Drive-by exploit kit bypasses Microsoft EMET protections

By
Follow google news

Angler gets around DEP, ASR, EAF and other mitigations.

Malware writers have updated the widely-used Angler exploit kit to bypass Microsoft's Enhanced Mitigation Experience Toolkit (EMET), which is used to prevent software vulnerabilities from being exploited. 

Drive-by exploit kit bypasses Microsoft EMET protections

Angler is used to deploy ransomware such as TeslaCrypt via booby trapped Adobe Flash and Microsoft Silverlight ads in drive-by attacks.

Organisations deploy EMET to protect vulnerable, unpatched software from attacks. 

The vulnerabilities primarily target users of Microsoft's older Windows 7 operating system. 

Researchers from security vendor FireEye, who analysed new variants of Angler, have discovered that the malware now contains code to get around EMET protections. 

Using sophisticated coding techniques, the updated Angler malware is now able to evade memory protection measures to exploit vulnerable Adobe Flash and Microsoft SIlverlight installations on users' machines. 

Protections that have been bypassed include Data Execution Prevention (DEP), Address Space Randomisation (ASR), and Export Address Table filtering, among many others. 

The researchers suggest organisations quickly patch Adobe Flash Player, Java and web browsers to mitigate against the bypass of protection technologies. 

Disabling web browser plugins for Flash and Silverlight should also make users less vulnerable to attacks. 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Service NSW launches Digital ID pilot

Service NSW launches Digital ID pilot

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Windows Secure Boot certificates expire in June, Microsoft warns

Windows Secure Boot certificates expire in June, Microsoft warns

Under malware threat, runaway AI agent project OpenClaw turns to Google's VirusTotal

Under malware threat, runaway AI agent project OpenClaw turns to Google's VirusTotal

Log In

  |  Forgot your password?