Tara Seals at InfoSecurity Magazine has a scary post, which relies on research published last week from EnSilo. It appears that Microsoft can’t fix t
[See the full post at: AtomBombing]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
AtomBombing
Home » Forums » Newsletter and Homepage topics » AtomBombing
- This topic has 23 replies, 2 voices, and was last updated 8 years, 4 months ago by
Virginia Woolf.
Tags: AtomBomb
AuthorTopicViewing 22 reply threadsAuthorReplies-
Eric
Guest -
woody
Manager -
Bill C.
GuestNovember 9, 2016 at 4:46 pm #23200Here is another interesting article from the same site.
http://www.infosecurity-magazine.com/news/browsers-ability-to-block-malware-downloads/
It compares and analyzes browsers’ ability to block malware downloads.
I use both IE and Firefox so I take no sides here.
-
rc primak
GuestNovember 9, 2016 at 5:00 pm #23201The accounts indicate that at least for now, this is like other code injection exploits in Windows. Either the PC has to be infected already, or else the attacker must have physical access to the PC to inject the code to run this exploit. Nothing posted yet about over-the-Internet or Drive-By applications. But true, it seems this exploit is not going to be easily patched.
Linux has been accused of harboring allegedly unpatchable vulnerabilities for years, and again, most of the exploits until recently, required physical access to the PC. But this may be changing for both Windows and Linux.
Worth watching, but I don’t think the sky is falling.
-
Terry Pickleson
Guest -
woody
Manager -
John W
GuestNovember 9, 2016 at 8:51 pm #23204 -
samak
Guest -
brandy
Guest -
Eric
GuestNovember 10, 2016 at 6:27 am #23212I’ll be very interested to see how Microsoft addresses the issue. I’ll wager that even if it is eventually addressed it won’t be considered a security hole since the discussed AtomBombing exploit has not demonstrated that it is capable of privilege escalation or violating any other security barriers within Windows. If you can run code, you can run code.
-
Anon
Guest -
Anonymous
Guest -
Noel Carboni
GuestNovember 10, 2016 at 11:49 am #23217This “Atombombing” thing sounds more like hype than substance to me, TBH.
Common-sense computing and security measures apply:
1. Think first. Avoid risky computing practices, such as running any old stuff you find online.
2. Create a computing environment that helps you avoid malware sources. Keep in mind that out of the box, Windows does NOT help you do this.
The above two items can be completely effective at keeping you safe. However, if you feel exposed still, there are additional measures…
3. Use active protection. All recent Windows systems come with such protection, which isn’t bad.
4. Scan with a different product to ensure nothing has gotten past the above measures.
5. Make backups!
-Noel
-
Ascaris
GuestNovember 10, 2016 at 12:37 pm #23218Is this really something new? Firewall leak-testing programs like Thermite, Tooleaky, Firehole, HijackThis, etc., have been around for more than a decade.
The leak-testing programs represent a new or undetected malware process that has not been detected by signature-based scanners, and is already running on the system. Each of them uses a different technique to attempt to bypass process firewalling, where only trusted applications are permitted internet access (and thus an unknown piece of malware that manages to get on the system will not be allowed to communicate).
While it might seem that something like a browser would be the obvious choice for hijacking, those are also much more likely to be scrutinized or sandboxed. Hijacking a smaller program that also has net access (perhaps to check for updates to itself) works just as well, and is more likely to succeed without being detected.
It’s easy to say that “if the executable code is running on the system already, it’s too late.” While every precaution should (of course) be taken to prevent that from happening, it does no good to concede defeat in advance in such cases. The best defenses are multi-layered; do all you can to prevent an unknown malware from executing, but have countermeasures in place in case such a malware DOES manage to get started on the system.
I’ll post the anecdote I have about that in a moment here. I’ve had this site fail to post my longer messages without telling me anything, so I guess there is a length limit that is somehow not being communicated when I exceed it.
-
woody
Manager -
Ascaris
GuestNovember 10, 2016 at 12:55 pm #23220For many years, I ran a now-defunct software firewall/antimalware/HIPS (host intrusion prevention system) called Agnitum Outpost. It saved my bacon one time when I was browsing information about guitar strings.
The guitar site had apparently been compromised, as it didn’t contain the information as described by the search engine (which would have been Altavista at the time, I think). It redirected to what seemed like a blank page on some site whose URL had to do with legalizing pot or something.
Outpost popped up a message asking if I wanted to allow an unknown executable to run. In a moment of sphex-like robotic behavior (force of habit of having seen such dialogs many thousands of times for perfectly mundane events), I saw myself hit “allow” on the dialog while some inner part of me seemed like it was screaming to stop.
I knew I had made a mistake almost before I made it. As soon as I got done allowing the unknown program to run, I quickly hit the tray icon and set Outpost to block all net traffic, then I unplugged the ethernet cable to be certain.
Outpost immediately popped up another message after I hit allow; this time, the unknown process was trying to install a registry value to run itself on boot. I hit “block and terminate,” and it did.
I looked at the Outpost log to see the location and name of the file. I found the executable and scanned it with Outpost’s on demand malware scanner– nothing. I tried again with one of the free malware scanners I had (this was a long time ago; I have no idea which one it was then), and it still didn’t trigger an alert.
I zipped the file and password-protected it (after I moved it to a USB drive and restored a full system image, to be sure it was gone), then sent it to a couple of the white hat companies. A couple of days later, I received an email from one that this was a new malware that had not been discovered yet, and that it was now in the database.
The compromised web site had used one of the many zero-days in the Java plugin to execute a drive-by download and execution of the malware. Now it is very well-known that Java is a nightmare (and it’s also nearly totally obsolete, thankfully), but back then… well, if it was common knowledge that Java was a disaster looking for a place to happen, I wasn’t aware of it.
Other than having the Java plugin set to “enabled” in Firefox (I don’t remember if it had the “ask for permission” option then), I hadn’t done any of the risky things like go to warez sites or run programs sent to me in email.
What would that malware have done if Outpost had not discovered it? How long would it have been there before it was discovered? I have no idea.
-
Virginia Woolf
GuestNovember 10, 2016 at 5:00 pm #23221Somewhat long time reader, but first time poster here, and this seemed like a good time to stick my head up and offer an additional viewpoint on this topic.
I’ve been disenchanted with Micro$oft for a long time and have used only their OS for many years. Open source software has been, and continues to be, available for most other needs, e.g., Firefox, Open Office, Libre Office, Thunderbird, etc. I have a Macbook Air that I love and can recommend highly. Others have mentioned their Macbook Pros as non-Windows choices.
But the last moves by M$ were the final straw and pushed me to take a further step that I had been mulling over for months. I installed linux and set up my desktop pc to dual boot Linux Mint and windows 7 and I’ve never been happier.
I think this is noteworthy because I have read comments here from various posters that the “typical pc user” couldn’t and wouldn’t do such things as switch to linux. And, as a card-carrying member of the Middle-aged Woman demographic, I think it’s important for “typical” pc users to know that it is possible to completely sever ties with M$ and have a more secure system without the additional costs of Apple products.
I realize that for many people this will seem daunting. And there can be some hurdles in the process, but if one is able to conduct internet searches and follow step-by-step instructions (as any follower of Woody’s blog is clearly able to do), then that person can install linux.
It’s definitely a viable option for people who are just completely fed up and don’t want to use their PCs as doorstops. I’ve read comments from many folks here who clearly have already stepped outside of their respective comfort zones. So what’s another few steps 🙂
-
Anonymous2
Guest -
woody
Manager -
John W
GuestNovember 10, 2016 at 6:56 pm #23224If you are not running a top tier AV package, consider either Avira Free or Bitdefender Free, for basic AV and malware protection, plus Malwarebytes Anti-Expoit Free to prevent browser exploits. The latest AV-Comparatives test results show that Avira, Bitdefender, and Kaspersky consistently score at 99.9% detection rate of known malware samples.
Then If you are running either Firefox or Chrome as your browser, you should consider the uBlock Origin browser add-on. They incorporate a number of active blacklists that will prevent your browser from connecting to known malware domains …
Then don’t run or install anything that you are not 100% sure about 🙂
-
T
Guest -
Anonymous
GuestNovember 10, 2016 at 11:19 pm #23226I do respect your opinion. But the problem with Linux is that a lot of software like Adobe Photoshop simply isn’t on there. Also for PC gamers like myself, a lot games won’t work on there either. And that’ll kill it for a lot of people. Now you might say that I can dual boot. But really it takes up more time than it’s worth for me personally. I do play around with Linux sometimes in a VM. And if I were to completely get rid of Windows them I would lost the ability to play half my Steam games.
But you do have some valid points Virginia. -
Virginia Woolf
GuestNovember 11, 2016 at 8:53 am #23227I understand completely. I play some PC games, as well, which is the only reason that I am keeping Windows 7 as my dual boot. But, as I’m sure you know, Steam is linux friendly with increasing numbers of games that work on linux. And GOG is another good repository for linux and drm-free games. But I know that many very good games are not linux compatible. I honestly believe that the major impetus for more game developers to make their games linux compatible will be their observation that increasing numbers of people are using that platform. Afterall, the tail never wags the dog 🙂
I also have work software that is only PC compatible and for which there is no open source alternative. My solution to that was to use Windows 7 in a VM on my Macbook.
We consumers collectively have largely acquiesced to the M$ hegemony for decades now. If we truly want or expect things to change in this landscape, we need to make the first move.
Viewing 22 reply threads - This topic has 23 replies, 2 voices, and was last updated 8 years, 4 months ago by
-

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Finding Microsoft Office 2021 product key
by
Kathy Stevens
52 minutes ago -
Over-the-Top solves it!
by
RetiredGeek
9 hours, 5 minutes ago -
To Susan – Woody Leonhard, the “Lionhearted”
by
Myst
16 hours, 6 minutes ago -
Extracting Data From All Sheets
by
WSJon5
17 hours, 41 minutes ago -
Use wushowhide in Windows 11 24H2?
by
Tex265
17 hours, 49 minutes ago -
Hacktool:Win32/Winring0
by
Marvel Wars
4 hours, 30 minutes ago -
Microsoft Defender as Primary Security Question
by
blueboy714
2 hours, 11 minutes ago -
USB printers might print random text with the January 2025 preview update
by
Alex5723
20 hours, 19 minutes ago -
Google’s 10-year-old Chromecast is busted, but a fix is coming
by
Alex5723
1 day, 5 hours ago -
Expand the taskbar?
by
CWBillow
1 day, 5 hours ago -
Gregory Forrest “Woody” Leonhard (1951-2025)
by
Susan Bradley
5 minutes ago -
March 2025 updates are out
by
Susan Bradley
6 hours, 58 minutes ago -
Windows 11 Insider Preview build 26120.3380 released to DEV and BETA
by
joep517
1 day, 23 hours ago -
Update Firefox to prevent add-ons issues from root certificate expiration
by
Alex5723
2 days, 6 hours ago -
Latest Firefox requires Password on start up
by
Gordski
2 days, 1 hour ago -
Resolved : AutoCAD 2022 might not open after updating to 24H2
by
Alex5723
2 days, 19 hours ago -
Missing api-ms-win-core-libraryloader-11-2-1.dll
by
IreneLinda
1 day, 18 hours ago -
How Much Daylight have YOU Saved?
by
Nibbled To Death By Ducks
1 day, 21 hours ago -
A brief history of Windows Settings
by
Simon Bisson
1 day, 14 hours ago -
Thunderbolt is not just for monitors
by
Ben Myers
1 day, 13 hours ago -
Password Generators — Your first line of defense
by
Deanna McElveen
1 day, 18 hours ago -
AskWoody at the computer museum
by
Will Fastie
18 hours, 46 minutes ago -
Planning for the unexpected
by
Susan Bradley
1 day, 19 hours ago -
Which printer type is the better one to buy?
by
Bob99
2 days, 21 hours ago -
Upgrading the web server
by
Susan Bradley
2 days, 19 hours ago -
New Windows 11 24H2 Setup – Initial Win Update prevention settings?
by
Tex265
3 days, 14 hours ago -
Creating a Google account
by
DavidofIN
3 days, 13 hours ago -
Undocumented “backdoor” found in Bluetooth chip used by a billion devices
by
Alex5723
3 days, 19 hours ago -
Microsoft Considering AI Models to Replace OpenAI’s in Copilot
by
Alex5723
4 days, 6 hours ago -
AI *emergent misalignment*
by
Alex5723
4 days, 8 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.