Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Microsoft Security Communications Encryption Network Networking Operating Systems Privacy Software The Internet Windows News Technology

Drive-By Exploits Pushing Ransomware Now Able To Bypass Microsoft EMET (arstechnica.com) 52

An anonymous reader writes from a report via Ars Technica: Ars Technica reports that drive-by attacks that install the TeslaCrypt crypto ransomware are now able to bypass Microsoft's Enhanced Mitigation Experience Toolkit (EMET), which is designed to block entire classes of Windows-based exploits. The EMET-evading attacks are included in Angler, a toolkit for sale online that provides ready-to-use exploits that can be stitched into compromised websites. Researchers from FireEye published a blog post Monday that says the new Angler attacks are significant because they're the first exploits found in the wild that effectively pierce the mitigations. The exploits' code is based on the Adobe Flash and Microsoft Silverlight browser plugins that bypass data execution prevention, a protection that prevents computers from running data loaded into memory. The new Angler exploits rely on techniques other than Data Execution Prevention (DEP) that are harder to detect and contain fewer limitations. FireEye researchers have observed the exploits working only on Windows 7 and not on Windows 10, which is more resistant to exploits. They also only work when targeted computers have either Flash or Silverlight installed. Microsoft created EMET to largely block entire classes of memory-based software exploits that had existed for decades. Now, Angler developers have struck back with techniques that can undo some of those protections. Recently, the TeslaCrypt ransomware makers closed down shop and released a master key and an apology.
This discussion has been archived. No new comments can be posted.

Drive-By Exploits Pushing Ransomware Now Able To Bypass Microsoft EMET

Comments Filter:
  • My question (Score:3, Insightful)

    by TheDarkener ( 198348 ) on Monday June 06, 2016 @09:25PM (#52263807) Homepage

    Why does Adobe Flash and Microsoft Silverlight browser plugins bypass data execution prevention?

  • Comment removed based on user account deletion
  • That was my one reason for Silverlight.
    Flash disabled for awhile now just too damn dangerous.

  • Microsoft has lots of money. Why don't they just actively buy these exploits as they hit the market (through an 'agent' if they must), reverse engineer them, update EMET & issue a patch that closes the flaw, and move on, long before anyone is hacked ???

"It's the best thing since professional golfers on 'ludes." -- Rick Obidiah

Working...