<s>
In	O
computing	O
,	O
Download.ject	B-Application
(	O
also	O
known	O
as	O
Toofer	B-Application
and	O
Scob	B-Application
)	O
is	O
a	O
malware	O
program	O
for	O
Microsoft	B-Application
Windows	I-Application
servers	O
.	O
</s>
<s>
When	O
installed	O
on	O
an	O
insecure	O
website	O
running	O
on	O
Microsoft	B-Application
Internet	I-Application
Information	I-Application
Services	I-Application
(	O
IIS	O
)	O
,	O
it	O
appends	O
malicious	O
JavaScript	B-Language
to	O
all	O
pages	O
served	O
by	O
the	O
site	O
.	O
</s>
<s>
Download.ject	B-Application
was	O
the	O
first	O
noted	O
case	O
in	O
which	O
users	O
of	O
Internet	B-Application
Explorer	I-Application
for	O
Windows	B-Application
could	O
infect	O
their	O
computers	O
with	O
malware	O
(	O
a	O
backdoor	O
and	O
key	O
logger	O
)	O
merely	O
by	O
viewing	O
a	O
web	O
page	O
.	O
</s>
<s>
Security	O
consultants	O
prominently	O
started	O
promoting	O
the	O
use	O
of	O
Opera	B-Application
or	O
Mozilla	B-Application
Firefox	I-Application
instead	O
of	O
IE	O
in	O
the	O
wake	O
of	O
this	O
attack	O
.	O
</s>
<s>
Download.ject	B-Application
is	O
not	O
a	O
virus	O
or	O
a	O
worm	O
;	O
it	O
does	O
not	O
spread	O
by	O
itself	O
.	O
</s>
<s>
Hackers	O
placed	O
Download.ject	B-Application
on	O
financial	O
and	O
corporate	O
websites	O
running	O
IIS	O
5.0	O
on	O
Windows	B-Application
2000	I-Application
,	O
breaking	O
in	O
using	O
a	O
known	O
vulnerability	O
.	O
</s>
<s>
Download.ject	B-Application
appended	O
a	O
fragment	O
of	O
JavaScript	B-Language
to	O
all	O
web	O
pages	O
from	O
the	O
compromised	O
servers	O
.	O
</s>
<s>
When	O
any	O
page	O
on	O
such	O
a	O
server	O
was	O
viewed	O
with	O
Internet	B-Application
Explorer	I-Application
(	O
IE	O
)	O
for	O
Windows	B-Application
,	O
the	O
JavaScript	B-Language
would	O
run	O
,	O
retrieve	O
a	O
copy	O
of	O
one	O
of	O
various	O
backdoor	O
and	O
key	O
logging	O
programs	O
from	O
a	O
server	O
located	O
in	O
Russia	O
and	O
install	O
it	O
on	O
the	O
user	O
's	O
machine	O
,	O
using	O
two	O
holes	O
in	O
IE	O
one	O
with	O
a	O
patch	O
available	O
,	O
but	O
the	O
other	O
without	O
.	O
</s>
<s>
These	O
vulnerabilities	O
were	O
present	O
in	O
all	O
versions	O
of	O
IE	O
for	O
Windows	B-Application
except	O
the	O
version	O
included	O
in	O
Windows	B-Application
XP	I-Application
Service	O
Pack	O
2	O
,	O
which	O
was	O
only	O
in	O
beta	O
testing	O
at	O
the	O
time	O
.	O
</s>
<s>
Both	O
the	O
server	O
and	O
browser	B-Application
flaws	O
had	O
been	O
exploited	O
before	O
this	O
.	O
</s>
<s>
Security	O
experts	O
also	O
advised	O
switching	O
off	O
JavaScript	B-Language
,	O
using	O
a	O
web	B-Application
browser	I-Application
other	O
than	O
Internet	B-Application
Explorer	I-Application
,	O
using	O
an	O
operating	B-General_Concept
system	I-General_Concept
other	O
than	O
Windows	B-Application
,	O
or	O
staying	O
off	O
the	O
Internet	O
altogether	O
.	O
</s>
<s>
This	O
particular	O
attack	O
was	O
neutralised	O
on	O
June	O
25	O
when	O
the	O
server	O
from	O
which	O
Download.ject	B-Application
installed	O
a	O
backdoor	O
was	O
shut	O
down	O
.	O
</s>
<s>
Microsoft	O
issued	O
a	O
patch	O
for	O
Windows	B-Application
2000	I-Application
,	O
2003	O
and	O
XP	B-Application
on	O
July	O
2	O
.	O
</s>
<s>
Although	O
not	O
a	O
sizable	O
attack	O
compared	O
to	O
email	O
worms	O
of	O
the	O
time	O
,	O
the	O
fact	O
that	O
almost	O
all	O
existing	O
installations	O
of	O
IE	O
95%	O
of	O
web	B-Application
browsers	I-Application
in	O
use	O
at	O
the	O
time	O
were	O
vulnerable	O
,	O
and	O
that	O
this	O
was	O
the	O
latest	O
in	O
a	O
series	O
of	O
IE	O
holes	O
leaving	O
the	O
underlying	O
operating	B-General_Concept
system	I-General_Concept
vulnerable	O
,	O
caused	O
a	O
notable	O
wave	O
of	O
concern	O
in	O
the	O
press	O
.	O
</s>
<s>
Even	O
some	O
business	O
press	O
started	O
advising	O
users	O
to	O
switch	O
to	O
other	O
browsers	B-Application
,	O
despite	O
the	O
then-prerelease	O
Windows	B-Application
XP	I-Application
SP2	O
being	O
invulnerable	O
to	O
the	O
attack	O
.	O
</s>
