百科全书条目:开拓:HTML全文/ IframeRef.gen - 了解更多关于恶意软件 ...

来源:百度文库 编辑:神马文学网 时间:2024/04/29 16:55:59
Get the latest definitions获取最新的定义Microsoft Forefront微软的Forefront
Microsoft Security EssentialsMicrosoft安全要点
Windows Live OneCare的Windows Live OneCare
Windows DefenderWindows Defender会
Definition change log定义更改日志
Learn more about malware了解更多关于恶意软件Research malware研究恶意软件
Active malware活跃的恶意软件
Additional tools and resources其他工具和资源
Guidance and advice指导和建议
News and events新闻和活动
Research papers研究论文
Security Intelligence Report安全情报报告
Glossary词汇
MMPC blogMMPC博客
Submit a sample提交样本Submit a sample提交样本
Learn about us了解我们Who we are and what we do我们是谁,我们做什么
Awards and certifications奖项与认证
Encyclopedia entry 百科全书条目
Updated: Nov 10, 2010 | Published: Jun 27, 2007更新时间:2010年11月10日|发布时间:2007年6月27日
Aliases 别名
HTML/Psyme ( AhnLab ) 的HTML / Psyme( 安博士 )
Trojan.Clicker.HTML.Iframe.W ( BitDefender ) Trojan.Clicker.HTML.Iframe.W(BitDefender的 )
HTML/Scoati ( CA ) 的HTML / Scoati( 加利福尼亚州 )
Trojan-Spy.HTML.Fraud.gen ( Kaspersky ) 木马Spy.HTML.Fraud.gen( 卡巴斯基 )
Troj/Fujif-Gen ( Sophos ) Troj / Fujif根 (Sophos公司 )
Trojan.Dowiex!inf ( Symantec ) Trojan.Dowiex!干扰素 ( 赛门铁克 )
HTML_IFRAME.BL ( Trend Micro ) HTML_IFRAME.BL( 趋势科技 )
Alert Level(?) 戒备级别(?)
Severe严重
Antimalware protection details 反恶意软件保护的详细信息
Microsoft recommends that you download thelatest definitions to get protected. Microsoft建议您下载最新的定义得到保护。 Detection last updated:检测最后更新:
Definition: 1.95.141.0定义:1.95.141.0
Released: Nov 18, 2010发行时间:二〇一〇年十一月十八日 Detection initially created:最初创建的检测:
Definition: 1.45.287.0定义:1.45.287.0
Released: Oct 07, 2008发行时间:2008年10月7日
On this page在此页
Summary |Symptoms |Technical Information |Prevention |Recovery摘要 |症状 |技术资料 |预防 |复原
Summary综述
Exploit:HTML/IframeRef.gen is generic detection for specially formed IFrame tags that point to remote Web sites containing malicious content, for example malicious Javascript containing an exploit for a specific vulnerability.漏洞:HTML全文/ IframeRef.gen是特殊形式的iframe标记的通用检测指向远程网站含有恶意内容,例如含有恶意JavaScript利用特定漏洞。
Top顶部
Symptoms症状
There are no common symptoms associated with this threat - links are activated within IFrames while viewing Web content on maliciously modified pages.没有与此相关联的威胁常见的症状 - 在iframe的激活链接在观看恶意修改的页的网站内容。 Alert notifications from installed antivirus software may be the only symptom(s).从已安装防病毒软件警报通知可能是唯一的症状(s)。
Top顶部
Technical Information (Analysis)技术信息(分析)
Exploit:HTML/IframeRef.gen is generic detection for specially formed IFrame tags that point to remote Web sites containing malicious content, for example malicious Javascript containing an exploit for a specific vulnerability.漏洞:HTML全文/ IframeRef.gen是特殊形式的iframe标记的通用检测指向远程网站含有恶意内容,例如含有恶意JavaScript利用特定漏洞。
Installation 安装
An IFRAME is a valid HTML element which allows content from a separate page or Web site to be embedded in other Web site pages. IFRAME是一个有效的HTML元素,允许从一个单独的页面或网站的内容在其他网站页面中嵌入。 In the case of Exploit:HTML/IframeRef.gen, a malicious IFrame is appended at the end of local html files.在案例的开发利用:HTML全文/ IframeRef.gen,恶意IFRAME是附加在本地HTML文件的末尾。 The rendered IFrame may be only one pixel in length to avoid being spotted by the user.呈现的IFrame的可能只有一个长度,以避免被用户发现像素。
Exploit:HTML/IframeRef.gen requires that a user view or visit the Web sites or open the HTML page in order for malicious action to occur.漏洞:HTML全文/ IframeRef.gen要求用户查看或访问的网站或打开,以便在HTML页的恶意动作发生。
Analysis by Cristian Craioveanu 分析克里斯蒂安Craioveanu
Top顶部
Prevention预防
Take the following steps to help prevent infection on your computer: 采取以下步骤来帮助防止计算机病毒对您的:
Enable a firewall on your computer.您的计算机上启用防火墙。
Get the latest computer updates for all your installed software.获得所有最新的电脑安装的软件更新。
Use up-to-date antivirus software.最多使用最新的防病毒软件。
Limit user privileges on the computer.在电脑上限制用户权限。
Use caution when opening attachments and accepting file transfers.打开附件时要小心,并接受文件传输。
Use caution when clicking on links to web pages.到时要小心点击网页链接。
Avoid downloading pirated software.避免下载盗版软件。
Protect yourself against social engineering attacks.防范社会工程学攻击。
Use strong passwords.使用强密码。
Enable a firewall on your computer 让你的电脑防火墙
Use a third-party firewall product or turn on the Microsoft Windows Internet Connection Firewall.使用第三方的防火墙产品或打开微软Windows Internet连接防火墙。
How to turn on the Windows Firewall in Windows 7如何打开Windows 7的Windows防火墙
How to turn on the Windows Firewall in Windows Vista如何打开Windows Vista的Windows防火墙
How to turn on the Windows firewall in Windows XP如何打开Windows XP的Windows防火墙
Get the latest computer updates 获取最新的电脑更新
Updates help protect your computer from viruses, worms, and other threats as they are discovered.更新可帮助保护您免受病毒,蠕虫和其他威胁的计算机,因为他们被发现。 It is important to install updates for all the software that is installed in your computer.重要的是要安装的所有在您的计算机安装的软件更新。 These are usually available from vendor websites.这些通常是从供应商的网站提供。
You can use the Automatic Updates feature in Windows to automatically download future Microsoft security updates while your computer is on and connected to the Internet.您可以使用Windows中的自动更新功能自动下载未来的微软安全更新,而您的计算机并连接到互联网。
How to turn on Automatic Updates in Windows 7如何打开自动更新在Windows 7
How to turn on Automatic Updates in Windows Vista如何打开自动更新在Windows Vista中
How to turn on Automatic Updates in Windows XP如何开启自动在Windows XP更新
Use up-to-date antivirus software 最多使用最新的防病毒软件
Most antivirus software can detect and prevent infection by known malicious software.大多数防病毒软件可以检测和防止已知的恶意软件感染。 To help protect you from infection, you should always run antivirus software, such asMicrosoft Security Essentials , that is updated with the latest signature files.为了帮助保护你的感染,你应该始终运行,如反病毒软件的Microsoft Security Essentials ,也就是文件的更新最新签名。 For more information, seehttp://www.microsoft.com/security/antivirus/av.aspx .有关详细信息,请参阅http://www.microsoft.com/security/antivirus/av.aspx 。
Limit user privileges on the computer 在电脑上限制用户权限
Starting with Windows Vista and Windows 7, Microsoft introduced User Account Control (UAC), which, when enabled, allowed users to run with least user privileges.与Windows Vista和Windows 7开始,微软推出了用户帐户控制(UAC),其中,启用时,允许用户以最少的用户权限运行。 This scenario limits the possibility of attacks by malware and other threats that require administrative privileges to run.这种情况限制了恶意软件,而且需要管理权限才能运行其他威胁攻击的可能性。
You can configure UAC in your computer to meet your preferences:您可以配置您的计算机的UAC,以满足您的喜好:
User Account Control in Windows 7Windows 7的用户帐户控制
User Account Control in Windows Vista用户帐户控制在Windows Vista中
Applying the Principle of Least Privilege in Windows XP应用最小权限的Windows XP中的原则
More on User Account Control有关用户帐户控制
Use caution when opening attachments and accepting file transfers 打开附件时要小心,并接受文件传输
Exercise caution with email and attachments received from unknown sources, or received unexpectedly from known sources.  Use extreme caution when accepting file transfers from known or unknown sources.运动与电子邮件和附件谨慎收到来源不明的,或接收来自已知来源意外。受理时要特别小心从已知或未知来源的文件传输。
Use caution when clicking on links to web pages 使用时要小心页面点击网页上的链接
Exercise caution with links to web pages that you receive from unknown sources, especially if the links are to a webpage that you are not familiar with, unsure of the destination of, or suspicious of.锻炼时要小心到网页,您会收到来源不明的,特别是如果链接到一个网页,你不熟悉的,最终目的,不确定或可疑的链接。 Malicious software may be installed in your computer simply by visiting a webpage with harmful content.恶意软件可能被安装在您的电脑只要访问带有有害内容的网页。
Avoid downloading pirated software 避免使用盗版软件下载
Threats may also be bundled with software and files that are available for download on various torrent sites.威胁可能也被捆绑的软件和文件,这些文件在各种洪流网站可供下载。 Downloading "cracked" or "pirated" software from these sites carries not only the risk of being infected with malware, but is also illegal.下载“破解”或“盗版”从这些网站进行软件不仅被恶意软件感染的风险,而且也是非法的。 For more information, see 'The risks of obtaining and using pirated software '.有关详细信息,请参阅'盗版软件的风险,获取和使用 '。
Protect yourself from social engineering attacks 保护自己从社会工程攻击
While attackers may attempt to exploit vulnerabilities in hardware or software to compromise a computer, they also attempt to exploit vulnerabilities in human behavior to do the same.虽然攻击者可能会试图利用在硬件或软件的漏洞侵入电脑,他们还尝试利用人类行为的漏洞做同样的。 When an attacker attempts to take advantage of human behavior to persuade the affected user to perform an action of the attacker's choice, it is known as 'social engineering'.当一个攻击者试图利用人的行为受影响的优势,说服用户来执行攻击者所选择的行动,它被称为'社会工程'。 Essentially, social engineering is an attack against the human interface of the targeted computer.从本质上讲,社会工程,是违背了目标计算机人机界面的攻击。 For more information, see 'What is social engineering? '.有关详细信息,请参阅'什么是社会工程? '。
Use strong passwords 使用强密码
Attackers may try to gain access to your Windows account by guessing your password.攻击者可能会尝试通过猜你的密码访问您的Windows帐户。 It is therefore important that you use a strong password – one that cannot be easily guessed by an attacker.因此,重要的是你使用强密码 - 一个不容易被攻击者猜到。 A strong password is one that has at least eight characters, and combines letters, numbers, and symbols.一个强大的密码是一个至少有八个字符,并结合字母,数字和符号。 For more information, seehttp://www.microsoft.com/protect/yourself/password/create.mspx .有关详细信息,请参阅http://www.microsoft.com/protect/yourself/password/create.mspx 。
Top顶部
Recovery恢复
To detect and remove this threat and other malicious software that may be installed in your computer, run a full-system scan with an up-to-date antivirus product such as the following:为了检测和清除此威胁和其他恶意软件,可能会在您的计算机上安装,运行全系统具有保持在最新的防病毒产品扫描,如以下:
Microsoft Security EssentialsMicrosoft安全要点
For more information on antivirus software, seehttp://www.microsoft.com/windows/antivirus-partners/ .欲了解更多信息,防病毒软件,请http://www.microsoft.com/windows/antivirus-partners/ 。