Attacks/Breaches
7/16/2010
01:56 PM
50%
50%

Malware Spreading Via USB Drives

The Stuxnet rootkit launches even with AutoRun and AutoPlay disabled and is known to affect Windows 7 Enterprise Edition x86 operating systems.

Security experts are warning of never-before-seen malware, dubbed Stuxnet, that spreads via USB drives, infecting PCs via an unknown -- aka zero-day -- Windows vulnerability. Unfortunately, the attack works even with AutoRun and AutoPlay disabled, and affects at least Windows 7 Enterprise Edition x86 operating systems.

The malware was first reported by VirusBlokAda, an antivirus company based in Belarus. According to an analysis released by the firm, "You just have to open [an] infected USB storage device using Microsoft Explorer or any other file manager that can display icons, to infect your operating system and allow execution of [the] malware program." Once a PC is infected, the rootkit takes additional steps to then camouflage the .lnk files and its system process threads.

Reportedly, the malware's purpose is to gather any information relating to Siemens SCADA (supervisory control and data acquisition) system software.

But exactly how Stuxnet works remains somewhat unclear. "Although analysis is not complete, it would appear that the flaw is in how Windows Explorer loads the image to display when showing a shortcut," according to Chester Wisniewski, a security expert at antivirus vendor Sophos. "This feature is being used to exploit a vulnerability and execute a DLL to load the malware on the system."

Here's what else is known: The malware uses .lnk files to "to launch files from USB storage devices, a method which hasn't been used before," said Wisniewski. To infect further USB drives, the malware also dynamically generates a new .lnk file for each new USB device. "At this time it is unclear whether this is necessary for the exploit to work, or whether it is a control mechanism for the perpetrators of this attack," he said.

Interestingly, the DLL is disguised as a device driver, which is what allows it to auto-load, thanks to the malware having a valid digital signature from Realtek Semiconductor, a legitimate company. Security researchers are anxious to learn how attackers got their hands on the digital signature, since such signatures are critical for differentiating good software from bad.

As that suggests, "digitally signed malware is a nightmare for antivirus developers," said Aleks Gostev, a security expert at antivirus vendor Kaspersky Lab, in a blog post.

Patching the vulnerability or vulnerabilities exploited by Stuxnet will likely require an operating system fix from Microsoft, rather than simply recalling Realtek's digital signature. "Recalling a certificate from a company like this simply isn't feasible -- it would cause an enormous amount of the software which they've released to become unusable," said Gostev.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4497
Published: 2015-08-29
Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token...

CVE-2015-4498
Published: 2015-08-29
The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point i...

CVE-2014-9651
Published: 2015-08-28
Buffer overflow in CHICKEN 4.9.0.x before 4.9.0.2, 4.9.x before 4.9.1, and before 5.0 allows attackers to have unspecified impact via a positive START argument to the "substring-index[-ci] procedures."

CVE-2015-1171
Published: 2015-08-28
Stack-based buffer overflow in GSM SIM Utility (aka SIM Card Editor) 6.6 allows remote attackers to execute arbitrary code via a long entry in a .sms file.

CVE-2015-2987
Published: 2015-08-28
Type74 ED before 4.0 misuses 128-bit ECB encryption for small files, which makes it easier for attackers to obtain plaintext data via differential cryptanalysis of a file with an original length smaller than 128 bits.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.