Feeds

Black hats target Windows Media Encoder bug

Quick on the draw

Top 5 reasons to deploy VMware with Tegile

Miscreants have wasted no time exploiting a critical hole in Microsoft's Windows Media Encoder. Just four days after Redmond released fixes for that flaw and seven others, security experts found attack code in the wild that preys on users who have yet to install the patch.

Public attack code was published on the Milw0rm exploit list as early as Friday - just three days after Microsoft's Patch Tuesday - though it was dated Wednesday, September 10. By Saturday, honeypots maintained by researchers at Symantec began detecting variants.

"This attack chronology is another example of the rapid adoption of public exploits into widely deployed exploit toolkits," Symantec researcher Sean Hittel writes here.

Attackers are distributing the attacks in at least two different ways. One is through a simple clear-text program on Milw0rm where the sample shellcode has been modified. A second method comes courtesy of a widely deployed toolkit that goes by the name e2, according to Hittel.

e2 appends a first stage-encrypted block to legitimate web pages, causing visitors to be redirected to a second website that launches an attack. The e2 encryptor is similar to later versions of MPack in that it feeds an encrypted block through a two-key decoder.

Symantec doesn't say how widespread the attacks are or how successful they are at actually infecting end-users' PCs. Microsoft has warned that the bug can allow attackers to take complete control of a vulnerable machine, so the smartest course of action is to install right away. To make sure the patch has been applied to your PC go to Start > All Programs > Windows Update. ®

Remote control for virtualized desktops

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?