A so-called "watering hole" hacking attack on the US Department of Labor website last week has spread to nine more global websites over the weekend, including those used by European aerospace and nuclear researchers.
Originally discovered on 1 May, the Department of Labor's Site Exposure Matrices site began, via JavaScript inserted into an iFrame format video, redirecting users to an infected site hosting the Poison Ivy remote access Trojan.
Further reading
Internet Explorer zero-day exploit discovered on hacker servers Microsoft patch for zero-day exploit cracked Java zero-day exploit being sold for ‘five digits’
The attack, which is so-named as it targets users of very specific interest groups, was initially thought to affect a vulnerability known as CVE-2012-4792 in Internet Explorer versions 6 through 8 - which Microsoft patched earlier in 2013.
However, it has now become apparent that the exploit is via a zero-day vulnerability in Internet Explorer 8 only. While this is potentially good news for many Internet Explorer users, a recent survey by statistics site WebMarketShare shows Internet Explorer 8 has the largest single share of the browser market, with 23.08 per cent of internet users still using it.
A module for popular "vulnerability testing" software Metasploit was also made available yesterday, so users should be doubly vigilant.
Microsoft has simply suggested IE 8 users upgrade to a newer version for now, but has also said it will tackle the exploit in a Patch Tuesday release in the near future.