TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Windows 7 Update appears to be compromised?

375 pointsby cyannover 9 years ago

22 comments

jimrandomhover 9 years ago
This links to a Microsoft support thread in which several users are reporting a suspicious update distributed through Windows Update. In lieu of a title and description, the update has 108-character and 24-character base52-encoded random numbers. In lieu of &quot;more information&quot; and &quot;help and support&quot; links, it has similarly random base52-encoded domains, which currently do not resolve, in .gov, .edu and .mil. Searching for the patch title turns up a bunch of people asking about the same suspicious patch on other sites, all within the past day. The update is attracting attention because it fails to install.<p><a href="http:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;101520&#x2F;weird-windows-update" rel="nofollow">http:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;101520&#x2F;weird-win...</a> <a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;techsupport&#x2F;comments&#x2F;3mykv1&#x2F;weird_windows_update&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;techsupport&#x2F;comments&#x2F;3mykv1&#x2F;weird_w...</a><p>This does strongly suggest a compromise of the Windows Update servers or of some bit of infrastructure that connects people to them, but also suggests that whoever the attackers are, they made a mistake - a successful compromise executed correctly would not leave so much evidence around. It&#x27;s quite possible that they&#x27;ve been compromised for awhile, and this is a buggy update to the existing malware.
评论 #10305478 未加载
评论 #10306701 未加载
eloyover 9 years ago
Confirmed that it was a test update: <a href="http:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;microsoft-accidentally-issued-a-test-windows-update-patch&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;microsoft-accidentally-issued-a...</a>
评论 #10306792 未加载
评论 #10306523 未加载
评论 #10306568 未加载
jordighover 9 years ago
Don&#x27;t panic, it was just a boo-boo:<p><a href="http:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;microsoft-accidentally-issued-a-test-windows-update-patch&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;microsoft-accidentally-issued-a...</a>
cwyersover 9 years ago
If someone has managed to compromise Windows Update (which I doubt seriously based on what&#x27;s presented here), why on Earth would they not bother to come up with text more convincing than the garbage on display here?
评论 #10305443 未加载
评论 #10306208 未加载
评论 #10305448 未加载
评论 #10306610 未加载
JohnTHallerover 9 years ago
There is a chance that the machines affected were already compromised by malware which altered the way Windows Update was working.
评论 #10305988 未加载
评论 #10305976 未加载
评论 #10306002 未加载
jimrandomhover 9 years ago
Does anyone have a copy of the 4.3MB file that this refers to? If so, please: (1) submit it to VirusTotal, and (2) post it here.
imperialdriveover 9 years ago
I&#x27;ve been deploying Microsoft based computer networks for 18 years... this would nearly top my nightmare list! I can&#x27;t imagine what the alert level is at MS offices right now, but I bet they are expending every effort to get to the bottom of this ASAP :&#x2F;
评论 #10305348 未加载
评论 #10305366 未加载
ArtDevover 9 years ago
<a href="http:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2015&#x2F;09&#x2F;nerves-rattled-by-highly-suspicious-windows-update-delivered-worldwide&#x2F;" rel="nofollow">http:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2015&#x2F;09&#x2F;nerves-rattled-by-hi...</a>
comexover 9 years ago
Just to state the obvious, .gov, .edu, and .mil are all restricted TLDs run by the US. What kind of attacker uses domain names in their attack that they can&#x27;t register?<p>Unless, of course...<p>But that would be a wee bit obvious.
评论 #10306294 未加载
hodwikover 9 years ago
This is probably just a test update that went out by mistake.<p>If MSFT is anything like where I work, that &quot;payload&quot; is a picture of a cat.
评论 #10305653 未加载
评论 #10307085 未加载
arca_voragoover 9 years ago
Looks more like an internal flub: &quot;&#x2F;&#x2F;⁠rr1winwusfs04&#x2F;⁠c&#x2F;⁠msdownload&#x2F;⁠update&#x2F;⁠software&#x2F;⁠defu&#x2F;⁠2015&#x2F;⁠09&#x2F;⁠testexe_896e3a62-⁠8954-⁠447b-⁠5a562bd65cc6_d5e430cb05ee8a627ee6d811da8d7c4ccea57f4b.exe&quot;<p>That being said, that something like this could happen should raise lots of questions about the amount of oversight on updates hitting windows, and the general security of such systems. I&#x27;ll wait for an official response or a reverse engineer before I decide what&#x27;s going on here.
MichaelGGover 9 years ago
I&#x27;d be surprised if an attacker would waste a compromise with something obvious. Perhaps it&#x27;s some testing thing that wasn&#x27;t supposed to go out.
评论 #10305449 未加载
Animatsover 9 years ago
Where&#x27;s Microsoft on this? This is on two news outlets as well as HN. Microsoft PR needs to issue a statement in the next hour or two, even one that just says they&#x27;re investigating the issue, or it will be on the evening TV news.
评论 #10308986 未加载
solidangleover 9 years ago
Could it be a man in the middle that tries to install updates that aren&#x27;t signed by Microsoft? It reminds me of this: <a href="http:&#x2F;&#x2F;www.leviathansecurity.com&#x2F;blog&#x2F;the-case-of-the-modified-binaries&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.leviathansecurity.com&#x2F;blog&#x2F;the-case-of-the-modifi...</a> .
blinkingledover 9 years ago
Not seeing anything on my Win7Pro SP1 VM - last update was 4.3MB VC++ 2008 Security fix - MFC applications being vulnerable to DLL planting due to MFC not specifying the full path to system&#x2F;localization DLLs.
评论 #10305776 未加载
flyinghamsterover 9 years ago
I haven&#x27;t seen any randomly-named updates on my system - but I had earlier ripped out all the telemetry and Windows 10-related crap (KB2952664, KB3021917, KB3035583, KB3068708, KB3075249, and KB3080149) and marked them hidden. I&#x27;ve also set my update policy to notify-only.<p>Now the spy updates are not hidden, and marked as &quot;Important.&quot; They&#x27;re bound and determined to force this crap down our throats. Bastards.<p>&quot;Because f*ck you, that&#x27;s why.&quot; The rallying cry of the corporate world.
评论 #10306143 未加载
gizmodo59over 9 years ago
Can anyone shed some light on this?
ComodoHackerover 9 years ago
Too many &quot;tests&quot; this month, I&#x27;d say. Test cert, test update... Let&#x27;s hope something worse like &quot;test nuclear strike&quot; won&#x27;t follow.
acqqover 9 years ago
And the same company doesn&#x27;t allow the users of the Windows 10 Home to review the updates, instead, the Windows 10 Home updates always download and install.
LinuxBenderover 9 years ago
Could it be that older versions of windows (2k3 for example) might allow this update to be installed? Has anyone tested this in a sandbox?
mtgxover 9 years ago
Microsoft sending spyware again?
mjevansover 9 years ago
I&#x27;m worried about friends, family, and small businesses that run Windows with install updates set to automated mode...<p>Shouldn&#x27;t Microsoft be signing updates so that redirection attacks don&#x27;t work?<p>Edit:<p>Elaborating on my question; I mean much more like Linux distributions which sign both packages (updates) and the index of those files. Some distributions use multiple hashs&#x2F;digests to make collision attacks far less likely to succeed.<p>Such an attack could be either the traffic at layer 3 redirected via router compromise, via some name resolution weakness (possibly even to localhost as a way of malware upgrading from being able to edit the hosts file to having system level services).<p>The signing of both the update files and the list of updates could offer protection from an attack that would thus need to be valid for all of the signature checks, not just a single check.
评论 #10305371 未加载
评论 #10305369 未加载
评论 #10305354 未加载
评论 #10305370 未加载