Having fun with Flash

If you like flash websites, pay close attention to them, you might just end up with surprises. They show no obvious symptoms until infection is already complete.

However, not only Flash websites are targeted this week. Our friend, the iframe is alive and kicking again. 


Yet another iframe hack for making
legitimate websites spread malware. This javascript tries to push
to the users, which was described in last weeks review. The technique used to
infect legitimate websites with such e-threats is generally SQL Injection
however in this case no such website was detected. Only the one hosting the ANNZ
Exploit is known to spread it in the wild, for now



This flash file basically replaces the
JavaScript part found in Exploit.SWF.Gen
which used to serve a maliciously crafted SWF file considering the flash
version installed on the victims computer. After successful exploitation any
action is possible but until now, this exploit is known to download and execute
some version of Trojan.PWS, a password stealing e-threat.



This malware is part of the infection chain
described a couple of weeks ago when Trojan.Exploit.SSX showed
up. This time however, this JavaScript is not only a new encryption layer used
for obfuscation (hiding from antivirus software) it also comes with two new
additional exploits:

– multiple stack based overflows
in an ActiveX control installed by the Lianzong Game Platform v2.6.1.29 which
allows remote attacker to execute arbitrary code

integer overflow present in
Adobe Flash Player up until version, which has been already used on
so many ocations (Exploit.SWF.C, Exploit.SWF.Gen)

Information in
this article is available courtesy of BitDefender virus researchers:


Sorin Ciorceri