Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Trojan uses MS hole to hijack Web browsers
InfoWorld ^ | 10/02/03 | Paul Roberts

Posted on 10/03/2003 8:30:14 AM PDT by Salo

Trojan uses MS hole to hijack Web browsers Program changes DNS so that requests for popular sites bring visitors to one maintained by hacker instead

By Paul Roberts, IDG News Service October 02, 2003

Computer hackers have found another way to exploit an unpatched hole in Microsoft Corp.'s Internet Explorer Web browser, using a specially designed attack Web site to install a Trojan horse program on vulnerable Windows machines.

The Trojan program changes the DNS (Domain Name System) configuration on the Windows machine so that requests for popular Web search engines like www.google.com and www.altavista.com bring the Web surfer to a Web site maintained by the hackers instead, according to warnings from leading security companies.

The attacks are just the latest in a string of online scams that rely on an easy-to-exploit flaw in IE known as the "ObjectData" vulnerability. Earlier attacks that relied on the vulnerability include a worm that spreads using American Online Inc.'s Instant Messenger network.

Microsoft released a patch for the ObjectData vulnerability, MS03-032, in August. However, even machines that applied that patch are vulnerable to the latest attack because of holes in that security patch, according to a bulletin posted by Network Associates Inc.

The Trojan horse program is called Qhosts-1 and rated a "low" threat, Network Associates (NAI) said. Trojan horse programs do not attempt to find and infect other systems. However, they do give attackers access to a compromised computer, often allowing a remote hacker to control the machine as if he or she were sitting in front of it.

Microsoft issued a statement Thursday saying that it was investigating reports of exploits for a variation on a vulnerability originally patched in Microsoft Security Bulletin MS03-032 and would release a fix for that hole shortly. A company spokesman could not say when the patch update will be released.

The Redmond, Washington, company recommended that customers worried about attacks install the latest Windows updates and change their IE Internet security zone settings to notify the user when suspicious programs are being run.

Qhosts-1 was installed on vulnerable Windows machines using attack code planted in a pop-up ad connected to a Web page set up by the hackers on a free Web hosting site, www.fortunecity.com, NAI said. The DNS servers used in the attack resided on systems owned by Houston, Texas hosting firm Everyone's Internet, according to Richard Smith, an independent computer security consultant in Boston.

Those servers, as well as the fortunecity.com site used to install the Trojan, have been taken offline since the attack caught the attention of security experts. That will stop the DNS hijackings, but will also make it impossible for users on infected computers to browse the Web until their DNS configuration is restored, he said. However, as long as the Microsoft hole remains unpatched, similar attacks could be launched.

To be attacked, Windows machines had to be running Internet Explorer versions 5.01, 5.5 or 6.0, which contain the ObjectData vulnerability, and visit the Web site that launched the pop-up. The pop-up ad exploited the ObjectData vulnerability then downloaded the Qhosts-1 Trojan from a Web site in Seattle, Smith said.

Counterpane Internet Security Inc., of Cupertino, California, said in a statement that it was tracking three possible infections by the Qhosts-1 Trojan on networks that it monitors.

There are still questions about how users were lured to the fortunecity.com site that installed the Trojan, but unsolicited commercial ("spam") e-mail with links to the site was a likely suspect and economic gain was a likely motive, Smith said.

Hackers used the DNS changes to drive Web surfers to a site that launched a variety of pop-up advertisements, resulting in increased Web traffic and advertising revenue for the individuals behind the scheme, he said.

The latest attack is an example of the increasingly sophisticated strategies used by malicious hackers, who adopt the strategies of legitimate online businesses, cobbling together available Web technologies in a "Tinker Toy" fashion to create sophisticated attacks, Smith said.

By relying on a network of sites hosted on free and fee-based Internet hosting sites, hackers also make it more difficult for authorities to follow their tracks. Identity theft frequently plays a role in the latest scams as well. Hackers use stolen credit card information to set up hosting accounts which are then used as part of Internet based attacks, he said.


TOPICS: Business/Economy; Technical
KEYWORDS: computersecurity; lowqualitycrap; microsoft; security; trojan; windows
Navigation: use the links below to view more comments.
first 1-2021-33 next last
I can't wait until Explorer is secured.
1 posted on 10/03/2003 8:30:15 AM PDT by Salo
[ Post Reply | Private Reply | View Replies]

To: rdb3
Pinging the Penguin Pinger.
2 posted on 10/03/2003 8:30:51 AM PDT by Salo
[ Post Reply | Private Reply | To 1 | View Replies]

To: All
A Recall AND a Fundraiser? I'm toast.
Let's get this over with FAST. Please contribute!

3 posted on 10/03/2003 8:30:55 AM PDT by Support Free Republic (Your support keeps Free Republic going strong!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000; CheneyChick
Not sure if this applies to the Apple version of Explorer.
4 posted on 10/03/2003 8:31:39 AM PDT by Salo
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salo
Trojan uses MS hole to hijack Web browsers

A Trojan with a hole was responsible for at least one of my kids.

5 posted on 10/03/2003 8:32:44 AM PDT by TruthShallSetYouFree
[ Post Reply | Private Reply | To 1 | View Replies]

To: TruthShallSetYouFree
I'm *so* glad I don't have to patch *that* hole......

A Trojan with a hole was responsible for at least one of my kids.

6 posted on 10/03/2003 8:34:10 AM PDT by Salo
[ Post Reply | Private Reply | To 5 | View Replies]

To: Salo
Explorer will be secured when pigs fly. It's own construction forbids serious security - you could not have reliable security without changing the program entirely. Microsoft needs to re-code the browser from scratch, with security replacing OS integration as a priority.
7 posted on 10/03/2003 8:34:47 AM PDT by thoughtomator (tpaine says, "Don't post to me anymore." <-- guess he lost that argument. Don't kill babies, people!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salo
Trojan uses MS hole

I have a dirty mind!
8 posted on 10/03/2003 8:35:03 AM PDT by HuntsvilleTxVeteran (Illegal drug buyers and sellers support terrorisms !)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salo
There was a "FReeper help" thread yesterday (I think) from someone with this problem. Anyone remember who, I can't find the thread.
9 posted on 10/03/2003 8:37:45 AM PDT by The_Victor
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salo
Nope. Apple's cool!!!
10 posted on 10/03/2003 8:39:10 AM PDT by MrLee
[ Post Reply | Private Reply | To 4 | View Replies]

To: Salo
Hah! Good one!

I actually prefer IE's page rendering features, though I haven't really given much time to netscape's latest offering. But the only way I'll browse is by setting activex controls to 'prompt' instead of 'always run'. It's a pain in the butt, but I don't trust MS security inside of IE.
11 posted on 10/03/2003 8:42:12 AM PDT by flashbunny
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salo
even machines that applied that patch are vulnerable to the latest attack because of holes in that security patch

'blows is a total pos.

12 posted on 10/03/2003 8:46:50 AM PDT by tubavil
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salo
**IF** apple - linux - xenix - etc were the MOST POPULAR programs and MS was HARDLY EVER used ....

.... then you would see all these "flaws" in the other programs/systems.

A hacker is NOT going to waste his time on a second rate machine/program that very few people could even care for.

If someone came up with "Extreme Virus affect Commodore-64 Computers" WHO WOULD CARE? Only the C-64 users (YES! There still are some out there!)
13 posted on 10/03/2003 8:57:48 AM PDT by steplock (www.FOCUS.GOHOTSPRINGS.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salo
Trojan uses MS hole to hijack Web browsers Program changes DNS so that requests for popular sites bring visitors to one maintained by hacker instead.

They must be talking about Verisign.

14 posted on 10/03/2003 9:00:22 AM PDT by JoJo Gunn (Help control the Leftist population. Have them spayed or neutered.…©)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TruthShallSetYouFree
hehe...was waiting for that one...
15 posted on 10/03/2003 9:01:23 AM PDT by MD_Willington_1976
[ Post Reply | Private Reply | To 5 | View Replies]

To: steplock
So doesn't that mean MS should be even more cautious? BTW, it's not a "flaw" - it's a real-deal security hole. Again.

**IF** apple - linux - xenix - etc were the MOST POPULAR programs and MS was HARDLY EVER used then you would see all these "flaws" in the other programs/systems

16 posted on 10/03/2003 9:05:06 AM PDT by Salo
[ Post Reply | Private Reply | To 13 | View Replies]

To: MD_Willington_1976
Glad you smiled. Was expecting condomnation.
17 posted on 10/03/2003 9:09:48 AM PDT by TruthShallSetYouFree
[ Post Reply | Private Reply | To 15 | View Replies]

To: steplock
A hacker is NOT going to waste his time on a second rate machine/program that very few people could even care for.

It comes down to this: Microsoft has worked very hard to ensure its monopoly.

The problem is, in the computer world, a monopoly is the equivelent of the Dutch Elm. Does anyone remember Dutch Elms? They were the perfect tree . . did well no matter where they were planted, and they were planted all over cities and suburbs across America.

Then one day Dutch Elm disease came. And since Dutch Elms were everywhere, the disease spread quickly. And since there weren't a lot of trees in many places that weren'tDutch Elms, there were many many towns that suddenly had all their trees die.

Whether Windows is a great or horrid operating system is beyond the point. Hackers want their viruses going everywhere as quickly as possible. Since there is no OS diversity, they can accomplish this easily. Therefore, the Microsoft monopoly is a threat to America's computer infrastructure.

18 posted on 10/03/2003 10:46:22 AM PDT by libravoter (Live from the People's Republic of Cambridge)
[ Post Reply | Private Reply | To 13 | View Replies]

To: libravoter
**IF** apple - linux - xenix - etc were the MOST POPULAR programs and MS was HARDLY EVER used then you would see all these "flaws" in the other programs/systems

If you had Apple AND Linux AND Xenix all competing as major players as opposed to JUST Microsoft, no one person would be able exploit a "flaw" on so many machines at once.

19 posted on 10/03/2003 10:48:20 AM PDT by libravoter (Live from the People's Republic of Cambridge)
[ Post Reply | Private Reply | To 18 | View Replies]

To: Salo
Latest news is that software maker Valve, who made the game Half-life, had the entire source code to Half-life 2 ripped off due to this exploit. Don't ask me why they would be so stupid as to use Outlook.
20 posted on 10/03/2003 11:23:01 AM PDT by sigSEGV
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-33 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson