Hackers have posted a new version of malicious software that will make it easier for them to exploit an unpatched vulnerability in Microsoft’s Internet Explorer (IE) browser. Based on a critical bug disclosed on March 22, the software was posted by hackers Friday to the Milw0rm.com website.The code exploits a flaw in the way IE processes webpages using the createTextRange() method. Hackers have been using malware that takes advantage of this vulnerability to install unauthorized software on victims’ computers over the past week, but this new generation is considered to be more dangerous, according to security researchers.Older versions of the malware could freeze victims’ browsers for more than a minute, giving them an opportunity to shut down their computers or stop the malicious software before it could complete its work. But the new software works more quickly, meaning it will be particularly effective on older machines with limited memory and processing capabilities, said Craig Schmugar, researcher with McAfee Avert Labs. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Though hackers had not widely adopted the new software as of Friday morning, Schmugar said he expected that to change. “It’s still pretty early,” he said. “I think it’s reasonable to expect that people will shift.” The software also uses new techniques to avoid certain types of signatures used by antivirus vendors, said Aviv Raff, a security researcher based in Israel. “It’s much more effective,” he said. “I think people should know and understand that … now they are more vulnerable.”The fact that the code was released just before the weekend is also worrisome, because it means that “administrators have to wait for Monday to apply their protections and to give warning to users,” said Juha-Matti Laurio, a security researcher in Helsinki. With a fix for the problem expected as late as April 11, the date of Microsoft’s next scheduled security update, security companies Determina and eEye Digital Security issued unsupported patches for the problem. According to eEye, there have been more than 70,000 downloads of its software since its Monday release.Microsoft does not recommend that users install these patches. Instead, it recommends that users disable IE’s Active Scripting feature as a work-around.Despite the severity of the TextRange() bug, McAfee says the malware that takes advantage of it is not particularly widespread. This software at present ranks number 13 in McAfee’s list of the top 20 pieces of malware being reported, Schmugar said.-Robert McMillan, IDG News ServiceThis article is posted on our Microsoft Informer page. For more news on the Redmond, Wash.-based powerhouse, keep checking in.Also, listen to CIO Publisher Gary Beach’s podcast on Microsoft’s upcoming operating system, Vista, as well as the topic of open source. Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content feature Gen AI success starts with an effective pilot strategy To harness the promise of generative AI, IT leaders must develop processes for identifying use cases, educate employees, and get the tech (safely) into their hands. By Bob Violino Sep 27, 2023 10 mins Generative AI Innovation Emerging Technology feature A fluency in business and tech yields success at NATO Manfred Boudreaux-Dehmer speaks with Lee Rennick, host of CIO Leadership Live, Canada, about innovation in technology, leadership across a vast cultural landscape, and what it means to hold the inaugural CIO role at NATO. By CIO staff Sep 27, 2023 6 mins CIO IT Skills Innovation feature The demand for new skills: How can CIOs optimize their team? By Andrea Benito Sep 27, 2023 3 mins opinion The CIO event of the year: What to expect at CIO100 ASEAN Awards By Shirin Robert Sep 26, 2023 3 mins IDG Events IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe