Patched Windows bug wreaks havoc

Powered by SC Magazine
 

Vulnerability used to target political, industrial and defense organisations.

A critical Windows vulnerability that Microsoft patched in April continues be used in targeted attacks against companies, security researchers are warning.

Many of the attacks appear to be going after political, industrial and defense interests.

For instance, a malicious document exploiting the vulnerability, which resides in Windows Common Controls, recently targeted a defense contractor according to Sophos senior threat researcher Paul Baccas. 

He did not identify the contractor, but wrote that there have been a "large number of files" exploiting the same vulnerability being emailed to companies in "a diverse number of sectors."

As reported by SC, another document specially crafted to exploit the same flaw targeted people interested in the recent ASEAN Defense Ministers' Meeting.

Symnatec software engineer Takashi Katsuki said when the malicious file was opened, it displayed a document containing contact information of each member country's military-related personnel.

The problem bug, CVE-2012-0158, remains in heavy use, Kaspersky Lab researcher Kurt Baumgartner told SC.

More than 90 exploit documents targeting the weakness have been collected as of June, according to a post by malware researcher Mila Parkour on the Contagio blog, a malware sample collection site.

The file names included references to a Pakistan and Chinese missile tests, military reports and even a fax to UNESCO. Other filenames were more generic, such as "schedule," "criteria" and "info." Most of the samples, collected between April and June, were "mostly APT targeted," Parkour wrote.

The exploit takes advantage of an issue in the component MCSOMCTL OCX, and if triggered could result in remote code execution.

This particular flaw affects Office 2003 through 2010 on Windows, SQL Server 2000 through 2008 R2, BizTalk Server 2002, Commerce Server 2002 through 2009 R2, Visual FoxPro 8 and 9, and Visual Basic 6 Run-time

"There are really no excuses for not having applied [the patch]," Baccas wrote.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Patched Windows bug wreaks havoc
 
 
 
Top Stories
Qld Transport to replace core registration system
State's biggest citizen info repository set for overhaul.
 
Innovating in the sleepy super industry
There’s little incentive to be on the bleeding edge, so why is Andrew Todd fighting so hard?
 
How technology will unify Toll
The systems headache formed through 15 years of acquisitions.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
More 4G from Optus in Darwin
Nov 21, 2014
Click to see where Optus has expanded coverage to the suburbs near Darwin.
Optus steps up regional 4G coverage
Nov 20, 2014
Once 700Mhz services are working, Optus claims regional users will have a "faster and more ...
This Huawei 4G phone costs $99
Nov 12, 2014
The $99 Huawei Ascend Y550, available through Vodafone, enters the budget market as one of the ...
4G smartphones: Microsoft's Lumia 830
Nov 7, 2014
Microsoft has announced its flagship Windows Phone, the Nokia Lumia 830 4G, will be available in ...
Do you direct debit customers? Read this
Oct 10, 2014
Authorities have been targeting direct debit practices with iiNet and Dodo receiving formal ...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  39%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  7%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  21%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  5%
TOTAL VOTES: 890

Vote