Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Sophos Blocks Windows Shell Attacks

Malware protection tool doesn't blank out shortcut icons like Microsoft's proposed workaround for the active exploit.

To help safeguard PCs against the Windows Shell -- aka shortcut -- file attack now at large, Sophos on Monday announced the release of Sophos Windows Shortcut Exploit Protection Tool.

The free tool prevents malware from exploiting the Windows Shell vulnerability and warns users when it finds a potential exploit. The tool operates in real time, so users don't have to remember to run it, and intercepts malicious shortcut files both on PC hard drives as well as non-local drives, such as USB drives.

Unlike the Microsoft-recommended workaround and related tool, the Sophos tool won't blank out shortcut file images, turning once colorful and identifiable icons into blank white graphics. Furthermore, Sophos says its tool will work alongside any existing antivirus software.

Malware which exploits the Windows Shell vulnerability first appeared in mid-July, in the form of the Stuxnet worm, which targeted SCADA control systems developed by Siemens, spreading via USB drives. Computers in Iran, more than any other country, appeared to suffer the most infections from Stuxnet.

The shortcut vulnerability is present in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server R2. Attacks which exploit it are so potent because simply displaying a malicious icon in a Microsoft Explorer or file manager window will trigger the attack. Furthermore, attacks exploiting the vulnerability will work even with AutoRun and AutoPlay disabled.

Since Stuxnet first appeared, four new Windows Shell exploits have been discovered: the Dulkis and Vobfus worms, Chymin keylogging software, as well as a variant of the Zeus financial malware. Thankfully, according to F-Secure, "we don't really expect great success for this particular variant of Zeus," because it relies on social engineering to try and trick users into opening a password-protected zip file and copying the malicious DLL file contained therein to a designated directory.

Still, expect to see more malware gunning for the shortcut vulnerability. According to Graham Cluley, senior technology consultant at Sophos, "details of how to exploit the security hole are now published on the web, meaning it is child's play for other hackers to take advantage and create attacks."

Microsoft has yet to patch the vulnerability.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31922
PUBLISHED: 2021-05-14
An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could allow an attacker to smuggle an HTTP request through an HTTP/2 Header. This vulnerability is resolved in 21.1, 20.3R1, 20.2R1, 20.1R2, 19.2R4, and 18.2R3.
CVE-2021-32051
PUBLISHED: 2021-05-14
Hexagon G!nius Auskunftsportal before 5.0.0.0 allows SQL injection via the GiPWorkflow/Service/DownloadPublicFile id parameter.
CVE-2021-32615
PUBLISHED: 2021-05-13
Piwigo 11.4.0 allows admin/user_list_backend.php order[0][dir] SQL Injection.
CVE-2021-33026
PUBLISHED: 2021-05-13
The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the ca...
CVE-2021-31876
PUBLISHED: 2021-05-13
Bitcoin Core 0.12.0 through 0.21.1 does not properly implement the replacement policy specified in BIP125, which makes it easier for attackers to trigger a loss of funds, or a denial of service attack against downstream projects such as Lightning network nodes. An unconfirmed child transaction with ...