Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Duqu Malware: Still No Patch

Malware exploits Microsoft Windows kernel zero-day vulnerability. Installer file is a Word document.

Windows 8 Upgrade Plans: Exclusive Research
Slideshow: Windows 8 Upgrade Plans: Exclusive Research
(click image for larger view and for slideshow)
The recently discovered Duqu malware can exploit a zero-day Windows kernel vulnerability, which would help it to infect PCs and spread without being detected.

That revelation came after researchers at CrySyS Lab at the Budapest University of Technology and Economics managed to recover a dropper file, aka installer, for Duqu. Droppers are typically the first malicious files to infect a computer, and then they download and install further malicious files onto the computer.

"The installer file is a Microsoft Word document (.doc) that exploits a previously unknown kernel vulnerability that allows code execution," said Vikram Thakur, principal security response manager at Symantec, which has been working with CrySyS to unravel Duqu's inner workings. "We contacted Microsoft regarding the vulnerability and they're working diligently towards issuing a patch and advisory."

Simply opening the malicious Word file enables it to execute malicious code, which exploits the zero-day (aka previously unknown) vulnerability, and then installs multiple Duqu binary files. Interestingly, the recovered dropper was designed to target just a single organization, and would only have operated for an eight-day window in August. Thakur, however, cautioned that this is the only Duqu installer to have been recovered, meaning that others may operate in different ways, and still be targeting other businesses.

[Fortune 100 companies have been targeted by malware seeking to steal proprietary information. Learn more: Nitro Malware Targeted Chemical Companies.]

Until Microsoft patches the zero-day vulnerability, there's no surefire safeguard against this type of attack. "Unfortunately, no robust workarounds exist at this time other than following best practices, such as avoiding documents from unknown parties and utilizing alternative software," said Thakur. "Fortunately, most security vendors already detect and block the main Duqu files, thereby preventing the attack."

Researchers have also found that Duqu also has the alarming ability to infect and control computers that aren't connected to the Internet. "In one organization, evidence was found that showed the attackers commanding Duqu to spread across SMB shares," said Thakur. "Interestingly though, some of the newly infected computers did not have the ability to connect to the Internet and thereby the command-and-control (C&C) server. The Duqu configuration files on these computers were instead configured not to communicate directly with the C&C server, but to use a file-sharing C&C protocol with another compromised computer that had the ability to connect to the C&C server."

In other words, Duqu can use Internet-connected PCs as proxies for infecting PCs that may be operating in a designated "secure zone" that's network-connected, but lacks Internet connectivity. Such computers would be one location where businesses might store confidential or propriety information, to help safeguard it against online attackers.

That, of course, gels with what researchers already know about Duqu. While apparently related to Stuxnet, Duqu appears to have been designed for cyber espionage purposes, and in particular to steal design documents relating to industrial control facilities in a number of different countries.

In other Duqu news, on Monday, Symantec said it had discovered what's now the second known Duqu C&C server, this one operating from Belgium (the first was in India). Symantec said that the Belgian service provider with control of the server took it down rapidly after being contacted.

But those servers may just be the tip of the iceberg. "As well as a unique set of Duqu files for each victim, there may well be a unique command server for each entity that was attacked," said Alexander Gostev, who heads the global research and analysis team at Kaspersky Lab, in a blog post.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
jrapoza
50%
50%
jrapoza,
User Rank: Apprentice
11/2/2011 | 11:10:56 PM
re: Duqu Malware: Still No Patch
This is just another good example of why it was a really bad idea to allow scripting and code execution from documents. There was really no need for that and it caused many security headaches.

Jim Rapoza is an InformationWeek Contributing Editor
Bprince
50%
50%
Bprince,
User Rank: Ninja
11/4/2011 | 2:02:48 AM
re: Duqu Malware: Still No Patch
MS issued information about a workaround earlier tonight.
http://technet.microsoft.com/e...
Brian Prince, InformationWeek/DarkReading Comment Moderation
YMOM100
50%
50%
YMOM100,
User Rank: Apprentice
11/5/2011 | 3:55:28 PM
re: Duqu Malware: Still No Patch
How come that a document can take down an entire system? Why would Word need direct access to kernel resources in the first place? This is not just a mistake in coding, the entire design is flawed.
kjh..2
50%
50%
kjh..2,
User Rank: Apprentice
11/6/2011 | 12:39:20 PM
re: Duqu Malware: Still No Patch
Isn't DuQu exploiting a vulnerability in TrueType Font Processing ?

IIRC, Font Processing has been embedded in the NT Kernel since NT-4 for performance reasons.

Why would that be necessary any more given the raw power of today's hardware is up for discussion.

MS's design decisions (? or were they marketing decisions ?) as to what should and should not be included in Kernel-Level Code continue to bite them again and again.

-- kjh
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.