IE users most at risk from DLL hijacking attacks
Stuxnet worm used the attack strategy, notes researcher
Computerworld - Users of Microsoft's Internet Explorer (IE) are more vulnerable to rogue DLL attacks than people who use rival browsers such as Mozilla's Firefox or Google's Chrome, a security researcher said today.
When running on Windows XP, Internet Explorer 6 (IE6), IE7 and IE8 do not warn users when they click on a malicious link that automatically downloads a malicious dynamic link library, or DLL, to the PC, said Mitja Kolsek, the CEO of Slovenian security company Acros Security.
Called "binary planting" by Acros and "DLL load hijacking" by others, the attack technique jumped into public view last month when HD Moore, the creator of the Metasploit penetration hacking toolkit, said he'd found 40 vulnerable Windows applications. Moore was followed by other researchers, including Kolsek, who claimed different numbers of at-risk programs, ranging from more than 200 to fewer than 30.
Many Windows applications don't call DLLs using a full path name, but instead use only the filename, giving hackers wiggle room that they can then exploit by tricking an application into loading a malicious file with the same title as a required DLL. If attackers can dupe users into visiting malicious Web sites or remote shared folders, or get them to plug in a USB drive -- and in some cases con them into opening a file -- they can hijack a PC and plant malware on it.
Binary planting or DLL hijacking attacks have been known about for at least 10 years, and Microsoft was again informed of the problem in August 2009 by researchers at the University of California Davis.
But IE users, particularly those running Windows XP, are especially susceptible, Kolsek said, pointing to testing his firm has conducted.
And that category includes a lot of online users. According to the most recent numbers from Web metric vendor Net Applications, Windows XP powered 66.7% of all Windows machines last month.
Users running IE7 or IE8 on Windows Vista or Windows 7 are safer, said Kolsek, who noted that both browsers run by default in "Protected Mode" on those operating systems. Protected Mode is Microsoft's term for a sandbox-like environment in which IE runs with restricted rights.
The problem on XP is that it automatically opens Windows Explorer, the operating system's file manager, whenever IE encounters a remote shared folder. At that point, the hackers have won, Kolsek said.
"It's not so much that IE itself is vulnerable to binary planting, but that other applications' binary planting vulnerabilities can be exploited relatively easily through IE, and in most cases without a single warning," said Kolsek.
Danish vulnerability tracker Secunia has compiled a list of 175 Windows applications that contain one or more unpatched binary planting bugs. Acros Security has identified more than 500 individual vulnerabilities.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts