• Increase font size
  • Default font size
  • Decrease font size
Home IT 101 Blog TechwebReality Info Is Internet Explorer leaking sensitive information?

IT Discussions 101

Basic IT fundamental discussion and solutions

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login

Is Internet Explorer leaking sensitive information?

Posted by on in Rules
  • Font size: Larger Smaller
  • Hits: 2218
  • Subscribe to this entry
  • Print
  • PDF

Do you use Internet Explorer? If you do, hopefully you’ve already applied the updates from Patch Tuesday earlier this week. But, even if you did it seems your browser might still be vulnerable to a potentially serious issue.


Spider.io, a company in the business of helping customers distinguish between actual human website visitors and automated bot activity, claims to have discovered a flaw that affects Internet Explorer the current flagship browser from Microsoftversions 6 through 10. The vulnerability reportedly allows the mouse cursor position to be tracked wherever it is on the screen—even if IE is minimized.

Spider.io disclosed the vulnerability to Microsoft on October 1, 2012, but it was not addressed in the most recent security update for Internet Explorer. Spider.io asserts that the flaw is being actively exploited, and claims the Microsoft Security Research Center (MSRC) has acknowledged the vulnerability, but has no immediate plan to patch it.

A bug in IE may leak potentially sensitive information

I asked Microsoft for its position on the alleged vulnerability. A spokesperson sent me this official response: “We are currently investigating this issue, but to date there are no reports of active exploits or customers that have been adversely affected. We will provide additional information as it becomes available and will take the appropriate action to protect our customers.”

Jason Miller, manager of research and development for VMware questions whether the issue is a “bug” or a “feature”. “One could question whether this is a vulnerability or a feature introduced into the browser to help establish metrics of usage. Regardless, the researchers have proven that this “issue” could be used maliciously.”

I spoke with Qualys CTO Wolfgang Kandek. He expressed concerns over the implications such a vulnerability might have for online banking. Many banks have implemented on-screen virtual keyboards for entering account credentials as a means of avoiding traditional keylogger attacks.

Andrew Storms, director of security operations for nCircle, agrees. “This exploit renders that mitigation null and void -- it has the effect of a key logger on virtual keyboards. Attackers could potentially capture the clicks connected with banking credentials using this exploit and that isn’t good news for the 63 million Americans that bank online.”

Alex Horan, senior product manager at CORE Security, adds that supposedly “safe” websites may not be so safe. “It also reinforces that just because you are visiting YouTube or the New York Times doesn’t mean all the content on that site is owned or managed by them—serving up malicious ads on trusted mainstream sites is a great way to expose your attack to a large volume of user.”

Horan suggests abandoning IE until or unless the issue is patched by Microsoft.

Storms says, “If this vulnerability is confirmed, it has the potential to require an out-of-band patch and that’s something everyone would like to avoid this holiday season.”

Tagged in: Internet Explorer