IE10 under attack as hackers exploit zero-day bug
FireEye uncovers attacks emanating from a U.S. website just two days after Microsoft issued huge IE patch collection
Computerworld - FireEye today said it had discovered that attackers are actively exploiting a new, unpatched vulnerability in Internet Explorer 10 (IE10).
Microsoft confirmed the Milpitas, Calif. security company's report.
"Microsoft is aware of targeted attacks against Internet Explorer, currently targeting customers using Internet Explorer 10," a Microsoft spokesperson said via email. "We are investigating and we will take appropriate actions to help protect customers."
FireEye's disclosure came just two days after Microsoft patched every edition of IE with a large update that fixed 24 flaws, 15 of which applied to IE10. The IE update, which was not originally on this week's Patch Tuesday slate, was added at the last minute by Microsoft, which said it had completed testing of the repairs in time to make the cut.
The attack code, said FireEye, was hosted on a compromised website based in the U.S. The company called the exploit a "classic drive-by download attack," a term reserved for the most dangerous kind of browser-based assaults, one that only need entice people to a malware-infected site.
According to FireEye, the exploit sidesteps ASLR (address space layout randomization) using Flash ActionScript, an Adobe-owned scripting language most often used on sites that rely on Flash Player to execute content. ASLR is one of Windows' most important anti-exploit technologies.
"Upon successful exploitation, this zero-day attack will download a XOR-encoded payload from a remote server, decode and execute it," FireEye added.
FireEye said that it is "currently collaborating" with Microsoft's security engineers on researching the IE10 vulnerability and the related exploit.
IE10 has been on the downturn for the last four months. Starting in October 2013, Microsoft has been replacing IE10 with the newer IE11 on Windows 8 devices, including PCs and the tablets -- such as Microsoft's own Surface Pro 2 -- that run the full-featured Windows 8 and 8.1 rather than the subset-of-an-OS Windows RT.
Microsoft released IE11 for Windows 7 in November, at which point it was automatically pushed to those machines as a substitute for IE10.
Web metrics firm Net Applications estimated IE10 user share, a rough calculation of the percentage of all Internet users running a specific browser, at 9.3% in January. Most people running IE remain tied to 2009's IE8.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is email@example.com.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts