Malware Hijacks Windows Update 209
clickclickdrone writes "The BBC are reporting a new piece of malware is in the wild that can hijack Windows Update's functionality and bypass firewalls allowing it to install malicious code on users PCs. The new code was discovered by Frank Boldewin in an email. The attack utilizes the BITS system."
Maybe we should call it... (Score:5, Funny)
but does it support Vista? (Score:2)
Re:but does it support Vista? (Score:5, Funny)
Typical Microsoft response (Score:5, Funny)
Re:Typical Microsoft response (Score:5, Informative)
However, given the time I spend helping my less technical friends clean up their PCs you do definitely have a point!
Re:Typical Microsoft response (Score:4, Interesting)
Re: (Score:3, Funny)
Re:Typical Microsoft response (Score:4, Funny)
Re: (Score:3, Funny)
Re: (Score:2)
Sure, but I think it would be more cost effective if they made the OS impossible to have a Trojan in the first place.
Here is my take... A 3rd party application should never... EVER be able to modify anything with the OS unless the user specifically jumps through hoops of fire to allow this. It should not be a cancel o
Re: (Score:3, Insightful)
There is no way to program around users that blindly say yes to every prompt. There is however a way to create users who blindly say yes to every prompt, and that is throwing a million prompts at them every time they want to update their video card driver.
Re: (Score:2)
I'm not suggesting providing a prompt at all. If a program wants to modify the OS, it should not be given an option. It should not even prompt to run the password for an admin account. It simply should not be allowed.
If a user really wants to install it, they they need to run an application much like OS X's Net Info manager which they had to specially type in a string text to enable the root account.
(I would like to also point out
Re: (Score:2)
That is one of the features for VISTA that got nixed during development.
Re:Typical Microsoft response (Score:5, Insightful)
huh? I mean seriously, huh? What century are you in?
Windows 2000 and later you can make USB sticks read-only for non-admin users through group policy. System file changes do require the user to intervene, even if the user isn't aware system file changes are logged and have been logged since Windows 2000 "self-healing" became prevalent. With XP SP2 things became more obvious and with Vista things are blatantly obvious when there is a system change as the Allow Cancel dialog pops up.
Seriously, why make a point about the operating system being designed improperly if you're going to support it with completely false evidence. You could at least use real evidence like memory management and service dependency problems in the Windows world. It would be real, it is a poorly designed system but despite that they make it work for the vast majority of users out there.
Linux systems are just as susceptible to trojans of this sort. When the user opens something from an untrusted source and blindly clicks like would be required in Vista then almost anything is possible. There are ways to mitigate the risks on both sides but typical setups will still be quite susceptible.
I'm curious what you think Administrator can't do on a Windows system as well, perhaps you mean they don't make potentially dangerous features readily accessible? Perhaps you mean the protected-mode nature of the kernel preventing flashing of internal firmware which also isn't problem? Add in Powershell and I'm thoroughly confused as to what you think administrative users can't do.
Re: (Score:2)
But it isn't like this out of the box! There are millions of people who do not have the knowledge for the home computers and I dare say there are plenty of Network Admins who are clueless too.
Hence, this is why OS is designed improperly. It should be secure as soon as you install it... Not after tweaking it and locking it down.
This is why we have millions of zombies s
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
There are provisions in Windows for injecting a DLL into a currently running process (SetWindowsHookEx). The malware author could simply set the hook, which would inject code into this other process. He could then use the hook as a proxy to do his data communication without tripping the Windows Firewall. BITS is a good choi
Re: (Score:2)
Re: (Score:3, Insightful)
When will Microsoft patch these vulnerabilities?!
Re: (Score:2)
Re:Typical Microsoft response (Score:5, Insightful)
Not that it would matter- I always choose "Custom Install" anyway because otherwise I'll end up with Windows Genuine Advantage which I think fits the definition of a Trojan.
Re: (Score:2)
Re: (Score:2)
Just wait. I'm fully expecting some asshat there to decide that WGA should now be regarded (and renamed) as one of the many "critical system updates" that MS sends out, and blammo -- everyone's got it. New, Improved! It's Microsoft Clap(TM)!
Re: (Score:3, Insightful)
Well, Microsoft's response makes a lot of sense. You could trick a user into running sudo trojan.sh on Ubuntu too. After that the user is screwed anyway, as trojan.sh could contain anything, including something that edits /etc/apt/sources.list to the attacker's repo's.
What do you want MS to do to stop this from being possible? If the user runs a random executable as root/a
Re: (Score:2)
Re: (Score:2)
What do you want MS to do? disallow even the administrator from writing to system files? The only thing that could protect you against stuff like that is "trusted computing", w
Re: (Score:2)
It should. They are running a program with admin rights on a box, and we're supposed to be scared about what it can do to windows update? It can pretty much do anything its coded to do. Of course the slashdot blurb implies that someone has hacked wu.
Your machine has just been updated (Score:5, Funny)
please restart your machine to become a zombie
Re:Your machine has just been updated (Score:4, Funny)
Accept or Deny?
This will never get old...
Not one the the better MS Patents... (Score:4, Funny)
Correct link (Score:5, Informative)
Re: (Score:2)
The weird Christian page; unless you happen to be running Linux x64.
Re: (Score:2)
Makes perfect sense (Score:4, Insightful)
Re:Makes perfect sense (Score:5, Informative)
Security quiz linked from TFA (Score:5, Funny)
A: Guerilla activism by open source software advocates in which they uninstall Windows on a PC and replace it with Linux
Re: (Score:2)
I want a recount, first of all how come knowing which platform the first virus ever invented targeted is any useful for my security knowledge?
Then the serious complaints:
Q: Windows is nagging you to update the operating system. What do you do?
Alleged correct answer: "Install the updates as soon as they become available" , wtf? What if I don't want any WGA trojan?
Q: You need to choose a password for the account you have set up at an online shop. What do you do?
The answer for most is "Pick one t
Windows is safe! (Score:5, Funny)
I have my own awesome blog whose url I certainly don't need to post here since I expect you all to know it already.
I just talked with my friends at Microsoft and they told me that
"Windows is safe!"
and it seems ridiculous to care about such small issues when 9/11 was only 6 years ago. You people should really step aside and look at the things from another perspective.
Maybe from above like the Lord does.
I rather go to church and pray to the Lord for less terrorists than being part in this smear campain against the blessed world leader of IT.
Bill and Melinda think of the children. Do YOU?
Re: Windows is safe! (Score:2)
Re: (Score:2, Funny)
Re: (Score:2)
A little overstated (Score:4, Informative)
Re: (Score:2)
Speak for yourself. I have Zonealarm block every IE connection unless I specifically allow it... no way will I trust that piece of crap to go talking to random web sites without permission.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
But it is a conjecture or speculation on your part. It is possible that MSFT has given more privileges to BITS over other parts and a privelege escalation vulnerability could be found in future. But as of now, malware using windows downloader is no different from malware using firefox, Infernal Exploder or plain vanilla ftp.
WGA (Score:3, Funny)
Manual updates at risk? (Score:2)
If I only ever do manual updates on windows, by manually surfing to windowsupdate.com, am I at risk for this? It's not actually necessary to run BITS in order to keep a Windows system up to date.
Also, it's not clear from TFA whether this can be stopped by privilege separation -- if I'm sur
Re: (Score:2)
If I only ever do manual updates on windows, by manually surfing to windowsupdate.com, am I at risk for this? It's not actually necessary to run BITS in order to keep a Windows system up to date.
Manual downloads from Windows update use BITs. Check %SYSTEMROOT%\WindowsUpdate.log while doing an update if your curious.
Also, it's not clear from TFA whether this can be stopped by privilege separation -- if I'm surfing as a low-priority user and hit this malware, can it still make BITS do the more-malware download?
BITs runs as a service under the system account. It can do whatever it wants. However it needs to be woken up to do it, as it's default service state is set as 'Manual'.
Re: (Score:2)
Re: (Score:2, Insightful)
click here (Score:4, Funny)
Re: (Score:2)
I clicked on the link and it redirected me to http://127.0.0.1/apache2-default/ [127.0.0.1] and the page confirms that it works!
Let me be the first to say... (Score:5, Funny)
Me, I'm relaxed and enjoying a soda.
Re: (Score:2)
Ok, so I feel detached and amused, but I'm still left wondering why it is that Windows users always seem to have all the new neato features.
From Symantec's Malware Update with Windows Update [symantec.com]
Re: (Score:2)
Snort (Score:2, Interesting)
The "news" here is that there is software capable of doing this, not that it can't be done. True, BITS is a protocol created to work around firewalls, but it is hardly the only protocol engineered to do that.
Oh,
Re: (Score:2)
I understand the issue at hand perfectly. Microsoft uses the BITS protocol to manage Windows Update downloads and work around firewalls. A trojan that gets ahold of your windows system can use the BITS system to implement updates and installs of malware, thus making malware maintenance as convenient as Windows Update itself.
So, not only is your Windows box easy to hose because it's got so many critical vulnerabilities and Microsoft (not being open source) is the on
Re: (Score:2)
BITS is a service that can be told to download stuff. Windows Update uses it to download stuff. BITS can also be told to download other stuff. In this case, an already infected system uses it to download more infections, rather then say creating a HTTP connection itself.
Re: (Score:2)
BITS is a piece of Windows Update (it's the system Microsoft built to let Windows Update get past your firewall).
Therefore...
using BITS is like using Windows Update. Or at least part of it. And it makes life easier for spyware authors.
Nyah, nyah! Pbbbbbbbbbt!
It should be possible to delete your own posts (Score:2)
I just wanted to say it amuses me when people get emotional over operation systems. This is true for both Windows and non-windows users alike; I recall several Winlots being on cloud 9 when that Mac scripting error deleted a bunch of files.
I'm probably also guilty of being amused by others misery at one time or another.
Re: (Score:2)
My mother used to use a Compaq with Windows installed. Despite her running Norton Internet Security, it would periodically get utterly FUBAR by viruses, trojans, crapware... I found myself reinstalling the whole damn box a few times a month. I couldn't go NEAR their house without having to spend a few hours fixing their computer.
Finally I got fed up and heckled her into
Overblown (Score:5, Informative)
Can you safely disable BITS? (Score:4, Interesting)
However, I've never found anything more specific -- does anyone know the consequences of disabling BITS?
Re: (Score:2)
Re: (Score:2)
http://www.firewallleaktester.com/news.htm#57 [firewallleaktester.com]
Re: (Score:2)
of course the malware could also just use your favorite networking sta
Re: (Score:2)
No matter how you secure your computer, there are ways around it. All you can do is make it more difficult for the attacker.
Re: (Score:2)
Nice work! A program to infect an already ... (Score:3, Funny)
and yet... (Score:2)
Eh. What can ya do.
Re:and yet... (Score:5, Insightful)
How is this Microsoft's fault? It's a trojan. The system has already been compromised. Hey, if I can get you to run my shell script as root, then I can add my own sources to your sources.list and use apt to install my rootkit! Debian must be insecure!!@#!#!#!
Re: (Score:2)
Unless you're saying you use your debian box logged in as root to surf and do work?
Re: (Score:2)
There have been numerous examples of local privilege escalation exploits on OpenBSD, let alone Debian.
Could I do it? Probably not. I'm not much of a programmer. Could people who regularly write malware do it? Probably.
No. I do it with Windows of course
Re: (Score:2)
That's the thing the article doesn't make clear: Does this exploit require that the trojan be executed with admin privileges, or can it get the necessary privileges from a standard user account?
If the former, then clearly this isn't MS' fault at all. Got Root? Got Pwned. If the latter, then it's a local privilege escalation bug that is MS' fault. It may still requir
Re: (Score:3, Insightful)
Oh, wait, that's bollocks. And so is your argument.
Re: (Score:2)
Just letting you know to be helpful.
Re: (Score:2)
Just letting you know to be helpful.
The question left unanswered is: Is it generally easier or harder to make an exploit at the application level, as compared to the OS level? And, once we take this into account, how does the Apache HTTPD application monoculture then compare with the Windows OS monoculture?
Re: (Score:2)
So I suppose my question
Microsoft's Makes a Buck, However (Score:5, Funny)
Your Trojan, named 1337-5ki11z, violates 387 Microsoft patents, included patent 666-1345-876-666 ("screwing the user over"). We do not wish to actually pursue legal action, but would rather license our Windows Update APIs to you for the paltry sum of 100.00 (per infection).
Thank You
Kindly,
The MS Legal Eagles
Story is innacurate (Score:5, Insightful)
Windows update makes use of the BITS service. Malware can make use of the BITS service. Its not logical to then say that Malware is exploiting Windows update. Any more than an attack that utilised Java would be exploiting Azureus (A java application).
The reason malware utilising BITS is a problem is because with any application-level firewall, permission for BITS to access the net is already granted and so unlike a regular trojan, the firewall won't spit a potentially suspicious permission request up when it tries to download more malware from the 'net. This same exploit is true of the JVM too.
A solution to the problem might be to instance such services. But by doing that it sort of renders them not services anymore.
So eh, mark my stats +1 pedantry, but to perpetuate this as a Windows Update exploit isn't accurate.
Re: (Score:2)
And this is what's wrong with Windows' security model.
Firewalls shouldn't be caring about which programs want access to the outside world. Firewalls should be caring about which bit of the outside wor
Re: (Score:2)
Aw, man...now I've got Windows envy. I wish my Linux PC could downdaload data! (sorry, I couldn't resist!)
I've always been curious... (Score:3, Interesting)
Re: (Score:2)
Had Enough (Score:2)
Completely misleading (Score:5, Informative)
BITS stands for "Background Intelligent Transfer Service" and is simply a way to download files using idle bandwith. It's fully documented in MSDN, see http://msdn2.microsoft.com/en-us/library/aa362708. aspx [microsoft.com], and among many things it's used by some browser downloading plugins (similar to DownloadThemAll) that enhance downloading of large files. It's not just used by Windows Update.
Do we need additional articles to state that a malicious program on a compromised machine could use FTP to download additional files? Or HTTP? Or BitTorrent? Or roll their own protocol?
Based on the article, it sounds like the only concern is that because BITS is a service (daemon in the Unix world), it means that firewalls or malware detection tools that attempt to block outgoing requests (which most don't; they block listening ports) may not currently detect this because it's not the malicious .EXE itself that's opening a port; it calls into BITS, which opens the port. However, the app still has to use a public API to instantiate the BITS object, so there's no reason such a program couldn't hook that as well.
Unfortunately the article summary (and headline of the BBC article!) completely misrepresents the issue and blows it way out of proportion. They are not Hijacking Windows Update. They're using a generic well-documented downloading service that also happens to be used by Windows Update simply because it enables WU to download updates without gobbling up all your bandwidth.
Windows Firewall model suxors (Score:2)
The problem isn't BITS. The problem is the idea that BITS is "trusted". Should you trust every FTP server your computer connects to? Every HTTP server? Of course not. Then why BITS?
The Windows firewall model of "trust this program" is inherently incorrect, and that's the real source of this issue. I really hate to say it, but Internet Explorer gets this right - programs aren't trusted, places you can connect to are trusted.
Re: (Score:2)
No worries (Score:2)
More Symantec Baloney (Score:3)
I wrote a proof of concept application that bypassed all of the major outgoing software firewalls (BlackIce, Zonealarm, McAfee, Symantec) by utilizing the COM interfaces for Internet Explorer and funneling all my requests through it. This is almost impossible to detect. Even better, I wrote this app in freakin' VB!
The real problem is that local outgoing software firewalls simply don't work in an environment where all the users are admin. Once the machine is compromised, it's compromised. No number of software defenses are going to help. This includes, by the way, Symantec's expensive and incredibly crappy products. These products are there to make users feel secure, not actually make them secure.
Remember WordMasters from grade school? You know, the analogy test they used to give every once in a while. Here is an analogy for you:
Symantec is to computer security as the Bush Administration is to homeland security.
They do their best to scare the crap out of people in an attempt to get them to buy their software... or vote for their party. Don't trust either of them and you'll be better off.
"Flamebait"? (Score:2)
Mcaffee do it to -- have a look at http://www.avertlabs.com/research/blog/?p=218#com m ent-32657 [avertlabs.com], an explot that gives an attacker "full access to the system". A little lower down, it is noted that the attack "requires... administrator [privileges]", but goes on to say that "a determined attacker can always find workarounds". WTF??? It's an attack the purpose of which is to malware running wi
Re: (Score:2)
Really, it was flamebait I guess... but my other points are valid regardless of my unnecessary, but imho funny (and accurate), political analogy.
Re: (Score:3, Insightful)
Re: (Score:2)
First you install a trojan. Then the trojan uses a background FTP process (which is also used by Windows Update) to download additional malware -- but your machine is already compromised at that point.
Re: (Score:2)
Yes, you can. (Score:3, Insightful)
No, I don't agree.
No matter what, buggy drivers, compromised machine, spilled coffee, you can always count on your trustworthy old friend, mister Blue-Screen©® !