Hackers use porn to target Microsoft JPEG hole

Malicious hackers are seeding Internet news groups that traffic in pornography with JPEG images that take advantage of a recently disclosed security hole in Microsoft's software, according to warnings from antivirus software companies and Internet security groups.

The reports are the first evidence of public attacks using the critical flaw, which Microsoft identified and patched on September 14. Users who unwittingly download the poison images could have remote control software installed on their computers that gives remote attackers total control over the machine, experts warned.

The images were posted in a variety of Internet news groups where visitors post and share pornographic images or "binaries." The altered JPEG images were posted to groups such as "alt.binaries.erotica.breasts" on Monday by someone using the e-mail address "Power-Poster@power-post.org," according to information published on the online security discussion group Bugtraq and on Easynews.com, a Web portal for Usenet, the global network of news servers.

The corrupted JPEG images are indistinguishable from other images posted in the group, but contain a slightly modified version of recently released exploit code for the JPEG vulnerability called the "JPEG of Death" exploit, which appeared over the weekend, according to Johannes Ullrich, chief technology officer of The SANS Institute's Internet Storm Center (ISC).

Like other exploits for the vulnerability that have appeared in the weeks since Microsoft released its patch, the JPEG of Death uses a JPEG file formatted to trigger an overflow in a common Windows component called the GDI+ JPEG decoder, which is used by Windows, Internet Explorer, Outlook and many other Windows applications, Ullrich said.

When opened by users, the infected JPEGs try to install a copy of Radmin, a legitimate software application that allows users to remotely control their computers. In this case, however, the program is being used by the remote attacker as a Trojan horse program. Infected Windows machines are also programmed to report back to an IRC (Internet relay chat) channel, Ullrich said.

The images only work on Windows XP machines and some of the attack features do not appear to work on all XP machines, Ullrich said.

ISC and antivirus companies cautioned that the newly posted attack images cannot spread and are not, technically, a "virus." However, the exploit code could easily be modified to download a virus engine with e-mail capability that would spread when images are opened, Ullrich said.

As with Sasser and other recent worms that target common Windows components, security experts worry that the JPEG vulnerability in GDI+ could spawn another major worm outbreak. The vulnerability is remotely exploitable and can be accessed through a long list of popular Windows applications, including Internet Explorer, the Outlook e-mail program and Microsoft's Office applications.

In addition to GDI+ being a standard component of Windows, different Windows applications frequently distribute their own versions of GDI+. Those versions might reside in folders used by the applications and be out of reach of the Windows patch, or could be installed after the Microsoft patch was applied, undoing that patch, Ullrich said.

Currently, most major antivirus software programs can spot corrupted JPEG images. Antivirus software, in combination with the Windows patch, is currently the only known protection from attacks that use the GDI+ vulnerability, he said.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Paul Roberts

IDG News Service
Show Comments

Cool Tech

Breitling Superocean Heritage Chronographe 44

Learn more >

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?