IE8 zero-day exploit targets U.S. nuke researchers

Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working  on nuclear weapons research.

Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working  on nuclear weapons research, the concerning discovery has been confirmed by principal security firms that revealed that the flaw has been used in a series of “watering hole” attacks.

According first investigation the IE8 zero-day has been used to target various groups of research such as the components of U.S. Department of Labor and the U.S. Department of Energy.

Watering Hole” is a technique of attack realized compromising legitimate websites with a “drive-by” exploit, in this way restricted  audience interested in the specific content proposed by targeted website could be attacked, when an internet user visits the page a backdoor trojan is installed on his computer.

The success of the method of attack depends on the capabilities of attacker to develop/produce zero-day exploits that affect victim’s software, watering Hole is not new ,it has been detected for first time in 2009 when civil society organizations were compromised with this technique and used as a vector to deliver 0-day exploits.

The website compromised to exploit the IE8 zero-day is the Dept. of Energy’s Site Exposure Matrices (SEM) website, the site deals with “nuclear-related illnesses” linked to Dept. of Energy facilities of employees who are experiencing health problems as a result of their professional activities.

Once again the hackers behind the exploits of IE8 zero-day flaw seems to have Chinese origin, Invincea security firm revealed that the Dept. of Labor website was hacked by attackers to hijack visitors to a compromised website to deploy Poison Ivy Trojan through the execution of a “drive-by download exploit”, the malware is known to be linked to the China based group of hackers “DeepPanda”.

 

 

According security specialist a similar exploit has been already used early 2012, the new  IE8 zero-day exploit, according to security firm FireEye despite it searches for XP users it is also able to work against IE8 on Windows 7″ machines.

“This particular exploit checks for OS version, and only runs on Windows XP. We are able to reproduce the code execution and confirm it’s a working zero-day exploit against IE8. During our research we also found the exploit constructs a ROP chain on non-ASLRed msvcrt.dll, and we verified it could also work against IE8 on Windows 7. So we believe there should be some other exploits targeting IE8 on Windows 7.” FireEye post states.

At the moment is not clear the real entity of the attacks and there is no info in the information stolen, it must be anyway considered that those departments are considered strategic for cyber espionage activity due the numerous classified documents managed.

Microsoft issued a security advisory on Friday announcing its investigation on the event and confirming it as a “remote code execution vulnerability.”, Microsoft confirmed on Friday that the IE8 zero-day vulnerability exists in Internet Explorer 8 for all versions of Windows XP and above are affected, including Windows Server 2003, 2008 and R2.

Microsoft noted that IE6 users on Windows XP, IE7, IE9, and IE10 users on Windows 8 and Surface tablets, are not affected by the security flaw.

Other precious suggestions provided by the advisory are:

Mitigating Factors:

  • By default, Internet Explorer on Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 runs in a restricted mode that is known as Enhanced Security Configuration. This mode mitigates this vulnerability.
  • By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML email messages in the Restricted sites zone. The Restricted sites zone, which disables script and ActiveX controls, helps reduce the risk of an attacker being able to use this vulnerability to execute malicious code. If a user clicks a link in an email message, the user could still be vulnerable to exploitation of this vulnerability through the web-based attack scenario.
  • An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker’s website.

Pierluigi Paganini

(Security Affairs – Cyber espionage)

UPDADE

Microsoft has release the patch for the vulnerability

http://www.net-security.org/secworld.php?id=14886

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Experts warn of an ongoing malware campaign targeting WP-Automatic plugin

A critical vulnerability in the WordPress Automatic plugin is being exploited to inject backdoors and…

16 hours ago

Cryptocurrencies and cybercrime: A critical intermingling

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement…

18 hours ago

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

18 hours ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

20 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

22 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

1 day ago

This website uses cookies.