WMF zero-day exploit first hand experience



Well, I’ve just spent the better part of 6 hours (maybe a bit more) “sacrificing” a virtual machine to the zero-day Windows Meta File (WMF) exploit and all the malware that comes in. I picked one site from the sunbeltblog list to infect the virtual machine with and can attest to it being quite nasty. I was able to get the virtual machine *mostly* clean. I still haven’t gone back over it to try and make sure, but I’ll be posting some details from the “fun” tomorrow.


It’s too late now to spend too much time documenting what I had to do to clean things up. I essentially hit the exploit site and got the red circle icon in the system tray with a white x that I’ve seen screen shots of. (In fact I had 4 instances loaded….) I saw at least one trick I haven’t run into first hand before.

It’s worth saying. If a system has been trojaned the best bet to make sure that it’s clean is to re-image it. Cleaning a system is something that is possible to miss files and leave something that the attacker(s) can use to re-enter the system and the fun begins again. I’ll try to pass along some details tomorrow. I’ve collected a few files I want to run through virustotal because clamav doesn’t seem to find anything wrong with them.

Related Posts

Blog Traffic Exchange Related Posts
  • The latest and greatest in Malware Removals I have started referring to malware more and more lately because the term virus doesn't exactly describe the pests I see on peoples machines and the terms spyware or adware aren't doing justice to some of these pests either. (There are many pieces of what I would consider malware that......
  • VM Player vmx builder Of course, I've spent some time with posts on VMware player (free download to "play" existing vmware images). And more recently on the VMware server which is also a free download but can create images as well. If you're not in a position to try the VMWare server, you might......
  • Australia to ask Google Maps to pull images over security concerns According to this article, Australia will ask Google to pull satellite photos of its only Nuclear plant. It's worth noting that several locations in the US Capital are either reduced resolution or blocked out with solid colors. Now that we live in an era of private satellite imagery are services......
Blog Traffic Exchange Related Websites
  • How to Have Fun Running (Gulp!) Many people have a love/hate relationship with running. It's a highly polarizing activity, as many people find it the most difficult, laborious type of exercise, and others find it the most freeing, liberating exercise possible. Where do you lie? And have you ever wondered how some people could actually have......
  • 7 Reader Friendly Corporate Blogs Tips You want your blog to be engaging, but that may not always be easy. Here are some great tips on how to keep your corporate blog reader friendly. 1. Pick your design well. One of the biggest problems for corporate blogs is design. You can need to make sure that......
  • FAQ about computer security Q: The virus blocked the registry access and how to get rid of it?A: You can deal with like this: 1. Click on Start -> Run (or Start Search in Windows Vista). 2. Enter GPEdit.msc and then press Enter. 3. Navigate to the following location: User Configuration -> Administrative Templates......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

One Response to “WMF zero-day exploit first hand experience”

  1. The PC Doctor Says:


    More on the Windows Meta File exploit

    Here are a few more interesting and useful links about the Windows Meta File exploit recently discovered in Windows.
    First is an advisory from Microsoft – Security Advisory (912840) Vulnerability in Graphics Rendering Engine Could Allow Remote Code E…


Switch to our mobile site