New IE Spyware Problems

jwmorrice

Gentleman by Profession
Jun 30, 2003
7,133
2
0
In the laboratory.
From the Washington Post:

Newly Detected IE Exploit Spells Massive Spyware Trouble

A previously undocumented flaw in Microsoft's Internet Explorer Web browser is reportedly being exploited by online criminals to install an entire kitchen sink of malicious software on any computer that visits any of a handful of sites currently exploiting the vulnerability.

Researchers at Sunbelt Software discovered the exploit last week while conducting some routine online surveillance of known crimeware gangs. According to Sunbelt researcher Eric Sites, the exploits at the moment appear to be hosted mainly on hardcore porn sites. But if past experience with new IE exploits holds true, we may soon see this exploit being sewn into the fabric of legitimate, but poorly programmed, business Web sites that hackers can manipulate to their advantage.

According to Sites, among the nasty pieces of software an IE user can expect to be whacked with upon visiting one of the sites is the BigBlue keystroke logger, which monitors and captures data from computers including screenshots, keystrokes, web cam and microphone data; it also records instant messaging chat sessions, e-mail information and the Web sites visited by the user.

The exploit is also being used to install the incredibly invasive Spybot worm and VXGame Trojan, as well as adware titles that scam artists profit from on a per installation basis, such as Virtumondo, SafeSurfing, Avenue Media, WebHancer, Internet Optimizer, SurfSidekick, DollarRevenue, and the bogus anti-spyware program SpySheriff.

And that's not even the half of it, Sites said. "We haven't even fully analyzed this piece of malware yet."

Sites said Sunbelt had notified Microsoft of the discovery. I put in a call to the company late Monday but haven't heard back yet. I will update the blog when I hear back or when the company issues an advisory about this.

This whole thing is starting to smell a lot like the activity that preceded similar attacks on an unpatched IE flaw at the beginning of the year. For a week or so at the end of 2005, a handful of crime groups were using an undocumented IE vulnerability to attack people who visited a small number of fringe or hardcore porn Web sites, and Microsoft downplayed the threat from it by noting that fact. As the new year arrived, however, hundreds of legitimate Web sites had been compromised and were installing spyware on the computers of any user who visited them with the IE browser.

"Usually, as soon as we see these things in the wild like this they start spreading very quickly," Sites said.

Sites said the flaw appears to be the result of Microsoft's implementation in IE of "vector mark-up language," or "VML" for short -- an XML Web programming language used to create scalable graphics.

This new exploit, combined with two other publicly available exploits for a separate, unpatched IE flaw, should give pause to anyone using the Microsoft browser. My advice: If you or someone you care about is in the habit of cruising the Web with IE, now would be a very good time to get acquainted with another browser that doesn't use IE's rendering engine, such as Firefox or Opera.

But if IE is your browser of choice, make sure you have Windows set to receive automatic software updates, and be very careful about visiting Web sites that are off the Internet's beaten path.

Update, Sept. 19, 12:06 a.m.: I neglected to mention that IE users can mitigate this flaw by disabling Javascript in the browser. To do this, click on "Tools," then "Options," and then on the "Security" tab, scroll down to the section marked "Scripting," select either the option for "prompt" or "disable" of active scripting.

Update, Sept. 19, 12:08 p.m.: Microsoft is now acknowleging the existence of this flaw, which it said "could allow an attacker to execute arbitrary code on the user's system," and that Redmond "is aware of limited attacks that attempt to exploit the vulnerability. The security update is now being finalized through testing to ensure quality and application compatibility and is on schedule to be released as part of the October security updates on October 10, 2006, or sooner as warranted."

Microsoft may quickly find that sooner is in fact warranted in this case. It's worth noting that once again online crooks have waited until just after Microsoft releases its monthly patches to begin exploiting this new flaw (Sunbelt said it first spotted this new exploit last week, just hours after Patch Tuesday). The bad guys appear to be gaming Microsoft's patch process with a fair degree of regularity.

By Brian Krebs | September 18, 2006; 10:25 PM ET | Category: Latest Warnings


Guarding Against the New IE Exploit

Earlier this week Security Fix wrote about a newly discovered vulnerability in Microsoft's Internet Explorer Web browser that bad guys were exploiting to install malicious software when users merely browsed certain nasty Web sites.

That post advised users who wanted to continue using IE to jack up the Javascript security settings on the browser, but as the most recent attacks with this exploit have shown, the bad guys don't need to use Javascript to execute their attacks with this vulnerability.

Microsoft has since published an advisory with a workaround that seems to be pretty effective at stopping these attacks, pending the release of a patch from Microsoft (the company says it may not arrive until Oct. 10). The temporary fix involves "unregistering" the vulnerable Windows component, and is pretty straightforward step that should help mitigate this threat.

The problem is present in all versions of IE 5.0 and higher, according to US-CERT. I have not seen anyone test this exploit against IE 7 yet, but I've not heard of any evidence that the later version is vulnerable.

The following workaround works on Windows XP Service Pack 1 and 2, Windows Server 2003 and Windows Server 2003 Service Pack 1:

1) Open up a command prompt: Click "Start," then "Run," and a text box should pop up.

2) Cut and paste the following text into that box: regsvr32 -u "%ProgramFiles%\Common Files\Microsoft Shared\VGX\vgx.dll

3) Then hit enter or click "Ok." You should then receive a pop-up window stating that the vulnerable component has been unregistered.

Even if you don't use IE as your default browser, disabling this Windows component may prove essential. One need only look back at the security headaches Windows users had earlier this year with the Windows meta file (WMF) vulnerabilities, when Microsoft was forced to issue a patch outside of its normal monthly patching process in part due to the creation of unofficial patches from third-party security vendors.

With that problem, it was sufficient for Windows users merely to have the vulnerable WMF component active on a system for it to be compromised by a variety of different means, whether through a third-party e-mail client or other software that might invoke the flawed component.

Incidentally, anyone willing to take bets on how long it will be until we start to see a repeat of third-party patches to fix this problem?

By Brian Krebs | September 21, 2006; 2:29 PM ET | Category: Latest Warnings
 

MarkII

New member
Sep 22, 2004
1,903
0
0
Every version of anything MS does is a work in progress.

Face it they supple the OS to about 80% of the worlds computers. ( agree or disagree on the percentage..but it is high)

There will be some leaks..or gaps depending on the age of your computer.

Imagine creating software to run on anything thats still powered up! It's not like they are starting out with brand new equipment across the board.

Suprisingly they do a pretty good job of plugging the leaks and updating.

When you sit back and think about it...would you want to try and supply somewhere near 80% of the worlds computers and make it work flawlessly every time? Pretty hard challenge.

Ok so you can debate the numbers...but it's the idea of how many OS systems MS supplies in so many computer configurations in so many languages..it does amaze me that they do keep up so fast.

M2
 

Cobster

New member
Apr 29, 2002
10,422
0
0
MarkII said:
Ok so you can debate the numbers...but it's the idea of how many OS systems MS supplies in so many computer configurations in so many languages..it does amaze me that they do keep up so fast.
M2
Keep up?????????
They have a great distribution channel that evolved over the years.
They have the funds to push and push and push.
My buddy works for M$ and let me tell you about the pressure he has to sell their shit. He travels all over N.America.
They are the patch Kings.
Problem arises, they just get their "developers, developers, developers, developers, developers, developers, developers" to, yup that's right, PATCH IT UP.

I'm gonna start to try using Linux slowly and learn that OS.
Unless my buddy hooks me up with a new free OS from M$ again. :D
 

Cobster

New member
Apr 29, 2002
10,422
0
0
lmao kitaa...
my next laptop might be a Mac.
Definitely going to learn Linux though.
Which one did you get? and how much did you pay?
 

jwmorrice

Gentleman by Profession
Jun 30, 2003
7,133
2
0
In the laboratory.
kitaa said:
I just bought a MacBook Pro......

Zero Viruses and Zero Spyware crap :)

Fuck Norton and Windows!!!
From the Washington Post:

Apple Issues Patches for Laptop Wireless Flaws

Apple Computer today issued a trio of software updates to fix four serious vulnerabilities located in the wireless components of a number of its Mac products.

In an advisory, Apple said flaws exist in the Airport wireless device drivers included in the Macbook Pro and other Mac products. The company said the flaws could be exploited by attackers to compromise a vulnerable system remotely just by having the wireless devices turned on and in range of the attacker.

According to Apple, the flaws are present in Power Mac, PowerBook, iMac, Mac Pro, Xserve, and PowerPC-based Mac mini computers equipped with wireless. Apple says Intel-based Mac mini, MacBook, and MacBook Pro computers are not affected.

I first wrote about this issue at the Black Hat hacker conference in Las Vegas roughly two months ago, where I witnessed security researcher David Maynor compromising a Macbook from a Windows machine remotely using what he said were flaws in the built-in wireless drivers.

The videotaped demo produced by Maynor and colleague John Ellch shown to Black Hat attendees deliberately used a third-party USB wireless card plugged into a Macbook. To demonstrate the exploit with the Apple wireless drivers before giving the company time to inspect and fix them, they argued, would be irresponsible. Many in the security community -- particularly Mac security enthusiasts -- were eager for more information and charged that the Maynor/Ellch demonstration did not prove that there were flaws in Apple's own wireless components.

I attempted to follow up on several of the points Maynor and Ellch made in their Black Hat talk, but SecureWorks declined to have Maynor comment further. Apple repeatedly said SecureWorks had informed the company of a wireless vulnerability in its products but had shared no code as evidence.

Apple and SecureWorks still apparently differ over which side found the flaw and how exploitable it really is. But one thing now appears quite clear: The built-in wireless device drivers are indeed vulnerable to exploitation in a manner very similar to what Ellch and Maynor detailed in their presentation.

Apple spokesman Anuj Nayar maintains that the company is not aware of any exploit code available to attack these flaws, and that SecureWorks to this day has not shared a working demonstration of how to exploit them.

"Basically, what happened is SecureWorks approached Apple with a potential flaw that they felt would affec tthe wireless drivers on Macs, but they didn't supply us with any information to allow us to identify a specific problem. So we initiated our own internal product audit, and in the course of doing so found these flaws."

I called SecureWorks and Maynor but haven't heard back from either so far. I will update the blog as more of this unfolds.

By Brian Krebs | September 21, 2006; 5:10 PM ET | Category: New Patches
 

Cobster

New member
Apr 29, 2002
10,422
0
0

Cobster

New member
Apr 29, 2002
10,422
0
0
kitaa said:
I bought this one http://store.apple.com/1-800-MY-APPLE/WebObjects/canadastore.woa/6794006/wo/qt4Jwyq8ONJy3PBzSwH1lC6fwbX/2.?p=0 with an additional 512 of RAM with taxes $ 2643.66 at the Apple store at Sherway Gardens. Let them install the RAM....

Believe it or not but the thing boots in 28 seconds, even after installing quite a few programs!
Didn't work, don't think it will, unless you tell me what model, etc.
I believe the 28-second boot up, don't worry. ;)
lol
Actually makes me wanna time my PC, since I tweaked the hell out of it and have a few programs on it.
 

Meister

Well-known member
Apr 17, 2003
4,371
647
113
I am thinking about a Macbook, but I'm not sure if they are available with the new Core 2 Duo yet. I've only seen the Core Duo so far.
 

Cobster

New member
Apr 29, 2002
10,422
0
0
Sounds good, how are you finding the switch over to a MAC based OS.
Or do you just use it for surfing and documents?
 

skihrdr

New member
Mar 25, 2004
55
0
0
welcome to the spinning beachball kitaaa :D

both os's have their advantages/disadvantages. Until this current Intel-ization of Mac, PCs were a world ahead in terms of processor performance - Mac is on the path of righting that.

I work with both OSs, among some others as well, and I prefer osx for personal work but still rely on XP for anything business related. Vista will be a very interesting step and it should make this OS thing just a tad more interesting.

Enjoy your mac! They're slick devices.
 

Cobster

New member
Apr 29, 2002
10,422
0
0
kitaa said:
I still keep my PC although you can install another OS like XP, Vista, Linux etc with Parallels http://www.parallels.com/. The main reasons why I bought it is that I don't have to worry about viruses and spyware so much, not that there aren't any but it is more likely to get infected with a Windows machine than anything else!!! And I don't see why I should have to pay to clean up this mess (virus progams etc.) since I haven't caused it.
Well the majority of the time, it is caused by the user.
However I do agree, it can slip in there somehow without you knowing it.
My suggestion for PC (since you're still using it).
Get firefox, great to block pop-ups on its own.
Then get https://addons.mozilla.org/firefox/722/ this extension.
A lot of malicious crap can be embedded in a site via java script coding.
This extension blocks ALL java script on every site and YOU GET to select how the java codes on every page behaves.
It's great, there's a small learning curve to it. But once you get the hang of it, you're laughing.
Then if you want a GREAT anti-virus program, NOD32, www.eset.com.
Phenomenal tech support, very fast and reliable.

The other reason why I bought it is Mulimedia. Nothing beats a Mac when it comes to Presentations, forget MS Powerpoint. On a Mac I created smooth running presentations in HD resolutuion. I use a pogram called Keynote (part of iWork 06) for that. I also have MS Office 2004 for Mac installed. Once I exported a Keynote HD presentation as a PPT file, opened it with MS PowerPoint on a my Mac and apart from some minor format issues - it wasn't running as smoothly as in Keynote...:rolleyes: . Now it could be that it wasn't a native ppt file but anyone who uses PowerPoint can confirm that some effects look too choppy especially if you're working with high res pics......and it integates video much better, there is no eggtimer icon like in PPT......
Damn all that is making me want to get an apple powerbook.
Was considering a PC-based one, but I'll just need it for surfing and for smoe photography stuff. Sounds great though. Congrats.
 

Cobster

New member
Apr 29, 2002
10,422
0
0
boffo said:
Now there is a story that Mozilla's Firefox has been whacked with an unfixable virus. Although, Mozilla has yet to confirm the story.

These people who write code to nuke browsers should be put away for the rest of their lives.

http://www.betanews.com/article/Alleged_Unfixable_Exploit_in_Firefox/1159803553
https://addons.mozilla.org/firefox/722/ this extension will help possibly.
Like I said, it's got a small learnng curve, but once you get the hang of it, you'll NEVER surf without it again.
 

Cobster

New member
Apr 29, 2002
10,422
0
0
skihrdr said:
welcome to the spinning beachball kitaaa :D

both os's have their advantages/disadvantages. Until this current Intel-ization of Mac, PCs were a world ahead in terms of processor performance - Mac is on the path of righting that.
What was wrong with MACS before then?
They were IBM based processors weren't they?
 
Ashley Madison
Toronto Escorts