Russian sites using new IE bug to install spyware
Unpatched flaw in VML processing is vector for attacks
IDG News Service - Hackers are taking advantage of a newly discovered vulnerability in Internet Explorer (IE) to install spyware on PCs that visit a number of Russian pornography sites.
The malware, first reported Monday by researchers at Sunbelt Software Inc., takes advantage of an unpatched flaw in the way Microsoft Corp.'s IE processes Vector Markup Language (VML) code. VML is a language used to display graphic information on the Web. (See: FAQ: What you should know now about the latest IE bug.)
The attack appears to work on all versions of Windows running the IE 6 browser, said Eric Sites, Sunbelt's vice president of research and development. "It's not an operating system-dependent issue," he said.
Sunbelt first discovered the malware on a Russian porn site late Friday. "This site and a couple of others use an exploit kit called Web Attacker, and it looks like the Web Attacker kit has been upgraded to include this new exploit," Sites said.
Since Friday, Sunbelt noticed that the attack code has popped up on about a half-dozen Russian porn sites. In addition, since security researchers estimate that Web Attacker is used by nearly 1,000 Web sites, this latest exploit should soon become more widespread.
Web Attacker is a software development kit sold for as little as $20 to criminals looking for an easy way to develop malware.
"Since it's being built into the next version of the Web Attacker kit, we expect that this thing will be everywhere in a few days," said Sites.
Whether the attacks will be widespread enough for Microsoft to rush to patch the flaw remains to be seen.
On Tuesday, Microsoft confirmed the Sunbelt team's findings, and said it planned to fix the VML bug in its next set of security patches, scheduled to be released on Oct. 10, "or sooner as warranted," according to a statement from the company's public relations agency.
This is the second unpatched flaw found in IE over the past week. On Sept. 14, researchers posted code that could be used to exploit a different vulnerability in a multimedia component of the Web browser. Microsoft is still investigating that flaw and is not saying whether it too will be patched next month.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Malware and Vulnerabilities White Papers | Webcasts