IE10 under attack as hackers exploit zero-day bug
FireEye uncovers attacks emanating from a U.S. website just two days after Microsoft issued huge IE patch collection
Computerworld - FireEye today said it had discovered that attackers are actively exploiting a new, unpatched vulnerability in Internet Explorer 10 (IE10).
Microsoft confirmed the Milpitas, Calif. security company's report.
"Microsoft is aware of targeted attacks against Internet Explorer, currently targeting customers using Internet Explorer 10," a Microsoft spokesperson said via email. "We are investigating and we will take appropriate actions to help protect customers."
FireEye's disclosure came just two days after Microsoft patched every edition of IE with a large update that fixed 24 flaws, 15 of which applied to IE10. The IE update, which was not originally on this week's Patch Tuesday slate, was added at the last minute by Microsoft, which said it had completed testing of the repairs in time to make the cut.
The attack code, said FireEye, was hosted on a compromised website based in the U.S. The company called the exploit a "classic drive-by download attack," a term reserved for the most dangerous kind of browser-based assaults, one that only need entice people to a malware-infected site.
According to FireEye, the exploit sidesteps ASLR (address space layout randomization) using Flash ActionScript, an Adobe-owned scripting language most often used on sites that rely on Flash Player to execute content. ASLR is one of Windows' most important anti-exploit technologies.
"Upon successful exploitation, this zero-day attack will download a XOR-encoded payload from a remote server, decode and execute it," FireEye added.
FireEye said that it is "currently collaborating" with Microsoft's security engineers on researching the IE10 vulnerability and the related exploit.
IE10 has been on the downturn for the last four months. Starting in October 2013, Microsoft has been replacing IE10 with the newer IE11 on Windows 8 devices, including PCs and the tablets -- such as Microsoft's own Surface Pro 2 -- that run the full-featured Windows 8 and 8.1 rather than the subset-of-an-OS Windows RT.
Microsoft released IE11 for Windows 7 in November, at which point it was automatically pushed to those machines as a substitute for IE10.
Web metrics firm Net Applications estimated IE10 user share, a rough calculation of the percentage of all Internet users running a specific browser, at 9.3% in January. Most people running IE remain tied to 2009's IE8.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is email@example.com.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Malware and Vulnerabilities White Papers | Webcasts