Users of Advanced Micro Devices Inc.’s (AMD’s) microprocessors may want to think twice before looking for technical support on the company’s Web site. Customer support discussion forums on the forums.amd.com site have been compromised and are being used in an attempt to infect visitors with malicious software, an AMD spokesman confirmed Monday.The problem was first reported Monday in a blog posting by Mikko Hypponen, manager of antivirus research at F-Secure Corp. in Helsinki. As of Monday morning, AMD technicians were still working to resolve the problem, according to AMD spokesman Drew Prairie.Because AMD had just learned of the problem, Prairie could give few details on how the site was compromised or on when AMD expected to have the issue resolved. “It’s being worked on and corrected,” he said.According to F-Secure’s Hypponen, attackers are exploiting a widely reported flaw in the way the Windows operating system renders images that use the WMF (Windows Metafile) graphics format. This flaw was patched on Jan. 5, so users who are running versions of Windows that have the latest patches installed are not at risk, he said. Attackers have figured out a way to use AMD’s forums to deliver maliciously encoded WMF images to visitors, which are then used to install unauthorized software on the unpatched systems, he said.In this case, the software appears to be a number of different malicious toolbars. “Most of the toolbars show pop-ups, follow your search and other keyword activity, and use that to target ads to you,” Hypponen said. “It’s for-profit hacking. Somebody is making money from each machine that is hit by these toolbars.” Because of the nature of the WMF vulnerability, however, hackers could install any type of software they wanted on unpatched systems, he said.How the attackers were able to compromise the AMD forums is unclear. Hypponen said that the AMD server could have been hacked, but that the problem could also be due to an intrusion at an AMD partner Web site or at an ISP (Internet service provider), he said.These kind of WMF exploits have already been seen on a number of Web sites, but AMD is the most high-profile victim, Hypponen said. Because users tend to trust content being served by known Web sites like AMD, the hack is particularly troublesome, he added.Ironically, AMD Web site visitors who are using chips that support the new DEP (Data Execution Prevention) feature, which prevents software from running where it doesn’t belong, are probably protected from the WMF malware, Hypponen said. “If you are running an AMD processor with DEP enabled, it likely protects you from the vulnerability that hit you from the AMD site.”By Robert McMillan – IDG News Service (San Francisco Bureau) Related content news UK Cyber Security Council CEO reflects on a year of progress Professor Simon Hepburn sits down with broadcaster ITN to discuss Council’s work around cybersecurity professional standards, careers and learning, and outreach and diversity. By Michael Hill Sep 27, 2023 3 mins Government Government Government news FIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely. By Michael Hill Sep 27, 2023 3 mins Certifications Internet Security Security Hardware news analysis Web app, API attacks surge as cybercriminals target financial services The financial services sector has also experienced an increase in Layer 3 and Layer 4 DDoS attacks. By Michael Hill Sep 27, 2023 6 mins Financial Services Industry Cyberattacks Application Security news Immersive Labs adds custom 'workforce exercising' for each organizational role With the new workforce exercising capability, CISOs will be able to see each role’s cybersecurity readiness, risk areas, and exercise progress. By Shweta Sharma Sep 27, 2023 3 mins Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe