BlackHole toolkit targets Microsoft XML flaw

Powered by SC Magazine
 

Popular toolkit targets unpatched Windows hole.

The BlackHole exploit kit has been updated with an exploit that targets an unpatched vulnerability in Microsoft XML Core Services.

The newly added malicious payload in BlackHole -- a crimeware application that exploit vulnerabilities to install malware -- targets a recently disclosed zero-day flaw in the service.

The defect (CVE-2012-1889) allowed remote attackers to execute malicious code on a user's computer if they view a specially crafted page using Internet Explorer. In early June, Microsoft admitted the security flaw actively was being exploited in the wild.

It is currently unpatched, although Microsoft has released a Fix-It tool in lieu of a patch. Exploit code for the vulnerability has already been added to the Metasploit penetration testing framework, making it available to anyone.

"As soon as we see exploit kits targeting new vulnerabilities, we can expect to see a lot more users getting infected – especially if the vulnerabilities are zero-days," Sophos principal virus researcher Fraser Howard.

He said he expected to see a "significant portion, if not all," of BlackHole sites to use the new version within days, and was surprised that hasn't happened yet.

BlackHole was one of the more popular crimeware kits and was used compromise legitimate sites, usually those running outdated versions of an off-the-shelf content management system or e-commerce application.

Visitors landing on the hacked site were redirected or hit with drive-by downloads. The kit often took advantage of vulnerabilities in Java, Adobe Reader or Flash, or Internet Explorer. WordPress blogs were commonly targeted.

This is the second major update for BlackHole in recent weeks. The developers previously added functionality to the kit to redirect users from compromised website to those serving malware.

Before the update, if the original site containing malware changed or was taken down, all the compromised sites needed to be manually modified to point to the new location.

With the update, the redirect is automated.

This article originally appeared at scmagazineus.com

in lieu 

Copyright © SC Magazine, US edition


BlackHole toolkit targets Microsoft XML flaw
 
 
 
Top Stories
Westpac interim CIO resigns
Group CIO yet to be appointed.
 
Earning the right to innovate
Breaking down the barriers to innovation is a long, but rewarding process, says Bank of Queensland Group CIO, Julie Bale.
 
A call for timely reporting
[Blog post] Businesses need incentives to keep customer data secure.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Have customers that won't pay debts?
Jul 10, 2014
The ACCC and ASIC have updated their advice when it comes to collecting debts.
Carpet cleaner faces court over online testimonials
Jul 4, 2014
The ACCC has initiated proceedings against A Whistle (1979) Pty Ltd, the franchisor of Electrodry...
You can now get 15GB of free online storage using Microsoft OneDrive
Jun 25, 2014
Cloud storage has reached both the capacity and price where it's a viable alternative to local ...
Another clever trick you can perform with Xero
Jun 25, 2014
Here is another way to reach out to particular subsets of your customers using Xero.
Have a phone, tablet and laptop?
Jun 20, 2014
This new Telstra pre-paid 4G mobile hotspot might be useful if you regularly need to use fast ...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  26%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  5%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 884

Vote