Hackers used previously unknown Internet Explorer flaw in new attacks

SAN FRANCISCO Fri Feb 14, 2014 7:01am IST

The Microsoft logo is seen on the wall of the company's branch in Prague March 17, 2013. REUTERS/David W Cerny/Files

The Microsoft logo is seen on the wall of the company's branch in Prague March 17, 2013.

Credit: Reuters/David W Cerny/Files

Related Topics

Stocks

   

SAN FRANCISCO (Reuters) - A previously unknown flaw in a recent version of Microsoft Corp's (MSFT.O) Internet Explorer web browser is being used to attack Internet users, including some visitors to a major site for U.S. military veterans, researchers said Thursday.

Security firm FireEye Inc (FEYE.O) discovered the attacks against IE 10 this week, saying that hundreds or thousands of machines have been infected. It said the culprits broke into the website of U.S. Veterans of Foreign Wars and inserted a link that redirected visitors to a malicious web page that contained the infectious code in Adobe Systems Inc's (ADBE.O) Flash software.

FireEye researcher Darien Kindlund said that the attackers were probably seeking information from the machines of former and current military personnel and that the campaign shared some infrastructure and techniques previously attributed to groups in mainland China.

He said planting backdoors on the machines of VFW members and site visitors to collect military intelligence was a possible goal.

A VFW spokeswoman didn't immediately respond to requests for comment.

A Microsoft spokesman said the company was aware of the "targeted" attacks and was investigating. "We will take action to help protect customers," said spokesman Scott Whiteaker.

The latest version of the browser is IE 11, which is unaffected, and a Microsoft security tool called the Enhanced Mitigation Experience Toolkit also protects users who have installed that.

Previously unknown flaws in popular software are a key weapon for hackers and are sold by the researchers who discover them for $50,000 or more, brokers say.

They are most often bought by defense contractors and intelligence agencies in multiple countries, but some of the best-funded criminal groups buy them as well.

(Editing by Cynthia Osterman)

FILED UNDER:
  • Most Popular
  • Most Shared

GOOGLE

Tech Showcase

Advanced Software

Advanced Software

Computer spying malware uncovered with 'stealth' features - Symantec.  Full Article 

Apple Settlement

Apple Settlement

Apple $450 mln e-book settlement gets final court approval.  Full Article 

Samsung Complain

Samsung Complain

Samsung files ITC complaint to block Nvidia chips from U.S. - Bloomberg.  Full Article 

Jeep SUVs

Jeep SUVs

Chrysler says it will speed up recall repairs for Jeep SUVs.  Full Article 

Internet Rules

Internet Rules

Any new U.S. Internet rules must withstand lawsuits - FCC chief.  Full Article 

Amazon's Plan

Amazon's Plan

Amazon plans ad-supported video streaming service - NY post.  Full Article 

Cellphone Upgrade

Cellphone Upgrade

Mobile phones to get handy upgrade.  Video 

Reuters India Mobile

Reuters India Mobile

Get the latest news on the go. Visit Reuters India on your mobile device.  Full Coverage