Security Pros Warn of Drowning in IE 'Watering Hole' Attack
has confirmed a report of an Internet Explorer zero-day exploit. Redmond also confirmed it is being leveraged in an active campaign attack. Version 10 of IE is reportedly vulnerable to the so-called watering hole attack.
“FireEye Labs has identified a new Internet Explorer (IE) zero-day exploit hosted on a breached Web site based in the U.S.,” FireEye wrote in a blog post on Thursday. “It’s a brand new zero-day that targets IE 10 users visiting the compromised Web site -- a classic drive-by download attack. Upon successful exploitation, this zero-day attack will download a XOR encoded payload from a remote server, decode and execute it.”
How the Watering Hole Works
FireEye first discovered what it has dubbed “Operation Snowman” on Feb. 11. The zero-day exploit targets CVE-2014-0322 and is being served up from the U.S. Veterans of Foreign Wars’ Web site.
“We believe the attack is a strategic Web compromise targeting American military personnel amid a paralyzing snowstorm at the U.S. capitol in the days leading up to the Presidents Day holiday weekend,” the firm reported. “Based on infrastructure overlaps and tradecraft similarities, we believe the actors behind this campaign are associated with two previously identified campaigns.”
No Out-of-Band Patch Required
We caught up with Tyler Reguly, manager of security for Tripwire, to get his take on the zero day. He told us past versions of IE have earned a bad reputation for IE and news reports of new zero-days like this one don't help.
“The truth is that recently, IE has had fewer issues per year than other browsers,” he said. “It's just a common target due to the number of users it has.”
Reguly said Websense and FireEye have both released details on the zero-day with different noted targets, which makes him wonder if other sites are affected and how wide spread the exploit code is. He suspects we'll start to see more now that it's publicly discussed.
“While I'd normally be the first to call for an out-of-band Microsoft patch, I don't think this attack requires one,” Reguly said. “Users should upgrade to IE 11 and if they're stuck on 10 (i.e., Vista), they should install EMET because the exploit code will terminate if it sees that the Enhanced Mitigation Experience Toolkit (EMET) is installed.”