TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The Microsoft Update mechanism has been used to spread malware

225 pointsby k33l0ralmost 13 years ago

14 comments

semenkoalmost 13 years ago
The SecureList summary was much more detailed: <a href="http://www.securelist.com/en/blog/208193558/Gadget_in_the_middle_Flame_malware_spreading_vector_identified" rel="nofollow">http://www.securelist.com/en/blog/208193558/Gadget_in_the_mi...</a><p>Flame took advantage of WPAD, a little-known magical hostname (<a href="http://en.wikipedia.org/wiki/Web_Proxy_Autodiscovery_Protocol" rel="nofollow">http://en.wikipedia.org/wiki/Web_Proxy_Autodiscovery_Protoco...</a>) to do MITM attacks on the Windows Update servers.<p>Flame then installed 'WuSetupV.exe' with the description "Desktop Gadget Platform" "Allows you to display gadgets on your desktop".<p>What's amazing is that Windows Update doesn't require explicit validation of an update-only certificate chain. It seems like any certificate from the Microsoft root can certify updates (!).
debaclealmost 13 years ago
This is like finding out the zombies have made it into the compound.<p>I wonder how big this hole is to fix. I also wonder, as many have, if this was written by an Intelligence agency and, if so, if they had access to Windows' source code.
评论 #4066557 未加载
评论 #4068144 未加载
fidotronalmost 13 years ago
It really was an unbelievable oversight to use the same certs in the Terminal Services activation system.<p>Quite a demonstration that even if you go to great pains to secure the code if you aren't careful with your credentials then it's for nothing.
评论 #4066617 未加载
sevalmost 13 years ago
&#62; I guess the good news is that this wasn't done by cyber criminals interested in financial benefit. They could have infected millions of computers. Instead, this technique has been used in targeted attacks, most likely launched by a Western intelligence agency.<p>You mean the bad news.
评论 #4068124 未加载
smackfualmost 13 years ago
Apparently the other tricky bit is that Windows can be set to auto-configure network proxies (presumably for enterprise support), so the infected host pretends to be the source of auto-config info in order to direct the other systems to connect through it to get to Windows Update. At which point the infected system can infect the package, which has been signed so it will auto-install.
billpgalmost 13 years ago
I saw the headline and thought "Oh (expletive) I let update run last night!", but it turned out to be the revoked cert update.
joeweealmost 13 years ago
"Western Intelligence" agencies really seem to be good at mucking stuff up.
MiguelHudnandezalmost 13 years ago
Here we have an example of complexity arising from copy protection/licensing. It so happens that this complexity caused a security vulnerability which, when exploited on any one computer, affects close to a billion computers.<p>Is anyone else infuriated that a vulnerability like this exists in what is analogous to copy protection code?<p>In other words, if Microsoft had been spending more of their resources on making software work, instead of making software work only when you've proven you've paid for it, this particular issue would not exist.
评论 #4066169 未加载
评论 #4069167 未加载
评论 #4066583 未加载
meatsockalmost 13 years ago
let this be a lesson to you: run windows update frequently for maximum security.
评论 #4066785 未加载
rsynnottalmost 13 years ago
But does it refuse to install the malware if it arbitrarily decides that your Windows is not genuine?
leephillipsalmost 13 years ago
So it's working as designed.
DigitalSeaalmost 13 years ago
Cue the sound of a thousand palms hitting faces at Microsoft HQ.
dholowiskialmost 13 years ago
You realize, you already have to be infected with the flame virus to work, right?
评论 #4066777 未加载
Ararealmost 13 years ago
Oh look, another scaremongering and purposely misleading article from F-Secure. This is starting to become a regular thing isn't it; I guess the recession must have hit them particularly hard.
评论 #4066855 未加载
评论 #4066189 未加载
评论 #4066686 未加载
评论 #4066194 未加载