Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Trend Micro Backtracks on MS Trojan Description

    Written by

    Ryan Naraine
    Published November 11, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Virus researchers at Trend Micro Inc. are wiping eggs off their faces one day after jumping the gun with a warning that a Trojan in the wild was capable of exploiting newly patched Windows security flaws.

      Just 24 hours after announcing the discovery of TROJ_EMFSPLOIT.A, a proof-of-concept Trojan that exploits a trio of image-rendering vulnerabilities patched by Microsoft Corp. earlier this week, Trend Micro is retreating from that claim.

      The companys description of the Trojan has been modified to remove the contention that MS05-053 was being exploited.

      A Trend Micro spokesperson told Ziff Davis Internet News that the erroneous reference to the image-rendering flaws was made because the Trojan exhibited behavior that suggested it “may well be classified” as an exploit for that vulnerability.

      “Our Trend Labs team is currently working with Microsoft to resolve whether TROJ_EMFSPLOIT.A does indeed fall under the category of code exploiting the MS05-053 vulnerability or whether it is only a related piece of code but not totally exploiting MS05-053,” the spokesperson said.

      /zimages/1/28571.gifTo read more about the original claim that a Trojan is attacking a Microsoft image-rendering flaw, click here.

      Raimund Genes, chief technologist for anti-malware at Trend Micro, admitted that the companys initial assessment was flawed.

      “Given the time we needed to react to this, we didnt analyze it thoroughly. We wanted to do something fast and perhaps we didnt spend sufficient time on it,” Genes said in an interview.

      /zimages/1/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      He said the company received the Trojan sample from a customer in Japan and, during the initial research, the code definitely crashed the “explorer.exe” and EMF File Viewer in unpatched Windows systems.

      The “explorer.exe” process is a required file used to manage the Windows Graphical Shell, including the Start menu, taskbar, desktop and File Manager. A malicious attack that disrupts those essential services is considered very disruptive.

      In systems running Windows XP without Service Pack 1, Genes said, the Trojan crashes the process but, under Windows XP with SP1 installed, there is no crash of “explorer.exe.”

      When the company started working with the MSRC (Microsoft Security Response Center), Trend Micros researchers were told that a successful exploit of the flaw would have affected both Windows XP SP1 and SP2.

      /zimages/1/28571.gifMicrosoft rebrands its “AntiSpyware” software as “Windows Defender.” Click here to read more.

      “Were still working with Microsoft to clarify what it is exactly and how it will be categorized in relation to MS05-053. But its not exactly as we originally described it,” he added.

      A Microsoft spokesperson said the company is not aware of any active attacks that use this Trojan. “Microsoft continues to urge all customers to deploy MS05-053 and all recent security updates released by Microsoft to help ensure that their systems are protected from any attempted exploitation,” she said.

      Microsofts patches, contained in the MS05-053 bulletin, addresses three separate image-rendering flaws in the Windows operating system. The flaws could be exploited via any software that displays images, including the widely used Microsoft Outlook, Microsoft Word and Internet Explorer programs.

      The bugs are considered particularly dangerous because users could be at risk by merely browsing to a malicious rigged site with rigged image files or by displaying images in the preview pane of an e-mail program.

      /zimages/1/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Ryan Naraine
      Ryan Naraine

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.