WMF zero-day exploit first hand experience



Well, I’ve just spent the better part of 6 hours (maybe a bit more) “sacrificing” a virtual machine to the zero-day Windows Meta File (WMF) exploit and all the malware that comes in. I picked one site from the sunbeltblog list to infect the virtual machine with and can attest to it being quite nasty. I was able to get the virtual machine *mostly* clean. I still haven’t gone back over it to try and make sure, but I’ll be posting some details from the “fun” tomorrow.


It’s too late now to spend too much time documenting what I had to do to clean things up. I essentially hit the exploit site and got the red circle icon in the system tray with a white x that I’ve seen screen shots of. (In fact I had 4 instances loaded….) I saw at least one trick I haven’t run into first hand before.

It’s worth saying. If a system has been trojaned the best bet to make sure that it’s clean is to re-image it. Cleaning a system is something that is possible to miss files and leave something that the attacker(s) can use to re-enter the system and the fun begins again. I’ll try to pass along some details tomorrow. I’ve collected a few files I want to run through virustotal because clamav doesn’t seem to find anything wrong with them.

Related Posts

Blog Traffic Exchange Related Posts
  • The latest and greatest in Malware Removals I have started referring to malware more and more lately because the term virus doesn't exactly describe the pests I see on peoples machines and the terms spyware or adware aren't doing justice to some of these pests either. (There are many pieces of what I would consider malware that......
  • Cleaning up after the WMF exploit OK, I mentioned that I infested a virtual machine with the current WMF 0-day exploit. First I should probably clarify. An exploit is a means of getting in to a system. The payload is the software that is installed. In the case of my experience there was a long list......
  • Workaround for the critical WMF zero-day exploit The Windows Meta File (WMF) zero-day (0-day) exploit is apparently, VERY nasty, no user intervention required (unless running firefox or opera). Just VISITING a malicous site (viewing a malicious email with image...) would be enough to get the system owned. It sounds as though a FULL reinstall is the best......
Blog Traffic Exchange Related Websites
  • An Exercise Plan Everyone Can Enjoy Can exercise really be fun? The answer is yes – if you go about it the right way. There are many different motivational books about exercise and the main component is usually that group exercise is the most effective. If you have been thinking about getting fit, why not help......
  • How to Have Fun Running (Gulp!) Many people have a love/hate relationship with running. It's a highly polarizing activity, as many people find it the most difficult, laborious type of exercise, and others find it the most freeing, liberating exercise possible. Where do you lie? And have you ever wondered how some people could actually have......
  • Don't be a bandit runner, run at “race pace” for FREE In all honesty, for quite some time now, I've been thinking of being a bandit runner. What is a bandit runner? A bandit runner is a person who joins a run but in not a registered runner for the event. I've been reading all about bandit running around the web......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

One Response to “WMF zero-day exploit first hand experience”

  1. The PC Doctor Says:


    More on the Windows Meta File exploit

    Here are a few more interesting and useful links about the Windows Meta File exploit recently discovered in Windows.
    First is an advisory from Microsoft – Security Advisory (912840) Vulnerability in Graphics Rendering Engine Could Allow Remote Code E…


Switch to our mobile site