website statistics

A new zero-day Internet Explorer 8 vulnerability was recently used by hackers to install trojans on systems of Dept. of Labour employees.

What is the next Gadget you want?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading ... Loading ...

A security firm recently found out that a zero-day vulnerability in Internet Explorer 8 has been used by hackers to install malicious trojans on the systems of nuclear weapons researchers and Department of Energy employees. Microsoft has confirmed the exploit and has provided guidelines on how to patch the exploit.


Internet Explorer 8

Interestingly, the zero-day exploit that has been found in Internet Explorer 8 is not found in any of the earlier or later versions of the browser. That is precisely why, Microsoft has advised the users to upgrade to later versions of the browser, so as to avoid incurring any harm due to the exploit.

Since the attack was directed at such employees who are directly involved with nuclear weapons, there are hints that it originated somewhere outside of the U.S. The attack involved compromising the U.S. Department of Labor website, which was then used as the home base to redirect users to other malicious links.

The exact web pages that were eventually hacked, were about such employees or contractors who have incurred different illnesses while working on atomic weapons. Once the computers of these employees were compromised due to the IE 8 exploit, a well-known trojan ‘Poison Ivy’ was installed on their machines. The trojan had been modified so that it could be detected only by 2 of the top 46 antivirus software. This essentially means that the attack was very sophisticated.

While such users who can update their browser from IE 8 to IE 9 or IE 10 are safe from the exploit, others who are not able to update their browser must follow these guidelines:

  • Set Internet and local intranet security zone settings to “High” to block ActiveX Controls and Active Scripting in these zones
    This will help prevent exploitation but may affect usability; therefore, trusted sites should be added to the Internet Explorer Trusted Sites zone to minimize disruption.
  • Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and local intranet security zones
    This will help prevent exploitation but can affect usability, so trusted sites should be added to the Internet Explorer Trusted Sites zone to minimize disruption.

Source: Invincea

Courtesy: Arstechnica

Buy Cheapest Related Product From Amazon.com


Facebook Can Lead To Psychosis, Reveals Study

Indiegogo Campaign Launched For Gathering Money To Help Survivors Of Savar Garments Tragedy
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On May 5, 2013(11 months, 17 days ago.)
  • Tsais

    One would expect nuclear weapons researchers to be too smart to use IE, no?

    I had thought this kind of physics required a high IQ…


Recent Search

Recent Tutorials

At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Do you want to record Skype calls but don't know how to do that? Then this guide is absolutely for you. Get inside the article for details.
Do you know that many companies can track you on Facebook? Do you want to know who they are? Do you want to block them?
So you've been planning on replacing your old hard drive with the new drive? This tutorial helps you with a few simple steps.
Bitcoin is a digital currency that has gained extraordinary momentum in the last few months. This tutorial helps you get started with the basics.
Android lockscreen can be secured in a number of ways, some of which are described in this brief tutorial.
This review of iSkysoft Video Converter tells you everything you want to know about this Win 8/7 compatible video/DVD tool. Check the below to learn more details.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook