Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Microsoft Confirms Excel Zero-Day Attack 199

Guglio writes "Eweek has a story about a new, undocumented Excel flaw that is being used in a targeted attack against an unnamed business. The latest zero-day attack comes just two days after Patch Tuesday (coincidence?) and less than a month after a very similar, 'super, super targeted attack' against business interests overseas. The back-to-back zero-day attacks closely resemble each other and suggest that well-organized criminals are conducting corporate espionage using critical flaws purchased from underground hackers."
This discussion has been archived. No new comments can be posted.

Microsoft Confirms Excel Zero-Day Attack

Comments Filter:
  • unnamed business (Score:1, Insightful)

    by Anonymous Coward on Friday June 16, 2006 @11:47AM (#15549203)
    Anyone have any clue what is under attack?
  • by Thunderstruck ( 210399 ) on Friday June 16, 2006 @11:49AM (#15549217)
    Well organized criminals conducting corporate espionage, complex software running international corporations, (hackers/crackers) slipping deviously bugged code into the works for their own nefarious purposes.

    I don't need to RTFA, I can just wait for the movie.
  • NOT TO FEAR! (Score:4, Insightful)

    by pcguru19 ( 33878 ) on Friday June 16, 2006 @11:52AM (#15549242)
    Just upgrade to Windows VISTA (when it's out) and Office 2007 (when it's out) and all of these silly security issues will go away....

    Oh wait, didn't they say that when they released Windows 98, Windows ME, Windows 2000, Windows XP, Windows 2003 Server, Office XP, & Office 2003? HMMMMMMM. This could be a pattern forming.
  • by brian0918 ( 638904 ) <brian0918@gma[ ]com ['il.' in gap]> on Friday June 16, 2006 @11:53AM (#15549247)
    "If Criminal orgs are purchasing exploits, why doesn't Microsoft? (it's not like the don't have the money!)"

    Microsoft lets these exploits run free to keep the cattle in line. They need to keep people upgrading and buying the latest versions of their products to keep the cash flowing. If they released a well-written, stable, secure piece of software, what reason would people have to upgrade?
  • by SatanicPuppy ( 611928 ) * <Satanicpuppy.gmail@com> on Friday June 16, 2006 @11:55AM (#15549259) Journal
    Yea, nice way to jump to conclusions. The idea that intellectuals can't be criminals is almost victorian. Or maybe they fell for the stereotype of the happy-go-lucky-non-malicious-but-intellectually-in qusitive hacker who could come up with an exploit, but never use it for EVIL.

    Zero-day exploits do tend to suggest someone with specific goals, who has the resources to sit and come up with zero day exploits, and the foresight to target deployment to achieve a goal. It's not behaviour that we stereotypically associate with hackers, but there is no reason it couldn't be one person (or ten or a hundred).
  • by ILikeRed ( 141848 ) on Friday June 16, 2006 @11:59AM (#15549285) Journal
    It is not a popularity problem - it's a "our marketing and sales departments delegate everything to our engineering and security departments" problem.
  • News? (Score:5, Insightful)

    by MarkByers ( 770551 ) on Friday June 16, 2006 @11:59AM (#15549286) Homepage Journal
    Everyone knows that you should not open attachments. Word is likely full of 1000s of exploitable holes. Excel too. Plus any other complex program.

    Yes, OpenOffice will be full of holes as well.

    Not news.

    As for attacking just after the patch cycle, it's unlikely to mean anything. If I wanted to take advantage of a vulnerability for as long as possible, I would attack two or three days before the patch cycle. That will give people a couple of days to work out what happened and report the issue to Microsoft. After some initial analysis and prioritisation, a developer will be assigned to fix it. By that time it will have missed the boat for this month's patch day. Not that I would do this though. :)
  • by mmell ( 832646 ) on Friday June 16, 2006 @12:02PM (#15549302)
    is that (much like terrorists) there is no formal organization against which to direct your attention. The white-hats are left with trying to find individual crackers, much like the *AA goes after individual file-sharers because there is no centralized target for their wrath.

    In this instance, however, it is being hypothesized that an organized group is responsible. That's a centralized target; likely to yield more than one guy in his basement wearing shorts and a coffee-stained t-shirt, drinking coffee and jolt and living off old pizza.

    So, to CERT (and their international counterparts) I say - "Go get 'em, boys!"

  • by sterno ( 16320 ) on Friday June 16, 2006 @12:03PM (#15549319) Homepage
    The thing is, to be a good hacker, you kinda have to spend a lot of time and energy on hacking. At the end of the day, it's probably easier and equally lucrative to just sell your exploits to other people rather than using them yourself. It's also a much safer route legally speaking because you aren't directly involved in the criminal act, you're just selling the tools.
  • Re:news? (Score:5, Insightful)

    by Anonymous Coward on Friday June 16, 2006 @12:15PM (#15549398)
    If users are willing to click on an attachment from someone they don't know, then of course they're extremely vulnerable.

    There is no reason why it should have to be that way. In other operating systems and offices, you can open documents to see what's in them without handing over control of the OS to someone. Why should we accept a world in which unsolicited communication is banned ? Why can't we allows businesses to expand my making contacts with new, previously unknown people ?

    Of course, the problem is made worse by the fact that MS makes it so difficult not to run with administrator privileges.

    No, actually it is not. The most damaging things money wise that can happen to your computer are all available as the user, because if the data is important, the user obviously has to be able to read it. Trashing C:\Windows can always be fixed with a re-install. Uploading outlook.pst and *.xls to some site in Hong Kong can never be undone.

    If this is really targeted at a particular business, then the solution seems pretty simple: that business tells all their employees not to click on attachments from people they don't know, and whips up some software to filter out this stuff before it even gets to their users. If they're big enough to be an attractive target for extortion, they're presumably big enough to have an IT staff competent to take care of those simple steps.

    No, that is not the solution. Having to spend more on IT is the PROBLEM THIS BUG CREATED, not the solution.

    Like many computer users, windows or linux or mac, you have internalized your work-arounds and broken-system survival strategies to the point that you actually think that's the way things are supposed to work.

  • Just in time (Score:5, Insightful)

    by Opportunist ( 166417 ) on Friday June 16, 2006 @12:16PM (#15549405)
    Anyone here thinking it's a coincidence that the exploit goes life JUST after "patch day"?

    I don't want to call the responsible people at MS retards, who thought that patching at one very predetermined day every month is a good idea, but my English is not good enough to come up with a better name for this kind of idea.
  • by theundergroundman ( 944494 ) on Friday June 16, 2006 @12:17PM (#15549411)
    If a hacker sold an exploit to someone who uses it for corporate espionage, isn't that using his intellectual ability for "evil" as you put it?
  • by BunnyClaws ( 753889 ) on Friday June 16, 2006 @12:21PM (#15549442) Homepage
    The hackers themselves are probably not commiting the corporate espionage. They are merely traders in "Security Tools". They are like arms deals who sell to warlords. So no the hackers probably do not pull of the corporate espionage they just develop the means to do it. Which is probably the smarter thing to do.
  • Re:stupid (Score:1, Insightful)

    by Anonymous Coward on Friday June 16, 2006 @12:34PM (#15549528)
    I do not believe that e-mail spamming attack against a single company can be that effective.

    Ever heard of Osirusoft? How about Blue Security more recently? A targeted spamming attack can be pretty damn effective.

    Very low percentage of e-mail users, especially professionals, actually open the attachments in unsolicited e-mail.

    This could not be the e-mail users I am used to working with. They'll open anything.
  • by cp.tar ( 871488 ) <cp.tar.bz2@gmail.com> on Friday June 16, 2006 @12:36PM (#15549543) Journal

    I'm just waiting... waiting for a virus, attack or whatever you will which will simply turn all the threes into eights in every .xls file...

    Until something like that happens, no-one will bother learning about security... really learning.

  • by Anonymous Coward on Friday June 16, 2006 @12:37PM (#15549549)
    With an open file format such as OpenDocument, it would be much harder to hide malicious code and/or exploits in a document... You could easily parse the file at your gateway, and validate the xml content against the published schema

    So you expect the "malicious code" to be well labeled in the XML stream? ...maybe with XML comments? =P

    Seriously you can only trap a narrow set of possible exploits this way (ones dealing with XML parser exploits generally). Scripts/macros/etc. would need to be interpreted to understand if was utilizing an exploit in the target product (assuming the vulnerability was known). Also the document can be a valid document but the organization and composition of elements in the document could be used to exploit a vulnerability.

    I don't think it would net you as much of a benefit as you believe it would.
  • Comment removed (Score:3, Insightful)

    by account_deleted ( 4530225 ) on Friday June 16, 2006 @12:39PM (#15549569)
    Comment removed based on user account deletion
  • by Anonymous Coward on Friday June 16, 2006 @12:42PM (#15549600)
    Bullcrap, an open format doesn't preclude security problems.

    The closest already widespread format was PDF documents (multiple writers) and there have been plenty of exploits associated with that format, though not as many as Word, Excel, etc.
  • by masterzora ( 871343 ) on Friday June 16, 2006 @01:01PM (#15549744)
    Can the owner of a gun shop be charged as an accessory if a gun they sold is used in a murder?

    All the cracker has to do is come up with a reasonable way that they could have plausibly sold it without criminal intent (ie they get the actual criminal to agree that the cracker sold it for security testing purposes, not for cracking purposes or something like that).

  • Re:news? (Score:1, Insightful)

    by Anonymous Coward on Friday June 16, 2006 @01:10PM (#15549813)
    It's not like a document format designer was thinking one day, "I should make this contain executable code!"

    After having to live through dozens of MS Office macro viruses before MS finally turned them off by default, I can tell you, that's exactly what MS developers thought. Fools.
  • by dotoole ( 881696 ) on Friday June 16, 2006 @01:13PM (#15549835)
    You're missing the point. It's not that the hackers who find these exploits wouldn't use them - it's that they're smart enough NOT to use them. Undocumented exploits are worth their weight in gold for online criminals. Why use the exploit yourself and risk getting caught when you can sell it off to someone else for a tidy sum and let THEM risk getting caught.
  • by fm6 ( 162816 ) on Friday June 16, 2006 @01:27PM (#15549923) Homepage Journal
    They work on a schedule because that's the only way you can do a software project of any size. It's not like a flaw pops up once in a while, and they pull a programmer off his regular chores to write a patch. This is a large number of patches getting released over a long period of time. To create, test, and deploy software on that scale, you need a large team of programmers, together with project managers, QA folk, integrators, web deployment people, and technical writers. That kind of org cannot work on an ad-hoc basis.

    Microsoft's fuckup is not in choosing to release their patches on a scheduled basis. They really had no choice in the matter. Their fuckup is in letting their security situation get so bad, they had to produce a large number of patches every month.

  • by CyDharttha ( 939997 ) on Friday June 16, 2006 @02:12PM (#15550222) Homepage
    I upgrade my free/open source software because new features are added to extend funtionality, and to take advantage of ever improving hardware.
  • by Master of Transhuman ( 597628 ) on Friday June 16, 2006 @02:48PM (#15550482) Homepage

    No, that's BILL'S excuse - "It doesn't make me any money, so we're not doing it."

    If you think about it, it doesn't matter if the number of patches per month is large or small. It's just a matter of having enough people to deal with ALL of them, on a pipeline where it ends up in a security patch download on Microsoft Update.

    The problem for BILL is the number of people he has to pull off his "upgrade" and "new" products like Vista - which DO make him money - to the problem of security which does NOT make him any money.

    It's that simple. It always has been and always will be - which is why Microsoft Windows will NEVER be secure.

    Note that most other companies do what's necessary to issue patches when the fix is done. Microsoft doesn't solely and entirely because of Bill Gate's attitudes about money.
  • Re:NOT TO FEAR! (Score:2, Insightful)

    by pcguru19 ( 33878 ) on Friday June 16, 2006 @02:54PM (#15550530)
    Did you drink the grape Kool-aide or the cherry Kool-aide at the education camp? Microsoft will never get past the patching and they've at least built a process (monthly patches) and tools (WSUS, SMS, Windows Update, etc.) to deal with this reality.

    There's a simple formula to determine how secure and relaible any software is (OS or application). As you add to the total lines of code, regardless of who is writing the code, the opportunities for unexpected errors and security issues grows at a logorythmic scale. I loaded my VISTA DVD and the friggin OS takes 12 GIGs of HDD space. Office 2007 beta is out and it's install footprint is larger than Office 2003. As you add complexity and features, you add to the error rate on software, hardware, cars, etc.

    I'm probably showing my age here, but the thing that was bashed into my head when I started programming was that the next version of software should be SMALLER and MORE RELIABLE than the last version. If Microsoft (and plenty of other folks including some of the current LINUX projects) embraced making what they've already tried to build and provide better instead of pushing for something new, we'd be in a hell-of-a-lot-better-shape than we are today.

    As long as we live in the "bigger is better" and "people only buy the next version if there's more features" era of computing, then security and bugs are a fact of life we have to accept. Nobody's saying Microsoft won't try or isn't getting better, but the plain truth is they will never get rid of these issues if the driving force in their organization is to innovate and expand the feature set.

    IMHO, we didn't need to get anything else into MSOffice after 4.1 was released. You could copy & paste, put an excel spreadsheet in a powerpoint presentation, and write a letter. Any Office 4.1 exploits released...ever?
  • by dave562 ( 969951 ) on Friday June 16, 2006 @03:55PM (#15550991) Journal
    It is a great suggestion that Microsoft purchase information about their operating system from where ever it is available. It has been proven time and time again that Microsoft employees aren't capable of patching their operating system and updating their code. It has been implied that their management culture is so completely screwed up that they are never going to get anything accomplished in any sort of reasonable time frame. If I were in charge of personnel at Microsoft I would go out and recruit every user who contributes to any of the hacker sites in any sort of reasonable way, give them six figures a year, and set them loose on the source code for Windows and the various key applications. For the most part the people who are breaking Microsoft software are doing it for the thrill and challenge of it... and they aren't making much money doing it. If you were to wave six figures at some guy who can barely afford to keep his Honda Civic running and the Mountain Dew supply in the fridge stocked, he'd probably jump at the offer.

    Of course, such a thing will never happen. Sooner or later the OSS community is going to catch up, they are going to come up with an Exchange killer, and they are going to come up with an accounting package to rival the likes of Platinum / Sage / AccPac for the SMB market, and then Microsoft is going to be in serious trouble. However until the OSS world gets the necessary applications to slay the dragon with, we're stuck with Microsoft for the forseeable future.

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...