Attack on IIS Web Sites Infects Browsers With Malicious Code
Security analysts say that the malicious code that has been infecting some Windows machines since Thursday morning was planted via an IIS (Internet Information Services) vulnerability on the Web servers that host some high-traffic sites.
Source: eWeek
It's quite scary that these vulnerabilities haven't been patched yet. I hope this gets fixed soon. -KFUsers visiting those sites have had their machines infected with a piece of code that installs a keystroke logger and other malicious tools. The attack appears to affect only machines running Internet Explorer, and users do not have to click on any links or images in order for the code to download. The Trojan that's installed on compromised machines is a fairly simple one.
Source: eWeek
0
Comments
Today, same article has been updated. Two fixes for end clients.... XP2 RC2 is not vulnerable (but can be risky to install in other ways and I would not install it just to fix this vuln until it is out of beta), and updating regular boxes with all critcal patches without installing XP2 RC2 AND running IE at high security level for surfing will block this at client end. This thing does not get in through any browser besides IE right now, AFAIK.
Here's how to get the WindowsUpdate site to work with an IE defaulted to high security for the Internet zone:
Run IE
Then do, in IE:
Tools|Internet Options|Click on Security Tab|Click on Internet Zone|Move slider to High. Do not exit the security tab dialog.
Click on Trusted Sites Icon|click on Sites button|uncheck the box next to Verify....
Now enter these URLs and click add after each one (each one is on a separate line):
http://v4.windowsupdate.microsoft.com
http://windowsupdate.microsoft.com
http://www.microsoft.com
Now exit the security tab dialog with a click on apply and then OK until it closes.
RESTART IE, exit it and reopen it.
Now you can click WindowsUpdate or go to WindowsUpdate but other sites will get IE in high security mode. ADN WindowsUpdate will work for sure in XP Pro SP1a this way, the XP box is doing its check now set that way. This is not published normally because if you let a site that is not trustworthy into trusted sites zone by entering its URL in yourself it will get a low security resistance out of IE and that will let it do all sorts of things you do not want. BUT, these three specific entries will do no harm and let IE block other sites with HIGH SECURITY settings.
However, since Microsoft DOES wish to give updates out without requiring an https user login, and since they have two redirects internal to Microsoft.com to block other things before you can get to the WindowsUpdate site, this is a three site force to known good sites. THIER servers that run IIS 5.0 are not infected, and THOSE servers got the MS04-011 (IIS 5.0 and Server O\S version archives) patch applied to them, MS04-011 server version is the server-side fix for this thing.
Anyone who virus scans online only and is a member here can PM or email me and I will tell how in detail to virus scan with a trusted sites force, will give one example of online scanner access here that I also know is safe for you folks to use:
You can add http://securityresponse.symantec.com/ to trusted sites zone virus scan from Symantec's Online Viral scanner while IE is set to high security for Internet Zone also if you want an online virus scanner usable that way.
As and when Microsoft adds more IE patching and says it is safe to relax internet zone settings after patching, I will mention that here in this thread, because I do not like having folks have trusted sites zone populated unless there is a heavy need for same. Consider this a WhiteHat "heavyduty adaptation" to the things life can throw at Windows users that I know and have proven works.
John Danielson
Kaspersky Labs corporate policy is to spread news of major viruses, worms, and trojans and the attacks used, and do so at no charge, because they believe that an educated public can combat evil things better. There is therefore no copyright notice in this email and subscribing is free. Kaspersky is one of my main malware info sources, and I share their desire to spread news that is real about malware so informed users can know how to tighten down their boxes. This post is made in conformance to that spirit of giving known real information with attribution plus the principle that knowledge that is practical leads to better prevention.