das ist nicht mehr lustig...
Geizhals » Forum » Security & Viren » das ist nicht mehr lustig... (12 Beiträge, 204 Mal gelesen) Top-100 | Fresh-100
Du bist nicht angemeldet. [ Login/Registrieren ]
das ist nicht mehr lustig...
07.04.2004, 11:44:52
antivirus wirkungslos, empfangen einer e-mail führt ohne weitere aktion des
benutzers zur infektion.

New Computer Virus
Exploits Microsoft Flaw

By RIVA RICHMOND
DOW JONES NEWSWIRES
April 6, 2004 7:16 p.m.

NEW YORK -- A new version of the Bugbear e-mail virus emerged on the
Internet early Monday that can automatically infect computers by exploiting
a flaw in Microsoft Corp. software for which there is currently no available
fix.

The virus, dubbed "Bugbear.e" by antivirus companies, uses an HTML e-mail
that exploits a flaw in Windows-based computers' Internet Explorer Web
browsers to cause its dangerous executable file to silently run without the
user clicking on it. Bugbear.e is considered a "worm," or a virus that can
spread without human action.

For now, the worm isn't prevalent on the Internet, though its auto-execution
feature could help it gain ground, said Craig Schmugar, manager of Network
Associates Inc.'s virus-response center. The maker of McAfee antivirus
software rates the Bugbear.e low risk, as does Norton antivirus maker
Symantec Corp.

Separately, Network Associates warned Tuesday of a medium-risk virus known
as "Netsky.s," which first emerged Sunday.

It is highly unusual for an e-mail virus to exploit a flaw for which there
is no fix, or "patch," a phenomenon defined by some experts as a "zero-day
attack." (Others define it as an attack using a flaw that security experts
didn't know existed.) Such attacks are somewhat common in hacker programs
known as Trojan horses. But in a worm, they particularly unnerve security
experts and network operators because large numbers of computers could be
vulnerable to attack and quick defenses would be harder to come by.

To date, attackers have preferred to quietly use zero-day attacks in Trojans
rather than risk detection with a noisy virus. "In general, the trend is
that we're moving away from notoriety and fame being one of the motives to
criminal gain," says Ken Dunham, director of malicious code at iDefense Inc.
And attackers realize "there's a lot more value in a zero-day attack than a
worm that spreads and does whatever."

Still, among security experts' biggest fears is a zero-day network worm.
That would be a program akin to last summer's Blaster worm that uses an
unknown flaw or one for which there is no patch to spread virtually
unchecked through vulnerable machines via Internet connections.

Bugbear.e isn't this type of program and can be more easily stopped with
antivirus software. And experts say a similar attack on an Internet Explorer
flaw isn't likely to make it into a network worm because a user must view
Web content. But Bugbear.e's use of a flaw with no available patch
illustrates how the gap between the knowledge of a vulnerability and the
release of malicious code that exploits it is shrinking, and bringing us
ever closer to a zero-day network worm.

Microsoft wasn't immediately able to comment on the flaw or when a fix might
be available. Antivirus companies have rolled out software updates that can
block Bugbear.e and another Bugbear variant that also emerged in the last
day.

The flaw that Bugbear.e exploits was disclosed online in February, along
with a sample attack program, Mr. Schmugar said. It has since been used by
several Trojan horses, which are dropped onto PCs by malicious Web pages.

The virus essentially advances the delivery of a Trojan by using e-mail to
push PC users into viewing malicious Web content. In victim PCs, Bugbear.e
finds sensitive personal information and sends it to the attacker, including
cookies, text from open windows and data captured by a program that logs
keystrokes to filch passwords and credit card numbers.

The e-mail messages that carry Bugbear.e are blank, use faked "from"
addresses and can have one of many subject lines, including "Hi!", "hmm.."
and "SCAM alert!!!" It carries an attachment with a name that's randomly
chosen from a file found on the infected computer and has either a .zip or
.htm ending. Clicking on the attachment also will cause infection by the
virus.



Antworten PM Übersicht Chronologisch
 
Melden nicht möglich
 

Dieses Forum ist eine frei zugängliche Diskussionsplattform.
Der Betreiber übernimmt keine Verantwortung für den Inhalt der Beiträge und behält sich das Recht vor, Beiträge mit rechtswidrigem oder anstößigem Inhalt zu löschen.
Datenschutzerklärung