473,799 Members | 2,665 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Malicious JavaScript code,

AIUI, it was not all that long ago when the threat to personal users,
was attachments that when executed compromised machines with keyloggers,
trojans, etc.

Now it seems that the big problem is reading a webpage or an HTML e-mail
and getting affected through the scripting. My understanding is that
the script downloads the malicious program from the web and sets it to
run on start up through the start-up folder or in the registry.

I don't know much about this; can someone suggest a good web site to
start learning a bit more about these threats. I have googled, but I am
not quire sure of the best search terms, and since there is so much
information out there, a site that experienced people endorse would be a
lot of help.

In particular, it seems as if JavaScript dowloading a trojran without
the user clicking an attachment is a big problem.

Thanks.
Jan 27 '06 #1
28 3035

Noone Here wrote:
AIUI, it was not all that long ago when the threat to personal users,
was attachments that when executed compromised machines with keyloggers,
trojans, etc.

Now it seems that the big problem is reading a webpage or an HTML e-mail
and getting affected through the scripting. My understanding is that
the script downloads the malicious program from the web and sets it to
run on start up through the start-up folder or in the registry.

I don't know much about this; can someone suggest a good web site to
start learning a bit more about these threats. I have googled, but I am
not quire sure of the best search terms, and since there is so much
information out there, a site that experienced people endorse would be a
lot of help.

In particular, it seems as if JavaScript dowloading a trojran without
the user clicking an attachment is a big problem.


Using javascript is just one of many ways of writing codes that will
cause computers serious problems. Others include ActiveX, and just
corrupted images with bad code hidden in them. At one time you could
avoid bad sites and not open unknown email, and you usually would not
get infected.For some time now there have been bugs that will infect
you just if you sign onto the web. Especially if you have a Windows OS,
you must take all Microsoft critical updates, have good virus
protection, have a good firewall, and keep them all updated. Else you
most likely will be infected soon. Some of the anti virus programs have
links that will allow you to find what new bugs are out there and will
describe an old bug for which you have found a name.

Jan 27 '06 #2
In article <11************ **********@z14g 2000cwz.googleg roups.com>,
sp*******@cwdjr .info says...

Noone Here wrote:
AIUI, it was not all that long ago when the threat to personal users,
was attachments that when executed compromised machines with keyloggers,
trojans, etc.

Now it seems that the big problem is reading a webpage or an HTML e-mail
and getting affected through the scripting. My understanding is that
the script downloads the malicious program from the web and sets it to
run on start up through the start-up folder or in the registry.

I don't know much about this; can someone suggest a good web site to
start learning a bit more about these threats. I have googled, but I am
not quire sure of the best search terms, and since there is so much
information out there, a site that experienced people endorse would be a
lot of help.

In particular, it seems as if JavaScript dowloading a trojran without
the user clicking an attachment is a big problem.


Using javascript is just one of many ways of writing codes that will
cause computers serious problems. Others include ActiveX, and just
corrupted images with bad code hidden in them. At one time you could
avoid bad sites and not open unknown email, and you usually would not
get infected.For some time now there have been bugs that will infect
you just if you sign onto the web. Especially if you have a Windows OS,
you must take all Microsoft critical updates, have good virus
protection, have a good firewall, and keep them all updated. Else you
most likely will be infected soon. Some of the anti virus programs have
links that will allow you to find what new bugs are out there and will
describe an old bug for which you have found a name.


Feel free to go in to some detail about how JavaScript "will cause
serious problems". Also give some detail on how "just sign[ing] onto
the web" will cause infection.

--

Hywel
http://kibo.org.uk/
Jan 28 '06 #3
cwdjrxyz said the following on 1/27/2006 6:05 PM:
Noone Here wrote:
AIUI, it was not all that long ago when the threat to personal users,
was attachments that when executed compromised machines with keyloggers,
trojans, etc.

Now it seems that the big problem is reading a webpage or an HTML e-mail
and getting affected through the scripting. My understanding is that
the script downloads the malicious program from the web and sets it to
run on start up through the start-up folder or in the registry.

I don't know much about this; can someone suggest a good web site to
start learning a bit more about these threats. I have googled, but I am
not quire sure of the best search terms, and since there is so much
information out there, a site that experienced people endorse would be a
lot of help.

In particular, it seems as if JavaScript dowloading a trojran without
the user clicking an attachment is a big problem.


Using javascript is just one of many ways of writing codes that will
cause computers serious problems. Others include ActiveX, and just
corrupted images with bad code hidden in them. At one time you could
avoid bad sites and not open unknown email, and you usually would not
get infected.For some time now there have been bugs that will infect
you just if you sign onto the web.


I am like Hywel on this one. I would like to see some examples, or an
explanation, of your claims that JS "will cause" (not "can" cause)
serious problems. And as well as "just signing onto the web" can infect
my PC.

--
Randy
comp.lang.javas cript FAQ - http://jibbering.com/faq & newsgroup weekly
Javascript Best Practices - http://www.JavascriptToolbox.com/bestpractices/
Jan 28 '06 #4

Hywel Jenkins wrote:
Feel free to go in to some detail about how JavaScript "will cause
serious problems".
A very early JS exploit used script to open the Netscape home page in
windows without limit. It also wrote "Crashing" in the status bar, and
the computer crashed. This is a very simple bug by today's standards.
Rather than playing child-like pranks such as the above, the modern
hacker may not want you to know your computer is infected. He or she
may be more interested in making your computer a zombie to send out
spam email or to obtain your personal information such as various
account numbers.
Also give some detail on how "just sign[ing] onto
the web" will cause infection.


McAfee features a different bug on their security center home page
every few days. Here is one of their descriptions:

"W32/IRCbot.worm! is a medium risk worm for home users. You can be
infected simply by going online. Once infected, your computer may
restart continuously."

If you follow a McAfee link to a more detailed description of the worm,
you find in part:

"This threat scans for MS05-039 exploitable systems. When a vulnerable
system is found, it uses a buffer overflow to write the worm file to
that machine via a TFTP upload on port 8594. Blocking this port via
McAfee Desktop Firewall or McAfee Personal Firewall will prevent
infection even if the buffer overflow is not prevented."

Few of us have the time or interest to keep up with the details of the
several new important bugs discovered nearly every week. If there were
no more bugs, likely hundreds of people working at security companies
and Microsoft would be looking for new jobs. I have both my security
programs and Microsoft update set to update automatically so that I do
not have to check for new updates very often. You also need to pay
attention to the security program icon on your desktop. For example
mine is red if it is working and black if it is not.

Jan 28 '06 #5
cwdjrxyz wrote:
Using javascript is just one of many ways of writing codes that will
cause computers serious problems. Others include ActiveX, and just
corrupted images with bad code hidden in them.
ActiveX does not run in my Mozilla/Firefox, neither in Linux nor in
Windows. And on Linux, ActiveX does not run in any other UA, too.
At one time you could avoid bad sites and not open unknown email, and
you usually would not get infected. For some time now there have been
bugs that will infect you just if you sign onto the web.
Probably you mean security leaks exploited to infect computers that have
merely established an Internet connection, which is not the same.
Especially if you have a Windows OS, you must take all Microsoft critical
updates, have good virus protection,
The (sad) truth is that no virus protection can be good enough. Vendors of
anti-virus software cannot be faster than the thousands of malicious people
writing malicious software. You could be the one that discovers your
system being infected with the brand-new virus nobody knows about. Of
course vendors of anti-virus software do not tell you this, they want to
make money. Your money.
have a good firewall,


Utter nonsense. A firewall, may it be just snake-oil software ("desktop
firewall") or a real one (that is, a security concept including a network
packet filter), cannot protect you from yourself, allowing your system to
be compromised by running inherently insecure software and clicking on
everything that cannot fight back. Of course vendors of so-called "desktop
firewalls" do not tell you this, they want to make (your) money one way
(you buying their snake oil and feeling protected while you are not at all)
or the other (you providing them with potentially valuable information
without knowing it).

<URL:http://www.interhack.n et/pubs/fwfaq/>

Again, what is the right thing to do is not to use inherently insecure
software (that includes inherently insecure operating systems), or
configure the system as secure as possible if the former is not
possible, and to develop a common sense for secure use of computers.

<URL:http://www.ntsvcfg.de/linkblock_eng.h tml>
HTH

PointedEars
Jan 28 '06 #6

cwdjrxyz wrote:
Using javascript is just one of many ways of writing codes that will
cause computers serious problems. Others include ActiveX, and just
corrupted images with bad code hidden in them. At one time you could
avoid bad sites and not open unknown email, and you usually would not
get infected.For some time now there have been bugs that will infect
you just if you sign onto the web. Especially if you have a Windows OS,
you must take all Microsoft critical updates, have good virus
protection, have a good firewall, and keep them all updated. Else you
most likely will be infected soon. Some of the anti virus programs have
links that will allow you to find what new bugs are out there and will
describe an old bug for which you have found a name.


You can of course reduce your chances for infection by using one of the
lesser used OSs rather than Windows. Many of these are more difficult
to hack than the XP, but also the XP is a favorite target of hackers
because they can infect a larger number of of computers that way.
Unfortunately many of us must use a Windows OS, because many important
media and other programs do not have versions for other OSs. If you are
working with professional media programs, fortunately many of these
have Mac as well as Windows versions. Many of the media professionals
love Mac for their work. Macs have been hacked, but not nearly as much
as Windows.

I should mention that ActiveX usually is found only on Microsoft OSs,
browsers, and their close relatives such as MSN9. However there have
been downloads available for Firefox, Mozilla, and Netscape to support
ActiveX for the Windows Media Player only. The reason is that some
write media pages using only ActiveX support. This limited use of
ActiveX for the WMP only is likely much safer than full ActiveX
support. Opera seems to have found some indirect way to support media
for the WMP written using ActiveX code only. I have no idea how they do
this, but it is extremely unlikely that they use ActiveX for anything
on their browser. Of course, if one wishes to live dangerously, you can
locate full ActiveX plugins for many browsers.

I should add that spyware, malware, scumware, or whatever you choose to
call it has become a big problem. If you have a Windows OS, you can
download a spyware protection program for free.But they check your
computer to make sure you have an official Windows OS, and if not you
get no download.

Of course it still pays to be careful. Stay away from doubtful sites,
use an email service or agent that scans for problems, etc. I have
never used Outlook/Outlook Express. I use the Yahoo mail service
provided by my isp SBC/Yahoo DSL, but free Yahoo mail is available to
everyone. They will not open any attachment for you until it is scanned
for a virus. I open all of my domain mail at Yahoo mail as pop mail. As
in most things in life, nothing is certain. You could be the first on
the block to get a new bug before updates for it are available in
protection programs. However, especially if you use a Windows OS, you
can greatly reduce the odds if you have good protection programs as
well as use caution about what you view or open.

Even on a Windows OS browser, you likely can reduce your chances for
infection by using a browser other than IE when online. I usually use
Opera or Firefox, but you still have to use IE to view some sites
properly. I have Opera set for very high security and use it for
questionable sites. It asks for you to accept or refuse all cookies of
any type a site my try to plant on your computer. I have seen sites for
which you have to refuse cookies 20 times, and some sites will not let
you in without cookies.

Jan 28 '06 #7
cwdjrxyz said the following on 1/27/2006 9:29 PM:
Hywel Jenkins wrote:
Feel free to go in to some detail about how JavaScript "will cause
serious problems".
A very early JS exploit used script to open the Netscape home page in
windows without limit.


Trivial to do actually even now without a pop up blocker and considering
that even IE comes with one by default (enabled no less) its not a
concern anymore. But for kicks and giggles, you can disable yours and
execute this script for fun:

<script type="text/javascript">
while (1){window.open ('www.netscape. com')}
</script>

And anybody that surfs the web without a pop up blocker deserves what
that script snippet will do.

It also wrote "Crashing" in the status bar, and the computer crashed.
Repeatedly opening new windows causes that to happen......
This is a very simple bug by today's standards.
It wasn't a "bug" then and it's not a "bug" now. It was an exploitation
of user's ignorance about pop ups and the lack of a decent pop up blocker.
Rather than playing child-like pranks such as the above, the modern
hacker may not want you to know your computer is infected.
And I will ask *again*. Post some JavaScript code that will "infect" my
computer. I want to see it.

He or she may be more interested in making your computer a zombie to send out
spam email or to obtain your personal information such as various account numbers.
Again, post some code. And, post code that will cause *my* PC to
repeatedly send out emails. Go on, try it.
Also give some detail on how "just sign[ing] onto
the web" will cause infection.
McAfee features a different bug on their security center home page
every few days. Here is one of their descriptions:


Anybody dumb enough to buy into McAfee's marketing hype deserves to pay
for the product that McAfee is selling. Do you actually expect to open a
website that sells an anti-virus product and not read how you should
have it?
"W32/IRCbot.worm! is a medium risk worm for home users. You can be
infected simply by going online. Once infected, your computer may
restart continuously."
Thats ignorance on the users part.
If you follow a McAfee link to a more detailed description of the worm,
you find in part:

"This threat scans for MS05-039 exploitable systems. When a vulnerable
system is found, it uses a buffer overflow to write the worm file to
that machine via a TFTP upload on port 8594. Blocking this port via
McAfee Desktop Firewall or McAfee Personal Firewall will prevent
infection even if the buffer overflow is not prevented."
The only thing being exploited there is peoples fear. And the ones doing
the exploiting are McAfee.
Few of us have the time or interest to keep up with the details of the
several new important bugs discovered nearly every week.
And some of us, myself being the first one to say so, don't care about
the details of new "important bugs" discovered. When MS updates the OS,
I update it. I have no need to try to track it myself.
If there were no more bugs, likely hundreds of people working at
security companies and Microsoft would be looking for new jobs.
And as long as that stays true, there will always be people trying to
keep a job by telling you to buy the product they are selling.
I have both my security programs and Microsoft update set to update
automatically so that I do not have to check for new updates very often.
Smart move.
You also need to pay attention to the security program icon on your desktop.
What "security icon"? You mean the one I told the day I got WinXP to
shut up and let me handle my own PC? I disabled that piece of crap long ago.
For example mine is red if it is working and black if it is not.


Then it should stay black all the time......

--
Randy
comp.lang.javas cript FAQ - http://jibbering.com/faq & newsgroup weekly
Javascript Best Practices - http://www.JavascriptToolbox.com/bestpractices/
Jan 28 '06 #8

Lee wrote:
cwdjrxyz said:


Hywel Jenkins wrote:
Feel free to go in to some detail about how JavaScript "will cause
serious problems".


A very early JS exploit used script to open the Netscape home page in
windows without limit.


Very early. What does that have to do with how Javascript "will cause
serious problems"?


A virus that crashes a computer is a serious problem to me, but
everyone may have a different threshold for what is serious. Of course
this virus is seldom met anymore. I gave it as an example of a pure JS
virus rather than a modern one that often mixes several types of code.
However someone at a software company put it in a code for a free html
editor, apparently a former employee, as a prank. The software company
did not bother to remove it for years. Thus many people had their
antivirus program detect it when they downloaded the program. I believe
the virus was put in the program in a form that would do no harm,
except set off virus detection programs. This subject kept coming up in
NGs for many years.

Many modern viruses and worms use a combination of various codes, of
which javascript often is a part, and the problems caused by some of
these can be quite severe. You can find a huge number of references to
these on Google at
http://www.google.com/search?as_q=ja...s=&safe=images

. If this very long URL fails, just use advanced search, require virus
or worm, and require javascript. Javascript is very much alive and well
in many recent bugs.

Jan 28 '06 #9
cwdjrxyz said the following on 1/28/2006 1:50 AM:
cwdjrxyz wrote:


<snip>

Do you work for a security company or an anti-virus company? It has to
be one of the two to come up with the kind of arguments you did (none of
which are true).

The best defense against being infected? Knowledge. Knowledge of how
your computer works (at least a basic understanding) and a basic
knowledge of how the web works. Now you can be safe.

Even my mother knows how to keep from getting her computer infected. She
has no firewall and no anti-virus program but she has the Knowledge to
know how to stay safe.
--
Randy
comp.lang.javas cript FAQ - http://jibbering.com/faq & newsgroup weekly
Javascript Best Practices - http://www.JavascriptToolbox.com/bestpractices/
Jan 28 '06 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
3543
by: joshw53 | last post by:
I'm sure this is a simple question. I just installed Visual Basic.NET and every time I begin running the program Norton anti-virus says that there is a malicious script file that it suggest I stop. The file is devenv.exe. Is this a problem I should worry about or can I simply allow the file to run? Will it cause problems later, and if so how can I fix things?
2
1197
by: IRAQI OIL IS TOO PRECIOUS | last post by:
Friedman is a malicious mischief monger and misleader In his mind he is probably gloating over the victims he has fooled. Comments below clearly show where he is not an idiot but a malicious schemer. > Restoring Our Honor
1
1865
by: Stimp | last post by:
I have an input field, which will ultimately be stored in a database and the contents of which will be output on screen at some stage. ASP.NET has built-in functionality to prevent users inputing values such as "<script>", etc, to call malicious code, but I'd prefer to back this up with my own input validation. I'll deny < and > characters on input.. any other strings/characters to look for?
0
1236
by: =?Utf-8?B?UGF1bCBILg==?= | last post by:
When I download the August ’07 Malicious Software Removal Tool I am able to run the “quick” scan, but the “full” scan stops with an error message each time. There’s no ref. code so I can’t easily diagnose the problem. I had no problems running the “full” scan with the July ’07 tool, and I prefer to run the “full” scan because it finds and removes some e-mail malware that the “quick” scan doesn’t. I’m running...
14
2375
by: morebeer | last post by:
I got the same problem, hundreds of SQL tables been infected with this malicious javascript code. But although closing the original injection leak and also having replaced all strings in all tables, my tables being infected again and again. I already checked all stored procedures but couldn't find anything suspicious. Any help how to get rid of this f* malware is highly appreciated!!!
0
9689
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, well explore What is ONU, What Is Router, ONU & Routers main usage, and What is the difference between ONU and Router. Lets take a closer look ! Part I. Meaning of...
0
10495
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10269
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10248
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
1
7573
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupr who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6811
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5597
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
3764
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2942
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.