A bug in Microsoft Corp.’s Internet Explorer (IE) browser gives phishers a way to scan the hard drives of Google Desktop users, according to an Israeli hacker. Because of a flaw in the way IE processes Web pages, a malicious Web site could use the attack to steal sensitive information like credit card numbers or passwords from the hard drives of its visitors.“Google Desktop users who use IE are currently completely exposed,” wrote hacker Matan Gillon in an e-mail interview. “An experienced attacker can covertly harvest their hard drives for sensitive information such as passwords and credit card numbers. Since Google also indexes e-mails which can be read in the Web interface itself, it’s also possible to access them using this attack.”Gillon has posted an extensive description of how such an attack would work, along with a proof of concept exploit, on his blog.The IE bug concerns the way Microsoft’s browser processes Web page layout information using the CSS (Cascading Style Sheets) format. The CSS format is widely used to give Web sites a consistent look and feel, but attackers can take advantage of the way that IE processes CSS to get Google Desktop to reveal sensitive information. Hackers would first need to trick users into visiting a malicious Web site for the attack to be successful, Gillon said. The attack works with IE 6 and Google Desktop v2, but it may also work on other versions of Microsoft’s browser, but it does not work with non-Microsoft browsers like Firefox or Opera, he said.Users can nullify the attack by turning off JavaScript in their browsers, Gillon said. This can be done by disabling “Active scripting” in IE’s Internet Options menu. JavaScript is a popular scripting language used by Web developers to make their sites more dynamic. Users need to be particularly wary of the Web sites they visit these days, because of a second unpatched IE vulnerability that could be used to take over a user’s PC. Hackers posted sample code that exploited this problem over a week ago and Microsoft said that hackers are already using the code in attacks. As with the CSS problem, users must first be tricked into visiting a malicious Web site for this second IE bug to be exploited.Some security experts believe that Microsoft is in the process of rushing out a patch to fix this problem before these attacks become more widespread. These attacks can also be avoided by disabling JavaScript in IE, or by using an alternative browser.Microsoft executives were unavailable to comment on the CSS bug, but a spokeswoman for the company’s public relations agency said the issue is being investigated. Microsoft is not aware of any attacks resulting from the hole, she said.By Robert McMillan – IDG News Service (San Francisco Bureau) Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe