Running Internet Explorer?

Be careful where you surf -- there is a new exploit out there. From the Microsoft Security TechCenter:
Microsoft Security Advisory 2963983
Vulnerability in Internet Explorer Could Allow Remote Code Execution

Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11.

The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.

On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.
This is the classic sort of thing that those people still using XP on the net will find themselves vulnerable to. An anti-virus program will simply not prevent your system from being taken over. The classic example is when you receive an email from someone you know and there is minimal text in the content, just a URL to an unfamiliar site. Do not click on that link as it probably points to an infected site. Email the sender asking them if they sent that email and let them know that they have been infected. Here is a list of things to do that I wrote two weeks ago:
#1 - disconnect your system from the internet... NOW...
#2 - find a second system to use to download some files
#3 - get these downloads (all are free):
http://www.malwarebytes.org/mwb-download/

http://www.malwarebytes.org/antirootkit/

http://usa.kaspersky.com/downloads/TDSSKiller

http://www.sophos.com/en-us/products/free-tools/sophos-anti-rootkit.aspx
copy them onto a memory card or CD ROM or something.
#4 - Boot into Windows Safe Mode / no networking (reboot the machine and hit [F8] as the system is restarting).
#5 - install and run the apps in the order I listed them. Some of them will ask to download the latest databases - do not do this, just go for the complete scans first.
These apps should find what has infected your system. Jot down the names and then go and Google them after this is all over -- you can learn how you got infected in the first place.
#6 - if these apps have __not__ found anything, consider reinstalling Win7 and starting over again. If there are files you want to copy before wiping the disk, use the excellent SystemRescueCD to do this -- copy your user files onto a stand-alone hard drive:
http://www.sysresccd.org/SystemRescueCd_Homepage
Burn a copy of this file onto a CD-ROM and boot your system from it -- it will run a very simple version of Linux and it has a lot of file copy functions. To get the graphical user interface when it is done booting, just type " startx " at the command prompt. The little icon at the bottom left of the screen is your start menu.
#7 - when you are done running the apps, reboot your system normally (no [F8]) and run them again. This time, let them get the updated databases.

October 2022

Sun Mon Tue Wed Thu Fri Sat
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31          

Environment and Climate
AccuWeather
Cliff Mass Weather Blog
Climate Depot
Ice Age Now
ICECAP
Jennifer Marohasy
Solar Cycle 24
Space Weather
Watts Up With That?


Science and Medicine
Junk Science
Life in the Fast Lane
Luboš Motl
Medgadget
Next Big Future
PhysOrg.com


Geek Stuff
Ars Technica
Boing Boing
Don Lancaster's Guru's Lair
Evil Mad Scientist Laboratories
FAIL Blog
Hack a Day
Kevin Kelly - Cool Tools
Neatorama
Slashdot: News for nerds
The Register
The Daily WTF


Comics
Achewood
The Argyle Sweater
Chip Bok
Broadside Cartoons
Day by Day
Dilbert
Medium Large
Michael Ramirez
Prickly City
Tundra
User Friendly
Vexarr
What The Duck
Wondermark
xkcd


NO WAI! WTF?¿?¿
Awkward Family Photos
Cake Wrecks
Not Always Right
Sober in a Nightclub
You Drive What?


Business and Economics
The Austrian Economists
Carpe Diem
Coyote Blog


Photography and Art
Digital Photography Review
DIYPhotography
James Gurney
Joe McNally's Blog
PetaPixel
photo.net
Shorpy
Strobist
The Online Photographer


Blogrolling
A Western Heart
AMCGLTD.COM
American Digest
The AnarchAngel
Anti-Idiotarian Rottweiler
Babalu Blog
Belmont Club
Bayou Renaissance Man
Classical Values
Cobb
Cold Fury
David Limbaugh
Defense Technology
Doug Ross @ Journal
Grouchy Old Cripple
Instapundit
iowahawk
Irons in the Fire
James Lileks
Lowering the Bar
Maggie's Farm
Marginal Revolution
Michael J. Totten
Mostly Cajun
Neanderpundit
neo-neocon
Power Line
ProfessorBainbridge.com
Questions and Observations
Rachel Lucas
Roger L. Simon
Samizdata.net
Sense of Events
Sound Politics
The Strata-Sphere
The Smallest Minority
The Volokh Conspiracy
Tim Blair
Velociworld
Weasel Zippers
WILLisms.com
Wizbang


Gone but not Forgotten...
A Coyote at the Dog Show
Bad Eagle
Steven DenBeste
democrats give conservatives indigestion
Allah
BigPictureSmallOffice
Cox and Forkum
The Diplomad
Priorities & Frivolities
Gut Rumbles
Mean Mr. Mustard 2.0
MegaPundit
Masamune
Neptunus Lex
Other Side of Kim
Publicola
Ramblings' Journal
Sgt. Stryker
shining full plate and a good broadsword
A Physicist's Perspective
The Daily Demarche
Wayne's Online Newsletter

About this Entry

This page contains a single entry by DaveH published on April 27, 2014 3:58 PM.

Malthusians in the news - a good perspective was the previous entry in this blog.

Waterboarding is the next entry in this blog.

Find recent content on the main index or look in the archives to find all content.

Monthly Archives

Pages

OpenID accepted here Learn more about OpenID
Powered by Movable Type 5.2.9