Update on Internet Explorer Exploit in the wild



If you use Internet Explorer to browse the web, I’d suggest finding the instructions to disable active scripting, or drop it and use something else in light of the recent exploit floating around. It seems that in spite of Microsoft’s infinite wisdom that “Microsoft has determined that an attacker who exploits this vulnerability would have no way to force users to visit a malicious Web site. Instead, an attacker would have to persuade them to visit the Web site, typically by getting them to click a link that takes them to the attacker’s Web site”…. the reality is that legitimate sites have been hacked and the malicious code has been added. (Over 200 legit sites…)


Good details on this come from The security fix. The available options seem to be 1) disable active scripting (some sites may not work after this unless you add them to trusted sites…) 2) download IE7 beta2 preview (unstable beta browser?) 3) USE ANOTHER BROWSER. I would highly recommend option 3 and/or option 1, in that order…. The most popular rendition of this exploit seems to be dropping software that’s collecting private information.

Hopefully there will be an out of cycle patch for this, but from Microsoft’s official releases, it doesn’t seem they see it as a big problem “an attacker would have to persuade them to visit the Web site, typically by getting them to click a link that takes them to the attacker’s Web site”

If you’re interested in more details in what’s getting collected… Sans has a page analyzing some of what’s being snatched.

Be cautious….

Related Posts

Blog Traffic Exchange Related Posts
  • Microsoft vulnerability whack-a-mole continues..... Translation - Microsoft patched one vulnerability another surfaces.... Incidents.org brings us the frustrating news.... If you remember the month of browser bugs series of exploits back in July, there was a denial of service there that appears to have code execution after all. Coincidence or not, it got publicly released......
  • Cleaning up after WMF exploit - BHO removal Browser helper objects (BHO's) are listed in the registry and load with explorer when it runs (Internet Explorer/ File explorer are so closely tied it affects both.) I've used BHOdemon in the past to identify and disable BHO's and a tool like that is the preferred method. However, in my......
  • Nugache the latest in bot-net technology... and why you should care about botnets... To show you where the threat with bot networks is going there's a story today on Nugache (Symantec summary) which is a bot that takes advantage of a number of clever tricks to avoid having the whole bot net shut down, allow command and control on an encrypted channel and......
Blog Traffic Exchange Related Websites
  • How To Boost Your Productivity On Social Media Sites Today social media marketing leads the way for marketing efforts online. There are several companies that are taking advantage of social media to get more exposure and to drive targeted traffic to their sites. The biggest issue, though, is that it is really, really hard to be productive when you......
  • Mini Sites Vs. Authority Sites - Which Is Better? Mini sites and authority sites represent two alternative online marketing models, and not everyone understands the real differences. Inexperienced internet marketers often don't know the difference or have trouble choosing between these alternatives. Among the many considerations that are involved, you can't ignore Google's algorithms when it comes to ranking......
  • Building More Targeted Visitors To Your Blog By Adding A Social Bookmarking Button - Learn What Others Don't Know Making money with blogs is not that hard when you possess traffic, but if you don't have any visitors coming to your blog it can be near impossible. Most people keep trying every new application or program that comes out as a way to improve their blog traffic, but......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site