The ghost of Stuxnet past

Posted by   Virus Bulletin on   Mar 11, 2015

Microsoft patches .LNK vulnerability after 2010 patch was found to be incomplete.

Mention Stuxnet and you'll have many a security researcher's attention. The worm, which was discovered in 2010, used a number of zero-day vulnerabilities to reach its target: air-gapped Windows PCs at the Natanz nuclear plant in Iran. Most prominent among these was CVE-2010-2568, which allowed an attacker to execute remote code through a specially crafted .LNK file.

The vulnerability could be triggered by plugging an infected USB drive into a vulnerable PC, thus allowing an attacker to bridge air gaps. Researchers from Kaspersky have since found that the same exploit was used by the 'Equation Group' even before Stuxnet.

Microsoft patched the vulnerability in August 2010, but earlier this year researchers from HP's Zero Day Initiative discovered that the patch was insufficient and still left an attack surface open.

The vulnerability was privately disclosed to Microsoft, who in yesterday's Patch Tuesday release, patched this vulnerability, while HP published a lengthy blog post with full details on this new vulnerability. It has been assigned CVE number CVE-2015-0096.

Chances are you don't run a nuclear plant. That doesn't mean you shouldn't patch this vulnerability though: the original vulnerability is still widely used by malware to trick an unpatched Windows PC into executing malicious libraries.

For the more paranoid, it is good to note that while the 2010 patch didn't fully solve the issue (and, speaking to Ars Technica, HP's Brian Gorenc said "it's hard to believe that somebody didn't know about this bug prior to it being patched today"), the workaround provided by Microsoft back in 2010 would have prevented further exploitation. It may still be a good idea to apply it on critical systems as its only impact is that shortcut icons will not be displayed.

  The work around involves disabling .LNK files from having their icons displayed.

This isn't the only reason to apply Microsoft's patches though: no fewer than five out of the 14 bulletins are rated 'critical', while another bulletin patches the FREAK vulnerability. For those who prefer their security information in audio format, Johannes Ullrich's excellent daily ISC Stormcast podcast provides a brief summary of the important issues.

On the subject of Stuxnet, I can't recommend Kim Zetter's book Countdown to Zero Day highly enough. I reviewed it for this blog last year.

Posted on 11 March 2015 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.