mjrpes3
Golden Member
- Oct 2, 2004
- 1,876
- 1
- 0
A month back I got hit with a malware that was able to installed itself on my computer just by visiting a website (and it wasn't even pr0n). I had to do a reinstall because it was so invasive. This was an eye-opener for me because I thought I didn't have to worry about this stuff as long as I ran firefox, avoided downloading anything, and used a firewall. I didn't even have antivirus installed. me == dummy.
I was never able to determine what exactly let it through, whether it was a firefox, flash, foxit, or a java exploit. But I stumbled upon this article about exploit kits that probe your browser for known security holes:
http://www.krebsonsecurity.com/2010/01/a-peek-inside-the-eleonore-browser-exploit-kit/
I was never able to determine what exactly let it through, whether it was a firefox, flash, foxit, or a java exploit. But I stumbled upon this article about exploit kits that probe your browser for known security holes:
http://www.krebsonsecurity.com/2010/01/a-peek-inside-the-eleonore-browser-exploit-kit/
Moral of the story: always keep browser and add-ons up to date, consider not using pdf plug-ins or java runtime if you don't really need them, use flashblock, and use antivirus software just in case anything else gets through... which is bound to happen at some point.Its important to keep in mind that some of these exploits are browser-agnostic: For example, with the PDF exploits, the vulnerability being exploited is the PDF Reader browser plug-in, not necessarily the browser itself. That probably explains the statistics in the images below, which shows a fairly high success rate against Opera, Safari, and Google Chrome users.