Feeds

Download.Ject-style worm spreads via IM

Unpatched Windows PCs at risk. Again

  • alert
  • submit to reddit

Protecting users from Firesheep and other Sidejacking attacks with SSL

A Download.Ject-style worm which spreads through instant messages is spreading across the Net, according to intrusion prevention firm PivX.

The as-yet unnamed worm arrives as an innocuous looking instant message on AIM or ICQ which says: "My personal home page http://XXXXXXX.X-XXXXXX.XXX/". This link takes users to a one of a number of sites hosted in Uruguay, Russia and the US, from which a Trojan horse program is downloaded. These websites contains exploit code designed to infect surfers by taking advantages of a variety of well known IE exploits (such as Object Data, Ibiza CHM and MHTML Redirect).

Infection will modify a user's home page to a site called TargetSearch. The setting of an infected user's browser will also be changed to open up several browser windows displaying adult advertisement and referral links every time IE is loaded, according to preliminary analysis of the worm.

The scope of the worm's spread is unclear but early analysis hasn't revealed any of the key logging features that made the original Download.Ject worm such a menace.

On 24 June many websites running IIS 5 were infected with malicious JavaScript code called Download.Ject. Websites running the latest versions of Microsoft IIS were unaffected. Users visiting a website contaminated with Download.Ject activated a script that downloaded a Trojan horse (called Berbew) from a website in Russia.

Acting with law enforcement authorities, Microsoft was able to rapidly shut down the Russian website, but the affair still highlighted security concerns with IE. Security clearing house US-CERT took the extraordinary step of advising users to ditch IE in favour of alternative browsers. Microsoft has since fixed the underlying flaw that Download.Ject exploited.

PivX Labs has notified anti-virus vendors so that they can create signatures to defend against the latest threat, which is nowhere near as serious as the original Download.Ject worm. ®

Related stories

Watch out! Incoming mass hack attack
Unpatched IE vuln exploited by adware
CERT recommends anything but IE
Long-awaited IE patch (finally) arrives
Instant message, cracker tricks

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.