website statistics

A new zero-day Internet Explorer 8 vulnerability was recently used by hackers to install trojans on systems of Dept. of Labour employees.
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...

A security firm recently found out that a zero-day vulnerability in Internet Explorer 8 has been used by hackers to install malicious trojans on the systems of nuclear weapons researchers and Department of Energy employees. Microsoft has confirmed the exploit and has provided guidelines on how to patch the exploit.


Internet Explorer 8

Interestingly, the zero-day exploit that has been found in Internet Explorer 8 is not found in any of the earlier or later versions of the browser. That is precisely why, Microsoft has advised the users to upgrade to later versions of the browser, so as to avoid incurring any harm due to the exploit.

Since the attack was directed at such employees who are directly involved with nuclear weapons, there are hints that it originated somewhere outside of the U.S. The attack involved compromising the U.S. Department of Labor website, which was then used as the home base to redirect users to other malicious links.

The exact web pages that were eventually hacked, were about such employees or contractors who have incurred different illnesses while working on atomic weapons. Once the computers of these employees were compromised due to the IE 8 exploit, a well-known trojan ‘Poison Ivy’ was installed on their machines. The trojan had been modified so that it could be detected only by 2 of the top 46 antivirus software. This essentially means that the attack was very sophisticated.

While such users who can update their browser from IE 8 to IE 9 or IE 10 are safe from the exploit, others who are not able to update their browser must follow these guidelines:

  • Set Internet and local intranet security zone settings to “High” to block ActiveX Controls and Active Scripting in these zones
    This will help prevent exploitation but may affect usability; therefore, trusted sites should be added to the Internet Explorer Trusted Sites zone to minimize disruption.
  • Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and local intranet security zones
    This will help prevent exploitation but can affect usability, so trusted sites should be added to the Internet Explorer Trusted Sites zone to minimize disruption.

Source: Invincea

Courtesy: Arstechnica

Buy Cheapest Related Product From Amazon.com


Facebook Can Lead To Psychosis, Reveals Study

Indiegogo Campaign Launched For Gathering Money To Help Survivors Of Savar Garments Tragedy
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On May 5, 2013(3 years, 1 month ago.)

You May Also Like:

What Do You Think?

1 Response

  1. Tsais Says:

    One would expect nuclear weapons researchers to be too smart to use IE, no?

    I had thought this kind of physics required a high IQ…

    Posted on May 6th, 2013 at 6:48 PM

Leave a Reply




Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

Perhaps, you are new Apple user and you might have no idea how to change name of your iPhone. Check out this tutorial to change the name.
Check out this tutorial to lock Android phone using PIN code, Password or Pattern. Following the easy steps, you can secure your smartphone.
If you could not figure out yet, how to save and send GIF from your iPhone, then this tutorial is just for you.
Google released 'Ambient Display' feature with Android 5.x Lollipop. Check the tutorial to know how to turn off Android’s Ambient Display .
Have you recently got your 3D Touch iPhone 6s and struggling to delete apps? Go through the tutorial to learn how to delete or move the apps.
Just read this tutorial by yourself and from now on, we will show you, how you can make your iOS device read text loudly for you.
If you're still struggling to take selfie on iPhone then check it out to know how to take photos from far using iPhone's headset as a remote.
Even if your iPhone is locked, people can reply from the lock screen. Check out, how to turn off the quick reply message from locked screen.
Have you forgot Apple ID password or having trouble signing in? Check out this tutorial to reset the password.
Even if iPhone is muted, still Siri's voice is loudly chime. Now you can change the setting to silence Siri using your iPhone's mute switch.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook