Microsoft acknowledged this week that Internet Information Server (IIS), a component of the Windows 2000 Server, and holes in the Internet Explorer Web browser are being used in widespread attacks that are compromising Web pages and using them as launching pads for malicious computer code.
Microsoft issued an alert late Thursday and posted a Web page with information on the attacks. The company urges customers to apply the latest security patches for both IIS and the Internet Explorer Web browser and increase the security settings on Internet Explorer browser. In an unusual move, Microsoft notes that users that are running its as-yet-unreleased Windows XP Service Pack 2 are protected.
The warnings from the Redmond, Washington, company came as antivirus and computer security experts say that an organized gang of Russian hackers are behind the attacks and are using the security holes in a coordinated, global attack to steal sensitive personal and financial information from customers of leading banking and e-commerce Web sites.
Malicious Files Spotted
Rumors of the attacks surfaced Thursday, after network administrators spotted malicious files on Windows 2000 machines running IIS version 5. Computer security experts are still analyzing the attacks, but have isolated files involved in the attack and how the malicious files are being spread from Web sites to customer machines, according to a message posted on The SANS Institute's Internet Storm Center.
The infected files have names such as Download_Ject_Symantec.doc, ipaddress.txt, issue.csv, ads.vbs, and agent.exe. They are placed in a Windows folder named "inetsrv." In addition, the configuration of IIS is changed, so that an option called "enable document footer," is turned on, according to the Internet Storm Center.
The Microsoft Web site encourages network administrators to apply a recent patch for IIS, MS04-011. Systems that did not have this patch may be vulnerable to the attacks, the company says. A previously unknown and unpatched (or "zero day") security vulnerability in IIS may also be to blame for the infections, says Ken Dunham, director of malicious code at iDefense.
How It Spreads
The code redirects the user's Web browser to a Russian Web site from which a Trojan horse program is unknowingly downloaded and installed on the user's system, according to Johannes Ullrich, chief technology officer at the Internet Storm Center.
That program contains a key-capture feature that can be used to steal password and credit card information from Web sessions, and forward those to the criminals behind the scam, experts say.
NetSec, which provides managed security services for large businesses and government agencies, began detecting suspicious traffic on several of its customers' networks related to the spreading exploit on Thursday morning, says Chief Technology Officer Brent Houlahan.
NetSec and the Internet Storm Center decline to name companies affected by the exploit, but both say that the problem is widespread. NetSec says that an online auction Web site, search engine site, and a comparison shopping site all were known to have infected visitors' computers with the malicious code.
Uncovering the Source
The exploits appear to be the work of an organized group of Russian hackers and are designed to harvest personal information that can be used for financial fraud, security experts say.
IDefense linked the malicious attacks to a group by a different name called the hangUP team, also from Russia and also believed to be responsible for the recent string of Korgo worms, Dunham says.
"These are hackers for hire and they commoditize every piece of information they capture. This was a very complicated and sophisticated attack," he says.
Security experts were still trying to determine Friday how IIS servers were compromised and whether applying the latest patches for IIS and Internet Explorer would protect users from the attacks.
"My gut feeling is [patching] doesn't protect you," Dunham says. "If I were a home user, I'd consider using another Web browser, like Mozilla, until a patch comes out," he says.