Feeds

Malware attacks IE users via pop-ups

Oh dear

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Another warning has been issued over data-stealing malware that exploits a vulnerability in Internet Explorer.

Although the threat from last week's "download.ject" attack has subsided, malware authors have not missed a beat in their efforts to use flaws in Internet Explorer as a gateway to steal banking and credit card information.

The malware, which has been identified by the SANS Institute, is delivered to users' PCs through pop-up windows that appear when users log on to financial portals.

It seems that the suspect pop-ups are delivered on certain websites that run ads from third-party ad servers, which appear to have been hacked. When the pop-ups appear, vulnerable versions of Internet Explorer begin downloading a malicious file that records activity - such as passwords - onto the infected PC and sends that data to a server reportedly located in Estonia.

Some 50 financial institutions have been affected, reports claim, and a patch for the exploit used by the as-yet-unnamed malware has not been released.

The latest trouble is sure to add to the pressure Microsoft is facing with Internet Explorer. The new warning comes less than a week after it was discovered that a number of websites running Microsoft's Internet Information Server 5.0. had been hacked.

The attackers then dropped code onto the compromised servers which exploited a vulnerability in Internet Explorer. This installed Trojan horses and keyloggers on the computers via IE to the visitors of the compromised sites.

Microsoft is said to be working feverishly to deliver patches for these "zero-day" bugs, and there is now speculation that the company has decided to rebuild Internet Explorer from the ground up in order to ensure that the software is air-tight.

Meanwhile, US-CERT is telling users to deactivate certain advanced functions in Internet Explorer, such as ActiveX, to help prevent infection from a whole range of viruses and Trojans. Deactivation of these higher functions is not a cure-all and could impact on the functionality of some sites, experts say.

An even safer route would be to switch to a rival Internet browser like Netscape, Safari, Opera or Mozilla.

© ENN

Related stories

Watch out! Incoming mass hack attack
CERT recommends anything but IE
Gates defends Microsoft patch efforts
Internet Explorer. Quick, call security!

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.