Windows falls victim to animated cursor attacks

Powered by SC Magazine
 

Corrupted cursor files could deliver malicious payloads.

Microsoft is warning that attackers are actively exploiting an unpatched vulnerability in animated cursor (.ani) files for Windows. 

Security vendors have seen targeted attacks that used malformed .ani files. The flaw could allow attackers to take control of a system with no user interaction.

The attack is launched when the user receives a specially crafted .ani file embedded in either a web page or email. The file is installed on the user's system and then delivers its malicious payload.

Nearly all supported versions of Windows and Internet Explorer are vulnerable to the attack. Only users running Windows Vista and Internet Explorer 7 in protected mode appear to be safe, according to Microsoft.

In protected mode, no file is allowed to access or modify any system files without user permission.

Alternative browsers such as Firefox and Opera do not appear to be vulnerable to the attack.

Copyright ©v3.co.uk


Windows falls victim to animated cursor attacks
 
 
 
Top Stories
Beyond ACORN: Cracking the infosec skills nut
[Blog post] Could the Government's cybercrime focus be a catalyst for change?
 
The iTnews Benchmark Awards
Meet the best of the best.
 
Telstra hands over copper, HFC in new $11bn NBN deal
Value of 2011 deal remains intact.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  39%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  7%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1792

Vote
Do you support the abolition of the Office of the Information Commissioner?