[Infowarrior] - Microsoft Update and The Nightmare Scenario

Richard Forno rforno at infowarrior.org
Mon Jun 4 19:11:54 CDT 2012


http://www.f-secure.com/weblog/archives/00002377.html

Microsoft Update and The Nightmare Scenario	Posted by Mikko @ 14:09 GMT | Comments

About 900 million Windows computers get their updates from Microsoft Update. In addition to the DNS root servers, this update system has always been considered one of the weak points of the net. Antivirus people have nightmares about a variant of malware spoofing the update mechanism and replicating via it.

Turns out, it looks like this has now been done. And not by just any malware, but by Flame.

The full mechanism isn't yet completely analyzed, but Flame has a module which appears to attempt to do a man-in-the-middle attack on the Microsoft Update or Windows Server Update Services (WSUS) system. If successful, the attack drops a file called WUSETUPV.EXE to the target computer.

This file is signed by Microsoft with a certificate that is chained up to Microsoft root.

Except it isn't signed really by Microsoft.

Turns out the attackers figured out a way to misuse a mechanism that Microsoft uses to create Terminal Services activation licenses for enterprise customers. Surprisingly, these keys could be used to also sign binaries.

Here's what the Certification Path of the certificate used to sign WUSETUPV.EXE looks like:\

< - >

http://www.f-secure.com/weblog/archives/00002377.html

---
Just because i'm near the punchbowl doesn't mean I'm also drinking from it.



More information about the Infowarrior mailing list