« DNS Trojan on the loose. . . | Main | NoScript: A tool for securing your computer against web browser-based attacks »
12/13/2008
New IE7 security exploit in the wild
Co-Editor
Looks like some folks have already taken advantage of a Taiwanese search engine "look.tw," which has apparently had at least several hundred pages infected, and are trying to use that site download a file called ieupdate.exe
For those of you who think you're not affected because you only surf "trusted" sites, think again:
"This issue could impact you even if you avoid surfing questionable sites. Over the past few months, we've seen a surge in SQL injection attacks which enable miscreants to inject content onto trusted sites (we even blogged about the technique a few months ago). This class of attack, along with other more classical forms of website intrusion mean that even trusted sites can end up serving malicious content causing you to get infected."
Concerned readers should have a look at the official Microsoft Malware Protection Centre report for details as well as recent Clarifications on the workarounds from Microsoft on the IE advisory.
The Options for minimizing risk offered by MSMVPs.com recommends several things that are a good idea generally but especially so right now:
Their post goes on to say:
- TURN UAC BACK ON (Available in Vista)
- Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting in these zones (Tools >> Internet Options >> Security
- Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone (Tools >> Internet Options >> Security)
- Enable Data Execution Prevention for Internet 7 (Tools >> Internet Options >> Advanced >> then turn on "Enable memory protection") to help mitigate online attacks.
- Use ACL to Disable OLEDB32.DLL.
- Unregister OLEDB32.DLL (Technet security bulletin has details).
- Disable Data Binding support in Internet Explorer 8.
"You can also try blacklisting the bad domains (details here and here) but to be honest, using blacklist protection is like playing an unwinnable game of whack-a-mole. Do what you can to mitigate risk by adjusting your browser settings, and for heavens sake turn UAC back on!!"
Thanks to MSMVPs for putting together this excellent list of recommendations.
TrackBack
TrackBack URL for this entry:
https://www.typepad.com/services/trackback/6a0133f40d81f4970b013487649207970c
Listed below are links to weblogs that reference New IE7 security exploit in the wild :
The comments to this entry are closed.
Comments
You can follow this conversation by subscribing to the comment feed for this post.