As you may have heard via news reports, there is a new Internet Explorer exploit that has been reported. This exploit downloads malware via the video ‘Active X’ control in Internet Explorer. Microsoft does not have a patch for this exploit at this time, but has a temporary workaround that we recommend you download immediately.Please note that this is a proactive security tip for the Managed Company Hosted Solutions Community. Non-MC clients, should your company or organization need outsourced email servers or hosted online business solutions please contact us today - I'm sure we can be of assistance.
Vulnerability in Microsoft Video ActiveX ControlEarlier today, Trend Micro also informed us that about 967 Chinese websites are reported to be infected by a malicious script that leads users to successive redirections and lands them to download a JPG file containing the exploit. Trend Micro detects it as JS_DLOADER.BD. Upon successful exploitation, the script downloads another malware detected as WORM_KILLAV.AI. This malware disables and terminates AV processes, and drops other malware on the affected system. Unfortunately, the Microsoft workaround will likely disable your ability to view video via Internet Explorer.
To download the workaround, please click on the following link, http://support.microsoft.com/kb/972890, and follow the steps after ‘enable workaround’ that Microsoft recommends:
For more information on this vulnerability, the Microsoft Knowledge base article can be found at, http://bit.ly/mc-microsoft-ie.
Monthly retained customers will be kept you updated on this vulnerability stand by and be prepared to take action as soon as a patch has been released by Microsoft.
Managed Company at Anobleworld