Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.
Some feel a more-sophisticated virus is nearing completion.
George V. Hulme
September 28, 2004
1 Min Read
Attackers have posted a malicious Jpeg image file to Internet newsgroups that distribute pornography. The infected Jpeg file attempts to exploit a critical vulnerability Microsoft announced and issued a patch for on Sept. 14, in its MS04-028 security bulletin.
According to postings on the Internet security mailing list Bugtraq and Easynews Web portal, the infected Jpeg file was posted Monday. Users who download the file could allow attackers to take complete control of their systems. Internet security information group Internet Storm Center issued an advisory saying the malicious file appears to have been developed using one of the many published "exploit kits" that are designed to make it easier to attack the MS04-028 vulnerability. The center tested the attack-image file on unpatched Windows 2000 and XP SP1 systems running Internet Explorer. It said that while the malicious file managed only to crash Internet Explorer, better attacks are likely on the way. "We suspect that a working exploit is very close to widespread availability," wrote the center's Joshua Wright in the advisory. Most popular antivirus apps can detect and protect against this attack, and Microsoft is urging users to update their systems with the patch included in its MS04-028 security bulletin. See all the latest Microsoft security bulletins.
About the Author(s)
An award winning writer and journalist, for more than 20 years George Hulme has written about business, technology, and IT security topics. He currently freelances for a wide range of publications, and is security blogger at InformationWeek.com.
You May Also Like
The Total Economic Impact™ Of Fortinet NGFW For Data Center And AI-Powered FortiGuard Security Services Solution Study
Navigating the ISO 27001 compliance journey
NIST Cybersecurity Framework 2.0: Changes, impacts, and opportunities for your InfoSec program
2023 Cloud Security Report
Checklist: Top 6 Considerations to Optimize Your Digital Acceleration Security Spend