A malicious batch of adware and spyware has appeared that can use Firefox and other alternative browsers to infect Microsofts IE.
According to a researcher at Vitalsecurity.org in the United Kingdom, if a user visits a site hosting the malicious code and agrees to install the applications despite security warnings, Internet Explorer will automatically run and deluge the computer with pop-up ads and offers, regardless of IE security settings.
While the security and infection threat is relatively low—in addition to the security warnings, the code only affects users of Suns JRE (Java Runtime Environment), and so far is only found at a Neil Diamond lyrics site—it illustrates the continued expansion of malicious code targeting alternative browsers, as well as a unique cross-browser capability.
“As virus writers get more sophisticated, they are looking at more products to exploit,” said Gregg Mastoras, a senior security analyst at Sophos in the United Kingdom.
“Windows and Microsoft products are going to be the first targets because theyre so ubiquitous. Other applications will become targets as they become more popular.”
Consumers love for IE is on the rocks, but with more than 25 million installs, Mozilla Organizations Firefox is one browser likely to see more attacks and exploit code heading its way.
“Firefox will retain an edge in security for some time, but the notion that youll be impervious to threats due to using Firefox is an illusion,” said Jim Slaby, a senior analyst with the Yankee Group.
“The criminal element has decided that its profitable enough to write malware that targets it.”
This code, however, doesnt work only through Firefox to get at IE.
Next Page: A new wave of infections on the way.
A new wave of
infections on the way”>
According Christopher Boyd, the Vitalsecurity.org researcher, versions of alternative browsers including Firefox, Mozilla, Netscape and Avant all allow the execution of code within IE.
“Theres definitely a new wave of infection triggers on the way,” Boyd told eWeek.com. “Realizing that people are turning away from IE, theyve [virus writers] now latched onto the idea of using non-browser specific platforms to nail the PC.”
Boyds bigger concern, however, is the application writers use of Java as a gateway to execute the code.
By employing JRE, the installer appears as a Java applet rather than an Active X component, which is inherent to IE alone, and downloads a native executable binary (PE file).
That PE file then installs the offending adware and spyware applications.
“In this way, if the browser being used can recognize and install the applet, then it doesnt seem to matter what browser youre using, or how tight your IE security is,” Boyd wrote on the site.
He also noted that deleting the newly created file will not remove the new adware, it will only remove the installer.
Boyd told eWEEK.com that rather than giving the end user the ability to decide whether to download the infected applet, Java should automatically lock down potentially malicious code.
Sun and Mozilla developers are currently working jointly to secure the browser and JREs ability to execute the code.