Hi goofer-ga,
Thanks for the clarification. ISTbar is closely tied to TinyBar, which
is a helper sometimes used to display ISTBar. TinyBar has been known
to exploit a vulnerability in Microsoft Java virtual machine. The
applicable patch is MS00-075 and can be found at:
http://www.microsoft.com/technet/security/bulletin/MS00-075.mspx
TinyBar has also been implicated in iframes cross-frame scripting
exploits. The applicable patch is MS02-066 and can be found at:
http://www.microsoft.com/technet/security/bulletin/MS02-066.mspx
A good resource for information on known TinyBar variants can be found at:
http://www.doxdesk.com/parasite/TinyBar.html
A good resource for information on known ISTBar variants can be found at:
http://www.doxdesk.com/parasite/ISTbar.html
Quite often, no vulnerability is involved, but rather affected by what
is often referred to as a drive-by download. The process starts with a
miscreant ActiveX control. To avoid this, make sure you've got
Internet Explorer configured properly. Mike Healan of Spywareinfo.com
has put together an excellent resource describing the necessary
settings:
http://www.spywareinfo.com/articles/hijacked/prevent.php
Though ISTBar is accused of being porn-related, insinuating that the
victim may have received it while visiting a porn site, this is a
rather common misconception. While a component of ISTBar is
porn-related, i.e. it launches pop-ups affiliate with porn sites,
ISTBar itself is not directly related to porn sites and the porn is a
side affect of the infection, not the cause.
So many of these hijackers are driven by affiliate ad programs.
Websites that sign up for such ad programs generally have no control
over what is advertised through them. The folks that do have control
seldom seem to bother checking out the types of ads that are pushed
through. Thus it is fairly easy to impact a wide range of victims and
often difficult to trace the source.
I hope this helps!
Regards,
antivirus-ga |