Zero-Day Flaw In Internet Explorer Exploited In Spam Attack

Security researchers have uncovered a new Internet Explorer (IE) zero-day vulnerability being used in malware attacks.

The exploit was uncovered by Symantec after researchers observed a limited spam campaign seeking to trick users into clicking on a link. The spam had the subject line “re: hotel reservations” and posed as a message about a hotel room. Once inside the email, users were greeted with a link leading to a page on a legitimate, but compromised, site.

Hotel With A Backdoor

“The link pointed to a page which contained a script looking to see what version of the browser and operating system the visitor was using,” explained Vikram Thakur, threat researcher at Symantec Security Response. “Since the specific exploit page only worked when someone was using Internet Explorer 6 and 7, the script only transferred the visitor to the page hosting the exploit when this condition was met. In other cases, the users didn’t see anything but a blank website.

“Visitors who were served the exploit page didn’t realise it, but went on to download and run a piece of malware on their computer without any interaction at all,” Thakur continued. “The vulnerability allowed for any remote program to be executed without the end user’s notice.”

According to Microsoft, the vulnerability in question exists due to an invalid flag reference within Internet Explorer. Under certain conditions, the invalid flag reference can be accessed after an object is deleted. In attempting to access a freed object, the browser can open users up to remote code execution.

In the attack discovered by Symantec, the malware – a backdoor Trojan dubbed Pirpi – set itself to start up with the computer along with a service named “NetWare Workstation”. The Trojan, which targets Windows computers, installs a backdoor and reaches out to remote servers.

“It tries to contact a specific server, hosted in Poland, for small files named with a .gif extension,” Thakur blogged. “These small files are actually encrypted files with commands telling the Trojan what to do next.

“The files being downloaded by the attacker were hosted on yet another hacked Website,” the researcher continued. “The owners of this server were also unaware of their computer being involved in hosting of malicious programs… [and] immediately took down the malicious content.”

The IE vulnerability impacts IE 6, 7 and 8, Microsoft noted, but there are mitigations. Data Execution Prevention (DEP) protects against code execution and is enabled by default in IE 8 on Windows XP Service Pack 3, Windows Vista Service Pack 1, Windows Vista Service Pack 2, and Windows 7. Additionally, Protected Mode in Internet Explorer on Windows Vista and later Windows versions limits the impact of the attack.

“On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs,” Microsoft said in its advisory.

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

NASA, Boeing To Begin Starliner Testing After ‘Anomalies’

American space agency prepares for testing of Boeing's Starliner, to ensure it has two space…

2 days ago

Meta Launches Friends Tab, As Zuck Touts ‘OG Facebook’

Zuckerberg seeks to revive Facebook's original spirit, as Meta launches Facebook Friends tab, so users…

2 days ago

WhatsApp Appeal Against EU Fine Backed By Court Advisor

Notable development for Meta, after appeal against 2021 WhatsApp privacy fine is backed by advisor…

3 days ago

Intel Board Shake-Up As Three Members Confirm Retirement

First sign of shake-up under new CEO Lip-Bu Tan? Three Intel board members confirm they…

3 days ago

Trump’s SEC Pick Pledges ‘Coherent’ Crypto Rules

Trump's nominee for SEC Chairman, Paul Atkins, has pledged a “rational, coherent, and principled approach”…

3 days ago