PDA

View Full Version : Flame Malware Hijacks Windows Update



wraggster
June 5th, 2012, 21:01
As more research unfolds about the recently discovered Flame malware, researchers have found three modules – named Snack, Gadget and Munch – that are used to launch what is essentially a man-in-the-middle attack against other computers on a network. (http://www.securityweek.com/flame-malware-hijacks-windows-update-mechanism) As a result, Kaspersky researchers say when a machine attempts to connect to Microsoft's Windows Update, it redirects the connection through an infected machine and it sends a fake malicious Windows Update to the client. That is courtesy of a rogue Microsoft certificate (http://news.slashdot.org/story/12/06/04/1211206/microsoft-certificate-was-used-to-sign-flame-malware) that chains to the Microsoft Root Authority and improperly allows code signing. According to Symantec, the Snack module sniffs NetBIOS requests on the local network. NetBIOS name resolution allows computers to find each other on a local network via peer-to-peer, opening up an avenue for spoofing. The findings have prompted Microsoft to say that it plans to harden Windows Update (http://blogs.technet.com/b/msrc/archive/2012/06/04/security-advisory-2718704-update-to-phased-mitigation-strategy.aspx) against attacks in the future, though the company did not immediately reveal details as to how."And an anonymous reader adds a note that Flame's infrastructure is massive (http://www.net-security.org/malware_news.php?id=2138): "over 80 different C&C domains, pointed to over 18 IP addresses located in Switzerland, Germany, the Netherlands, Hong Kong, Poland, the UK, and other countries."

http://it.slashdot.org/story/12/06/05/1638228/flame-malware-hijacks-windows-update