Forum Forum czatu www.czat.wp.pl --->  RPG Strona Główna
Home - FAQ - Szukaj - Użytkownicy - Grupy - Galerie - Rejestracja - Profil - Zaloguj się, by sprawdzić wiadomości - Zaloguj
the malware will exit.

 
Napisz nowy temat   Odpowiedz do tematu    Forum Forum czatu www.czat.wp.pl ---> RPG Strona Główna -> RPG
Zobacz poprzedni temat :: Zobacz następny temat  
Autor Wiadomość
fertieg97
Zwiastujący Szatana



Dołączył: 23 Wrz 2010
Posty: 395
Przeczytał: 0 tematów

Ostrzeżeń: 0/5
Skąd: England

PostWysłany: Pią 3:30, 29 Paź 2010    Temat postu: the malware will exit.

Source: The Register
Don`t Learn to HACK - Hack to LEARN. That`s our motto and we stick to it, we are all about Ethical Hacking,[link widoczny dla zalogowanych], Penetration Testing & Computer Security. We share and comment on interesting infosec related news, tools and more. Follow us on RSS or Twitter for the latest updates.
If Norman’s report proves accurate, it’s the first time in recent memory attackers have exploited an unpatched vulnerability in Firefox. Most so-called zero-day attacks are perpetrated against Adobe Reader or Flash Player, Microsoft software and to a lesser extent Oracle’s Java. The report is also unusual because the attack didn’t appear to target other applications, as is typical with exploit packages.
Hours after the reports surfaced,[link widoczny dla zalogowanych], Mozilla said it would issue a fix as soon as possible. In the meantime, users can protect themselves by disabling JavaScript altogether or installing the NoScript extension that allows users to control which websites are permitted to run JavaScript.
Mozilla claims they will address this issue soon and past history dictates that a patch will come out within a few days, so look forwards to Firefox 3.6.12 by the end of the week. It seems to be a fairly advanced and targeted attack.
In this case it was used via an iFrame on nobelpeaceprize.org which then downloaded malware to the visitors machine using a multi-exploit back-end which amongst others also leveraged this 0day Firefox exploit.
It’s been a while since Firefox has been in the news, but this is a fairly high profile case involving the Nobel Peace Prize website. It seems there is a race condition vulnerability in the latest versions of Firefox (including 3.6.11) that allows remote exploitation.
Malicious hackers have exploited an unpatched vulnerability in the latest version of Firefox to attack people visiting the Nobel Peace Prize website,[link widoczny dla zalogowanych], a Norway-based security firm said on Tuesday.
If the addresses resolve, “the malware attaches a command shell to the opened socket,[link widoczny dla zalogowanych], giving an attacker access on the local computer with the same rights as the logged on user.” If not, the malware will exit.
It’s been a while since there’s been a serious bug in Firefox, most of the recent ones have not been exploitable or have involved passive activities like data leakage and clickjacking.
“This iframe has a multi exploit backend and serves exploits for Firefox, including a working remote exploit for Firefox 3.6.11,” he said in an instant message to The Register. “We didn’t see any 0day for IE,” he added, referring to Microsoft’s browser.

Darknet - The Darkside
Of course the conspiracy theorists will say that the attack was carried out by the Chinese Government as their way of complaining that the most recent Nobel Peace Prize was given to a Chinese dissident named Liu Xiaobo.
As per usual you can protect yourself against this flaw by using NoScript or disabling JavaScript functionality in your browser.
He said the attack exploited a race condition vulnerability in Firefox to force end users to install malware his firm has dubbed Belmoo. The Windows executable was created on Sunday and attempts to connect to several internet addresses, according to his analysis.

Mozilla representatives confirmed a “critical vulnerability” in versions 3.5 and 3.6 of the open-source browser. It came several hours after the organization members were said to have made the same admission on this password-protected Bugzilla page. According to Einar Oftedal, a detection executive at Norman ASA in Oslo, the official website for the Nobel Peace prize, nobelpeaceprize.org,[link widoczny dla zalogowanych], was compromised so that it contained an iframe link to a malicious server.


Post został pochwalony 0 razy
Powrót do góry
Zobacz profil autora
Wyświetl posty z ostatnich:   
Napisz nowy temat   Odpowiedz do tematu    Forum Forum czatu www.czat.wp.pl ---> RPG Strona Główna -> RPG Wszystkie czasy w strefie EET (Europa)
Strona 1 z 1

 
Skocz do:  
Nie możesz pisać nowych tematów
Nie możesz odpowiadać w tematach
Nie możesz zmieniać swoich postów
Nie możesz usuwać swoich postów
Nie możesz głosować w ankietach


fora.pl - załóż własne forum dyskusyjne za darmo
Powered by phpBB
Appalachia Theme © 2002 Droshi's Island