Microsoft fix nearly ready for IE flaw used in China attacks

Share this article:

The Internet Explorer (IE) vulnerability that was used to install espionage trojans on the networks of large corporations, including Google, is scheduled to be fixed on Thursday, Microsoft announced.

The software giant said Wednesday in an advance notification that the patch is due out about 1 p.m. EST on Thursday. The fix will repair a single flaw affecting IE 6, 7 and 8 for all versions of Windows.

"Once [the patch is] applied, customers are protected against the known attacks that have been widely publicized," Jerry Bryant, senior security program manager at Microsoft, said Wednesday in a blog post. "We recommend that customers install the update as soon as it is available." 

The vulnerability came to light last week after Google disclosed that its systems were targeted by sophisticated malware designed to steal company secrets on behalf of Chinese hackers. More than 30 other companies, including Adobe, Northrop Grumman, and Juniper also were targeted.

U.S. officials reportedly are asking Chinese leaders for an explanation for the intrusions, which Google detected in December.

So far, according to Microsoft, only machines running IE 6 have been affected.

"Based on our comprehensive monitoring of the threat landscape, we continue to see only limited attacks," Bryant said. "We continue to recommend that customers update to Internet Explorer 8 to benefit from the improved security protection it offers."

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters


More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.