Internet Explorer Flaw Generates Google Nation-State Attack Message
Microsoft issued a patch to address the vulnerability in IE, but the flaw triggering the warning message was not addressed.
Although the package of fixes includes a patch to address the vulnerability in IE, the flaw triggering the warning message was not addressed in the package.
"The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer," Microsoft explained in an advisory.
In order for a hacker to exploit the vulnerability, an IE user needs to land on an infected webpage. To steer traffic to such pages, cybercriminals will typically use phishing e-mails or instant messages containing links to the infected locations.
Until Microsoft patches the vulnerability, the company is offering a temporary solution that can be downloaded from its Technet website.
According to cybersecurity software maker Trend Micro, the vulnerability has prompted Google to issue warnings to some of its Gmail users. "Google is flagging attempts to exploit this vulnerability by noting 'Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer,'" it said in an e-mail to PCWorld.
"Reports show that this vulnerability has been used to compromise Gmail accounts," it added.
A number of Gmail users have reported on Twitter that they received the nation-state warning, but those tweets date back to days before the Microsoft advisory. Therefore, there's no way to know if they were triggered by the vulnerability or some other attack on Gmail users.
Google added the nation-state warning earlier this month. The warning doesn't mean that a Gmail account has been compromised, only that Google has detected that an account is under attack. Google declined to release details about how it knows one of its Gmail accounts is under attack.
The vulnerability in IE that allows the drive-by attacks is located in Microsoft XML Core Services. Microsoft XML Core Services provides a set of W3C compliant XML APIs that allows users to use Jscript, VBScript and Microsoft development tools to develop XML 1.0 standard applications, Trend Micro explained in a blog.
Using the vulnerability, it said, an attacker can craft a website to host a malicious webpage invoking affected MSXML APIs, which in turn accesses a COM object in memory that has not been initialized. The vulnerability is exploited when a user opens these crafted pages using IE.
Cyphort and Juniper Networks have announced a partnership to deal with advanced security threats.
Telco and IT services company, Telstra, has launched what it calls Asia's first Software-Defined Networking (SDN) platform, which will be made available to its customers globally. The move follows the company's recent acquisition of Pacnet.
Mobile users in the US are 1.3 times more likely to be struck by lightning than malware, new research has found.
Only 46 percent of organizations have confidence that their security teams can respond to complex threats, according to a new study by ISACA.