{"id":3673,"date":"2014-02-19T18:17:13","date_gmt":"2014-02-19T10:17:13","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3673"},"modified":"2015-09-09T19:36:51","modified_gmt":"2015-09-09T11:36:51","slug":"2-different-hacker-groups-exploit-ie-0-day","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2014\/02\/2-different-hacker-groups-exploit-ie-0-day\/","title":{"rendered":"2 Different Hacker Groups Exploit The Same IE 0-Day"},"content":{"rendered":"

It hasn’t been too long since the last serious Internet Explorer 0-day, back in November it was used in drive-by attacks – Another IE 0-Day Hole Found & Used By In-Memory Drive By Attacks<\/a>.<\/p>\n

And earlier last year there was an emergency patch issued – Microsoft Rushes Out \u2018Fix It\u2019 For Internet Explorer 0-day Exploit<\/a>.<\/p>\n

This time though it seems two different groups have figured this one out and have developed attack code independently, that ended up pretty similar (which is not surprising considering it’s attacking the same exploit).<\/p>\n

Two different hacker groups are exploiting the same still-unpatched vulnerability in Internet Explorer (IE) with almost-identical attack code, a security researcher said Tuesday.<\/p>\n

The attacks, the first campaign unearthed last week by FireEye and a second campaign found by Websense, exploit a flaw in IE9 and IE10, two editions of Microsoft’s browser. Attacks have been spotted targeting only IE10, however.<\/p>\n

According to FireEye, the attacks it found targeted current and former U.S. military personnel who visited the Veterans of Foreign Wars (VFW) website. Meanwhile, Websense reported that the exploit it discovered had been planted on the website of a French aerospace association, GIFAS (Groupement des Industries Francaises Aeronautiques et Spatiales), whose members include defense and space contractors.<\/p>\n

GIFAS is best known to the public as the sponsor of the Paris Air Show, where commercial and military aircraft makers strut their newest fixed-wing planes and helicopters.<\/p>\n

Aviv Raff, chief technology officer at security firm Seculert, contended that the attacks uncovered by FireEye and Websense were the work of two gangs.<\/p><\/blockquote>\n