New details have emerged showing that the Flame malware abused Microsoft’s Windows Update mechanism to infect computers.
According to new information revealed by researchers, three modules of the Flame malware – named Snack, Gadget and Munch – are used to launch what is essentially a man-in-the-middle attack against other computers on a network.
“When a machine tries to connect to Microsoft’s Windows Update, it redirects the connection through an infected machine and it sends a fake, malicious Windows Update to the client,” blogged Alexander Gostev, head of the Global Research and Analysis team at Kaspersky Lab.
“When a victim updates itself via Windows Update, the query is intercepted and the fake update is pushed,” he explained. “The fake update proceeds to download the main body and infect the computer.”
According to Symantec’s Security Response team, the Snack module sniffs NetBIOS requests on the local network. NetBIOS name resolution allows computers to find each other on a local network via peer-to-peer, opening up an avenue for spoofing.
“When clients attempt to resolve a computer name on the network, and in particular make WPAD (Web Proxy Auto-Discovery Protocol) requests, Flamer will claim it is the WPAD server and provide a rogue WPAD configuration file (wpad.dat),” Symantec noted. “NetBIOS WPAD hijacking is a well-known technique and many publicly available hack tools have implemented the technique.”
“Once a computer that has not yet been compromised receives the rogue wpad.dat file, it will set its proxy server to the Flamer-compromised computer,” the firm noted. “All its web traffic will now be redirected to the Flamer compromised computer first.”
The Munch component is a Web server within Flamer and receives the redirected traffic and checks for a variety of queries, including matching URLs for Windows Update.
“Hijacking Windows Update is not trivial because updates must be signed by Microsoft,” Symantec’s team added. “However, Flamer bypasses this restriction by using a certificate that chains to the Microsoft Root Authority and improperly allows code signing. So when a Windows Update request is received, the GADGET module through MUNCH provides a binary signed by a certificate that appears to belong to Microsoft.”
The findings have prompted Microsoft to say that it plans to harden Windows Update against attacks in the future, though the company did not immediately reveal details as to how.
“The Flame malware used a cryptographic collision attack in combination with the terminal server licensing service certificates to sign code as if it came from Microsoft,” blogged Mike Reavey, senior director of Microsoft Security Response Center. “However, code-signing without performing a collision is also possible. This is an avenue for compromise that may be used by additional attackers on customers not originally the focus of the Flame malware. In all cases, Windows Update can only be spoofed with an unauthorized certificate combined with a man-in-the-middle attack.”
“To increase protection for customers, the next action of our mitigation strategy is to further harden Windows Update as a defense-in-depth precaution,” he added. “We will begin this update following broad adoption of Security Advisory 2718704 in order not to interfere with that update’s worldwide deployment.”
Related News: Microsoft Certificate Was Used to Sign “Flame” Malware
Tech Insight: What Flame Means to the Enterprise
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- Google Introduces SAIF, a Framework for Secure AI Development and Use
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds
