Posts Tagged ‘URL security scanners’
Tuesday, April 10, 2012 @ 02:04 PM gHale
New Web-based malware attacks evade URL security scanners by checking for the presence of mouse cursor movement, researchers said.
The new drive-by download attacks are in the Russian Web space and don’t require user interaction to infect computers with malware, said security researchers from antivirus vendor ESET.
Most attacks of this type rely on hidden iframes injected into legitimate, but compromised websites, to redirect their visitors to the actual attack page. However the websites affected by this new campaign don’t exhibit such rogue elements.
It is a simple technique, but it suggests that cyber criminals are looking for more proactive ways to differentiate between human visitors and automated bots, so they can keep their attacks undetected for longer periods of time, the ESET researchers said. “It’s a natural evolution for drive-by download attacks to include malicious code employing proactive techniques for detecting real user activity and bypassing malware collecting systems.”
Like most drive-by download attack tools, Nuclear Pack attempts to exploit remote code execution vulnerabilities in unpatched versions of browser plug-ins such as Java, Adobe Reader or Flash Player, in order to infect victims’ computers with malware.
In this case, the Nuclear Pack installation attempts to exploit the CVE-2012-0507 Java vulnerability, patched in Java for Windows back in February and in Java for Mac last week, as well as a much older vulnerability in Adobe Reader, identified as CVE-2010-0188.
Users should make sure their browser plug-ins are always up to date when surfing the Web and they should run an antivirus program on their computers at all times, security experts advise.