MSXML flaw now actively exploited
By Lucian Constantin, IDG News Service | Jul 4, 2012
An exploit for an unpatched vulnerability in the Microsoft XML Core Services (MSXML) has been incorporated into Blackhole, one of the most widely used Web attack toolkits, according to security researchers from antivirus firm Sophos.
The security flaw is identified as CVE-2012-1889 and is what security researchers call a zero-day vulnerability -- an actively exploited vulnerability for which an official patch doesn't yet exist.
CVE-2012-1889 allows remote attackers to execute malicious code on a user's computer if they convince the user to visit a specially crafted Web page in Internet Explorer.
On June 12, Microsoft published a security advisory regarding this security flaw and provided users with several work-arounds for it, including a semi-automated "Fix it" solution.
Since then, exploit code for the vulnerability was added to the open-source Metasploit penetration testing framework, making it available for anyone to copy and potentially misuse.
"Within a week, CVE-2012-1889 exploiting code very similar to that published to Metasploit was seen within the landing page of a Blackhole exploit kit site," said Fraser Howard, a principal virus researcher at Sophos, in a blog post on Friday.
Blackhole is one of the most popular exploit toolkits -- malicious Web applications designed to exploit vulnerabilities in browser plug-ins and other components in order to distribute malware.
Exploit kits are used in the majority of Web-based attacks launched from compromised websites and are one of the primary methods of infected computers with malware.
Accelerating the Deployment of the Evolved Cyber Range
Ixia BreakingPoint creates an Internet-scale cyber range environment from a single 7-inch-high device for arming and training cyber warriors. Learn how BreakingPoint can be used by organizations to defend national interests by assessing, educating, and certifying elite cyber warriors and equipping those forces to harden the resiliency of critical network and data center infrastructures.
A Six-Step Plan for Competitive Device Evaluations
This paper presents a six-step methodology for conducting competitive product evaluations that provide advance insight into the performance, security, and stability of devices within production network and data center environments. Following this will give insights on how to evaluate and select the network or security devices for Enterprise, Federal, and Carrier Infrastructures
A Case Study of Eurograbber: How 36 Million Euros was Stolen via Malware
This is a case study about a sophisticated, multi-dimensional and targeted attack that stole an estimated 36+ million Euros from more than 30,000 bank customers from multiple banks across Europe.
Symantec, Singapore school partner to nurture next-generation security talents
Symantec Corp. and the Singapore Management University will jointly train and equip IT security professionals with the latest knowledge and skill sets in information security.