Feeds

Hackers just POURING through unpatched Internet Explorer zero-day hole

Oh, sysadmins. It's so much worse than we feared – report

The essential guide to IT transformation

An as-yet-unpatched zero-day vulnerability affecting Internet Explorer is being abused much more widely than analysts had previously suspected.

The vulnerability first came to public attention last week with the Operation DeputyDog attacks against targets in Japan, as first reported by net security firm FireEye.

Websense, FireEye and AlienVault have since reported more malware-flinging campaigns exploiting this vulnerability. Several groups are using an exploit that takes advantage of security bugs in Microsoft's flagship browser software to attack financial institutions and government agencies in various countries in the far East, using various Trojans and similar strains of malware.

AlienVault discovered a version of the exploit hosted on a subdomain of Taiwan's Government e-Procurement System.

"When users visit the main webpage a Javascript code will redirect them to the exploit page if it is the first time they visit the page," the security firm warns.

Websense warned that a variety of hack-for-hire groups are exploiting the recently discovered “zero-day” vulnerability in Microsoft Internet Explorer to steal vital data from companies in the Asia Pacific region. These attacks are far more widespread than previously thought.

FireEye adds that various groups are involved in these attacks, even though in at least some cases they are using the same infrastructure but using it to push different malware, such as the PoisonIvy remote access trojan (RAT), and not the DeputyDog malware associated with the attacks against Japanese targets that first set off the alarm bells.

"Since we first reported on Operation DeputyDog, at least three other Advanced Persistent Threat (APT) campaigns known as Web2Crew, Taidoor, and th3bug have made use of the same exploit to deliver their own payloads to their own targets," write FireEye researchers Ned Moran and Nart Villeneuve in a blog post.

"It is not uncommon for APT groups to hand-off exploits to others, who are lower on the zero-day food chain – especially after the exploit becomes publicly available. Thus, while the exploit may be the same, the APT groups using them are not otherwise related."

"In addition, APT campaigns may reuse existing infrastructure for new attacks. There have been reports that the use of CVE-2013-3893 may have begun in July; however, this determination appears to be based solely on the fact that the CnC infrastructure used in DeputyDog had been previously used by the attackers. We have found no indication that the attackers used CVE-2013-3893 prior to August 23, 2013."

In related news, Rapid7 has added Internet Explorer exploit CVE-2013-3893 to Metasploit, allowing penetration testers and sysadmins to inspect systems for exposure to the vulnerability. But from the latest developments it appears it has gone mainstream.

Carl Leonard, senior security research manager EMEA at Websense, commented: "Websense estimates that close to 70 per cent of Windows-based PCs are vulnerable to this exploit. Given the huge attack surface, the actors behind these campaigns are racing to target companies before a patch becomes available."

"In addition, we anticipate that as more information of this zero day comes to light, the exploit will be weaponised and packaged into exploit kits rapidly, greatly increasing the number of attackers with access to this exploit," he added.

Websense advises sysadmins to install the Microsoft FixIt workaround as a safeguard against attack, pending the availability of a more complete patch from Microsoft. This will hopefully be available for the next edition of Patch Tuesday (8 October). ®

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?