other malware with the goal of stealing personal and financial data.

      Last week, for example, a pop-up ad on a compromised Web site silently installed a Trojan on visitors machines, which then dropped a BHO (Browser Helper Object) that watched for outbound secure connections to a preset list of banking sites.

      That Trojan included a keylogger to record data sent over the secure connection before encryption. The data was then sent to a remote machine, presumably controlled by the attacker.

      This attack vector is one thats been used to install spyware for some time, but security analysts said last weeks attack is the first instance theyve seen of crackers using this technique.

      “Spyware has been using these same methods for some time now, and I think that theyre rather well-known,” said Tom Liston, the analyst who did the original analysis of this malware for The SANS Institutes Internet Storm Center, in Bethesda, Md. “The extent of the work involved in setting this up—apparently compromising a few Web sites—leads me to believe that this was a more professionally done hack. Theyll be back.”

      A similar attack a week earlier took advantage of compromised Web servers to install a different Trojan via two vulnerabilities in IE. These incidents, combined with the string of vulnerabilities that plague IE, have pushed some users to the breaking point.

      During a debate between Microsofts Scott Charney and security researcher Dan Geer at the Usenix Annual Technical Conference here last week, audience members called for more diversity in operating systems. Other Microsoft customers said the company needs to start over with IE.

      /zimages/6/28571.gifInternet Explorer is too risky to use, Steven J. Vaughan-Nichols warns. Click here to read more.

      “Trustworthy Computing has done nothing in regards to IE. I can confidently say IE is in a worse position with the type of exploits today than ever,” said Mark Deason, network administrator at Silverside Equipment Inc., in Reno, Nev., which is testing Mozilla Firefox for enterprise deployment. “Blended attacks using obscure functionality are becoming commonplace, hence the recent attention.”

      Charney, however, rejected repeated assertions that forcing the user base to use different browsers or operating systems would have much effect on the state of security.

      “To say that diversity will solve the problem of confidence or integrity isnt true,” said Charney, chief security strategist at Microsoft, of Redmond, Wash. “If a very small percent of machines can have an effect [when theyre compromised], wed have to diversify not into two but into millions. Its not really clear to me how that would work in practice.”

      /zimages/6/28571.gifCheck out eWEEK.coms Security Center at http://security.eweek.com for security news, views and analysis. Be sure to add our eWEEK.com security news feed to your RSS newsreader or My Yahoo page: /zimages/6/19420.gif http://us.i1.yimg.com/us.yimg.com/i/us/my/addtomyyahoo2.gif

      Dennis Fisher
      Dennis Fisher

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.