Malicious MIDI files lead to rootkit malware
Posted on 26.01.2012
A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets' computer, warns Trend Micro.

The victims are lured to a malicious web page (http://images.{BLOCKED}p.com/mp.html), which hosts a specially crafted MIDI file and JavaScript.

The page's HTML file calls upon the MIDI file to trigger the exploit, and the JavaScript decodes shellcode that is already embedded in the HTML file. Upon execution, the shellcode downloads an encrypted binary from another site.

"This binary is then decrypted and executed as a malware detected as TROJ_DLOAD.QYUA," says Trend Micro's engineer. "We’re still conducting further analysis on TROJ_DLOAD.QYUA, but so far we’ve been seeing some serious payload, including rootkit capabilities."

All this happens without the victims being none the wiser - they simply see (and hear?) the MIDI file being played as they expect it to.

To protect themselves from such attacks, users of Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 are advised to to patch their systems as soon as possible.






Spotlight

Microsoft Edge: New browser, new risks for Windows 10

Microsoft Edge, the new browser in Windows 10, represents a significant increase in the security over Internet Explorer. However, there are also new potential threat vectors that aren’t present in older versions.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Aug 3rd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //