Tuesday, July 25, 2006
An online banner advertisement that ran on MySpace.com and other sites over the past week used a Windows security flaw to infect more than a million users with spyware when people merely browsed the sites with unpatched versions of Windows. The attack was spotted while browsing MySpace on a Linux-based machine. When somebody browsed a page headed with an ad for DeckOutYourDeck.com, the browser asked you whether yoy want to open a file called exp.wmf. Microsoft released a patch in January to fix a serious security flaw in the way Windows renders WMF (Windows Metafile) images, and online criminal groups have been using the flaw to install adware, keystroke loggers and all manner of invasive software for the past seven months. Internet Explorer users who visited a Web page containing this ad and whose IE was not equipped with the WMF patch would not get that warning. Rather, their machines would silently download a Trojan horse program that installs junk software in the family of adware. This stuff bombards the user with pop-up ads and tracks their Web usage. Using software that captures and analyzes Web traffic, we found that the installation program contacted a Russian-language Web server in Turkey that tracks how many times the program was installed, presumably because most of this adware is installed by third parties who get paid for each installation. The data there indicate that the adware was installed on over 1 million computers. Even other ads trying to serve up adware on Webshots.com a popular photo-sharing site were spotted. It's not clear when this particular campaign started but an anonymous user at the invaluable CastleCops security forum posted information about a similar attack spotted on MySpace on July 12. Users at this online gaming forum apparently spotted the same WMF exploit being served via the DeckOutYourDeck ad as early as July 8. A WHOIS database search for Deckoutyourdeck.com listed a fax machine as a contact phone number, but also contained an e-mail contact at RedTurtleInvestments.com. A WHOIS search on that domain turned up an address at Springfusion.com , which appears to be a fairly new online-affiliate marketing company. Springfusion.com is registered to a guy in Seattle, who replied that he was not connected with any of the sites I looked up. What is clear from this attack is that there are plenty of people who still haven't installed this security update from Microsoft. It's also fairly obvious that online criminals are targeting high-traffic Web sites. Again examples of what I call targeted attacks. And that was the case during my holiday period. But I'm back! ;-)
<< Home