Vulnerabilities / Threats
11/22/2010
12:53 PM
50%
50%

Alureon Malware Bites Windows 7

The threat's rootkit gets an upgrade to compromise Microsoft's 64-bit operating systems by defeating driver-signing security.

How Firesheep Can Hijack Web Sessions
(click image for larger view)
Slideshow: How Firesheep Can Hijack Web Sessions

Security researchers are warning that the sophisticated Alureon -- aka TDL -- malware has gotten an upgrade, enabling it to take down even 64-bit versions of Windows Vista and Windows 7.

According to Chandra Prakash, technical fellow at GFI Labs, "the TDL4 rootkit bypasses driver signing policy on 64-bit machines by changing the boot options of Microsoft boot programs that will allow an unsigned driver to load."

The rootkit, which itself arrives as an unsigned driver, also disables debuggers, which "makes reverse engineering this rootkit very difficult," said Prakash.

Versions of Alureon that target 32-bit Windows first began appearing in 2006. According to Microsoft, "these Trojans allow an attacker to intercept incoming and outgoing Internet traffic in order to gather confidential information such as user names, passwords, and credit card data," and may also enable attackers to pass malicious data to a PC.

The 32-bit version made a large splash after Microsoft's February 2010 Patch Tuesday, when many Windows users found themselves unable to boot their machines. Microsoft traced the cause not to its security update directly, but rather to the effect that its security update had on machines already infected with Alureon.

At the time, Microsoft noted that 64-bit versions of Windows were immune from Alureon thanks to kernel patch protection, aka "PatchGuard."

Now, instead of taking down PatchGuard, Alureon has simply routed around it. According to Microsoft, "normally, 64-bit Windows has several protections against untrusted modifications to the kernel, including a requirement that all drivers be signed, and PatchGuard, which prevents tampering of certain system structures." Accordingly, Alureon taps a feature built into 64-bit Windows -- intended to support full disk encryption and software compression -- which allows unsigned drivers to be loaded.

Microsoft's statement on the matter is that Alureon "does not actually violate the guarantees PatchGuard provides about system integrity." That said, it will exploit 64-bit Windows.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?