{"id":183792,"date":"2010-01-15T11:35:26","date_gmt":"2010-01-15T16:35:26","guid":{"rendered":"http:\/\/www.stoth.com\/2010\/01\/15\/ie-opened-door-to-attacks-on-google-other-companies\/"},"modified":"2010-01-15T11:35:26","modified_gmt":"2010-01-15T16:35:26","slug":"ie-opened-door-to-attacks-on-google-other-companies","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/183792","title":{"rendered":"IE Opened Door To Attacks on Google, Other Companies"},"content":{"rendered":"<p><\/p>\n<p>On Tuesday, Google revealed cyberattacks against it and other U.S. companies. Within two days, security researchers had traced one of the open doors back to Internet Explorer. Microsoft has admitted that a remote code execution (RCE) vulnerability exists in IE.<\/p>\n<p>\n&#8220;Based upon our investigations, we have determined that Internet Explorer was one of the vectors used in targeted and sophisticated attacks against Google and possibly other corporate networks,&#8221; said Mike Reavy, Microsoft Security Response Center director. <\/p>\n<p>\nOn Thursday, Microsoft issued guidance to help customers mitigate the RCE vulnerability in Internet Explorer. Microsoft has not seen widespread consumer impact from the vulnerability, but may release an out-of-band patch to address the issue. Reavy also said Microsoft is cooperating with Google and other companies, as well as authorities and other industry partners.<\/p>\n<p>Major Ramifications<\/p>\n<p>\nMcAfee CTO George Kurtz explained how the attack works in a blog post: The intruders gained access by sending a tailored attack to one or a few targeted individuals. McAfee suspects these individuals were targeted because they likely had access to valuable intellectual property. These attacks will look like they come from a trusted source, he said, leading the target to fall for the trap and click a link or file. That&#8217;s when the exploitation takes place, using the vulnerability in Microsoft&#8217;s Internet Explorer.<\/p>\n<p>\nKurtz said once the malware is downloaded and installed, it opens a back door that allows the attacker to perform reconnaissance and gain complete control over the compromised system. The attacker can now identify high-value targets and start to siphon off valuable data, he explained.<\/p>\n<p>\n&#8220;It&#8217;s hard to imagine a cyber breach with bigger ramifications than this one unless it involved some infrastructure capacity. The scope and the targeting of this breach should grab every CEO&#8217;s attention,&#8221; said Andrew Storms, director of security operations for nCircle. &#8220;If Google got&#8230; <\/p>\n<p>Buy This Item: <a class=\"buy\" href=\"http:\/\/www.stoth.com\/buy.php\" ><span style=\"color: #33bc03\">[Click here to buy this item]<\/span><\/a><\/p>\n<p><a href=\"http:\/\/www.toptechnews.com\/story.xhtml?story_id=71107\" >Read Original Article<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Tuesday, Google revealed cyberattacks against it and other U.S. companies. Within two days, security researchers had traced one of the open doors back to Internet Explorer. Microsoft has admitted that a remote code execution (RCE) vulnerability exists in IE. &#8220;Based upon our investigations, we have determined that Internet Explorer was one of the vectors [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-183792","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/183792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=183792"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/183792\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=183792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=183792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=183792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}