Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Duqu Malware: Still No Patch

Malware exploits Microsoft Windows kernel zero-day vulnerability. Installer file is a Word document.

Windows 8 Upgrade Plans: Exclusive Research
Slideshow: Windows 8 Upgrade Plans: Exclusive Research
(click image for larger view and for slideshow)
The recently discovered Duqu malware can exploit a zero-day Windows kernel vulnerability, which would help it to infect PCs and spread without being detected.

That revelation came after researchers at CrySyS Lab at the Budapest University of Technology and Economics managed to recover a dropper file, aka installer, for Duqu. Droppers are typically the first malicious files to infect a computer, and then they download and install further malicious files onto the computer.

"The installer file is a Microsoft Word document (.doc) that exploits a previously unknown kernel vulnerability that allows code execution," said Vikram Thakur, principal security response manager at Symantec, which has been working with CrySyS to unravel Duqu's inner workings. "We contacted Microsoft regarding the vulnerability and they're working diligently towards issuing a patch and advisory."

Simply opening the malicious Word file enables it to execute malicious code, which exploits the zero-day (aka previously unknown) vulnerability, and then installs multiple Duqu binary files. Interestingly, the recovered dropper was designed to target just a single organization, and would only have operated for an eight-day window in August. Thakur, however, cautioned that this is the only Duqu installer to have been recovered, meaning that others may operate in different ways, and still be targeting other businesses.

[Fortune 100 companies have been targeted by malware seeking to steal proprietary information. Learn more: Nitro Malware Targeted Chemical Companies.]

Until Microsoft patches the zero-day vulnerability, there's no surefire safeguard against this type of attack. "Unfortunately, no robust workarounds exist at this time other than following best practices, such as avoiding documents from unknown parties and utilizing alternative software," said Thakur. "Fortunately, most security vendors already detect and block the main Duqu files, thereby preventing the attack."

Researchers have also found that Duqu also has the alarming ability to infect and control computers that aren't connected to the Internet. "In one organization, evidence was found that showed the attackers commanding Duqu to spread across SMB shares," said Thakur. "Interestingly though, some of the newly infected computers did not have the ability to connect to the Internet and thereby the command-and-control (C&C) server. The Duqu configuration files on these computers were instead configured not to communicate directly with the C&C server, but to use a file-sharing C&C protocol with another compromised computer that had the ability to connect to the C&C server."

In other words, Duqu can use Internet-connected PCs as proxies for infecting PCs that may be operating in a designated "secure zone" that's network-connected, but lacks Internet connectivity. Such computers would be one location where businesses might store confidential or propriety information, to help safeguard it against online attackers.

That, of course, gels with what researchers already know about Duqu. While apparently related to Stuxnet, Duqu appears to have been designed for cyber espionage purposes, and in particular to steal design documents relating to industrial control facilities in a number of different countries.

In other Duqu news, on Monday, Symantec said it had discovered what's now the second known Duqu C&C server, this one operating from Belgium (the first was in India). Symantec said that the Belgian service provider with control of the server took it down rapidly after being contacted.

But those servers may just be the tip of the iceberg. "As well as a unique set of Duqu files for each victim, there may well be a unique command server for each entity that was attacked," said Alexander Gostev, who heads the global research and analysis team at Kaspersky Lab, in a blog post.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
jrapoza
50%
50%
jrapoza,
User Rank: Apprentice
11/2/2011 | 11:10:56 PM
re: Duqu Malware: Still No Patch
This is just another good example of why it was a really bad idea to allow scripting and code execution from documents. There was really no need for that and it caused many security headaches.

Jim Rapoza is an InformationWeek Contributing Editor
Bprince
50%
50%
Bprince,
User Rank: Ninja
11/4/2011 | 2:02:48 AM
re: Duqu Malware: Still No Patch
MS issued information about a workaround earlier tonight.
http://technet.microsoft.com/e...
Brian Prince, InformationWeek/DarkReading Comment Moderation
YMOM100
50%
50%
YMOM100,
User Rank: Apprentice
11/5/2011 | 3:55:28 PM
re: Duqu Malware: Still No Patch
How come that a document can take down an entire system? Why would Word need direct access to kernel resources in the first place? This is not just a mistake in coding, the entire design is flawed.
kjh..2
50%
50%
kjh..2,
User Rank: Apprentice
11/6/2011 | 12:39:20 PM
re: Duqu Malware: Still No Patch
Isn't DuQu exploiting a vulnerability in TrueType Font Processing ?

IIRC, Font Processing has been embedded in the NT Kernel since NT-4 for performance reasons.

Why would that be necessary any more given the raw power of today's hardware is up for discussion.

MS's design decisions (? or were they marketing decisions ?) as to what should and should not be included in Kernel-Level Code continue to bite them again and again.

-- kjh
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
4 Security Tips as the July 15 Tax-Day Extension Draws Near
Shane Buckley, President & Chief Operating Officer, Gigamon,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...