2010年8月24日 星期二

FW: NEWSBANK :: W32 Stuxnet-B rootkit can install itself automatically from a USB memory stick onto a fully-patched PC


-------------------------------------------
From: Juan Castro (SAL-LA)
Sent: Wednesday, August 25, 2010 12:50:18 AM
To: Newsbank
Subject: NEWSBANK :: W32 Stuxnet-B rootkit can install itself automatically from a USB memory stick onto a fully-patched PC
Auto forwarded by a Rule


W32 Stuxnet-B rootkit can install itself automatically from a USB memory stick onto a fully-patched PC 

(23/08/2010)

Sophos has detected a rootkit that can install itself automatically from a USB memory stick onto a fully-patched PC, even if the user has disabled the Windows AutoRun and AutoPlay feature.

The W32/Stuxnet-B rootkit exploits a vulnerability in the way Windows handles .LNK shortcut files, that allows them to execute automatically if the USB stick is accessed by Windows Explorer. Once the rootkit is in place it effectively enters "stealth-mode", cloaking its presence on the infected PC.

Curiously, the suspicious driver files carry the digital signature of Realtek Semiconductor Corp, a major supplier of computer equipment.

"Threats such as the infamous Conficker worm have spread very successfully via USB devices in the past, but were in part reduced by disabling AutoPlay. The risk is that more malware will take advantage of the zero-day exploit used by the Stuxnet rootkit, taking things to a whole new level," explained Graham Cluley, senior technology consultant at Sophos. "The exploit is still being analysed by the security community, but there are disturbing suggestions that the malware could be trying to access data specific to Siemens SCADA systems - software that controls national critical infrastructure."

“It’s important not to overreact to this threat, as the exploit has only recently been discovered and the security community has not yet established the extent of the risk to SCADA systems. But the fact that SCADA systems are involved at all does mean that everyone will be examining the attack closely. Eyes will also be turned to Microsoft to see how they will respond to what appears to be another unpatched vulnerability in their code that is being exploited by hackers."

http://www.securitypark.co.uk/security_article265100.html

 

沒有留言: