ROM-DOS Posted November 30, 2005 CID Share Posted November 30, 2005 Trojan horse rides on unpatched IE flaw Attackers are taking advantage of an unpatched vulnerability in Internet Explorer to target users of the ubiquitous Web browser, Microsoft warned late Tuesday. Malicious software that exploits the security flaw to download a Trojan horse to vulnerable computers has been found on the Internet, according to Microsoft. Detection and removal capabilities for the "TrojanDownloader:Win32/Delf.DH" have been added to Microsoft's recently launched online security-scanning tool. "Customers can visit Windows Live Safety Center and are encouraged to use the Complete Scan option to check for and remove this malicious software and future variants," Microsoft said in its updated security advisory on the issue. http://safety.live.com/Template/home.aspx?NRMODE=Published&NRORIGINALURL=%2fsite%2fen-US%2fdefault.htm&NRNODEGUID=%7bC0902729-5DC9-4154-8C03-ABA23DD4421E%7d&NRCACHEHINT=Guest&jgmsuid=true&newguid=69d7f58eab784cd581a728a722634d05 The security bug, exploited by the Trojan downloader, was originally reported in May. The bug was thought to only allow for a denial-of-service attack, which would cause IE to close. However, experts last week raised an alarm on the issue because it was discovered that it could be used to remotely run code on a vulnerable computer. Microsoft has yet to provide a fix for the vulnerability, but is working on a patch, according to the security advisory. Security-monitoring company Secunia deems the problem "extremely critical," its rarely given highest rating. The vulnerability puts computers running Windows 98, Windows Millennium Edition, Windows 2000 and Windows XP at risk. An attacker could gain complete control of vulnerable systems by hosting malicious code on a Web site. Once an IE user visits the site, the malicious program would run without any user interaction. Microsoft offers several workarounds to deflect attacks. These include changing IE settings to disable active scripting or prompt the user before running such scripts. [edit] I made this a sticky because this looks like a serious exploit (extremely critical). Three critical flaws found in Java 29 November 2005 Sun's Java Runtime Environment (JRE) contains serious security flaws that could allow remote attackers to execute applications on a system, the company has warned. The bugs, patched in a new release yesterday, affect Windows, Unix and Linux platforms. The Java Software Development Kit (SDK) is also affected. Sun outlined three separate vulnerabilities, each of which could independently allow a specially crafted Java applet, for example embedded in a Web page, to escalate its privileges. That could allow the applet to read and write local files and execute applications accessible to the user running the applet, with the user's privileges. Ordinarily, Java applets are restricted from reading and writing files and executing applications by the Java "sandbox". The JRE is the code used to execute Java applets on a local system, and is one of the most widely distributed client-side software products. Versions of the JRE are also found in unconventional systems such as mobile phones. Secunia and FrSIRT, which maintain vulnerabilities databases, gave the vulnerabilities serious ratings - "highly critical" and "critical" respectively. Sun(sm) Alert Notification http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102050-1 Quote Link to comment Share on other sites More sharing options...
Ryan314 Posted November 30, 2005 CID Share Posted November 30, 2005 Thats good to know! Quote Link to comment Share on other sites More sharing options...
ROM-DOS Posted December 1, 2005 Author CID Share Posted December 1, 2005 Thats good to know! Maybe, but Microsoft ~ with all their. . .resources ~ have known of this since MAY . . .and they still haven't been able to patch it, yet!! Must be one heck of a super security bug!! Quote Link to comment Share on other sites More sharing options...
Ryan314 Posted December 1, 2005 CID Share Posted December 1, 2005 Yeah, if they have known this since may.. maybe they would have told us sonner ya know that way we are a bit more careful on what we download and what sites we go on i donno maybe im wrong .... Quote Link to comment Share on other sites More sharing options...
Hollywoodx954x Posted December 1, 2005 CID Share Posted December 1, 2005 another good reason to download FierFox Quote Link to comment Share on other sites More sharing options...
Ryan314 Posted December 1, 2005 CID Share Posted December 1, 2005 Heh i knew someone was gonna use this post to promote firefox haha i actually have both...... Quote Link to comment Share on other sites More sharing options...
resopalrabotnick Posted December 1, 2005 CID Share Posted December 1, 2005 another good reason to download FierFox seeing how ie is a huge part of the os and ff is just a cobbled together browser, [glow=red,2,300]by the way, can the oh so touted new version at least display glow text properly?[/glow], i see no reason to castrate my ability to see web content correctly. i'm sticking with ie. Quote Link to comment Share on other sites More sharing options...
JustinOhioRR Posted December 1, 2005 CID Share Posted December 1, 2005 i say use opera.......its free again Quote Link to comment Share on other sites More sharing options...
Ryan314 Posted December 1, 2005 CID Share Posted December 1, 2005 Whats opera lol Quote Link to comment Share on other sites More sharing options...
resopalrabotnick Posted December 1, 2005 CID Share Posted December 1, 2005 something about the fat lady singing. is that a prediction for ff? Quote Link to comment Share on other sites More sharing options...
Ryan314 Posted December 1, 2005 CID Share Posted December 1, 2005 Yeah when i saw opera i was thinking... fat lady, big clothes... glass breaking voice.. but apparently its a program??? Quote Link to comment Share on other sites More sharing options...
resopalrabotnick Posted December 1, 2005 CID Share Posted December 1, 2005 it's one of those hopeless wannabee ie replacements. Quote Link to comment Share on other sites More sharing options...
just- Posted December 1, 2005 CID Share Posted December 1, 2005 just dont use IE sucks anyway sorry i know that is really not nice but ie just has so many problems so many people trying to attack it isnt it Quote Link to comment Share on other sites More sharing options...
RTB Posted December 1, 2005 CID Share Posted December 1, 2005 seeing how ie is a huge part of the os and ff is just a cobbled together browser, [glow=red,2,300]by the way, can the oh so touted new version at least display glow text properly?[/glow], i see no reason to castrate my ability to see web content correctly. i'm sticking with ie. Nope, but that's actually a problem of IE not displayed thing properly so webmasters have to do some strange stuff to make it work properly in IE, while breaking the other browsers, which follow the formal rules on webdesign. Quote Link to comment Share on other sites More sharing options...
monsnet2k8 Posted December 1, 2005 CID Share Posted December 1, 2005 another IE vs FF conflict' lol' Quote Link to comment Share on other sites More sharing options...
ROM-DOS Posted December 3, 2005 Author CID Share Posted December 3, 2005 . . . Spython found this on my computer after I did a 2MB update. RedHand Category: Keystroke Logger RedHand is a hidden keystroke recorder that records all keyboard key strokes and other computing activity into a log file, so that you (or someone else) can view and use this data later. Also allows total remote control by hackers and malicious users. Contains functionality to block certain programs from running. Also has the ability to lockdown, log on or off users, even shutdown the PC completely. This spyware application exhibits the following characteristics: Logs Internet browsing habits Tracks your web browsing and shopping habits, sending this information to a centralized server for analysis. This information is normally used to provide targeted advertising. Logs keystrokes Tracks all the keys pressed on the keyboard, saving this information to a text file or sending the information to an e-mail recipient. Keystroke loggers are very dangerous because they can log passwords, account numbers, credit card numbers, and all other personal information entered on your computer, including email correspondence. Remains memory resident Remains memory resident in an attempt to detect and deter removal. Such behavior makes applications difficult to remove without anti-spy software such as Spython. Stealthy Typically hides associated files from the computer process manager, creates no visible icons in the system tray or taskbar, and provides no method for uninstall. . . .this is the second keylogger I've found on my computer this year. Quote Link to comment Share on other sites More sharing options...
tdawnaz Posted December 4, 2005 CID Share Posted December 4, 2005 seeing how ie is a huge part of the os and ff is just a cobbled together browser, [glow=red,2,300]by the way, can the oh so touted new version at least display glow text properly?[/glow], i see no reason to castrate my ability to see web content correctly. i'm sticking with ie. resop...i actually do see ur glow thingy just fine...it's ur green and blue thing at the bottom the doesn't look right because they are too close to the same hue to contrast one or the other... ...it's all about choices and we don't want to castrate u either ...i choose both btw Quote Link to comment Share on other sites More sharing options...
Ryan314 Posted December 4, 2005 CID Share Posted December 4, 2005 I choose both also... Quote Link to comment Share on other sites More sharing options...
fred Posted December 5, 2005 CID Share Posted December 5, 2005 R-D that red handed sounds dangerous. How can a person go about detecting whether or not such code is in your computer with out buying a detection program to deal with the same??? Quote Link to comment Share on other sites More sharing options...
ROM-DOS Posted December 5, 2005 Author CID Share Posted December 5, 2005 R-D that red handed sounds dangerous. How can a person go about detecting whether or not such code is in your computer with out buying a detection program to deal with the same??? Fred, because Redhand is sold commercially, most anti-virus and anti-spyware programs may not detect it. The latest permutations include the use of routines to mail out user activity via e-mail and/or posting information to the web where the spy can view it at their leisure. Also many spyware vendors are useing "stealth routines" and "polymorphic" (meaning to change) techniques to avoid detection and removal by popular anti-spy software. In some cases Spyware vendors have went as far as to counter-attack anti-spy programs by attempting to break their use. In addition they may use routines to re-install the spyware application after it has been detected. Ironically you can monitor for spy software by installing spy software on your system first! Since spy software can record all keystrokes it can monitor and record the installation of another spy software. Again this turns into a virtual arms race, but keep in mind that many spy programs are vulnerable to anti-spy attacks. There's only a couple of thousand Spy programs out to get you. Here's a list of free programs you can try, but I'm seriously not sure how well they can detect some of the stealth rountines some these spyware/key-loggers use to avoid detection. Spybot - Search & Destroy - free - spyware killer/remover - (trys to) catches what Ad-aware misses http://www.safer-networking.org/index.php?page=download Ad-aware - free - spyware killer/remover - (trys to) catches what spybot misses http://www.lavasoftusa.com/software/adaware/ SpywareBlaster - doesn't scan for and clean spyware - it (trys to) prevents it from being installed in the first place. http://www.javacoolsoftware.com/spywareblaster.html HijackThis - scans for pesky malware, spyware and adware that manage to avoid being detected by other scanners it is very detailed about what is installed and running with loads of tools and log analyzer. Read everything on this one before using. http://www.download.com/HijackThis/3000-8022-10379544.html?tag=list You may want to check out Spyware Doctor, it will do a free scan, but it won't fix any problems, 'till you purchase it ~ http://www.pctools.com/spyware-doctor/ . . .a few things you might want to keep in mind before you click on something ~ try to avoid "drive-by downloads". Drive-by downloads are accomplished by providing a misleading dialogue box and/or other methods of stealth installation (like hitting the [X] to exit a pop-up). Many times users have no idea they have installed the application. Often Adware/Spyware makers make their applications very difficult to uninstall. A "EULA" or End User License Agreement is the agreement you accept when you click "OK" or "Continue" when you are installing software. Many users never bother to read the EULA. It is imperative to actually read this agreement before you install any software. No matter how tedious the EULA, you should be able to find out the intent BEFORE you install the software. If you have questions about the EULA- e-mail the company and ask them for clarification. . . .Happy Hunting. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.