Attacks/Breaches
7/16/2010
01:56 PM
50%
50%

Malware Spreading Via USB Drives

The Stuxnet rootkit launches even with AutoRun and AutoPlay disabled and is known to affect Windows 7 Enterprise Edition x86 operating systems.

Security experts are warning of never-before-seen malware, dubbed Stuxnet, that spreads via USB drives, infecting PCs via an unknown -- aka zero-day -- Windows vulnerability. Unfortunately, the attack works even with AutoRun and AutoPlay disabled, and affects at least Windows 7 Enterprise Edition x86 operating systems.

The malware was first reported by VirusBlokAda, an antivirus company based in Belarus. According to an analysis released by the firm, "You just have to open [an] infected USB storage device using Microsoft Explorer or any other file manager that can display icons, to infect your operating system and allow execution of [the] malware program." Once a PC is infected, the rootkit takes additional steps to then camouflage the .lnk files and its system process threads.

Reportedly, the malware's purpose is to gather any information relating to Siemens SCADA (supervisory control and data acquisition) system software.

But exactly how Stuxnet works remains somewhat unclear. "Although analysis is not complete, it would appear that the flaw is in how Windows Explorer loads the image to display when showing a shortcut," according to Chester Wisniewski, a security expert at antivirus vendor Sophos. "This feature is being used to exploit a vulnerability and execute a DLL to load the malware on the system."

Here's what else is known: The malware uses .lnk files to "to launch files from USB storage devices, a method which hasn't been used before," said Wisniewski. To infect further USB drives, the malware also dynamically generates a new .lnk file for each new USB device. "At this time it is unclear whether this is necessary for the exploit to work, or whether it is a control mechanism for the perpetrators of this attack," he said.

Interestingly, the DLL is disguised as a device driver, which is what allows it to auto-load, thanks to the malware having a valid digital signature from Realtek Semiconductor, a legitimate company. Security researchers are anxious to learn how attackers got their hands on the digital signature, since such signatures are critical for differentiating good software from bad.

As that suggests, "digitally signed malware is a nightmare for antivirus developers," said Aleks Gostev, a security expert at antivirus vendor Kaspersky Lab, in a blog post.

Patching the vulnerability or vulnerabilities exploited by Stuxnet will likely require an operating system fix from Microsoft, rather than simply recalling Realtek's digital signature. "Recalling a certificate from a company like this simply isn't feasible -- it would cause an enormous amount of the software which they've released to become unusable," said Gostev.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.