[span style="font-weight: bold; color: rgb(0, 0, 255);"]Go ahead and be stupid: use Microsoft Explorer. If you do, don't say no one warned you. Or you could use FireFox and not have to worry about shit like this. Your choice. [/span]
[hr style="width: 100%; height: 2px;"] [table border="0" cellpadding="0" cellspacing="0" width="100%"][tbody][tr style="font-weight: bold;" valign="top"][td colspan="1" align="left" valign="top"]
[/td][/tr][tr valign="top"] [td class="Article_Content" colspan="1" align="left"]Spyware, Bots, Rootkits Flooding Through Unpatched IE Hole
By Ryan Naraine
September 19, 2006
[/p]The newest zero-day flaw in the Microsoft Windows implementation of the Vector Markup Language is being used to flood infected machines with a massive collection of bots, Trojan downloaders, spyware and rootkits.[/p]Less than 24 hours after researchers at Sunbelt Software [!-- start ziffarticle //--][a href="vny!://www.eweek.com/article2/0,1895,2017407,00.asp"]discovered an active malware attack[/a][!-- end ziffarticle //--] against fully patched versions of Windows, virus hunters say the Web-based exploits are serving up botnet-building Trojans and installations of ad-serving spyware.[/p] "This is a massive malware run," says Roger Thompson, chief technical officer at Atlanta-based Exploit Prevention Labs. In an interview with eWEEK, Thompson confirmed the drive-by attacks are hosing infected machines with browser tool bars and spyware programs with stealth rootkit capabilities.[/p] The laundry list of malware programs seeded on Russian porn sites also includes a dangerous keystroke logger capable of stealing data from computers and a banker Trojan that specifically hijacks log-in information from financial Web sites.[/p] According to Sunbelt Software researcher Eric Sites, the list of malware programs includes [a href="vny!://securityresponse.symantec.com/avcenter/venc/data/adware.virtumonde.html"]VirtuMonde[/a], an ad-serving program that triggers pop-ups from Internet Explorer; [a href="vny!://research.sunbelt-software.com/threatdisplay.aspx?name=Claria.GAIN.CommonElements&threatid=5605"]Claria.GAIN.CommonElements[/a], an adware utility; [a href="vny!://research.sunbelt-software.com/threatdisplay.aspx?name=AvenueMedia.InternetOptimizer&threatid=4711"]AvenueMedia.InternetOptimizer[/a]; and several browser plug-ins and tool bars and variants of the virulent [a href="vny!://www.symantec.com/security_response/writeup.jsp?docid=2003-053013-5943-99"]Spybot worm[/a].[/p] eWEEK has confirmed the flaw—and zero-day attacks—on a fully patched version of Windows XP SP2 running IE 6.0. There are at least three sites hosting the malicious executables, which are being served up on a rotational basis.[/p] In some cases, a visit to the site turns up an error message that reads simply: "Err: this user is already attacked."[/p] The attack is closely linked to the [!-- start ziffarticle //--][a href="vny!://www.eweek.com/article2/0,1895,1987275,00.asp"]WebAttacker do-it-yourself spyware installation tool kit[/a][!-- end ziffarticle //--]. On one of the maliciously rigged Web sites, the attack code even goes as far as referencing the way Microsoft identifies its security patches, confirming fears that a well-organized crime ring is behind the attacks.[/p]The URL that's serving up the exploit includes the following: "MS06-XMLNS&SP2," a clear reference to the fact that the flaw is a zero-day that will trigger a quick patch from Microsoft.[/p] A Microsoft spokesman said the company is aware of the public release of detailed exploit code that could be used to exploit this vulnerability. "Based on our investigation, this exploit code could allow an attacker to execute arbitrary code on the user's system. Microsoft is aware of limited attacks that attempt to exploit the vulnerability," the spokesman said in a statement sent to eWEEK.[/p]The company plans to ship an IE patch as part of its October batch of updates due Oct. 10. An emergency, out-of-cycle patch could be released if the attacks escalate.[/p] Microsoft has added signature-based detection to its Windows OneCare anti-virus product. A formal security advisory with pre-patch workarounds will be posted within the next 24 hours.[/p][/td][/tr][/tbody][/table]