Recent cyber attacks on Google and other organizations have been greatly covered by the media, owing much to the size and notability of the companies affected. However, what this incident really does is bring to light the true complexity and sophistication of computer threats and that any user or organization—large or small—can potentially be at risk.
Although these attacks were orchestrated to target certain groups or organizations, any computer can actually fall prey to them. Trend Micro strongly suggests that users keep their systems updated with the latest patches and to apply the necessary workaround fixes for the said Internet Explorer (IE) vulnerability, which can be found in this Microsoft Security Advisory page.
Although there have been some reports that the IE exploit was also found to take advantage of vulnerabilities in Adobe Reader and Acrobat, Adobe states that there has been no evidence that its products were being used as vectors for the said attack. It was, however, one of the organizations that suffered from an attack similar to Google. These Adobe vulnerabilities were found to be exploited by TROJ_PIDIEF.SHK, which, in turn, downloads TROJ_DLOAD.COB onto the affected systems.
Trend Micro™ Smart Protection Network™ protects users from these kinds of attack by preventing the download of all the detected malicious files and by blocking user access to malicious sites.
Additional text by Oscar Abendan, Carolyn Guevarra, and Elizabeth Bookman