Attacks/Breaches
7/16/2010
01:56 PM
Connect Directly
RSS
E-Mail
50%
50%

Malware Spreading Via USB Drives

The Stuxnet rootkit launches even with AutoRun and AutoPlay disabled and is known to affect Windows 7 Enterprise Edition x86 operating systems.

Security experts are warning of never-before-seen malware, dubbed Stuxnet, that spreads via USB drives, infecting PCs via an unknown -- aka zero-day -- Windows vulnerability. Unfortunately, the attack works even with AutoRun and AutoPlay disabled, and affects at least Windows 7 Enterprise Edition x86 operating systems.

The malware was first reported by VirusBlokAda, an antivirus company based in Belarus. According to an analysis released by the firm, "You just have to open [an] infected USB storage device using Microsoft Explorer or any other file manager that can display icons, to infect your operating system and allow execution of [the] malware program." Once a PC is infected, the rootkit takes additional steps to then camouflage the .lnk files and its system process threads.

Reportedly, the malware's purpose is to gather any information relating to Siemens SCADA (supervisory control and data acquisition) system software.

But exactly how Stuxnet works remains somewhat unclear. "Although analysis is not complete, it would appear that the flaw is in how Windows Explorer loads the image to display when showing a shortcut," according to Chester Wisniewski, a security expert at antivirus vendor Sophos. "This feature is being used to exploit a vulnerability and execute a DLL to load the malware on the system."

Here's what else is known: The malware uses .lnk files to "to launch files from USB storage devices, a method which hasn't been used before," said Wisniewski. To infect further USB drives, the malware also dynamically generates a new .lnk file for each new USB device. "At this time it is unclear whether this is necessary for the exploit to work, or whether it is a control mechanism for the perpetrators of this attack," he said.

Interestingly, the DLL is disguised as a device driver, which is what allows it to auto-load, thanks to the malware having a valid digital signature from Realtek Semiconductor, a legitimate company. Security researchers are anxious to learn how attackers got their hands on the digital signature, since such signatures are critical for differentiating good software from bad.

As that suggests, "digitally signed malware is a nightmare for antivirus developers," said Aleks Gostev, a security expert at antivirus vendor Kaspersky Lab, in a blog post.

Patching the vulnerability or vulnerabilities exploited by Stuxnet will likely require an operating system fix from Microsoft, rather than simply recalling Realtek's digital signature. "Recalling a certificate from a company like this simply isn't feasible -- it would cause an enormous amount of the software which they've released to become unusable," said Gostev.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.