Security

Don't Kill the Messenger: Blaming IE for Attacks is Dangerous

In the wake of the attacks in China it has been determined that a zero-day flaw in Microsoft's Internet Explorer Web browser is one of the primary exploits used to compromise target systems. Germany, and now France, feel the solution is easy--stop using Internet Explorer. This simplistic approach is shortsighted and may create a false sense of security.

Blaming Internet Explorer

McAfee determined that the attacks originated from a zero-day exploit of Internet Explorer
The attacks against Google, and an array of other private corporations, political activists, and international journalists, which have led Google to consider shutting down operations in China completely, did use Internet Explorer as an attack vector.

McAfee CTO George Kurtz explains on his blog "In our investigation we discovered that one of the malware samples involved in this broad attack exploits a new, not publicly known vulnerability in Microsoft Internet Explorer."

It is worth noting that Kurtz used the phrase "one of the malware samples", implying that there are others and that additional attack vectors may be involved. There is a fair chance that Internet Explorer is not alone in enabling the attacks.

I asked Kurtz about initial speculation that the Adobe Reader zero day exploit patched by Adobe last week was involved. He responded "We have heard the rumors but have not confirmed nor analyzed any malware specific to these attacks that used Adobe Reader. I can only comment on the malware we have examined and there certainly could be other pieces of malware that have not yet been discovered. Additionally, it is common for an attacker to leverage one point of access as a pivot point, and attack other internal systems with different exploits specific to that operating system or application."

False Sense of Security

I asked Kurtz about the irony that Google, makers of the Chrome Web browser, could be compromised by a flaw in Internet Explorer. Shouldn't Google be using Chrome?

Kurtz replied "It is easy to come to that conclusion, but IE is ubiquitous and is used in almost every corporation. Keep in mind, there are many enterprise applications that only work with IE--so it is difficult to just mandate an alternate browser even if you are the creator of that browser."

Still, the problem with adopting the "abandon Internet Explorer" defense as a strategy is that it creates a false sense of security. Other browsers, applications, and operating systems can be breached as well--especially by attackers with a dedicated mission and sophisticated resources.

At the CANSEC West conference last year the Mac OS X operating system was compromised in a matter of seconds for the Pwn2Own contest using a zero-day exploit for the Safari Web browser. In an interview following the contest, the winner explained that "It's more about the operating system than the (target) program. Firefox on Mac is pretty easy too. The underlying OS doesn't have anti-exploit stuff built into it."

While research indicates that the Internet Explorer zero-day used in the attacks could be used on any version of Internet Explorer, even on Windows 7, the initial investigation suggests that the systems targeted were actually using Internet Explorer 6 on Windows XP. Simply using a current operating system and a current Web browser would have afforded significantly more protection.

Subscribe to the Security Watch Newsletter

Comments