Compromised website serving "state-sponsored" 0-day exploit
Posted on 20 June 2012.
The still unpatched Microsoft XML Core Services vulnerability (CVE-2012-1889) that allows attackers to gain the same user rights as the logged on user and execute malicious code remotely is being actively exploited in the wild.


According to Sophos, the website of a European aeronautical parts supplier has been recently compromised and found serving a file infected with the code that tries to exploit the aforementioned zero-day.

Given that the vulnerability was recently tied to Google's warnings about state-sponsored attacks, and given that a "tried-and-trusted method of hacking into large companies and organizations is to target the supply chain," Graham Cluley puts forward the extremely plausible theory that the hackers were counting on staff of arms manufacturers or defense ministries to visit the site and get infected by simply viewing the page in Internet Explorer.

The company was not named, but was notified of the problem and has since cleaned up its site.

Still, it is good to point out that until Microsoft issues a patch for the flaw, users would do well to implement the workaround offered by the company in order to block this attack vector.






Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //