Feeds

ActiveX Trojan dubbed offensive

It's nasty but rare and hard to catch

  • alert
  • submit to reddit

Protecting users from Firesheep and other Sidejacking attacks with SSL

Security experts have issued a low-key alert about a Trojan horse which exploits Microsoft's ActiveX applet programming language.

Called Offensive, The Trojan comes in the form of an HTML file or a Web page on the Internet. Offensive is potentially dangerous, but it appears difficult to become a victim.

An attacker would have to either send the Trojan directly to a user in an email (it has no worm-like characteristics), or construct a maliciously constructed Web page which few are likely to visit, in order to try and infect people.

One variant of the Trojan will activate as soon as an HTML file is opened, so users of Outlook or Outlook Express are advised to delete suspicious emails without opening them.

If activated, Offensive might modify a user's home page as well as to severely restrict your access to a system, including preventing you starting programs and frustrating attempts to shut down a system

Andre Post, senior researcher at Symantec, said that it would take a "lot of work undoing its effects".

All this sounds rather nasty but Symantec assure us the Trojan is low risk for a number of reasons.

Firstly Offensive has failed to spread widely and does not pose a particularly high risk because the default security settings of Internet Explorer should - by default - block it's execution.

Users with fully patched versions of IE 5.5 are also immune, whatever the security settings on their browser. More information on the Trojan is available on Symantec's Web site here. ®

External links

Write-up of Offensive Trojan by Symantec

Related Stories

SirCam tops July virus charts
SirCam worm enjoys virus gang bang
Code Red and the Cisco side effect
MS internal network whacked by Code Red
Son of Code Red is born
Teenager finds virus, acclaimed world-saving genius

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.