IE6/7 zero-day exploit code heading for the masses

11/03/2010
G DATA Blog

The Israeli hacker Moshe Ben Abu published exploit code that takes advantage of a vulnerability in Internet Explorer 6/7 not 24 hours after Microsoft gave out Security Advisory 981374. Attackers are expected to adopt the exploit and use it in massive attacks targeting a broader audience.

Ben Abu said he found the exploit code for CVE-2010-0806 in-the-wild on the server www.topix21century.com, one of the domains used in the ongoing spear phishing attacks. The hacker indicated in a statement to ZDNet that he found the malicious page after browsing the domain that was mentioned by a McAfee blog post describing the targeted attack. After analyzing the attack, Ben Abu released a Metasploit module recreating the exploit and announced it via Twitter. Metasploit quickly integrated the module into their official repository, extending the armory of the point-and-click attack tool. Researchers of the G Data SecurityLabs were able to independently retrace the steps of the Israeli hacker and finally ended up with a working PoC-exploit.

 

The story of CVE-2010-0806 bears a certain similarity to the developments in the case of the targeted 'Aurora' attack where the exploit techniques were quickly adopted by the authors of web exploit kits for the use in massive web attacks.