AMEDA unveils modernisation steps for African, ME depositories    US Military Official Discusses Gaza Aid Challenges: Why Airdrops Aren't Enough    US Embassy in Cairo announces Egyptian-American musical fusion tour    ExxonMobil's Nigerian asset sale nears approval    Chubb prepares $350M payout for state of Maryland over bridge collapse    Argentina's GDP to contract by 3.3% in '24, grow 2.7% in '25: OECD    Turkey's GDP growth to decelerate in next 2 years – OECD    $17.7bn drop in banking sector's net foreign assets deficit during March 2024: CBE    EU pledges €7.4bn to back Egypt's green economy initiatives    Egypt, France emphasize ceasefire in Gaza, two-state solution    Norway's Scatec explores 5 new renewable energy projects in Egypt    Microsoft plans to build data centre in Thailand    Japanese Ambassador presents Certificate of Appreciation to renowned Opera singer Reda El-Wakil    Health Minister, Johnson & Johnson explore collaborative opportunities at Qatar Goals 2024    WFP, EU collaborate to empower refugees, host communities in Egypt    Al-Sisi, Emir of Kuwait discuss bilateral ties, Gaza takes centre stage    Sweilam highlights Egypt's water needs, cooperation efforts during Baghdad Conference    AstraZeneca, Ministry of Health launch early detection and treatment campaign against liver cancer    AstraZeneca injects $50m in Egypt over four years    Egypt, AstraZeneca sign liver cancer MoU    Swiss freeze on Russian assets dwindles to $6.36b in '23    Amir Karara reflects on 'Beit Al-Rifai' success, aspires for future collaborations    Climate change risks 70% of global workforce – ILO    Prime Minister Madbouly reviews cooperation with South Sudan    Egypt retains top spot in CFA's MENA Research Challenge    Egyptian public, private sectors off on Apr 25 marking Sinai Liberation    Debt swaps could unlock $100b for climate action    President Al-Sisi embarks on new term with pledge for prosperity, democratic evolution    Amal Al Ghad Magazine congratulates President Sisi on new office term    Egyptian, Japanese Judo communities celebrate new coach at Tokyo's Embassy in Cairo    Uppingham Cairo and Rafa Nadal Academy Unite to Elevate Sports Education in Egypt with the Introduction of the "Rafa Nadal Tennis Program"    Financial literacy becomes extremely important – EGX official    Euro area annual inflation up to 2.9% – Eurostat    BYD، Brazil's Sigma Lithium JV likely    UNESCO celebrates World Arabic Language Day    Motaz Azaiza mural in Manchester tribute to Palestinian journalists    Russia says it's in sync with US, China, Pakistan on Taliban    It's a bit frustrating to draw at home: Real Madrid keeper after Villarreal game    Shoukry reviews with Guterres Egypt's efforts to achieve SDGs, promote human rights    Sudan says countries must cooperate on vaccines    Johnson & Johnson: Second shot boosts antibodies and protection against COVID-19    Egypt to tax bloggers, YouTubers    Egypt's FM asserts importance of stability in Libya, holding elections as scheduled    We mustn't lose touch: Muller after Bayern win in Bundesliga    Egypt records 36 new deaths from Covid-19, highest since mid June    Egypt sells $3 bln US-dollar dominated eurobonds    Gamal Hanafy's ceramic exhibition at Gezira Arts Centre is a must go    Italian Institute Director Davide Scalmani presents activities of the Cairo Institute for ITALIANA.IT platform    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Microsoft Flaw Used To Attack French Aerospace Employees, Veterans
Published in Amwal Al Ghad on 15 - 02 - 2014

A flaw in recent versions of Internet Explorer was used to attack visitors to a website for U.S. military veterans, and also appears to have been used earlier against French aerospace industry employees, researchers said Friday.
The flaw in Microsoft Corp's IE 10 Web browser was reported on Thursday, days after it was used inside the Web page of nonprofit U.S. group Veterans of Foreign Wars. The VFW said Friday that an unspecified federal law enforcement agency is investigating and that the malicious code on its site had been removed.
Security firm Websense Inc said it found similar attack code on a page set up on January 20 with a Web address nearly identical to one used by a French aerospace association.
That suggests the attacks using the flaw have been going on for at least three weeks, but might have succeeded earlier against higher-value targets and escaped discovery, said Websense Director of Security Research Alexander Watson.
FireEye Inc, which discovered the VFW attack, said it appeared connected to previous attacks against the Japanese financial sector, security firm Bit9 and others that Symantec Corp security researchers attributed to a large and well-organized group in China.
The latest attacks are considered to be sophisticated as they rely on a previously unknown flaw of a sort that can cost $50,000 or more when sold by shadowy brokers to government agencies or contractors. The industry calls these flaws "zero-day vulnerabilities."
They also seem part of a multistage operation, with the attackers seeking to break into the computers of U.S. veterans or French defense contractors in the future. Once there, they could look for military plans or designs or passwords that would enable them to impersonate the individuals electronically. Assuming those victims' identities in emails sent to more prominent targets would make it more likely that the recipients would click on baited links or unwitting install more spying software.
Although the initial report in the new campaign mentioned only IE 10, Microsoft said it had determined that IE 9 is also vulnerable.
"We recommend customers upgrade to Internet Explorer 11 for added protection," said Adrienne Hall, general manager of Microsoft's Trustworthy Computing Group.
Despite the use of the unknown flaw, Websense's Watson said the attacks were not that hard to spot. For one thing, a program that exploited the flaw was submitted on January 20 to Virus Total, a free Google Inc service that shows whether any major antivirus provider would block the sample. In this case, none did. In addition, the programming language operated in the open, without complicated obfuscation that can deter analysis.
Watson said that was why he felt the attacks could prove to be by a new group, or even two different new groups. As an example, the exploit code might have been written elsewhere, and used with more success, then passed along to a new group with less expertise.
The French page that was imitated is GIFAS, which claims more than 300 members, including contractors making satellites, missiles and other arms, as well as helicopters, military planes and engines.
Links to the fake page might have been sent via email to industry officials.
In the VFW's case, the hackers broke into the real Web page and inserted code shown to visitors that would lead to infection if they were using the right version of IE. FireEye said hundreds or thousands of infections occurred.
VFW spokeswoman Randi K. Law said the nonprofit group was working with law enforcement and private security incident responders.
"At this point, there is no indication that any member or donor data was compromised," she said in an email.
It was unclear whether that statement referred to the computers of website visitors or merely data stored by the VFW itself, and she did not respond to follow-up questions.
The FBI did not return a call seeking comment.
Source : Reuters


Clic here to read the story from its source.