After reports of a zero-day vulnerability exploiting IE8 for watering hole attacks, Microsoft confirmed the flaw and released Security Advisory 2847140. Microsoft Security Response Center wrote, "Internet Explorer 6, 7, 9 and 10 are not affected by the vulnerability. This issue allows remote code execution if users browse to a malicious website with an affected browser. This would typically occur by an attacker convincing someone to click a link in an email or instant message."
That, links in email or IM, wasn't the scenario when the U.S. Department of Labor website served up malicious code that was capable of disabling some antivirus products. It is believed to be highly targeted and aimed at Department of Energy (DOE) employees who worked with nukes.
The Institute of Medicine explained that Congress ordered compensation for DOE workers and contractors who suffered from diseases related to nuclear radioactive and nonradioactive toxic substances. To determine compensation, the Department of Labor setup a Site Exposure Matrix database, "which was designed to organize, display, and communicate information on the toxic substances found at those sites and possible health effects associated with exposure to those substances."
Security firm Invincea first reported the "Dept of Labor website was compromised to re-direct visitors to a website that in turn executed a drive-by download exploit of IE8 in order to install the Poison Ivy backdoor Trojan." Anup Ghosh, Invincea's founder and a former DARPA program manager told Nextgov, "We can infer the target of the attack are [Energy Department] folks in a watering hole style attack compromising one federal department to attack another." He added that there was nothing unique to the Labor's database that made it more vulnerable than other large organizations' sites.
Ghosh warned, "No one is immune to these attacks. The federal enterprise isn't much different from corporate enterprises in terms of using older versions of Windows and Internet Explorer. As a result, these attacks are likely to be successful unless the target is using more advanced forms of browser protection software such as virtual containers."
Alien Vault Labs reported, "In addition we have found that the U.S Department of Labor website wasn't the only entity affected and we can confirm that at least 9 other websites were redirecting to the malicious server at the same time. The list of affected sites includes several non-profit groups and institutes as well as a big European company that plays on the aerospace, defense and security markets."
The security firm had previously warned that the malware could detect and disable the following antivirus products: "Avira, Bitdefender 2013, McAfee Enterprise, AVG 2012, Eset Nod32, Dr. Web, Microsoft Security Essentials, Sophos, F-Secure 2011, Kaspersky 2012, Kaspersky 2013." Furthermore, the Command and Control (C&C) protocol matched "with a backdoor used by a known Chinese actor called DeepPanda and described by CrowdStrike" [pdf]. Alien Vault Lab recommended that you search your logs for known domains and IP addresses.
"An attacker who successfully exploited this vulnerability could gain the same user rights as the current user," warned Microsoft before advising users to upgrade to Internet Explorer 9 or 10. After an investigation, Microsoft "will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs."
Although Microsoft advised users who will continue to use IE8 to "Set Internet and local intranet security zone settings to 'High' to block ActiveX Controls and Active Scripting in these zones," Metasploit blogged that "by itself, that will not mitigate -- the exploitation technique used here does not leverage ActiveX controls at all. So, while that is generally good advice, it will not help in this case."
Keep in mind that if you use IE8, but don't believe you are the right audience to be targeted, other cybercrooks will jump on this zero-day and target anyone that they can.
Like this? Here's more posts:
- Journalist threatened, warned not to write about face-recognition at Statue of Liberty
- PETA plans to spy on hunters with drones
- Skype accounts easily hijacked via Skype Support, warns hacker
- Microsoft Phones, tablets as gaming controllers that detect gritting teeth, blinking?
- Post Boston: Privacy advocates warn about coming tsunami of surveillance cameras
- Officials to investigate DHS ammunition purchases
- Verizon report: China behind 96% of all cyber-espionage data breaches
- Former FBI agent: All phone calls recorded, no digital communication secure
- Microsoft: Facebook Home is a copycat, Windows Phone is the 'real thing'
- AV-Test issues first Windows 8 antivirus solution ratings
- Intelligence system FAIL: Tsarnaev wiretapped, listed in terrorism database
- Hacktivists take on 'Olympus Has Fallen' scare tactics style
Follow me on Twitter @PrivacyFanatic
Ms. Smith (not her real name) is a freelance writer and programmer with a special and somewhat personal interest in IT privacy and security issues. Smith has a diverse background in information technology, programming, web development, IT consulting, and information security. She focuses on the unique challenges of maintaining privacy and security, both for individuals and enterprises. She has worked as a journalist and has also penned many technical papers and guides covering various technologies. Smith is herself a self-described privacy and security freak.
Smith is an independent contractor and is not affiliated with any vendor that makes or sells information technology.
Policy on comments: Respectful discussion is welcomed! However comments that use inappropriate language, consist of name calling or personal attacks, or include accusations of wrongdoing are not appropriate. Those comments will be deleted or edited