New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 984
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image trj: Beware!: Banner ad Trojan hits IE image
Trojans
Banner ad Trojan hits IE
Dodgy patch not helping...
Fri 3 October 2003 10:43AM BST

A malicious program, dubbed QHosts, infects PCs using a recent flaw in Microsoft's Internet Explorer to take control of how computers look up internet addresses, antivirus firms warned on Thursday.

The program takes advantage of a critical flaw in the popular Internet Explorer web browser, which Microsoft has made an integral part of its Windows operating system. The flaw, which Microsoft has labeled an 'object type' vulnerability, can be used to cause website visitors to unknowingly run malicious code onto their computers when surfing a compromised site. Such an attack is referred to as a Trojan horse.

The Trojan horse used a banner ad that the attacker somehow placed on web hosting provider FortuneCity.com's site to infect PCs running Windows, said Craig Schmugar, a virus research engineer with security company Network Associates. When a page containing the booby-trapped ad is displayed in Internet Explorer, the malicious code will automatically install the Trojan horse on the user's PC.


The banner ad displayed another pop-up, and that pop-up would load the content, he said. Viewing that page would allow the Trojan to execute. FortuneCity.com has already taken down the banner ad, he added.

While the QHosts program does not seek out new computers to infect - and so, is not considered a worm or virus - its ability to automatically infect PCs and the fact that no fix exists for the vulnerability makes the appearance of the Trojan horse worrisome, Schmugar said.

The ones [flaws] that are exploited tend to get patched faster. I am sure - given all the attention -Microsoft is thinking of bumping up the time frame to repair the issue, Schmugar said. Microsoft originally patched the flaw in late August, but later discovered that the fix didn't solve the problem.

A Microsoft representative said that the company was working to solve the problem, but had no time frame for a fix.

While we will release a fix for this variation shortly, users can help protect against this newly reported issue by changing their IE internet security zone settings to prompt them before running ActiveX components, the company said in a statement. More information can be found in the advisory on Microsoft's website.

The QHosts program changes the internet addresses of the computers at which the infected PC will look to resolve unknown websites and domain names. Known as the domain name service (DNS) servers, such computers are generally operated by a trusted organisation, such as an internet service provider. However, QHosts will send the requests to other servers, which Schmugar believes are likely to be owned by the originator of the Trojan horse.

Such hostile servers could reroute an infected computer's request for a website to an entirely different page.

The servers to which the original QHosts program referred have since been removed from the internet, but future versions of QHosts could easily replace the addresses of those servers with new ones, said Schmugar. The silver lining is that we can contact the web host and have the page taken down, he said. The downside is that when one site is taken down, another could pop up.

Still, few reports of the Trojan horse have emerged, according to Vincent Weafer, the senior director of the incident response team at security company Symantec.

We have less than a handful of people reporting the issue, he said.

Robert Lemos writes for CNET News.com

Robert Lemos, CNET News.com

silicon
Posted on Monday, 06 October 2003 @ 05:25:00 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· News.com
· Microsoft
· Microsoft
· HotScripts
· W3 Consortium
· C|Net News
· More about Trojans
· News by phoenix22


Most read story about Trojans:
Lover Spy

image
Article Rating
Average Score: 5
Votes: 1


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register