WARNING: USB-based malware ignoring Windows AutoRun config


The good news is that security savvy Windows users will, more than likely, have already disabled the AutoRun and AutoPlay features. The bad news is that a new zero-day vulnerability could care less, and executes automatically anyway.

memstickrun.jpg The zero-day vulnerability in question was first spotted by Sergey Ulase, a researcher with security vendor VirusBlokAda, who when talking about some new malware samples he had been analysing noted "You should take into consideration that virus infects Operation System in unusual way through vulnerability in processing lnk-files (without usage of autorun.inf file). So you just have to open infected USB storage device using Microsoft Explorer or any other file manager which can display icons (for i.e. Total Commander) to infect your Operating System and allow execution of the malware".

Microsoft has eventually picked up on this, yet another Windows vulnerability , and has now issued a Security Advisory (2286198) which confirms it is "investigating reports of limited, targeted attacks exploiting a vulnerability in Windows Shell" then goes on to state that the vulnerability exists "because Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the icon of a specially crafted shortcut is displayed".

According to security experts at Sophos , a new rootkit has been discovered which goes by the name of Stuxnet and exploits this vulnerability to install itself onto even a fully patched Windows PC by running from a USB memory stick even if the user has disabled Windows AutoRun and AutoPlay. It does, however, require the user to browse the device using Windows Explorer in order to be able to do this, rather than just execute automatically upon insertion.

"Threats such as the infamous Conficker worm have spread very successfully via USB devices in the past, but were in part reduced by disabling AutoPlay. The risk is that more malware will take advantage of the zero-day exploit used by the Stuxnet rootkit, taking things to a whole new level" Says Graham Cluley, senior technology consultant at Sophos, adding "the exploit is still being analysed by the security community, but there are disturbing suggestions that the malware could be trying to access data specific to Siemens SCADA systems - software that controls national critical infrastructure".

Member Avatar
Davey Winder

I've been a freelance word punk for more than two decades and for the last few years an Editorial Fellow at Dennis Publishing. Along the way I have been honoured with a Technology Journalist of the Year award, and three Information Security Journalist of the Year awards. Most humbling, though, was the Enigma Award for 'lifetime contribution to IT security journalism' bestowed on me in 2011. As well as working for DaniWeb I have been a Contributing Editor with PC Pro (the best selling IT magazine in the UK) for twenty years.

Isn't it about time forums rewarded their contributors?

Earn rewards points for helping others. Gain kudos. Cash out. Get better answers yourself.

It's as simple as contributing editorial or replying to discussions labeled or OP Kudos

This is an OP Kudos discussion and contributors may be rewarded
Start New Discussion
View similar articles that have also been tagged: