Hash: SHA1

Update: New Trojan Exploits Microsoft Bug

,----[ Quote ]
| Tuesday, Microsoft Corporation released an emergency security update more
| than two weeks ahead of the company’s regular time of the month when update
| patches are issued, notifying of a vulnerability that could allow worms and
| trojans to run malicious codes on affected by the security hole machines.
| The first patch released outside Microsoft’s mainstay update cycle in
| eighteen months revealed the bug was apt to render attackers to remotely take
| full control of an infected system.


Trojan targets Microsoft's emergency fix

,----[ Quote ]
| There are reports emerging Friday morning of a new Trojan exploiting the
| MS08-067 RPC vulnerability in Windows that Microsoft patched with an
| emergency fix yesterday. Known as Gimmiv.A, the Trojan propagates
| automatically through networks, and also installs a number of small programs
| on compromised machines. But its most worrisome capability is a feature that
| enables Gimmiv.A to find cached passwords in a number of locations and then
| send them off to a remote server. Before sending the data, the Trojan
| encrypts the passwords with AES encryption.



Microsoft RPC exploit could be a packaged deal

,----[ Quote ]
| While Microsoft has labeled Thursday's emergency patch MS08-067 as "critical"
| and provided a rare out-of-cycle fix because its exploit could easily be used
| as worm on a compromised network, one security researcher doesn't think it
| will happen that way.
| "It's likely we're going to see this packaged with some other attack." said
| Ben Greenbaum, senior research manager at Symantec. "A Web-based attack, for
| example. We're looking out for are exploits of this being bundled with
| client-side exploits or Trojans so that the worm can get past corporate
| firewalls and get behind that firewall into the internal network."


Trojan attacks Microsoft's emergency patch vuln

,----[ Quote ]
| A day after Microsoft released an emergency patch for a critical flaw that
| could allow self-replicating attacks, researchers have identified a nasty
| trojan that attempts to exploit the vulnerability.


Version: GnuPG v1.4.9 (GNU/Linux)