Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management

    Internet Explorer Zero-Day Exploited in Malware Attack

    By
    Brian Prince
    -
    November 3, 2010
    Share
    Facebook
    Twitter
    Linkedin

      Security researchers have uncovered a new Internet Explorer zero-day being used in malware attacks.

      The situation was uncovered by Symantec after researchers observed a limited spam campaign seeking to trick users into clicking on a link. The spam had the subject line “re: hotel reservations,” and posed as a message about a hotel room. Once inside the e-mail, users were greeted with a link leading to a page on a legitimate, but compromised, site.

      “The link pointed to a page which contained a script looking to see what version of the browser and Operating System the visitor was using,” explained Vikram Thakur, threat researcher at Symantec Security Response. “Since the specific exploit page only worked when someone was using Internet Explorer 6 and 7, the script only transferred the visitor to the page hosting the exploit when this condition was met. In other cases the users didn’t see anything but a blank website.”

      “Visitors who were served the exploit page didn’t realize it, but went on to download and run a piece of malware on their computer without any interaction at all,” Thakur blogged. “The vulnerability allowed for any remote program to be executed without the end user’s notice.”

      According to Microsoft, the vulnerability in question exists due to an invalid flag reference within Internet Explorer. Under certain conditions, the invalid flag reference can be accessed after an object is deleted. In attempting to access a freed object, the browser can open users up to remote code execution, according to Microsoft’s advisory.

      In the attack discovered by Symantec, the malware–a backdoor Trojan dubbed Pirpi--set itself to start up with the computer along with a service named “NetWare Workstation.” The Trojan, which targets Windows computers, installs a backdoor and reaches out to remote servers.

      “It tries to contact a specific server hosted in Poland for small files named with a .gif extension,” Thakur blogged. “These small files are actually encrypted files with commands telling the Trojan what to do next.”

      “The files being downloaded by the attacker were hosted on yet another hacked Website,” the researcher continued. “The owners of this server were also unaware of their computer being involved in hosting of malicious programs…(and) immediately took down the malicious content.”

      The IE vulnerability impacts IE 6, 7 and 8, Microsoft noted, but there are mitigations. Data Execution Prevention (DEP) protects against code execution and is enabled by default in IE 8 on Windows XP Service Pack 3, Windows Vista Service Pack 1, Windows Vista Service Pack 2, and Windows 7. Additionally, Protected Mode in Internet Explorer on Windows Vista and later Windows versions limits the impact of the attack.

      “On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs,” Microsoft said in its advisory.

      Avatar
      Brian Prince

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×