The gang behind the recent Java zero day attacks apparently hasn’t packed up for the season.
A researcher examining one of the servers used to launch attacks on vulnerable Java installations says he has found a new zero day exploit for Microsoft’s Internet Explorer web browser.
The new and previously unknown (or “zero day”) exploit can be used to load malicious software on machines running fully patched Windows XP SP3 along with the latest editions of the IE 7 and IE 8 browser and Adobe’s Flash software, said Eric Romang, who discovered the vulnerability.
Further analysis by the firm AlienVault suggests that the zero day is being used in attacks that install the Poison Ivy Trojan.
In a blog post, Romang, a Luxemborg-based IT security advisor at ZATAZ.com, said he discovered the exploit when analyzing a batch of files hosted on one of the servers used by the Nitro gang to distribute attacks that exploited the Java vulnerability.
After running one of the sample files on a fully patched Windows XP SP3 system with an up-to-date version of Adobe Flash, Romang was surprised to find that the files loaded malicious software to his fully patched XP system.
Further analysis revealed that .html and Flash files were used to identify proper targets (Windows XP systems running IE 7 and 8) and use a common technique called a “heap spray” to lay the groundwork for a successful iFrame attack against the systems that exploited the vulnerability and used it to install a malicious program, 111.exe.
That malware has been identified as a new variant of the Posion Ivy Trojan horse program, according to the security firm AlienVault Labs.
Writing about the attack on the AlienVault Labs blog, researcher Jaime Blasco said that evidence collected online suggest the gang behind the Java attacks in August and September may be moving on: with domains used in that attack located at new IP addresses and serving up the new and more potent attacks.
Oracle issued an emergency patch for the vulnerability in Java on August 30, though researchers subsequently showed that the patch could be circumvented.
The new IE exploit is being implemented in the Metasploit penetration testing tool and a module that allows Metasploit users to launch IE 7 and IE8 exploit is expected by Monday, Romang wrote.
(Customers should note that Sophos products protect against the vulnerability detecting attempts to exploit it as Exp/20124969-A – however, we would still recommend that IE users apply the security patch as soon as it is released by Microsoft).
Poison Ivy image from Shutterstock.
Is Windows 7 or Windows 8 affected?
To answer my own question, if the security exploit described here is the same as the one described at http://krebsonsecurity.com/2012/09/exploit-releas… IE9 is affected. But the article does not say anything of IE10.
According to Microsoft's Security Advisory, IE 10 is not affected:
http://technet.microsoft.com/en-us/security/advis…
I hope this helps.
Hi Tyw7,
Unfortunately, IE 7, 8 and 9 are affected by this flaw, worse than was previously thought. Symantec and Kaspersky provides more details at the following links:
http://www.symantec.com/connect/blogs/new-interne…
http://threatpost.com/en_us/blogs/latest-ie-zero-…
Since IE 8 or IE9 can be installed on Windows 7, yes, Windows 7 would be affected.
I am not sure about Windows 8; IE 10 has more mitigations that would help in this case. E.g HEASLR (High Entropy Address Space Layout Randomization) of IE 10 64 bit that would make the heapspray technique used by this exploit ineffective. Enhanced Protected Mode would also be of benefit.
More information about these security features can be found in the following blog posts:
http://blogs.msdn.com/b/ie/archive/2012/03/12/enh…
http://blogs.msdn.com/b/ie/archive/2012/03/14/enh…
http://blogs.msdn.com/b/ieinternals/archive/2009/…
Here is a link explaining why IE 10 64 bit provides a better defence against heap spray attacks:
http://blogs.msdn.com/b/ie/archive/2012/03/14/enh…
Thanks.
Analysis by others shows this affects IE 9 as well:
https://community.rapid7.com/community/metasploit…
http://blog.vulnhunt.com/index.php/2012/09/17/ie-…
Has this been assigned a CVE yet?
Hi Sleepy,
Since this is a Zero day vulnerability, it has not yet been assigned a CVE.
Thanks.
Are machines running with sophos being protected by this vulnerability
Would really like to know the answer to this as well!
Sophos products detect malware we have seen using the exploit as Troj/SWFDL-G, Troj/SWFDL-H and Troj/SWFDL-I.
Hi,
Please follow the recommended advice (see Suggested Actions and Additional Suggested Actions) in the following Microsoft Security Advisory to help protect you from this threat:
http://technet.microsoft.com/en-us/security/advis…
I hope this helps. Thanks.
Why don't Sophos post, in the original article, that Sophos products detects this?
It is much better doing it that way, instead of a comment, way down below the article…
Just a suggestion. 🙂
Poison Ivy only works on Windows XP and before
Unfortunately it is not just Poison Ivy being used any more as the malware that gets downloaded once your PC is exploited. Please the see following article from Kaspersky about the new exploits that have been developed and the payload they drop:
http://threatpost.com/en_us/blogs/researcher-find…
Thanks.
Sounds like poison ivy was created by MS to get people off of XP
Hi John,
That is absolutely not true. Poison Ivy is quite an old piece of malware however more recent variants do work on Windows Vista and Windows 7. Older variants did not.
The following variant works on XP:
http://www.microsoft.com/security/portal/Threat/E…
http://www.symantec.com/security_response/writeup…
These variants work on newer versions of Windows:
http://www.sophos.com/en-us/threat-center/threat-…
http://www.microsoft.com/security/portal/Threat/E…
http://www.microsoft.com/security/portal/Threat/E…
http://www.microsoft.com/security/portal/Threat/E…
http://www.microsoft.com/security/portal/Threat/E…
The original author of this malware ceased development of this in 2008. More information on this malware can be found in the Microsoft Threat Report:
http://www.microsoft.com/en-us/download/details.a…
Finally, Windows XP is supported until the 8th of April 2014 so Microsoft are not rushing to get people off XP using malware:
http://windows.microsoft.com/en-us/windows/produc…
From reading some press releases in the last year, Windows 7 is their most successful OS of all time, selling more than 500 million copies.