Malicious MIDI files lead to rootkit malware
Posted on 26.01.2012
A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets' computer, warns Trend Micro.

The victims are lured to a malicious web page (http://images.{BLOCKED}p.com/mp.html), which hosts a specially crafted MIDI file and JavaScript.

The page's HTML file calls upon the MIDI file to trigger the exploit, and the JavaScript decodes shellcode that is already embedded in the HTML file. Upon execution, the shellcode downloads an encrypted binary from another site.

"This binary is then decrypted and executed as a malware detected as TROJ_DLOAD.QYUA," says Trend Micro's engineer. "Were still conducting further analysis on TROJ_DLOAD.QYUA, but so far weve been seeing some serious payload, including rootkit capabilities."

All this happens without the victims being none the wiser - they simply see (and hear?) the MIDI file being played as they expect it to.

To protect themselves from such attacks, users of Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 are advised to to patch their systems as soon as possible.






Spotlight

People will do anything for free Wi-Fi

Posted on 30 September 2014.  |  A new Wi-Fi investigation conducted on the streets of London shows that consumers carelessly use public Wi-Fi without regard for their personal privacy.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //