Computerworld - A critical ActiveX vulnerability used by hackers to exploit Microsoft Corp.'s Internet Explorer browser is a prime candidate for another Conficker-scale attack, security experts said.
On July 6, just hours after security companies reported that thousands of compromised sites were serving up exploits, Microsoft acknowledged the flaw in the ActiveX control that can be accessed using IE. The bug has been used by hackers since at least June 9.
Microsoft said it will issue a patch for the flaw on July 14.
The vulnerability "exposes the whole world and can be exploited through the firewall," said Roger Thompson, chief research officer at security software vendor AVG Technologies USA Inc. "That's better than Conficker, which mostly did its damage once it got inside a network."
Conficker exploited a Windows flaw that Microsoft had thought dire enough to fix outside its usual update schedule in October 2008. The worm exploded into prominence in January, when a variant infected millions of machines that remained unpatched.
Microsoft confirmed the latest flaw shortly after security researchers at Danish firms CSIS Security Group AS and Secunia said that thousands of hacks of legitimate Web sites over the July 4 weekend had exploited the bug.
The hackers took advantage of the bug to reroute users to a malicious site, which in turn downloads and launches a multiexploit hacker tool kit.
Two days after disclosing the bug, Microsoft admitted that members of IBM's X-Force threat research team had first reported the vulnerability to it sometime in 2008.
The X-Force researchers had uncovered the flaw in late 2007, and in December of that year reserved a number in the Common Vulnerabilities and Exposures list of publicly known information security vulnerabilities.
One of the researchers, Alex Wheeler, now manager of 3Com Corp.'s TippingPoint DVLabs, declined to say exactly when the flaw was discovered, citing a nondisclosure agreement he had signed with his former employer.
A Microsoft spokesman didn't say why the flaw wasn't patched earlier.
"When we were alerted in 2008, we immediately started an investigation," the spokesman said in an e-mail to Computerworld. "As we wanted to be thorough, this took extra time to fully evaluate."
This version of the story originally appeared in Computerworld's print edition.
Read more about Security in Computerworld's Security Topic Center.
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!