Newsfeed
Nachrichtenbote
As Sean predicted a week ago, we now have exploit code in-the-wild for MS09-002, a vulnerability in Internet Explorer 7. This particular variant of the exploit downloads a file named jc.exe from a server in China. We detect the exploit as Exploit:W32/JSShell.A and the downloaded file as Trojan-Dropper:W32/Agent.JLA. The file jc.exe drops a backdoor detected as Backdoor:W32/Agent.JLA.
It was great to see that F-Secure Exploit Shield proactively protected against the exploit without the need for an update. Below is a screenshot of the exploit being blocked.
If you haven't installed the update already, do so now. On 18/02/09 At 06:04 AM
Weiterlesen...
It was great to see that F-Secure Exploit Shield proactively protected against the exploit without the need for an update. Below is a screenshot of the exploit being blocked.
If you haven't installed the update already, do so now. On 18/02/09 At 06:04 AM
Weiterlesen...