Feeds

Hackers just POURING through unpatched Internet Explorer zero-day hole

Oh, sysadmins. It's so much worse than we feared – report

The essential guide to IT transformation

An as-yet-unpatched zero-day vulnerability affecting Internet Explorer is being abused much more widely than analysts had previously suspected.

The vulnerability first came to public attention last week with the Operation DeputyDog attacks against targets in Japan, as first reported by net security firm FireEye.

Websense, FireEye and AlienVault have since reported more malware-flinging campaigns exploiting this vulnerability. Several groups are using an exploit that takes advantage of security bugs in Microsoft's flagship browser software to attack financial institutions and government agencies in various countries in the far East, using various Trojans and similar strains of malware.

AlienVault discovered a version of the exploit hosted on a subdomain of Taiwan's Government e-Procurement System.

"When users visit the main webpage a Javascript code will redirect them to the exploit page if it is the first time they visit the page," the security firm warns.

Websense warned that a variety of hack-for-hire groups are exploiting the recently discovered “zero-day” vulnerability in Microsoft Internet Explorer to steal vital data from companies in the Asia Pacific region. These attacks are far more widespread than previously thought.

FireEye adds that various groups are involved in these attacks, even though in at least some cases they are using the same infrastructure but using it to push different malware, such as the PoisonIvy remote access trojan (RAT), and not the DeputyDog malware associated with the attacks against Japanese targets that first set off the alarm bells.

"Since we first reported on Operation DeputyDog, at least three other Advanced Persistent Threat (APT) campaigns known as Web2Crew, Taidoor, and th3bug have made use of the same exploit to deliver their own payloads to their own targets," write FireEye researchers Ned Moran and Nart Villeneuve in a blog post.

"It is not uncommon for APT groups to hand-off exploits to others, who are lower on the zero-day food chain – especially after the exploit becomes publicly available. Thus, while the exploit may be the same, the APT groups using them are not otherwise related."

"In addition, APT campaigns may reuse existing infrastructure for new attacks. There have been reports that the use of CVE-2013-3893 may have begun in July; however, this determination appears to be based solely on the fact that the CnC infrastructure used in DeputyDog had been previously used by the attackers. We have found no indication that the attackers used CVE-2013-3893 prior to August 23, 2013."

In related news, Rapid7 has added Internet Explorer exploit CVE-2013-3893 to Metasploit, allowing penetration testers and sysadmins to inspect systems for exposure to the vulnerability. But from the latest developments it appears it has gone mainstream.

Carl Leonard, senior security research manager EMEA at Websense, commented: "Websense estimates that close to 70 per cent of Windows-based PCs are vulnerable to this exploit. Given the huge attack surface, the actors behind these campaigns are racing to target companies before a patch becomes available."

"In addition, we anticipate that as more information of this zero day comes to light, the exploit will be weaponised and packaged into exploit kits rapidly, greatly increasing the number of attackers with access to this exploit," he added.

Websense advises sysadmins to install the Microsoft FixIt workaround as a safeguard against attack, pending the availability of a more complete patch from Microsoft. This will hopefully be available for the next edition of Patch Tuesday (8 October). ®

5 things you didn’t know about cloud backup

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.