The ghost of Stuxnet past

Posted by   Virus Bulletin on   Mar 11, 2015

Microsoft patches .LNK vulnerability after 2010 patch was found to be incomplete.

Mention Stuxnet and you'll have many a security researcher's attention. The worm, which was discovered in 2010, used a number of zero-day vulnerabilities to reach its target: air-gapped Windows PCs at the Natanz nuclear plant in Iran. Most prominent among these was CVE-2010-2568, which allowed an attacker to execute remote code through a specially crafted .LNK file.

The vulnerability could be triggered by plugging an infected USB drive into a vulnerable PC, thus allowing an attacker to bridge air gaps. Researchers from Kaspersky have since found that the same exploit was used by the 'Equation Group' even before Stuxnet.

Microsoft patched the vulnerability in August 2010, but earlier this year researchers from HP's Zero Day Initiative discovered that the patch was insufficient and still left an attack surface open.

The vulnerability was privately disclosed to Microsoft, who in yesterday's Patch Tuesday release, patched this vulnerability, while HP published a lengthy blog post with full details on this new vulnerability. It has been assigned CVE number CVE-2015-0096.

Chances are you don't run a nuclear plant. That doesn't mean you shouldn't patch this vulnerability though: the original vulnerability is still widely used by malware to trick an unpatched Windows PC into executing malicious libraries.

For the more paranoid, it is good to note that while the 2010 patch didn't fully solve the issue (and, speaking to Ars Technica, HP's Brian Gorenc said "it's hard to believe that somebody didn't know about this bug prior to it being patched today"), the workaround provided by Microsoft back in 2010 would have prevented further exploitation. It may still be a good idea to apply it on critical systems as its only impact is that shortcut icons will not be displayed.

  The work around involves disabling .LNK files from having their icons displayed.

This isn't the only reason to apply Microsoft's patches though: no fewer than five out of the 14 bulletins are rated 'critical', while another bulletin patches the FREAK vulnerability. For those who prefer their security information in audio format, Johannes Ullrich's excellent daily ISC Stormcast podcast provides a brief summary of the important issues.

On the subject of Stuxnet, I can't recommend Kim Zetter's book Countdown to Zero Day highly enough. I reviewed it for this blog last year.

Posted on 11 March 2015 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: Geost botnet. The story of the discovery of a new Android banking trojan from an OpSec error

OpSec mistakes are what lead to many malware discoveries, and in the case of the Geost Android botnet the mistake was a really interesting one. Today we publish the VB2019 paper by Sebastian García, Maria Jose Erquiaga and Anna Shirokova on the Geost…

Analysis of malware responsible for sextortion spam that mines for Monero on the side

VB2019 Platinum partner Reason Cybersecurity presents a threat analysis report on the Save Yourself malware.

Guest blog: Threat intelligence – a unifying force of the future

In a guest blog post VB2019 Platinum partner Reason Cybersecurity looks to the future of threat intelligence.

Guest blog: Why we should be paying more attention to Linux threats

In a guest blog post VB2019 Silver partner Intezer outlines the importance of paying attention to Linux threats.

New Emotet spam campaign continues to bypass email security products

On Monday, the infamous Emotet malware resumed its spam campaign to spread the latest version of the malware. As before, the malware successfully bypasses many email security products.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.