Forgot your password?
Security Windows

Stuxnet Attacks Used 4 Windows Zero-Day Exploits 67

Posted by CmdrTaco
from the i'll-exploit-you dept.
abadnog writes "The attackers behind the recent Stuxnet worm attack used four different zero-day security vulnerabilities to burrow into — and spread around — Microsoft's Windows operating system, according to a startling disclosure from Microsoft. Two of the four vulnerabilities are still unpatched. Microsoft said the attackers initially targeted the old MS08-067 vulnerability (used in the Conficker attack), a new LNK (Windows Shortcut) flaw to launch exploit code on vulnerable Windows systems and a zero-day bug in the Print Spooler Service that makes it possible for malicious code to be passed to, and then executed on, a remote machine. The malware also exploited two different elevation of privilege holes to gain complete control over the affected system."
This discussion has been archived. No new comments can be posted.

Stuxnet Attacks Used 4 Windows Zero-Day Exploits

Comments Filter:
  • Re:Zero Day? (Score:5, Insightful)

    by CannonballHead (842625) on Tuesday September 14, 2010 @04:08PM (#33579590)

    define: zero day
    Pertaining to the day on which software is released; New; as yet unpatched

    So it sounds like zero day means that it was present in the unpatched version?

    That said, the summary says nothing about patched vs. unpatched. There would be a great outcry if a vulnerability in Linux/OSS was exploited, even though that vulnerability was already patched, and the summary failed to mention that the only reason it was exploited was because the system was NOT patched...

  • Re:Zero Day? (Score:2, Insightful)

    by TheRedDuke (1734262) on Tuesday September 14, 2010 @04:51PM (#33580122)
    Just because MS releases a patch doesn't mean that users apply said patch.
  • by simp (25997) on Tuesday September 14, 2010 @05:25PM (#33580560)

    All these neat day0 exploits wasted to get into an industrial control system. The numbers of those systems are only in the thousands, they could have taken control over millions of normal Windows PCs. Who-ever designed this must have been really determined to get data out of those Siemens controllers. Wouldn't it be easier just to bribe a local operator into getting the info?

    Or did they want to create their own bot-net of Scada systems? Then you can brag that you can shutdown a country at the touch of a button.

  • Re:Zero Day? (Score:1, Insightful)

    by Anonymous Coward on Tuesday September 14, 2010 @06:04PM (#33581052)

    When you rely on security by obfuscation, yes, it does become easier when you take away the obfuscation. Best to not rely on that when it isn't reliable.

  • Re:Zero Day? (Score:4, Insightful)

    by NatasRevol (731260) on Tuesday September 14, 2010 @06:25PM (#33581288) Journal

    It stops being called a zero-day vulnerability... once there's a patch out. Just because a patch is or isn't used doesn't change that.

  • by NatasRevol (731260) on Tuesday September 14, 2010 @06:33PM (#33581380) Journal

    Seriously, why go to that level of trouble.

    Especially when the passwords to the database are hardcoded: []

  • by antifoidulus (807088) on Tuesday September 14, 2010 @07:19PM (#33581840) Homepage Journal
    This thing is able to inject code as well. Imagine how much a company could gain if it was able to inject difficult to detect faults in its competitors products. Imagine how many armies around the world would be salivating at the opportunity to, for a few thousand dollars, basically have an opportunity to render their opponents half-billion dollar jet useless. These attacks only work, however, if you are able to fly under the radar. If the authors would have attacked normal PCs the odds of the bug being discovered and fixed would be much greater than if they only target a very small subset of Windows computers.
  • Re:Zero Day? (Score:2, Insightful)

    by turbidostato (878842) on Wednesday September 15, 2010 @12:22AM (#33583248)

    "In the context of security, a zero-day vulnerability is a vulnerability for which no patch exists"


    I bet that a exploit against a known vulnerability is not a "zero-day" attack no matter if there's still no patch.

    But I wouldn't be surprised if software companies, especifically closed source software companies tried to change it to mean "no patch still delivered" of "before our monthly patch Thursday" since "zero-day attack" seems to imply the software vendor really couldn't do any better: another PR trick.

How much net work could a network work, if a network could net work?