Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Trojan spreads via new Windows hole
h-online ^

Posted on 07/15/2010 10:23:01 AM PDT by Gomez

Anti-virus specialists report that a new trojan is spreading via USB flash drives, apparently exploiting a previously unknown hole in Windows. According to analyses by Belarusian AV vendor VirusBlokAda, a copy of the trojan managed to infect a fully patched Windows 7 system (32-bit) without having to resort to such common auto-start tools as autorun.inf when a Flash drive carrying the trojan was plugged in. Instead of spreading through auto-start, the malware exploits a flaw in the code for processing short-cuts (.lnk files): Once the relevant icon is displayed in Windows Explorer, malicious code is launched without any further user interaction.

The trojan exploits this to install two drivers with rootkit functions designed to hide its subsequent activities within the system. Interestingly, both drivers are signed with a code-signing key by vendor RealTek and can, therefore, be installed on a system without triggering an alert. Only recently, AV vendor F-Secure pointed out that the amount of signed malware for Windows is increasing. In some cases, digital keys have even been stolen from developers.

An investigation by malware analyst Frank Boldewin has shown that this is not just any old trojan designed to harvest passwords from unsuspecting users. It appears that the malware specifically targets process control systems and their visualisation components. The trojan is, therefore, unlikely to spread on a large scale.

During his investigation, Boldewin came across some database queries the trojan made that point towards the WinCC SCADA system by Siemens. As Boldewin explained in an email to The H's associates at heise Security, a "normal" malware programmer wouldn't have managed to do that. Boldewin continued "As this Siemens SCADA system is used by many governments and industrial enterprises worldwide, we must assume that the attackers' intention was industrial espionage or even espionage in the government area". Frank Boldewin is the author of the feature article "Episode 2: The image of death" in our "CSI:Internet" series.

Microsoft has been informed about the vulnerability, but appears to have problems with reproducing it. Andreas Marx of AV-Test says that every .lnk file is linked to the ID of the newly infected USB Flash drive. This means that the sample trojans found so far can't simply be started on an arbitrary Windows system – the malware will only start in the OllyDbg debugger after some modifications to the code.


TOPICS: Computers/Internet
KEYWORDS: microsofttax

1 posted on 07/15/2010 10:23:03 AM PDT by Gomez
[ Post Reply | Private Reply | View Replies]

To: ShadowAce

ping


2 posted on 07/15/2010 10:23:52 AM PDT by Gomez (killer of threads)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez

Hmm, where are most USB Flash Drives manufactured these days?


3 posted on 07/15/2010 10:26:45 AM PDT by Yo-Yo (Is the /sarc tag really necessary?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez
This means that the sample trojans found so far can't simply be started on an arbitrary Windows system – the malware will only start in the OllyDbg debugger after some modifications to the code.


So, this affects what percentage of Windows users?

"after some modifications to the code"
Sounds like you have to mess with the system just to get the malware to work.
Don't think I'll lose any sleep over this one.
4 posted on 07/15/2010 10:32:26 AM PDT by Gun142 (Where Will You Be When You Get Where You're Going? -- Jerry Clower)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gun142
Ditto. Sounds like this goes back to the days of floppies and boot-sector viruses.

And, it's been discovered. Hole will be patched, and AV software will be updated....

ZZZZZzzzzzzzz

5 posted on 07/15/2010 10:44:06 AM PDT by wbill
[ Post Reply | Private Reply | To 4 | View Replies]

To: Gomez
It appears that the malware specifically targets process control systems and their visualisation components.

SCADA systems are those that monitor and control infrastructure facilities like power plants, gas lines, sewage plants etc.

This isn't the work of script kiddies trying to muck up your web-surfing. This appears to be targeted at serious systems by a knowledgeable attacker(s).

6 posted on 07/15/2010 10:53:33 AM PDT by Washi
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

PING.... our turn at bat.


7 posted on 07/15/2010 11:29:00 AM PDT by RachelFaith (2010 is going to be a 100 seat Tsunami - Unless the GOP Senate ruins it all...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PugetSoundSoldier
a copy of the trojan managed to infect a fully patched Windows 7 system (32-bit) without having to resort to such common auto-start tools as autorun.inf when a Flash drive carrying the trojan was plugged in. Instead of spreading through auto-start, the malware exploits a flaw in the code for processing short-cuts (.lnk files): Once the relevant icon is displayed in Windows Explorer, malicious code is launched without any further user interaction.

Well, there goes your "Windows 7 is just as secure as Mac OSX" shtick.

Real trogan, in the wild, doing an actual exploit, not in some lab, and without any user intervention required.

Plink Plink Plink

Just dropping 3 quarters in the machine and waiting for the spin cycle to begin....

8 posted on 07/15/2010 11:33:26 AM PDT by RachelFaith (2010 is going to be a 100 seat Tsunami - Unless the GOP Senate ruins it all...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: RachelFaith
Well, there goes your "Windows 7 is just as secure as Mac OSX" shtick.

Before we get into a discussion, perhaps you can define what you mean by trojan, virus, and infection. The last definition by you was that only a self-installing, self-replicating virus was a problem. Is that your claim?

9 posted on 07/15/2010 5:21:49 PM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 8 | View Replies]

To: PugetSoundSoldier
Before we get into a discussion, perhaps you can define what you mean by trojan, virus, and infection. The last definition by you was that only a self-installing, self-replicating virus was a problem. Is that your claim?

Good point, Puget. This appears to be a hybrid... self running and self installing, ergo, it can be self- replicating. But it requires the action of a user to insert the Flash Drive. Once the user takes that action, apparently there is no further user interaction required though. NOT GOOD. Still a trojan, for that reason... but the potential for being a worm.

10 posted on 07/15/2010 11:23:18 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 9 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson