Portal Home |  IS News Menu |  Portal Menu |  ISB Menu |  Main Content
Websense Alert
13 Jan 04:04

Throughout December, Websense Security Labs reported a number of cases where browser and Operating System vulnerabilities were being used to install Potentially Unwanted Software onto end-users' machines without user-intervention. In several cases, dozens of pieces of code were installed, and often report false information in order to entice the end-user to clean their machine from spyware.

We are now seeing some of those same entities using their exploit code to install more reprehensible crimeware, such as key loggers and phishing traffic redirectors. This code is designed to steal information in addition to the installation of potentially unwanted software.

Users are typically infected through an IFRAME, loaded silently from a compromised website or an advertisement network pop-up. The exploit code loaded through these IFRAME tags attempts to use several dozen vulnerabilities, including the two recent zero-day vulnerabilities: MS05-054 and MS06-001. Users who are patched against these vulnerabilities are displayed an ActiveX prompt to install the exploit code.

The IFRAME SRC loads a URL similar to these (NOTE: The URLs have been removed):
http:// too1barXXX.biz/dl/fillmemadv470.htm
http:// too1barXXX.biz/dl/sploitadv470.anr
http:// too1barXXX.biz/dl/xpladv470.wmf

These exploits function as downloaders, and performing HTTP GET requests to other websites to install their payload. Initially, the primary goal of these downloaders was to install unwanted software, such as counterfeit anti-spyware removal tools, toolbars, adware and other potentially unwanted software.

Recently, we have seen the downloaded files performing additional functions, including:

  • Banking keyloggers
  • Trojan horses with root-kit functionality
  • Traffic redirectors that direct you to fraudulent Paypal websites
  • Trojan horse backdoors
  • Internet Explorer process injection

For further information follow the link below.

Related links: (Open in a new window.)
External link www.websensesecuritylabs.com/alerts/alert.php?AlertID=395

View Printable View printable version (opens in new window)
Back Back