Cybercriminals
are actively exploiting a critical vulnerability in Internet Explorer 7,
which arises from the browser's improper handling of errors when attempting to
access deleted objects. This vulnerability allows remote attackers to execute
arbitrary codes on a vulnerable machine. The threat starts with a spammed
malicious .DOC file detected as XML_DLOADR.A. This file has a very limited
distribution script, suggesting it may be a targeted attack. It contains an
ActiveX object that automatically accesses a site rigged with a malicious HTML
detected by the Trend Micro Smart Protection Network as HTML_DLOADER.AS.
HTML_DLOADER.AS exploits the CVE-2009-0075 vulnerability, which is already
addressed by the MS09-002 security patch released last week. On an unpatched
system though, successful exploitation by HTML_DLOADER.AS downloads a backdoor
detected as BKDR_AGENT.XZMS. This backdoor further installs a .DLL file
that has information stealing capabilities. It sends its stolen information to
another URL via port 443.
If you are current on
your patches, you are fine. If not...well, you know the drill.
Update: Analysis by Trend Micro researchers reveal that BKDR_AGENT.XZMS
takes screenshots of the infected system and sends these screenshots to a remote
malicious location. It also creates a hidden Internet Explorer window which
connects to a website to listen for commands.