SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Web Attack Bulletin
                                         SM




Zero-Day Internet Explorer
Exploit Downloads HYDRAQ
Background of the Attack
We have been receiving several reports and inquiries surrounding a series of attacks that exploit        FROM THE FIELD: EXPERT INSIGHTS
an application vulnerability to download HYDRAQ variants onto infected computers. Awareness
about the attacks that first manifested as targeted against individuals increased when the code
used in them was made public. These attacks leverage a vulnerability in all versions of Internet         • “[The confusion] lies in the fact that the
Explorer (except IE 5.0) that has since been patched on January 21. For patch information, users           exploit code has been evolving these
are advised to refer to this Microsoft Web page.                                                           past couple of days. The malicious scripts
                                                                                                           still point to the final payload. It’s like
                                                                                                           JS_DLOADER is the first generation, JS_
                                                                                                           ELECOM the second. And now we’re seeing
                                                                                                           HTML_COMLE as the third.”

                                                                                                         —Trend Micro Network Architect Paul
                                                                                                          Ferguson on the evolution of the IE exploit
                                                                                                          and the perception that numerous attacks
                                                                                                          are ongoing

                                                                                                         • “Technically... they are unrelated. But the
                                                                                                           fact that they happened at the same time
                                                                                                           decreases the possibility that they are
                                                                                                           completely unrelated.”


                                                                                                           —Trend Micro Network Architect Paul
                                                                                                           Ferguson on the relationship of the IE
                                                                                                           exploit with the Adobe exploit used in earlier
                                                                                                           targeted attacks


                                                                                                         • “If [the users] patch... But even then, this
                                                                                                           exploit will still likely be around for a long
                                                                                                           time. The vulnerability affects IE regardless
                                                                                                           of the Windows version. And some
                                                                                                           companies are still using default IE browser
                                                                                                           installations and cannot simply upgrade
Frequently Asked Questions                                                                                 because of the way their operations work.”


What happens in this attack?                                                                               —Trend Micro Research Manager Jamz
                                                                                                           Yaneza on whether the upcoming release of
Users may either receive spam or other inbound online communication that may lead them to                  a security patch will lessen the impact of the
various exploit-ridden URLs. These URLs are specifically designed by cybercriminals to carry               IE exploit
exploits so they can execute code on the vulnerable computer without the visitor’s knowledge.

These exploits target a vulnerability in a widely used application for which, during the height of the
attacks, there was no security update yet. Once the exploit is triggered by visiting the malicious
site, a backdoor is downloaded onto the computer without the visitor’s knowledge.

The diagram above illustrates the known versions of this attack, each of which appeared one after
another. The infection path using JS_DLOADER.FIS appeared first, followed by JS_ELECOM.C and
so forth. Subsequent exploit codes appearing after JS_ELECOM.C in this attack are now detected




WEB ATTACK BULLETIN I JANUARY 25, 2010                                                                                                            Page 1 of 2
TREND MICRO | TRENDLABS ZERO-DAY INTERNET EXPLORER EXPLOIT DOWNLOADS HYDRAQ




as the JS_ELECOM.SMA-JS_ELECOM.SMB tandem. JS_DLOADER.FIS and the JS_ELECOM.SMA-JS_                                             RELATED BLOG ENTRIES
ELECOM.SMB tandem take advantage of CVE-2010-0249 to connect to URLs to download different
variants of HYDRAQ malware.
                                                                                                                                • New IE Zero-Day Exploit Attacks Continue
Why is this threat especially dangerous?                                                                                        • Cyber Attacks on Google and Others—Who
                                                                                                                                  Is Really at Risk?
Systems affected by this threat are compromised in such a way that the attackers who successfully
exploit the vulnerability could take complete control of an affected system (e.g., install programs or                          • Trend Micro Proactively Helps Protect
view, change, or delete data or create new accounts with full user rights).                                                       Against Zero-Day Attacks Like the Recent IE
                                                                                                                                  Exploit
Am I at risk?

This attack is no longer targeted in nature. While the initial evolution of this attack was directed                            RELATED VULNERABILITY
toward certain individuals, now that the code is accessible to everyone, cybercriminals can use
this in their own attacks. Therefore, if you have been attacked and the browser you are using
is vulnerable then your computer will perform the malicious routines of the Trojan payloads.                                    • Microsoft Internet Explorer DOM Operation
These include connecting to several URLs, which may also host other malicious elements, and                                         Memory Corruption Vulnerability (979352)
reassigning control of the computer to malicious attackers. A sample serving of the full range
of malicious routines that can be performed on your computer can be found in the technical
description for TROJ_HYDRAQ.SMA.
                                                                                                                                RELATED MALWARE

Is upgrading to the latest IE version enough to keep me from being
                                                                                                                                • JS_DLOADER.FIS
affected?
                                                                                                                                •   JS_ELECOM.C
                                                                                                                                •   JS_ELECOM.SMA
No. The attack is continuously evolving. Performing the workaround provided by Microsoft is
highly encouraged. However, enabling “Data Execution Prevention (DEP)” in IE versions where it is                               •   JS_ELECOM.SMB
not enabled by default will only protect you from the publicly known exploits. There have already                               •   TROJ_HYDRAQ.K
been reports of an exploit variant that can bypass “DEP.” It is best to apply the out-of-band patch                             •   TROJ_COMELE.AJ
at once.
                                                                                                                                •   TROJ_HYDRAQ.SMA

So what can I do to protect my computer?
                                                                                                                                ONLINE VERSION
Applying the appropriate IE patch mentioned here is crucial in protecting your system. It would
also be prudent to (1) update to the latest IE version, (2) make sure that “DEP” is enabled, and (3)
                                                                                                                                This is a developing story. Updates are
use IE in protected mode (in Vista and Windows 7). Users are likewise advised to consider disabling
                                                                                                                                made to the online version of this document
JavaScript.
                                                                                                                                as more information becomes available. The
                                                                                                                                online version can be found at the Threat
Furthermore, Trend Micro customers receive up-to-date protection via the Smart Protection
                                                                                                                                Encyclopedia Zero-Day Internet Explorer
Network™. File reputation service detects and inhibits the download of malicious files detected
                                                                                                                                Exploit Downloads HYDRAQ special Web
as JS_DLOADER.FIS, JS_ELECOM.C, TROJ_HYDRAQ.SMA, TROJ_HYDRAQ.K, JS_ELECOM.SMA,
                                                                                                                                attack page.
JS_ELECOM.SMB, and TROJ_COMELE.AJ. Web reputation service likewise prevents access to
malicious URLs. Lastly, Trend Micro OfficeScan™ users with Intrusion Defense Firewall (IDF) plug-in
are also protected from this attack if their systems are updated with IDF1003879 and IDF1003909
filters.




                                                                                                SM




©2010 by Trend Micro, Incorporated. All rights reserved.   TrendLabs is Trend Micro’s global network of research, development, and action centers committed to 24/7 threat surveillance, attack
Trend Micro, the Trend Micro t-ball logo, InterScan,       prevention, and timely and seamless solutions delivery. With a 1,000-strong staff of experts and round-the-clock operations, it stays at
NeatSuite, OfficeScan, and ScanMail are trademarks or      the forefront of the Internet security industry and serves as the backbone of Trend Micro’s service infrastructure. With accurate, real-
registered trademarks of Trend Micro, Incorporated. All    time data, TrendLabs delivers more effective security measures designed to detect, preempt, and eliminate attacks.
other product or company names may be trademarks or
                                                           Headquartered in the Philippines, TrendLabs is the only multinational research and development center with an extensive regional
registered trademarks of their owners.
                                                           presence, with labs in the United States, Japan, France, Germany, and China.
www.trendmicro.com




WEB ATTACK BULLETIN I JANUARY 25, 2010                                                                                                                                               Page 2 of 2

Contenu connexe

Plus de Trend Micro

Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaTrend Micro
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)Trend Micro
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT frameworkTrend Micro
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsTrend Micro
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryTrend Micro
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksTrend Micro
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest TexasTrend Micro
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011 Trend Micro
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeTrend Micro
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromiseTrend Micro
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a FlashTrend Micro
 
FIFA Spam Targets Football Fanatics
FIFA Spam Targets Football FanaticsFIFA Spam Targets Football Fanatics
FIFA Spam Targets Football FanaticsTrend Micro
 

Plus de Trend Micro (20)

Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in Asia
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT framework
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To Compromise
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
 
FIFA Spam Targets Football Fanatics
FIFA Spam Targets Football FanaticsFIFA Spam Targets Football Fanatics
FIFA Spam Targets Football Fanatics
 

Dernier

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Dernier (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Web Attack Bulletin: IE Exploit (HYDRAQ)

  • 1. Web Attack Bulletin SM Zero-Day Internet Explorer Exploit Downloads HYDRAQ Background of the Attack We have been receiving several reports and inquiries surrounding a series of attacks that exploit FROM THE FIELD: EXPERT INSIGHTS an application vulnerability to download HYDRAQ variants onto infected computers. Awareness about the attacks that first manifested as targeted against individuals increased when the code used in them was made public. These attacks leverage a vulnerability in all versions of Internet • “[The confusion] lies in the fact that the Explorer (except IE 5.0) that has since been patched on January 21. For patch information, users exploit code has been evolving these are advised to refer to this Microsoft Web page. past couple of days. The malicious scripts still point to the final payload. It’s like JS_DLOADER is the first generation, JS_ ELECOM the second. And now we’re seeing HTML_COMLE as the third.” —Trend Micro Network Architect Paul Ferguson on the evolution of the IE exploit and the perception that numerous attacks are ongoing • “Technically... they are unrelated. But the fact that they happened at the same time decreases the possibility that they are completely unrelated.” —Trend Micro Network Architect Paul Ferguson on the relationship of the IE exploit with the Adobe exploit used in earlier targeted attacks • “If [the users] patch... But even then, this exploit will still likely be around for a long time. The vulnerability affects IE regardless of the Windows version. And some companies are still using default IE browser installations and cannot simply upgrade Frequently Asked Questions because of the way their operations work.” What happens in this attack? —Trend Micro Research Manager Jamz Yaneza on whether the upcoming release of Users may either receive spam or other inbound online communication that may lead them to a security patch will lessen the impact of the various exploit-ridden URLs. These URLs are specifically designed by cybercriminals to carry IE exploit exploits so they can execute code on the vulnerable computer without the visitor’s knowledge. These exploits target a vulnerability in a widely used application for which, during the height of the attacks, there was no security update yet. Once the exploit is triggered by visiting the malicious site, a backdoor is downloaded onto the computer without the visitor’s knowledge. The diagram above illustrates the known versions of this attack, each of which appeared one after another. The infection path using JS_DLOADER.FIS appeared first, followed by JS_ELECOM.C and so forth. Subsequent exploit codes appearing after JS_ELECOM.C in this attack are now detected WEB ATTACK BULLETIN I JANUARY 25, 2010 Page 1 of 2
  • 2. TREND MICRO | TRENDLABS ZERO-DAY INTERNET EXPLORER EXPLOIT DOWNLOADS HYDRAQ as the JS_ELECOM.SMA-JS_ELECOM.SMB tandem. JS_DLOADER.FIS and the JS_ELECOM.SMA-JS_ RELATED BLOG ENTRIES ELECOM.SMB tandem take advantage of CVE-2010-0249 to connect to URLs to download different variants of HYDRAQ malware. • New IE Zero-Day Exploit Attacks Continue Why is this threat especially dangerous? • Cyber Attacks on Google and Others—Who Is Really at Risk? Systems affected by this threat are compromised in such a way that the attackers who successfully exploit the vulnerability could take complete control of an affected system (e.g., install programs or • Trend Micro Proactively Helps Protect view, change, or delete data or create new accounts with full user rights). Against Zero-Day Attacks Like the Recent IE Exploit Am I at risk? This attack is no longer targeted in nature. While the initial evolution of this attack was directed RELATED VULNERABILITY toward certain individuals, now that the code is accessible to everyone, cybercriminals can use this in their own attacks. Therefore, if you have been attacked and the browser you are using is vulnerable then your computer will perform the malicious routines of the Trojan payloads. • Microsoft Internet Explorer DOM Operation These include connecting to several URLs, which may also host other malicious elements, and Memory Corruption Vulnerability (979352) reassigning control of the computer to malicious attackers. A sample serving of the full range of malicious routines that can be performed on your computer can be found in the technical description for TROJ_HYDRAQ.SMA. RELATED MALWARE Is upgrading to the latest IE version enough to keep me from being • JS_DLOADER.FIS affected? • JS_ELECOM.C • JS_ELECOM.SMA No. The attack is continuously evolving. Performing the workaround provided by Microsoft is highly encouraged. However, enabling “Data Execution Prevention (DEP)” in IE versions where it is • JS_ELECOM.SMB not enabled by default will only protect you from the publicly known exploits. There have already • TROJ_HYDRAQ.K been reports of an exploit variant that can bypass “DEP.” It is best to apply the out-of-band patch • TROJ_COMELE.AJ at once. • TROJ_HYDRAQ.SMA So what can I do to protect my computer? ONLINE VERSION Applying the appropriate IE patch mentioned here is crucial in protecting your system. It would also be prudent to (1) update to the latest IE version, (2) make sure that “DEP” is enabled, and (3) This is a developing story. Updates are use IE in protected mode (in Vista and Windows 7). Users are likewise advised to consider disabling made to the online version of this document JavaScript. as more information becomes available. The online version can be found at the Threat Furthermore, Trend Micro customers receive up-to-date protection via the Smart Protection Encyclopedia Zero-Day Internet Explorer Network™. File reputation service detects and inhibits the download of malicious files detected Exploit Downloads HYDRAQ special Web as JS_DLOADER.FIS, JS_ELECOM.C, TROJ_HYDRAQ.SMA, TROJ_HYDRAQ.K, JS_ELECOM.SMA, attack page. JS_ELECOM.SMB, and TROJ_COMELE.AJ. Web reputation service likewise prevents access to malicious URLs. Lastly, Trend Micro OfficeScan™ users with Intrusion Defense Firewall (IDF) plug-in are also protected from this attack if their systems are updated with IDF1003879 and IDF1003909 filters. SM ©2010 by Trend Micro, Incorporated. All rights reserved. TrendLabs is Trend Micro’s global network of research, development, and action centers committed to 24/7 threat surveillance, attack Trend Micro, the Trend Micro t-ball logo, InterScan, prevention, and timely and seamless solutions delivery. With a 1,000-strong staff of experts and round-the-clock operations, it stays at NeatSuite, OfficeScan, and ScanMail are trademarks or the forefront of the Internet security industry and serves as the backbone of Trend Micro’s service infrastructure. With accurate, real- registered trademarks of Trend Micro, Incorporated. All time data, TrendLabs delivers more effective security measures designed to detect, preempt, and eliminate attacks. other product or company names may be trademarks or Headquartered in the Philippines, TrendLabs is the only multinational research and development center with an extensive regional registered trademarks of their owners. presence, with labs in the United States, Japan, France, Germany, and China. www.trendmicro.com WEB ATTACK BULLETIN I JANUARY 25, 2010 Page 2 of 2