PDA

View Full Version : Trojan Uses Ms Hole



sharedholder
10-03-2003, 08:27 AM
Trojan uses MS hole to hijack Web browsers

Computer hackers have found another way to exploit an unpatched hole in Microsoft's Internet Explorer Web browser, using a specially designed attack Web site to install a Trojan horse program on vulnerable Windows machines.

The Trojan program changes the DNS configuration on the Windows machine so that requests for popular Web search engines like www.google.com and www.altavista.com bring the Web surfer to a Web site maintained by the hackers instead, according to warnings from leading security companies.

The attacks are just the latest in a string of online scams that rely on an easy-to-exploit flaw in IE known as the "ObjectData" vulnerability. Earlier attacks that relied on the vulnerability include a worm that spreads using America Online's Instant Messenger network.

Microsoft released a patch for the ObjectData vulnerability, MS03-032, in August. However, even machines that applied that patch are vulnerable to the latest attack because of holes in that security patch, according to a bulletin posted by Network Associates Inc.

The Trojan horse program is called Qhosts-1 and rated a "low" threat, Network Associates (NAI) said. Trojan horse programs do not attempt to find and infect other systems. However, they do give attackers access to a compromised computer, often allowing a remote hacker to control the machine as if he or she were sitting in front of it.

Microsoft issued a statement Thursday saying that it was investigating reports of exploits for a variation on a vulnerability originally patched in Microsoft Security Bulletin MS03-032 and would release a fix for that hole shortly. A company spokesman could not say when the patch update will be released.

The Redmond, Washington, company recommended that customers worried about attacks install the latest Windows updates and change their IE Internet security zone settings to notify the user when suspicious programs are being run.

Qhosts-1 was installed on vulnerable Windows machines using attack code planted in a pop-up ad connected to a Web page set up by the hackers on a free Web hosting site, www.fortunecity.com, NAI said. The DNS servers used in the attack resided on systems owned by Houston, Texas hosting firm Everyone's Internet, according to Richard Smith, an independent computer security consultant in Boston.

Those servers, as well as the fortunecity.com site used to install the Trojan, have been taken offline since the attack caught the attention of security experts. That will stop the DNS hijackings, but will also make it impossible for users on infected computers to browse the Web until their DNS configuration is restored, he said. However, as long as the Microsoft hole remains unpatched, similar attacks could be launched.

To be attacked, Windows machines had to be running Internet Explorer versions 5.01, 5.5 or 6.0, which contain the ObjectData vulnerability, and visit the Web site that launched the pop-up. The pop-up ad exploited the ObjectData vulnerability then downloaded the Qhosts-1 Trojan from a Web site in Seattle, Smith said.

Counterpane Internet Security, of Cupertino, California, said in a statement that it was tracking three possible infections by the Qhosts-1 Trojan on networks that it monitors.

There are still questions about how users were lured to the fortunecity.com site that installed the Trojan, but unsolicited commercial e-mail with links to the site was a likely suspect and economic gain was a likely motive, Smith said.

Hackers used the DNS changes to drive Web surfers to a site that launched a variety of pop-up advertisements, resulting in increased Web traffic and advertising revenue for the individuals behind the scheme, he said.

The latest attack is an example of the increasingly sophisticated strategies used by malicious hackers, who adopt the strategies of legitimate online businesses, cobbling together available Web technologies in a "Tinker Toy" fashion to create sophisticated attacks, Smith said.

By relying on a network of sites hosted on free and fee-based Internet hosting sites, hackers also make it more difficult for authorities to follow their tracks. Identity theft frequently plays a role in the latest scams as well. Hackers use stolen credit card information to set up hosting accounts which are then used as part of Internet based attacks, he said.


SOURCE (http://www.tecchannel.com/)

toddiscool
10-03-2003, 08:44 AM
Every other call at work for the past three days has been about this, it is driven me nuts. All these virus's and what not are a tech support's worst nightmare. http://smilies.sofrayt.com/%5E/k0/smashfreak.gif

MUSLEMAN
10-03-2003, 08:46 AM
this has been another update from the updateholder :lol: thx sh you are the man :lol:

RedRival
10-03-2003, 08:52 AM
yep i just got infected.

sharedholder, thanks for informing me.

RedRival
10-03-2003, 08:55 AM
err as mentioned in the above post, i'm supposed to be reidrected to the hacker's site, but google.com and searchin engines are not wrking at all...

are you ure i;m infect by this trojan??

i can't go to any search engine right now, and it's increasingly annoying...
need help!!

sharedholder
10-03-2003, 08:57 AM
Go to my site and look for ON-LINE TROJAN CHECK and make all other free tests too.

toddiscool
10-03-2003, 08:59 AM
Originally posted by RedRival@3 October 2003 - 03:55
err as mentioned in the above post, i'm supposed to be reidrected to the hacker's site, but google.com and searchin engines are not wrking at all...

are you ure i;m infect by this trojan??

i can't go to any search engine right now, and it's increasingly annoying...
need help!!
It changes your DNS settings, just go and change it back, assumably to automatic, then get the romoval tool from mcafee(they are the only ones that have released one) or just update your AV and run a full scan in safe mode to repair it all.

imported_7aint9
10-03-2003, 10:33 AM
Think I've got it too. Can you give me a link to that mcfee removal tool as I can't seem to find it on their site. Cheers.

sharedholder
10-03-2003, 10:59 AM
Originally posted by 7aint9@3 October 2003 - 10:33
Think I've got it too. Can you give me a link to that mcfee removal tool as I can't seem to find it on their site. Cheers.
So,anyone want to give that link to 7aint9 or not? :angry:

RedRival
10-03-2003, 11:04 AM
Quote Todiscool:


Manuall removal instructions from norton.

http://securityresponse.symantec.com/avcen...jan.qhosts.html

or from mcafee

http://us.mcafee.com/virusInfo/default.asp...&virus_k=100719

assuming that is what this is.

u mean this?

nanotek
10-03-2003, 12:43 PM
Originally posted by RedRival@3 October 2003 - 11:04
Quote Todiscool:


Manuall removal instructions from norton.

http://securityresponse.symantec.com/avcen...jan.qhosts.html

or from mcafee

http://us.mcafee.com/virusInfo/default.asp...&virus_k=100719

assuming that is what this is.

u mean this?
how come the pages say they are oudated and no longer actuell ?

sharedholder
10-03-2003, 04:47 PM
The page you were looking for was not found. The link may be outdated, or you may have typed the address (URL) incorrectly. You may find what you are looking for in one of the links below. :blink: :blink:

toddiscool
10-03-2003, 07:13 PM
When I linked to em last night they were there, give me a sec. BTW - sorry i thought mcafee had a removal too but they don't it just there updats for there shit scanner, i will but the removal instructions here in a sec.


Removal Instructions 

All Windows Users :
Use current engine and DAT files for detection and removal.

The following EXTRA.DAT packages are being made available prior to the regularly scheduled weekly DAT release (working with EXTRA.DAT files ).

EXTRA.DAT
SUPER EXTRA.DAT

Manual Removal Instructions

As a patch for Internet Explorer does not yet exist, it is recommend that users Disable Active Scripting in Internet Explorer
Delete the following files:
%WinDir%\Help\hosts
%WinDir%\winlog

Set the following registry key value (Information on editing registry keys ):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
Tcpip\Parameters "DataBasePath" = %SystemRoot%\System32\drivers\etc
Delete the following registry key value (Information on deleting registry keys ):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\Tcpip\Parameters\Interfaces\windows "r0x"
Reconfigure your DNS server settings as desired
Reconfigure your Internet Explorer settings as desired

RedRival
10-03-2003, 07:15 PM
Originally posted by toddiscool@3 October 2003 - 20:13
When I linked to em last night they were there, give me a sec. BTW - sorry i thought mcafee had a removal too but they don't it just there updats for there shit scanner, i will but the removal instructions here in a sec.
not true when you I clicked on it before, they had manual removal instructions...

Nightwolf
10-04-2003, 09:20 AM
Here is the removal tool...

http://securityresponse.symantec.com/avcen...moval.tool.html (http://securityresponse.symantec.com/avcenter/venc/data/trojan.qhosts.removal.tool.html)