Security experts are urging users to stop using Internet Explorer, following the discovery of a new flaw that makes PCs vulnerable to malicious code hosted on websites. The security flaw affects Internet Explorer 9 and earlier versions of the browser, although IE10 - which is bundled with Windows 8 - is not affected. Microsoft said attackers can exploit the bug to infect the PC of somebody who visits a malicious website and then take control of the victim's computer.
For consumers it might be easier to simply click on Chrome
The software maker advised customers to install what it rather cryptically calls the Enhanced Mitigation Experience Toolkit (EMET) to prevent hackers gaining access to their systems, buying it time to fix the bug and release a new, more secure version of Internet Explorer. The company did not say how long that will take, but several security researchers said they expect the update within a week.
The EMET software must be downloaded, installed and then manually configured to protect computers from the newly discovered threat, according to the posting from Microsoft. The company also advised customers to adjust several Windows security settings to thwart potential attackers, but cautioned that doing so might impact the PC's usability. Some security experts said it would be too cumbersome for many PC users to implement the measures suggested by Microsoft. Instead they advised Windows users to temporarily switch from Internet Explorer to rival browsers such as Google' Chrome, Firefox or Opera.
"For consumers it might be easier to simply click on Chrome," said Dave Marcus, director of advanced research and threat intelligence with Intel Corp's McAfee security division. Marc Maiffret, chief technology officer of the security firm BeyondTrust, said it may not be feasible for some businesses to install Microsoft's EMET tool on their PCs. He said the security software has in some cases proven to be incompatible with existing programs already running on networks.
Tod Beardsley, an engineering manager with the security firm Rapid7, said that at first blush it appeared that the EMET may not be particularly effective in thwarting potential attacks. Microsoft officials declined to comment on the skepticism that those security experts expressed about the effectiveness of the EMET software.
Discovered last week
Eric Romang, a researcher in Luxembourg, discovered the flaw in Internet Explorer, when his PC was infected by a piece of malicious software known as Poison Ivy that hackers use to steal data or take remote control of PCs.
When he analysed the infection, he learned that Poison Ivy had gotten on to his system by exploiting a previously unknown bug, or "zero-day" vulnerability, in Internet Explorer.
"Any time you see a zero-day like this, it is concerning," said Liam O Murchu, a research manager with antivirus software maker Symantec Corp. "There are no patches available. It is very difficult for people to protect themselves."
Zero-day vulnerabilities are rare, mostly because they are hard to identify - requiring highly skilled software engineers or hackers with lots of time to scrutinise code for holes that can be exploited to launch attacks. Security experts only disclosed discovery of eight major zero-day vulnerabilities in all of 2011, according to Symantec.
Symantec and other major antivirus software makers have already updated their products to protect customers against the newly discovered bug in Internet Explorer. Yet, O Murchu said that may not be sufficient to ward off adversaries.
"The danger with these types of attacks is that they will mutate and the attackers will find a way to evade the defenses we have in place," he said.