Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Malicious JavaScript Strikes Getting Smarter

Manipulating JavaScript is becoming more intelligent. They can easily scan unsuspecting users' browsers, endangered sections and user-friendly CLSIDs, and distribute customized malware, alleged Dr. Jose Nazario, Arbor Networks' senior security engineer in Physorg on April 19, 2007.

Countless incursions employ JavaScript. Primarily hackers exploited the simple JavaScript but now that has altered, Nazario stated, in Enn's April 19, 2007 issue.

Nazario has detected an encrypted script function named "makemelaugh" that downloads a Trojan to ensnare banking details and a Paris Hilton Flash animation that fixes a device rendering the computer a botnet component.

Exploited JavaScript can be implanted in webpages and usually executes without forewarning while the page is being seen. Hackers could attempt to entice you to their spoofed site. An invasion could also creep around a reliable site by manipulating a common bug called cross-site scripting.

For safeguarding against exploiting JavaScript, visitors can disenable JavaScript but that can affect several sites. They also employ other security devices.

NeoSploit, the recent malware Nazario's encountered among viruses can convey a minimum of seven different malwares to affect a computer, chosen according to that computer's flaws.

"Numerous such episodes have been witnessed over the past few months, with several manipulating JavaScripts on the loose. Users are becoming more protective and hostile towards JavaScript" as reported in Physorg's 19th April 2007 publication.

Nazario stated this in a conference on reverse-engineering JavaScript malware at the CanSecWest security exposition on April 18. By alleging that hackers were exploiting JavaScript more cautiously he implied that investigators are progressively discovering access codes utilizing more advanced tools to disguise it so that the malware can bypass security measures.

The jumbled code can be deciphered very easily as it uses simple Base64 encryption for camouflage, instead of real encoding, Nazario stated. He recommended SpiderMonkey, NJS, and Rhino as devices to probe script code. Flash files can be examined using software named Flasm.

He further stated, "Life isn't forever so simple. Several protective JavaScript, codes are surfacing everyday that can destroy every type of scrutiny measures." Nazario asserted, in a report issued in Physorg's April 19, 2007 copy.

Related article: Malicious Scripts with Zero-byte Padding can Pass Undetected

» SPAMfighter News - 4/25/2007

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next