Sign Up: Free Daily Tech E-letter  
Technology Home
Washtech
Tech Policy
   -Copyright
   -Cybercrime
   -E-Taxes
   -FCC
   -ICANN
   -Security
Government IT
Markets
Columnists
Personal Tech
Special Reports
Jobs

Advertisement
Company Postings
Get Quotes
Press Releases
Tech Almanac

Virus Designed to Steal Windows Users' Data
Hundreds of Web Sites Targeted

Advertisement


_____Correction_____
A June 26 article about a new computer virus mischaracterized one of the preventive measures suggested by the U.S. Computer Emergency Readiness Team, a division of the Department of Homeland Security. CERT said computer users could protect their machines by using a browser other than Microsoft Corp.'s Internet Explorer, but it did not endorse any particular alternatives.


_____What You Can Do_____
How to Protect Your Computer (washingtonpost.com, Jun 25, 2004)
_____Filter_____
WWW.Danger.Net Clever hackers have come up with another way to harass users of the Windows operating system, devising a way to hijack computers that visit certain Web pages.
_____On the Web_____
SANS - Internet Storm Center Warning (Compromised Web Sites Infect Web Surfers)
US-CERT Alert (IIS 5 Web Server Compromises)
_____Cyber-Security_____
Microsoft Releases New Batch of Patches (washingtonpost.com, Jul 13, 2004)
Microsoft Releases Update for Browser (The Washington Post, Jul 3, 2004)
Net Attack Aimed at Banking Data (The Washington Post, Jun 30, 2004)
More Security News
___Tech Policy/Security E-letter___
Written by washingtonpost.com's tech policy team, the e-mail version of this weekly feature includes an original news article and links to policy and cyber-security stories from the previous week.
Click Here for Free Sign-up
Read E-letter Archive


E-Mail This Article
Print This Article
By Brian Krebs
Special to The Washington Post
Saturday, June 26, 2004; Page A01

A new Internet virus has surfaced that allows hackers to steal passwords, credit card numbers and other personal information when someone merely visits an infected Web site, government computer security experts warned this week.

Hundreds of Web sites have been targeted by the virus, which exploits flaws in Microsoft Corp.'s Windows Internet software, according to an alert issued Thursday by the U.S. Computer Emergency Readiness Team (US-CERT), a division of the Department of Homeland Security.

Infected sites were programmed to connect people using the Microsoft Internet Explorer browser to a Web site that contains code allowing hackers to record what users type, such as passwords and credit card and Social Security numbers. The code then e-mails that information to the anonymous attackers.

Government officials would not identify the infected sites; computer security vendors said many have taken steps to fix the problem. In addition, most large Internet service providers have stopped forwarding Web traffic to the Russian Web site that apparently hosts the software that records what is typed, minimizing the theft of data, officials said.

Among the several Web sites hit by the virus, dubbed "js.scob.trojan" by one antivirus vendor, were the Web sites of the Kelley Blue Book automobile pricing guide and MinervaHealth Inc., a Jackson, Wyo., company that provides online financial services for hospitals and health care businesses.

Robyn Eckard, a spokeswoman for the Irvine, Calif.-based Kelley Blue Book, said the company learned about the problem late Wednesday after Web site visitors said their antivirus software tipped them off to the code. Eckard said Kelly Blue Book removed the malicious code from its site by late Thursday afternoon.

Jennifer Scharff, vice president of marketing for MinervaHealth, said some of the company's clients reported the problem on Thursday. The company has since fixed its site, she said. Scharff said no more than 50 visitors browsed the Web site during the time it was serving up the hostile code.

Stephen Toulouse, a security program manager at Microsoft, said the company does not believe the attack is widespread. "Nonetheless, we view this as a very real threat, with serious significance in terms of the potential impact on our customers," he said.

Toulouse said the company is gathering information on the attack and will hand it over to the FBI.

FBI spokesman Joe Parris declined to say whether the FBI is investigating the attack. "These types of Trojan horse attacks are not that uncommon, and we work closely with Microsoft in investigating matters of this type and always follow up on any information provided by industry," he said.

Security experts said the attack represents the latest variation on "phishing" scams, a form of fraud designed to trick people into giving personal data to criminals who have designed Web sites to look like those of respectable companies.

Ken Dunham, malicious code manager for iDefense Inc., a Reston-based computer security company, said he expects this kind of attack to become more widespread in coming weeks and months.

"These guys have the tools, techniques and motivation to launch highly sophisticated attacks that are very difficult for consumers to protect themselves against," he said. "Whoever is responsible has just seen how well this attack works, and other [hacker groups] are almost surely going to take notice."

Computers experts urged Internet users to install firewalls and antivirus software and to download the latest updates. A CERT alert said Explorer users also can protect themselves by turning off the JavaScript function in their browsers. That change, however, can impair Internet browsing since JavaScript is a programming language used to add interactive functions to many Web sites.

The attack takes advantage of several recently discovered security flaws in Microsoft's Internet browser and Internet Information Services Web software. Microsoft released a patch in April to fix one security hole in its Internet browser; the company is still working on a patch for the other flaw, which security researchers publicly detailed less than two weeks ago.

CERT recommends that Explorer users consider other browsers that are not affected by the attack, such as Mozilla, Mozilla Firefox, Netscape and Opera. Mac, Linux and other non-Windows operating systems are immune from this attack. For people who continue to use the Internet Explorer, CERT and Microsoft recommend setting the browser's security settings to "high," but that can impair some browsing functions.

Krebs is a staff writer for washingtonpost.com. Staff writer Michael Musgrove contributed to this report.


TechNews.com Home

© 2004 The Washington Post Company

Company Postings: Quick Quotes | Tech Almanac
About TechNews.com | Advertising | Contact TechNews.com | Privacy
My Profile | Rights & Permissions | Subscribe to print edition | Syndication