NormCameron
Vista Guru
Recently I posted about attacks that involve exploits of the recently discovered vulnerability in Internet Explorer. Based on MMPC stats, since the vulnerability has gone public, roughly 0.2% of users worldwide may have been exposed to websites containing exploits of this latest vulnerability. That percentage may seem low, however it still means that a significant number of users have been affected. The trend for now is going upwards: MPC reports an increase of over 50% in the number of reports each day. The SANS Internet Storm Center, which tracks hacking trends, said that while the exploit does not appear to be widely in use at the moment, that situation is likely to change soon, since instructions showing criminals how to take advantage of this flaw have been posted online. According to knownsec, earlier this year a rumor emerged in the Chinese underground about an IE7 vulnerability and in October it began to be traded privately. In November it got into underground black market and was traded for about $15K. Later in December, it emerged and people sold the exploit second or third hand for about $650. Finally, someone purchased those second hand exploits to develop and deploy a Chinese gaming Trojan.
http://voices.washingtonpost.com/securityfix/2008/12/exploit_for_unpatched_internet.html
MMPC points to the Win32 Trojan as being the principle offender.
However Secunia have a different take
"The exploits contain shellcode that installs the Downloader-AZN, a well-known trojan that hijacks a PC's configuration settings and downloads additional pieces of malware. Anti-virus software from McAfee, and presumably other companies, detects the trojan - though at the time of writing, it appeared they didn't yet detect the zero-day exploit itself. The attacks target a flaw in the way IE handles certain types of data that use the extensible markup language, or XML, format. The bug references already freed memory in the mshtml.dll file. According to IDG News, exploits work about one in three times, and only after a victim has visited a website that serves a malicious piece of javascript.
Microsoft researchers are looking in to the reports, a company spokesman said Tuesday morning. Some eight hours later, the company had not yet issued an update.
The reports came just hours ahead of Patch Tuesday, Microsoft's monthly release of security updates. The patches included a cumulative update for IE that fixed four flaws that were rated critical because they could be used to remotely install malware with little or no action required of the user. Unfortunately, the miscreants are exploiting a separate security hole in IE, so the updates do nothing to protect users against the attacks.
In all, the Microsoft patch batch fixed 28 vulnerabilities, 23 of which carried the critical rating. Other Microsoft products that were updated included the Windows operating system, Office and Windows Media Player."
In-the-wild attacks find hole in (fully-patched) IE 7 • The Register
I have seen several people posting on this forum today who were infected with Trojan virus's that may well be a result of these exploits.
Significantly Secunia say the IE patches DO NOT repair the vulnerabilities
The following info is from the Microsoft Malware Protection Centre
About the Virus
Trojan:Win32/VB.IQ.dr is a trojan that drops other malware in the system.
Upon execution, Trojan:Win32/VB.IQ.dr drops a copy of itself in the Windows folder as ppsap.exe. It then drops the file kimo.exe also in the Windows folder.
It then modifies the system registry so that kimo.exe and another file, bravo.exe, are automatically run when Windows starts:
Adds value: "civic"
With data: "%windir%\kimo.exe"
Adds value: "ppsap"
With data: "%windir%\bravo.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
It then executes kimo.exe and bravo.exe, which are both detected as Trojan:Win32/VB.IQ.
Take note that Trojan:Win32/VB.IQ.dr does not drop bravo.exe but attempts to execute it, as it is assumed that bravo.exe is already in the system and possibly dropped by kimo.exe.
Prevention
Enable a firewall on your computer
http://voices.washingtonpost.com/securityfix/2008/12/exploit_for_unpatched_internet.html
MMPC points to the Win32 Trojan as being the principle offender.
However Secunia have a different take
"The exploits contain shellcode that installs the Downloader-AZN, a well-known trojan that hijacks a PC's configuration settings and downloads additional pieces of malware. Anti-virus software from McAfee, and presumably other companies, detects the trojan - though at the time of writing, it appeared they didn't yet detect the zero-day exploit itself. The attacks target a flaw in the way IE handles certain types of data that use the extensible markup language, or XML, format. The bug references already freed memory in the mshtml.dll file. According to IDG News, exploits work about one in three times, and only after a victim has visited a website that serves a malicious piece of javascript.
Microsoft researchers are looking in to the reports, a company spokesman said Tuesday morning. Some eight hours later, the company had not yet issued an update.
The reports came just hours ahead of Patch Tuesday, Microsoft's monthly release of security updates. The patches included a cumulative update for IE that fixed four flaws that were rated critical because they could be used to remotely install malware with little or no action required of the user. Unfortunately, the miscreants are exploiting a separate security hole in IE, so the updates do nothing to protect users against the attacks.
In all, the Microsoft patch batch fixed 28 vulnerabilities, 23 of which carried the critical rating. Other Microsoft products that were updated included the Windows operating system, Office and Windows Media Player."
In-the-wild attacks find hole in (fully-patched) IE 7 • The Register
I have seen several people posting on this forum today who were infected with Trojan virus's that may well be a result of these exploits.
Significantly Secunia say the IE patches DO NOT repair the vulnerabilities
The following info is from the Microsoft Malware Protection Centre
About the Virus
Trojan:Win32/VB.IQ.dr is a trojan that drops other malware in the system.
As of this writing, exploits for the Pointer Reference Memory Corruption Vulnerability in Internet Explorer are known to drop this trojan in vulnerable systems. Microsoft released Security Bulletin MS08-078 on December 17, 2008 that fixes this vulnerability. Microsoft recommends that users apply this update immediately. Users are advised to refer to Microsoft Security Bulletin MS08-078 for more information.
Upon execution, Trojan:Win32/VB.IQ.dr drops a copy of itself in the Windows folder as ppsap.exe. It then drops the file kimo.exe also in the Windows folder.
It then modifies the system registry so that kimo.exe and another file, bravo.exe, are automatically run when Windows starts:
Adds value: "civic"
With data: "%windir%\kimo.exe"
Adds value: "ppsap"
With data: "%windir%\bravo.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
It then executes kimo.exe and bravo.exe, which are both detected as Trojan:Win32/VB.IQ.
Take note that Trojan:Win32/VB.IQ.dr does not drop bravo.exe but attempts to execute it, as it is assumed that bravo.exe is already in the system and possibly dropped by kimo.exe.
Prevention
This trojan may arrive in the system when you visit a website that contains code that exploits the Pointer Reference Memory Corruption Vulnerability in Internet Explorer discussed in Microsoft Security Bulletin MS08-078. Microsoft recommends that you apply the update immediately. Please refer to Microsoft Security Bulletin MS08-078 for more information.
Take the following steps to help prevent infection on your system:- Enable a firewall on your computer.
- Get the latest computer updates for all your installed software.
- Use up-to-date antivirus software.
- Use caution when opening attachments and accepting file transfers.
- Use caution when clicking on links to web pages.
- Protect yourself against social engineering attacks.
Use a third-party firewall product or turn on the Microsoft Windows Internet Connection Firewall.
To turn on the Windows Firewall in Windows Vista
To turn on the Internet Connection Firewall in Windows XP
Get the latest computer updates To turn on the Windows Firewall in Windows Vista
- Click Start, and click Control Panel.
- Click Security.
- Click Turn Windows Firewall on or off.
- Select On.
- Click OK.
To turn on the Internet Connection Firewall in Windows XP
- Click Start, and click Control Panel.
- Click Network and Internet Connections. If you do not see Network and Internet Connections, click Switch to Category View.
- Click Change Windows Firewall Settings.
- Select On.
- Click OK.
Updates help protect your computer from viruses, worms, and other threats as they are discovered. It is important to install updates for all the software that is installed in your computer. These are usually available from vendor websites.
You can use the Automatic Updates feature in Windows to automatically download future Microsoft security updates while your computer is on and connected to the Internet.
To turn on Automatic Updates in Windows Vista
You can use the Automatic Updates feature in Windows to automatically download future Microsoft security updates while your computer is on and connected to the Internet.
To turn on Automatic Updates in Windows Vista
- Click Start, and click Control Panel.
- Click System and Maintainance.
- Click Windows Updates.
- Select a setting. Microsoft recommends selecting Install updates automatically and choose a time that is convenient for you. If you do not choose Automatic, but you choose to be notified when updates are ready, a notification balloon appears when new downloads are available to install. Click the notification balloon to review and install the updates.
To turn on Automatic Updates in Windows XP
- Click Start, and click Control Panel.
- Click System.
- Click Automatic Updates.
- Select a setting. Microsoft recommends selecting Automatic. If you do not choose Automatic, but you choose to be notified when updates are ready, a notification balloon appears when new downloads are available to install. Click the notification balloon to review and install the updates.
Most antivirus software can detect and prevent infection by known malicious software. To help protect you from infection, you should always run antivirus software that is updated with the latest signature files. Antivirus software is available from several sources. For more information, see Windows Vista Antivirus Software - Windows Live OneCare - Microsoft.
Use caution when opening attachments and accepting file transfersExercise caution with e-mail and attachments received from unknown sources, or received unexpectedly from known sources. Use extreme caution when accepting file transfers from known or unknown sources.
Use caution when clicking on links to web pagesExercise caution with links to web pages that you receive from unknown sources, especially if the links are to a web page that you are not familiar with or are suspicious of. Malicious software may be installed in your system simply by visiting a web page with harmful content.
Avoid downloading pirated softwareThreats may also be bundled with software and files that are available for download on various torrent sites. Downloading "cracked" or "pirated" software from these sites carries not only the risk of being infected with malware, but is also illegal. For more information. please see our article 'The risks of obtaining and using pirated software'.
Protect yourself from social engineering attacksWhile attackers may attempt to exploit vulnerabilities in hardware or software in order to compromise a system, they also attempt to exploit vulnerabilities in human behavior in order to do the same. When an attacker attempts to take advantage of human behavior in order to persuade the affected user to perform an action of the attacker's choice, it is known as 'social engineering'. Essentially, social engineering is an attack against the human interface of the targeted system. For more information, please see our article 'What is social engineering?'.
Recovery Steps
Note:
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as the Microsoft online scanner (http://safety.live.com). For more information, see Windows Vista Antivirus Software - Windows Live OneCare - Microsoft.
Malware Protection Center - Entry: Trojan:Win32/VB.IQ.dr
Recovery Steps
Note:
This trojan may arrive in the system when you visit a website that contains code that exploits the Pointer Reference Memory Corruption Vulnerability in Internet Explorer discussed in Microsoft Security Bulletin MS08-078. Microsoft recommends that you apply the update immediately. Please refer to Microsoft Security Bulletin MS08-078 for more information.
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as the Microsoft online scanner (http://safety.live.com). For more information, see Windows Vista Antivirus Software - Windows Live OneCare - Microsoft.
Malware Protection Center - Entry: Trojan:Win32/VB.IQ.dr
Last edited:
My Computer
System One
-
- Manufacturer/Model
- Scratch Built
- CPU
- Intel Quad Core 6600
- Motherboard
- Asus P5B
- Memory
- 4096 MB Xtreme-Dark 800mhz
- Graphics card(s)
- Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
- Monitor(s) Displays
- Samsung 206BW
- Screen Resolution
- 1680 X 1024
- Hard Drives
- 4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
- PSU
- 550 w
- Case
- Thermaltake
- Cooling
- 3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
- Mouse
- Targus
- Keyboard
- Microsoft
- Internet Speed
- 1500kbs
- Other Info
- Self built.