Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Angler Discovers Way for Evading EMET Security Kit of Microsoft


Exploits for Adobe Flash and Microsoft Silverlight which circumvent EMET (Enhanced Mitigation Experience Toolkit) of Microsoft now execute their operations through one revised edition of AEK (Angler Exploit Kit).

Enhanced Mitigation Experience Toolkit contains freely-obtainable tools in a package to aid Windows computers which lessen memory-based assaults. According to FireEye the security company and discoverer of the aforementioned exploits, the exploits impact solely Windows 7 computers that even now 49% of Windows operators use.

The primary function of AEK is installing the TeslaCrypt ransomware through booby-trapped Microsoft Silverlight or Adobe Flash advertisements within drive-by assaults.

Security investigators from FireEye elaborate the freshly discovered exploits within a blog as much refined when they circumvent EMET followed with subsequently attacking Silverlight or Flash Player via inserting the TeslaCrypt ransomware. For performing test of the exploit, FireEye chose solely Windows 7 as the experimental device. Scmagazine.com posted this, June 6, 2016.

And because a widely-distributed exploits can now circumvent EMET mitigations, people mustn't anymore rely on the toolkit for safeguarding previous editions of the Adobe Reader, Flash Player, Java or Silverlight applications till the time they're legitimately updated.

Disturbingly, sometimes it's forced on organizations to retain previous editions of browser plug-ins as well as other apps loaded onto endpoint PCs so that compatibility continually remains with tailored in-house Web-based apps which nobody has rewritten over many years.

Likewise in the case of Adobe Flash, AEK bypasses Export Address Table Filtering. And with the exploit for Flash, creators of AEK utilize some other methods to find recourses beyond EAF's context. So such a complicated compounding series of circumventions for bypassing DEP facilitates acquiring strong base on the intended host by the exploit that can then handover to the cyber-criminal the malevolent shellcode's control.

FireEye's experts therefore recommend organizations to fast patch their Web-browsers, Java and Adobe Flash for lowering the instances of security safeguards' circumvention. They need to also turn off their browser plug-ins related to Silverlight and Flash to be less attack prone.

Successful payloads, says FireEye, that get served through AEK include TeslaCrypt, while it isn't clear what fresh payloads Angler may serve with time.

» SPAMfighter News - 6/10/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next