Patch be damned: ANI attacks on the rise

Hacking exploits expected to have a 'pretty high success rate' for some time

Although Microsoft patched the ANI bug in Windows a week ago, that's not stopped attackers from boosting the number of Web sites serving exploits or tweaking exploits to make them more efficient.

"Based on past history, they'll have a pretty high success rate for quite a while," said Dan Hubbard, Websense's head of research, of attackers using ANI exploits. "That success rate goes down with time, but a patch is not the end of the story."

Past vulnerabilities that have been the target of major exploit campaigns -- notably the Windows Metafile (WMF) bug of late 2005 and early 2006 -- still account for 15 percent or more of active attacks, says Hubbard. "And that's more than a year after [the vulnerability was patched]."

As of Tuesday, according to Hubbard, over 2,000 Web sites either purposefully malicious or compromised by criminals are hosting exploits against the ANI file bug in Windows 2000, XP, Server 2003, and Vista. "That's bigger than WMF," he said. "The number of sites serving ANI exploits is larger than the number a week or so after WMF started."

Most of those sites are related to one of two major attacker groups. The first, out of China, is widely believed to be the first to use exploits, which were detected about a week before Microsoft released the emergency patch. These attackers, according to Hubbard, were using compromised Web sites to hijack users' log-on credentials for online games such as "Lineage," popular in Asia. Most of the servers compromised by this group are in China.

A second group from Eastern Europe is behind the bulk of the rest. This gang added ANI exploits to those it already used -- including WMF and VML (Vector Markup Language) exploits -- to grab control of servers primarily in the U.S. The second group's goal, said Hubbard, was more straightforward crime: "They mainly deal with information-stealing Trojans," he said.

As Websense tallies up the compromised sites, other security vendors have been finding new exploit-building toolkits and the stealthier malware some of those tools create.

In a Trend Micro Inc. blog, researcher Jonell Baltazar posted screen shots of toolkits for creating ANI exploits. "These toolkits makes it easier for a script kiddie to create a malware of his own," said Baltazar.

Over at McAfee's Avert Labs, meanwhile, researcher Geok Meng Ong spelled out obfuscation techniques that some ANI exploits were using to sneak by defenses. In one sample, the code of a toolkit-generated exploit used random tags to avoid detection as an .ani (animated icon) file. Most image viewers including Internet Explorer parse them without any problems," said Geok.

"We [also] found common ANI headers that were modified and redundant noise [extra white space in the code], in an attempt to circumvent detection in most traditional content filtering and anti-virus products," said Geok.

In other words, ANI, though patched, is just getting started.

"So far we haven't seen any activity of ANI exploits grabbing systems for botnets, but we expect to see that next," Hubbard said.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?