Good and bad news for victims of targeted attacks against Microsoft products

Posted by   Virus Bulletin on   Nov 6, 2013

Bug bounty program extended; TIFF zero-day used in the wild.

This week, Microsoft has good news and bad news for those targeted by zero-day exploits in its products.

The bad news is that a new zero-day exploit has been discovered in a graphics library that is used by Office 2010. To exploit the vulnerability, an attacker has to send the victim an Office document that contains a specially crafted TIFF image. The exploit is believed only to work on systems running Windows XP or Windows Server 2003.

Microsoft says it is aware of the exploit being used in targeted attacks "largely in the Middle East and South Asia". Meanwhile, Alienvault's Jaime Blasco has more details on the exploit being used against Pakistani targets.

A patch for the vulnerability, which has been given identifier CVE-2013-3906, is not yet available, but Microsoft has released a Fix it. It also recommends deploying the Enhanced Mitigation Experience Toolkit (EMET). (Those who saw Jarno Niemela's VB2013 presentation will know that EMET is an effective defence against most targeted attacks.)

But there is also good news for those who fall victim to zero-day exploits: they may be eligible to receive money in Microsoft's bug bounty program.

Microsoft was rather late in joining the game of awarding bug bounties to those who discover vulnerabilities in its software, but when it did introduce a bug bounty program earlier this year, it promised to award up to US$100,000 for those who found novel exploitation techniques against its latest operating system. (And the company has actually awarded a researcher the maximum amount.)

Microsoft will now extend the program to include those who discover these techniques being used in the wild. So if you are a victim of such an attack, or you are investigating one, and you tell Microsoft how it is done, you could earn a whopping US$100,000. Moreover, if you also submit a "qualifying defence idea", you could be eligible for another $50,000.

Writing about the program, Microsoft Senior Security Strategist Katie Moussouris says:

"We want to learn about these rare new exploitation techniques as early as possible, ideally before they are used, but we'll pay for them even if they are currently being used in targeted attacks if the attack technique is new - because we want them dead or alive."

CVE-2013-3906 won't be the last time a vulnerability in a Microsoft product is exploited in the wild prior to being known about by the company and, like many of its infamous predecessors, we can expect it to find its way into cybercrooks' toolkits. But with this new bounty program, Microsoft has demonstrated that it really wants to make sure that those who follow best practices are exposed to these vulnerabilities for as short a time as possible. And for that it deserves full praise.

Posted on 06 November 2013 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: APT cases exploiting vulnerabilities in region-specific software

At VB2019, JPCERT/CC's Shusei Tomonaga and Tomoaki Tani presented a paper on attacks that exploit vulnerabilities in software used only in Japan, using malware that is unique to Japan. Today we publish both their paper and the recording of their…

New paper: Detection of vulnerabilities in web applications by validating parameter integrity and data flow graphs

In a follow-up to a paper presented at VB2019, Prismo Systems researchers Abhishek Singh and Ramesh Mani detail algorithms that can be used to detect SQL injection in stored procedures, persistent cross-site scripting (XSS), and server‑side request…

VB2020 programme announced

VB is pleased to reveal the details of an interesting and diverse programme for VB2020, the 30th Virus Bulletin International Conference.

VB2019 paper: Cyber espionage in the Middle East: unravelling OSX.WindTail

At VB2019 in London, Jamf's Patrick Wardle analysed the WindTail macOS malware used by the WindShift APT group, active in the Middle East. Today we publish both Patrick's paper and the recording of his presentation.

VB2019 paper: 2,000 reactions to a malware attack – accidental study

At VB2019 cybercrime journalist and researcher Adam Haertlé presented an analysis of almost 2000 unsolicited responses sent by victims of a malicious email campaign. Today we publish both his paper and the recording of his presentation.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.