× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Lee,

Here's the e-mail on that special Microsoft email hole.

--Alan


----- Original Message -----
From: "Neil Palmer" <neilp@dpslink.com>
To: <midrange-nontech@midrange.com>
Sent: Wednesday, August 14, 2002 4:39 PM
Subject: Another gaping security hole in Microsoft IE


> 1. DEF CON TEAM DEMONSTRATES MICROSOFT IE TROJAN SETIRI
>
>
> From:
> *************** Club Tech Networking Tips Newsletter ***************
> A Penton Publication
> http://www.iSeriesNetwork.com                http://www.e-ProMag.com
> Issue 35                                             August 14, 2002
>
>
> 1. DEF CON TEAM DEMONSTRATES MICROSOFT IE TROJAN SETIRI
> Def Con is the infamous conference of underground "security
> specialists" (a.k.a. "hackers") that has become the annual venue for
> the alarming announcement of new security weaknesses. At this year's
> conference -- the 10th -- in Las Vegas, a team of three South African
> security consultants reported a flaw in Microsoft's Internet Explorer
> that lets them breach the security of virtually any firewall-protected
> network.
>
> The security breach uses a Trojan horse program, which is a program
> designed to look like something innocuous, but which actually carries
> a dangerous cargo to the deepest recesses of your protected network.
> The consulting trio, Roelof Temmingh, Haroon Meer, and Charl van der
> Walt, wrote a demonstration version of the Trojan horse program,
> called Setiri, and demonstrated it at the conference.
>
> Setiri propagates like many viruses -- via e-mail or an indiscreet Web
> download. Unlike a virus, however, it doesn't replicate itself.
> Instead, it opens an invisible window in IE that then connects to a
> secret Web server via an anonymous Web proxy called Anonymizer.com.
> Once Setiri reaches its mother ship, it can execute arbitrary commands
> on the infected user's computer, allowing it to do such things as
> install keystroke logging software or extract sensitive data files
> (such as password registries). By using Anonymizer.com, the identity
> of the mother ship site is hidden.
>
> Perhaps the most astounding fact about this demonstration is that
> Setiri does not exploit a hitherto-unrevealed Microsoft bug, as many
> prior viruses and Trojans have done. No, Setiri uses only standard
> features built into IE. Microsoft routinely uses the invisible window
> feature of IE to send surreptitious e-mails from a user's computer
> back to its own mother ship, Microsoft.com.
>
> Many people have warned for years that such Microsoft "back door"
> features can be uncovered and exploited by hackers. This is yet
> another instance of Microsoft inflicting damage on its own users
> through bad software architecture. Despite the fact that Roelof and
> his colleagues promise not to release their Trojan onto the Internet,
> the very fact that they have produced the program has spurred others
> to duplicate their work. At the same conference, a hacker in the
> audience claimed to have already produced a similar poison pill.
>
> For its part, Microsoft has reportedly acknowledged the invisible
> window problem and promised to look into a fix. In the meantime, you
> use IE at your own risk.
>
> Biographical information for the Setiri developers and an abstract of
> their presentation is available online at
>
> http://www.defcon.org/dcx-speakers.html .
>
>
> ___________________________
> Copyright 2002, Penton Technology Media
> http://www.iSeriesNetwork.com
> http://www.e-ProMag.com
>
>
> _______________________________________________
> This is the Non-Technical Discussion about the AS400 / iSeries
(Midrange-NonTech) mailing list
> To post a message email: Midrange-NonTech@midrange.com
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-nontech
> or email: Midrange-NonTech-request@midrange.com
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/midrange-nontech.
>
>



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.