Vulnerabilities / Threats
8/1/2011
01:29 PM
50%
50%

Counterfeit Windows XP Breeding Malware

Security firm finds that 74% of all rootkit infections can be traced to Windows XP machines.

Black Hat
Beware Windows XP, as 74% of rootkit infections can be traced to PCs running that operating system. By comparison, only 17% of rootkit infections were spotted running on Vista, and 12% on Windows 7.

That finding comes from Avast--a free antivirus software developer based in Prague--and is based on a six-month study the company conducted of 630,000 malware samples encountered by its users.

Interestingly, the prevalence of rootkits running on Windows XP, which debuted in 2001, is greater than the operating system's actual market share, which for Avast users was 49%, compared with Windows 7 (38%) and Vista (13%).

Attackers favor rootkits because they can surreptitiously be used to gain admin-level access to a PC, then silently install additional files and steal data. "Because of the way they attack--and stay concealed--deep in the operating system, rootkits are a perfect weapon for stealing private data," said Przemyslaw Gmerek, Avast's lead researcher, in a statement. He plans to detail his rootkit research in full, this week at the Black Hat USA conference, a UBM TechWeb event, in Las Vegas.

Most often, rootkits attack the master boot record (in 62% of attacks), followed by driver infections (27%). In terms of specific rootkits, Avast said that Alureon botnet--aka the TDL3 and TDL4 rootkit family--accounted for nearly three-quarters of all rootkit infections.

What, however, makes Windows XP such a rootkit magnet? "One issue with Windows XP is the high number of pirated versions, especially as users are often unable to properly update them because the software can't be validated by the Microsoft update," said Gmerek. As a result, he said, numerous Windows XP users aren't using the latest version--SP3--but rather earlier versions, such as SP2, which Microsoft ceased supporting--as well as patching--in July 2010. (Microsoft has said that it will cease supporting Windows XP SP3 in April 2014.)

Attackers also favor Windows XP because even SP3 lacks some of the anti-rootkit and other security features that Microsoft has added to more recent operating systems, including user account control, PatchGuard, and driver signing.

Since Windows XP, Microsoft has continued to boost the security of its operating systems and applications, although developer uptake of the enhancements can lag. Earlier this year, notably, Microsoft called on developers to implement more secure lifecycle software practices, as well as to better avail themselves of newer Microsoft-built mitigation technologies, including data execution prevention (to prevent attackers from executing arbitrary code) and address space layout randomization (to make it difficult for malware to locate known files on a PC that may contain vulnerabilities).

Read our report on how to guard your systems from a SQL attack. Download the report now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Verdumont Monte
50%
50%
Verdumont Monte,
User Rank: Apprentice
10/11/2012 | 9:01:06 PM
re: Counterfeit Windows XP Breeding Malware
Who knew that using pirated software is bad.. [Pun intended]
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4774
Published: 2015-05-25
Cross-site request forgery (CSRF) vulnerability in the login page in IBM License Metric Tool 9 before 9.1.0.2 and Endpoint Manager for Software Use Analysis 9 before 9.1.0.2 allows remote attackers to hijack the authentication of arbitrary users via vectors involving a FRAME element.

CVE-2014-4778
Published: 2015-05-25
IBM License Metric Tool 9 before 9.1.0.2 and Endpoint Manager for Software Use Analysis 9 before 9.1.0.2 do not send an X-Frame-Options HTTP header in response to requests for the login page, which allows remote attackers to conduct clickjacking attacks via vectors involving a FRAME element.

CVE-2014-6190
Published: 2015-05-25
The log viewer in IBM Workload Deployer 3.1 before 3.1.0.7 allows remote attackers to obtain sensitive information via a direct request for the URL of a log document.

CVE-2014-6192
Published: 2015-05-25
Cross-site scripting (XSS) vulnerability in IBM Curam Social Program Management 6.0 SP2 before EP26, 6.0.4 before 6.0.4.5 iFix10, 6.0.5 before 6.0.5.6, and 6.0.5.5a before 6.0.5.8 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-8146
Published: 2015-05-25
The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (hea...

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.