Stuxnet Attacks Used 4 Windows Zero-Day Exploits 67
abadnog writes "The attackers behind the recent Stuxnet worm attack used four different zero-day security vulnerabilities to burrow into — and spread around — Microsoft's Windows operating system, according to a startling disclosure from Microsoft. Two of the four vulnerabilities are still unpatched. Microsoft said the attackers initially targeted the old MS08-067 vulnerability (used in the Conficker attack), a new LNK (Windows Shortcut) flaw to launch exploit code on vulnerable Windows systems and a zero-day bug in the Print Spooler Service that makes it possible for malicious code to be passed to, and then executed on, a remote machine. The malware also exploited two different elevation of privilege holes to gain complete control over the affected system."
Zero Day? (Score:1, Interesting)
Re:Zero Day? (Score:5, Insightful)
define: zero day
Pertaining to the day on which software is released; New; as yet unpatched
So it sounds like zero day means that it was present in the unpatched version?
That said, the summary says nothing about patched vs. unpatched. There would be a great outcry if a vulnerability in Linux/OSS was exploited, even though that vulnerability was already patched, and the summary failed to mention that the only reason it was exploited was because the system was NOT patched...
Re: (Score:2)
Re:Zero Day? (Score:5, Informative)
No, it can't. The article may use it that way, but it is incorrect.
zero-day means that there is a hack before there is knowledge or, obviously, a fix of it.
http://en.wikipedia.org/wiki/Zero-day_attack [wikipedia.org]
Re: (Score:2)
Re: (Score:2)
I always used the meaning "there was an attack on the day of release". Shame it became such a cool phrase it doesn't mean anything anymore.
Re: (Score:2)
In the context of security, a zero-day vulnerability is a vulnerability for which no patch exists.
Re: (Score:2, Insightful)
"In the context of security, a zero-day vulnerability is a vulnerability for which no patch exists"
References?
I bet that a exploit against a known vulnerability is not a "zero-day" attack no matter if there's still no patch.
But I wouldn't be surprised if software companies, especifically closed source software companies tried to change it to mean "no patch still delivered" of "before our monthly patch Thursday" since "zero-day attack" seems to imply the software vendor really couldn't do any better: another
Re: (Score:3, Informative)
Reference: common, universally-accepted infosec lingo.
An zero-day exploit is an exploit which works against a zero-day vulnerability. As soon as a patch is released (day 1) neither the exploit nor the vulnerability are "zero-day" anymore.
Re: (Score:2)
"As soon as a patch is released (day 1) neither the exploit nor the vulnerability are "zero-day" anymore."
That's neither common sense nor INFOSEC slang. Try that:
"As soon as a *day* has passed (day 1) neither the exploit nor the vulnerability are "zero-day" anymore."
*That* is common sense.
And regarding InfoSec, as old as 2003 you will find definitions like this*1:
"FYI, I define zero-day exploits as exploits that were used to actually
compromise a system ("in the wild") before the vulnerability was known
to e
Re: (Score:1)
Re: (Score:3, Interesting)
That said, if this is the work of well-funded terrorists, they are probably well funded enough to have access to the Windows source code. Yes, yes, Microsoft doesn't disclose the entire code base for their OS. The parts that were exploited (like the print spooler) are probably considered "not high enough risk" and so are disclosed to governments far and near.
In fact, the only guys playing catch-up seem to be the anti-virus writers.
Re: (Score:2)
So "zero-day" now means "unpatched bug", instead of the original meaning where the vulnerability was being exploited the same day it was discovered? The term "zero-day" now has no temporal meaning, then?
Re: (Score:3, Interesting)
In response to your question, no, I don't define "zero-day" to mean "unpatched bug". I define it to mean "exploit found using unpatched bug in the wild on the day it is first reported to a security researcher (preferred), or else vendor (not ideal, as they have less incentive to disclose all important details)"
Re: (Score:2)
Currently, zero-day is an adjective that may be applied to any exploit (including very old exploits for which a patch has been available more than a year but never applied) including good old social engineering whenever a reporter needs to sound more authoritative or wizardy. Now we're just waiting for the -1 day exploit where due to causality violations, affected systems contact the hackers for instructions before the exploit is actually discovered.
Re: (Score:1)
Re: (Score:2)
Ah, the good old days. Some light warez browsing on the local BBS, followed by a couple games of Legend of the Red Dragon, Usurper, maybe even The Pit.
Zero-day was definitely used to describe several exploits in the early days though, not just warez.
Re: (Score:2)
"That said, if this is the work of well-funded terrorists, they are probably well funded enough to have access to the Windows source code. "
So in other words, having source access made the problem worse....
Re: (Score:1, Insightful)
When you rely on security by obfuscation, yes, it does become easier when you take away the obfuscation. Best to not rely on that when it isn't reliable.
Re: (Score:2)
> So in other words, having source access made the problem worse....
A small set of privileged people (not the users) having source access made the problem worse. That's pretty much the definition of closed source, isn't it?
Re: (Score:2, Insightful)
Re:Zero Day? (Score:4, Informative)
A zero-day vulnerability is widely recognized to be a vulnerability that is found only because it's being exploited, which is how the four vulnerabilities appear to have been discovered. I suspect that the author of the article reasoned that a zero-day vulnerability remains a zero-day vulnerability even after a patch is available for it.
I don't think there's any guidelines for when, if ever, an exploit stops being called a zero-day vulnerability and becomes just a normal one.
Re:Zero Day? (Score:4, Insightful)
It stops being called a zero-day vulnerability... once there's a patch out. Just because a patch is or isn't used doesn't change that.
Re: (Score:2)
nah, after one day, it's a one-day.
Re: (Score:2, Informative)
TFS lists 5 vulnerabilities, one identified as old (MS08-067). What gives you the impression that they are calling the known exploit a zero day instead of the remaining four (previously undisclosed) that they list ? Generally when being pedantic it's best to ensure you aren't making a more obvious error.
Well, at least (Score:4, Funny)
...zero-day bug in the Print Spooler Service...
it won't affect the iPad!
Yeah, yeah, -1 Troll, -1 Flamebait, -1 Offtopic...
Re: (Score:2)
/. math
-1 Troll + -1 Flamebait + -1 Offtopic = +5 Funny
I hope for your sake that you don't do your own taxes...
Re: (Score:2)
/. math
-1 Troll + -1 Flamebait + -1 Offtopic = +5 Funny
I hope for your sake that you don't do your own taxes...
Cut him a break. He's not Kreskin [wikipedia.org]
Re: (Score:2)
... Must..
resist...
netcraft...
comment... Auuuuuuuugh.
4 != four (Score:2, Funny)
Who else was all ready to flame about 4 being used to mean "four"?
Then I read the rest of the summary for once...
Re: (Score:2)
Or even "for"
Re: (Score:2)
Well that was the opposite of what I meant...
Re: (Score:2, Funny)
Re:4 != for (Score:2, Informative)
Who else was all ready to flame about 4 being used to mean "for"?
Fixed. And I'm legitimately trying to be helpful not just being a pain in the ass, it took me like 30 seconds to figure out what you were trying to say here.
Re: (Score:1, Informative)
Re: (Score:2)
Undoing Informative mod. Actually, it seems he pissed off for using 4 instead of Four in the title.
Re: (Score:2)
No it doesn't. It seems like he's an idiot whose first interpretation of the numeral 4 was "for".
Re: (Score:3, Informative)
it took me like 30 seconds to figure out what you were trying to say here
Same here – but I actually figured it out as soon as I looked up and read TFHeadline.
Re: (Score:2)
Re: (Score:3, Funny)
When not four, 4 is 2 B.
... or maybe ! 2 B.
Re: (Score:1)
Re: (Score:2)
+5 Facepalm
Gee What a Coincidence (Score:2, Funny)
Re: (Score:1)
In Russia, bugs exploit you!
Re: (Score:3, Interesting)
Lots of organizations and most governments have the source to windows, its not like its this closely guarded secret. Considering Stuxnet was found infecting Iranian systems [computerworld.com] more than anything else, its probably made in the good ol' USA. This thing has NSA written all over it. Its really well-done, I guess my tax dollars are at work.
All these vulnerabilities.. (Score:4, Insightful)
All these neat day0 exploits wasted to get into an industrial control system. The numbers of those systems are only in the thousands, they could have taken control over millions of normal Windows PCs. Who-ever designed this must have been really determined to get data out of those Siemens controllers. Wouldn't it be easier just to bribe a local operator into getting the info?
Or did they want to create their own bot-net of Scada systems? Then you can brag that you can shutdown a country at the touch of a button.
Re: (Score:3, Insightful)
Seriously, why go to that level of trouble.
Especially when the passwords to the database are hardcoded:
http://www.wired.com/threatlevel/2010/07/siemens-scada/ [wired.com]
Re: (Score:3, Interesting)
I work with a constrol system made by one of the largest competetors to Siemens... The root level passwords are almost always left as the default... :(
Same with the software access passwords
All of the systems I work with are physically disconnected from the outside world though, so it is less of an issue.
Re:All these vulnerabilities.. (Score:4, Insightful)
Re: (Score:2)
Depending on how the industrial control systems are use, you might be able to do a large amount of damage, and possibly kill people. Many facilities rely on industrial control systems to prevent damage to hardware (control sequencing of components, etc). Some facilities now rely on industrial controllers to provide human safety interlocks although these controllers need to be certified for life-safety applications, and I don't know if they could be vulnerable to similar attacks. Medical equipment may use si
Interesting note spied in the article (Score:2, Interesting)
"...noting that the worm also used signed digital certificates stolen from RealTek and JMicron..."
I wonder how they obtained driver level certificates. I can imagine how, but I'd be curious to know the actual method.
I also chuckled at the fact that part of the exploit involved something that was patched a month ago. More unpatched PCs get attacked. I'm shocked. SHOCKED!
Re: (Score:3, Funny)
"Hey Taco man you do realize this is recycled old news from about two month ago, don't you?"
Do you mean it's not zero-day news?
Re: (Score:2)
And the alternative is? Linux? STILL not ready for grandma's desktops. Mac? overpriced and neither have the software support of Win based machines.