1 min read

Having fun with Flash

Bogdan Botezatu

October 17, 2008

Promo Protect all your devices, without slowing them down.
Free 30-day trial
Having fun with Flash

However, not only Flash websites are targeted this week. Our friend, the iframe is alive and kicking again. 

Trojan.JS.IFrame.ACN

Yet another iframe hack for making
legitimate websites spread malware. This javascript tries to push
Trojan.Exploit.ANNZ
to the users, which was described in last weeks review. The technique used to
infect legitimate websites with such e-threats is generally SQL Injection
however in this case no such website was detected. Only the one hosting the ANNZ
Exploit is known to spread it in the wild, for now

 

Exploit.SWF.C

This flash file basically replaces the
JavaScript part found in Exploit.SWF.Gen
which used to serve a maliciously crafted SWF file considering the flash
version installed on the victims computer. After successful exploitation any
action is possible but until now, this exploit is known to download and execute
some version of Trojan.PWS, a password stealing e-threat.

 

Trojan.Exploit.JS.O

This malware is part of the infection chain
described a couple of weeks ago when Trojan.Exploit.SSX showed
up. This time however, this JavaScript is not only a new encryption layer used
for obfuscation (hiding from antivirus software) it also comes with two new
additional exploits:

– multiple stack based overflows
in an ActiveX control installed by the Lianzong Game Platform v2.6.1.29 which
allows remote attacker to execute arbitrary code


integer overflow present in
Adobe Flash Player up until version 9.0.124.0, which has been already used on
so many ocations (Exploit.SWF.C, Exploit.SWF.Gen)

Information in
this article is available courtesy of BitDefender virus researchers:

Daniel
Chipiristeanu

Sorin Ciorceri

tags


Author



You might also like

Bookmarks


loader