473,811 Members | 2,770 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Malicious JavaScript code,

AIUI, it was not all that long ago when the threat to personal users,
was attachments that when executed compromised machines with keyloggers,
trojans, etc.

Now it seems that the big problem is reading a webpage or an HTML e-mail
and getting affected through the scripting. My understanding is that
the script downloads the malicious program from the web and sets it to
run on start up through the start-up folder or in the registry.

I don't know much about this; can someone suggest a good web site to
start learning a bit more about these threats. I have googled, but I am
not quire sure of the best search terms, and since there is so much
information out there, a site that experienced people endorse would be a
lot of help.

In particular, it seems as if JavaScript dowloading a trojran without
the user clicking an attachment is a big problem.

Thanks.
Jan 27 '06
28 3039
cwdjrxyz said the following on 1/28/2006 3:58 AM:

<snip>
. If this very long URL fails, just use advanced search, require virus
or worm, and require javascript. Javascript is very much alive and well
in many recent bugs.


There are 20,500,000 hits for Driving and Virus OR Worm so you better
stop driving or your computer will get infected! Its true! I read it in
Google......

<URL:
http://www.google.com/search?as_q=dri ving&num=50&hl= en&btnG=Google+ Search&as_epq=& as_oq=virus+wor m&as_eq=&lr=&as _ft=i&as_filety pe=&as_qdr=all& as_occt=any&as_ dt=i&as_sitesea rch=&as_rights= &safe=images >

--
Randy
comp.lang.javas cript FAQ - http://jibbering.com/faq & newsgroup weekly
Javascript Best Practices - http://www.JavascriptToolbox.com/bestpractices/
Jan 28 '06 #11

Randy Webb wrote:
cwdjrxyz said the following on 1/28/2006 1:50 AM:
cwdjrxyz wrote:
Do you work for a security company or an anti-virus company? It has to
be one of the two to come up with the kind of arguments you did (none of
which are true).
No, I do not work for a security or anti-virus company. You are
entitled to your opinion about what is true. However I suspect that
many would argue with this conclusion, especially for those who use
Windows XP without protective programs. I think that even Microsoft
will suggest protective programs on computers that use Windows OSs, and
they are not a big player in the security market - at least not yet.
The XP does provide a one way firewall, and I doubt if Microsoft went
to the expense to put this in if they did not think it was needed -at
least for average computer users. If you want a 2 way firewall, you
have to obtain it elsewhere. Or if you are on broadband and use a
router with firewall protection, as often is the case, the issue
concerning a firewall on the computer itself becomes moot.
The best defense against being infected? Knowledge. Knowledge of how
your computer works (at least a basic understanding) and a basic
knowledge of how the web works. Now you can be safe.
The world is seldom ideal, and people who post to this and other
technical NGs likely know far more about computers than the average
computer owner. Also several family members may use the same computer,
and some may not know much about it. My impression is that many PC
owners now just consider it as another household appliance, expect it
to work well out of the box, and are not going to be bothered with much
upkeep. At least in the US, many computers are replaced when they
become very slow because of infection with multiple viruses and worms
or other technical issues, even though they often could be easily fixed
if the owner did just a little research, or perhaps asked a neighbor
teen computer geek to take a look.They could care less about how the
computer works. As long as it does email, allows them to use their bank
etc, and allows them to order goods, they are happy. Some, especially
those who live alone, are into chat.
Even my mother knows how to keep from getting her computer infected. She
has no firewall and no anti-virus program but she has the Knowledge to
know how to stay safe.


I have no idea what OS and browser your mother's computer uses. I have
know people who have an older Mac who have no protection and are not
especially careful, but who have never had problems, because there are
far fewer viruses and worms aimed at these older Macs. However you
mother has a son who is quite knowledgable about computers :-). For all
I know, your mother could be a computer engineer. However not all
mothers are especially careful when using a computer or have sons who
are knowledgable. Of course some mothers think mother-knows-best and
what you say to them goes in one ear and out the other.

Jan 28 '06 #12
On 27 Jan 2006 18:29:35 -0800, "cwdjrxyz" <sp*******@cwdj r.info>
wrote:

Hywel Jenkins wrote:
Feel free to go in to some detail about how JavaScript "will cause
serious problems".


A very early JS exploit used script to open the Netscape home page in
windows without limit. It also wrote "Crashing" in the status bar, and
the computer crashed. This is a very simple bug by today's standards.
Rather than playing child-like pranks such as the above, the modern
hacker may not want you to know your computer is infected. He or she
may be more interested in making your computer a zombie to send out
spam email or to obtain your personal information such as various
account numbers.
Also give some detail on how "just sign[ing] onto
the web" will cause infection.


McAfee features a different bug on their security center home page
every few days. Here is one of their descriptions:

"W32/IRCbot.worm! is a medium risk worm for home users. You can be
infected simply by going online. Once infected, your computer may
restart continuously."

If you follow a McAfee link to a more detailed description of the worm,
you find in part:

"This threat scans for MS05-039 exploitable systems. When a vulnerable
system is found, it uses a buffer overflow to write the worm file to
that machine via a TFTP upload on port 8594. Blocking this port via
McAfee Desktop Firewall or McAfee Personal Firewall will prevent
infection even if the buffer overflow is not prevented."

Few of us have the time or interest to keep up with the details of the
several new important bugs discovered nearly every week.


Keeping ports in stealth mode is pretty basic, IMO.
Mason Barge

"If this is coffee, please bring me some tea. If this is tea, please bring me some coffee."
-- Abraham Lincoln

Jan 29 '06 #13
"cwdjrxyz" <sp*******@cwdj r.info> writes:
XP is a favorite target of hackers
I never noticed that. Competent hackers even seem to be notoriously
uninterested; sad, isn't it.
Macs have been hacked


That would be successfully getting rid of HFS+, I believe. *Please*
share (wherever it would be on topic, surely not here).

Jan 29 '06 #14
VK

Noone Here wrote:
AIUI, it was not all that long ago when the threat to personal users,
was attachments that when executed compromised machines with keyloggers,
trojans, etc.

Now it seems that the big problem is reading a webpage or an HTML e-mail
and getting affected through the scripting. My understanding is that
the script downloads the malicious program from the web and sets it to
run on start up through the start-up folder or in the registry.

I don't know much about this; can someone suggest a good web site to
start learning a bit more about these threats. I have googled, but I am
not quire sure of the best search terms, and since there is so much
information out there, a site that experienced people endorse would be a
lot of help.

In particular, it seems as if JavaScript dowloading a trojran without
the user clicking an attachment is a big problem.


Such questions are better to be posted/answered at astalavista.com and
so.
Briefly and plainly: JavaScript by itself can do *nothing* to your
computer because it doesn't provide access to any system resources. The
best achievement within JavaScript itself would be some
systemwise-harmless nastiness like:
while (true) {
alert("I'm cool hacker Joe!");
} // :-)

JavaScript though can be used to unitiate host objects with system
access (DOM / ActiveX / XPConnect). This aspect is really out of
JavaScript responsability and depends of how wise the relevant object
have been written. For example IE 6.0 has a by-design hole in one
module allowing to infect the system in seconds even with *any
anti-virus software installed*. This hole was finally fixed only in IE
on XP SP2 or higher. On any lower versions your only protection is do
not go to any suspitious places. And this exploit also doesn't depend
on JScript enabled or not - only on <object> activation.

Does JavaScript / JScript disabled gurantees safe browsing? Not at all.
If say you're using Windows higher then Win98, you are vulnerable to
port attacks and you have to have personal firewall installed (or sit
behind a corporate one). Otherwise you even do not need to launch your
prowser - Internet connection itself is enough to be infected if your
computer is found by port spiders.

Does JavaScript / JScript disabled removes some possible
vulnerabilities ? Yes it does, but only smaller part of them.

1) Antivirus with regular update subscription
2) Firewall
3) All producer recommended updates for your OS
4) Latest producer recommended version of your preffered browser
5) A regular cautioness with files received from the Web

There are some money and efforts required to invest from the *customer
side* and it is much more (as you can see) than click some "disabled"
button.

IMHO

Jan 29 '06 #15
Mason Barge wrote:
Keeping ports in stealth mode is pretty basic, IMO.

^^^^^^^^^^^^^^^ ^^^^^^
Please get informed about TCP.
PointedEars
Jan 29 '06 #16
In article <11************ *********@g47g2 000cwa.googlegr oups.com>,
sp*******@cwdjr .info says...

Lee wrote:
cwdjrxyz said:


Hywel Jenkins wrote:

> Feel free to go in to some detail about how JavaScript "will cause
> serious problems".

A very early JS exploit used script to open the Netscape home page in
windows without limit.


Very early. What does that have to do with how Javascript "will cause
serious problems"?


A virus that crashes a computer is a serious problem to me, but
everyone may have a different threshold for what is serious. Of course
this virus is seldom met anymore. I gave it as an example of a pure JS
virus


It wasn't a virus, dumb-ass.

--

Hywel
http://kibo.org.uk/
Jan 29 '06 #17
In article <11************ **********@g49g 2000cwa.googleg roups.com>,
sp*******@cwdjr .info says...

Randy Webb wrote:
cwdjrxyz said the following on 1/28/2006 1:50 AM:
cwdjrxyz wrote:
Do you work for a security company or an anti-virus company? It has to
be one of the two to come up with the kind of arguments you did (none of
which are true).


No, I do not work for a security or anti-virus company. You are
entitled to your opinion about what is true. However I suspect that
many would argue with this conclusion, especially for those who use
Windows XP without protective programs. I think that even Microsoft
will suggest protective programs on computers that use Windows OSs, and
they are not a big player in the security market - at least not yet.
The XP does provide a one way firewall


It has two-way functionality.

Even my mother knows how to keep from getting her computer infected. She
has no firewall and no anti-virus program but she has the Knowledge to
know how to stay safe.


I have no idea what OS and browser your mother's computer uses. I have
know people who have an older Mac who have no protection and are not
especially careful, but who have never had problems, because there are
far fewer viruses and worms aimed at these older Macs.


Myth.

--

Hywel
http://kibo.org.uk/
Jan 29 '06 #18
On Sat, 28 Jan 2006 04:16:04 -0500, in comp.lang.javas cript Randy Webb
<Hi************ @aol.com>
<ub************ ********@comcas t.com> wrote:
| cwdjrxyz said the following on 1/28/2006 1:50 AM:
| > cwdjrxyz wrote:
|
| <snip>
|
| Do you work for a security company or an anti-virus company? It has to
| be one of the two to come up with the kind of arguments you did (none of
| which are true).
|
| The best defense against being infected? Knowledge. Knowledge of how
| your computer works (at least a basic understanding) and a basic
| knowledge of how the web works. Now you can be safe.
|
| Even my mother knows how to keep from getting her computer infected. She
| has no firewall and no anti-virus program but she has the Knowledge to
| know how to stay safe.


My experience (take it for what it is worth).
I have cable connection.
I was rebuilding my machine after a crash.
I formatted the hard drive and re-installed the OS.
I left the cable connection as the setup would've detected this and
configured it for me.
After the OS was installed I then installed the AV app.
It reported 5 virii - all because I had a connection to the internet.
---------------------------------------------------------------
jn******@yourpa ntsyahoo.com.au : Remove your pants to reply
---------------------------------------------------------------
Jan 29 '06 #19

Hywel Jenkins wrote:
In article <11************ **********@g49g 2000cwa.googleg roups.com>,
sp*******@cwdjr .info says...

Randy Webb wrote:
cwdjrxyz said the following on 1/28/2006 1:50 AM:
> cwdjrxyz wrote:
Do you work for a security company or an anti-virus company? It has to
be one of the two to come up with the kind of arguments you did (none of
which are true).


No, I do not work for a security or anti-virus company. You are
entitled to your opinion about what is true. However I suspect that
many would argue with this conclusion, especially for those who use
Windows XP without protective programs. I think that even Microsoft
will suggest protective programs on computers that use Windows OSs, and
they are not a big player in the security market - at least not yet.

Y> > The XP does provide a one way firewall
It has two-way functionality.


You may be right, but see
http://www.microsoft.com/windowsxp/u...2_wfintro.mspx
for details about the Microsoft firewall included with the XP, post
sp2. It makes mention that there firewall can block incoming attempts
to connect to ports, etc. It does not mention that it will block
outgoing attempts by your computer to connect to somewhere, which is
the second leg of a 2 way firewall. On the 2 way firewall I use, I can
even block a browser so it can not get out. This feature is useful for
a few programs that do not need to be on the web when you use them. A
few programs report back various things that some might consider an
invasion of privacy. I do not use the Microsoft firewall, but rather
another one that is 2 way, keeps detailed logs of all attempts to
connect, and allows you to easily trace the source of attempts. Such
attempts to find open ports happen all of the time from all over the
world, but especially from a few far Eastern countries.

It is interesting that Microsoft, in the reference given, also suggests
use of anti-virus software when using the XP and gives a link to
considerations for selection of such software.

Again, you could be right. Microsoft has so many updates for the XP
that it is difficult to keep track of just what each update does. It
would not surprise me if they made modifications in their firewall, and
since I use another firewall, I would never notice such a possible
change.

This thread has grown into a rather long, now off topic, monster. This
sometimes happens over weekends when there are not many questions
concerning script to answer. Hopefully there will be more posts more
directly concerned with script soon.

Jan 29 '06 #20

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
3543
by: joshw53 | last post by:
I'm sure this is a simple question. I just installed Visual Basic.NET and every time I begin running the program Norton anti-virus says that there is a malicious script file that it suggest I stop. The file is devenv.exe. Is this a problem I should worry about or can I simply allow the file to run? Will it cause problems later, and if so how can I fix things?
2
1197
by: IRAQI OIL IS TOO PRECIOUS | last post by:
Friedman is a malicious mischief monger and misleader In his mind he is probably gloating over the victims he has fooled. Comments below clearly show where he is not an idiot but a malicious schemer. > Restoring Our Honor
1
1866
by: Stimp | last post by:
I have an input field, which will ultimately be stored in a database and the contents of which will be output on screen at some stage. ASP.NET has built-in functionality to prevent users inputing values such as "<script>", etc, to call malicious code, but I'd prefer to back this up with my own input validation. I'll deny < and > characters on input.. any other strings/characters to look for?
0
1236
by: =?Utf-8?B?UGF1bCBILg==?= | last post by:
When I download the August ’07 Malicious Software Removal Tool I am able to run the “quick” scan, but the “full” scan stops with an error message each time. There’s no ref. code so I can’t easily diagnose the problem. I had no problems running the “full” scan with the July ’07 tool, and I prefer to run the “full” scan because it finds and removes some e-mail malware that the “quick” scan doesn’t. I’m running...
14
2375
by: morebeer | last post by:
I got the same problem, hundreds of SQL tables been infected with this malicious javascript code. But although closing the original injection leak and also having replaced all strings in all tables, my tables being infected again and again. I already checked all stored procedures but couldn't find anything suspicious. Any help how to get rid of this f* malware is highly appreciated!!!
0
9731
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, well explore What is ONU, What Is Router, ONU & Routers main usage, and What is the difference between ONU and Router. Lets take a closer look ! Part I. Meaning of...
0
9605
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10136
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9208
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development projectplanning, coding, testing, and deploymentwithout human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7671
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupr who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6893
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5556
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5697
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
3
3020
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.