Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

Re: [News] Is Microsoft Update Infecting You?

__/ [ AB ] on Saturday 12 May 2007 00:29 \__

> http://www.internetnews.com/security/article.php/3677201
> 
>    UPDATED: Tens of millions of Microsoft users get their security
>    updates from the Microsoft Update service. But a researcher at
>    security firm Symantec (Quote) is alleging that users could
>    potentially get something more than they bargained for.
> 
>    A Symantec researcher said that Microsoft Update, which includes a
>    component called Background Intelligent Transfer Service (BITS),
>    could potentially be used by hackers to bypass security measures and
>    attack users' PCs. BITS runs in the background on a Windows PC as an
>    asynchronous download service for patch updates.
> 
>    A Microsoft spokesperson confirmed to internetnews.com that
>    Microsoft is aware of public reports that BITS is being used by
>    TrojanDownloader:Win32/Jowspry to bypass policy-based firewalls in
>    order to install additional malware.
> 
> All you Windozers need to keep up with your patches so you're safe. Be
> good little boys and whatever else you are and go get all of your
> updates so you can "safely" browse the internet and download your
> warez.
> 
>    According to Microsoft, the bypass relies on TrojanDownloader:Win32/
>    Jowspry already being present on the system; it is not an attack
>    vector for initial infection. The bypass most commonly occurs after
>    a successful social-engineering attempt lures the user into
>    inadvertently running TrojanDownloader:Win32/Jowspry, which then
>    utilizes BITS to download additional malware.
> 
> .....
> 
>    Using BITS to download malicious files is a clever trick because it
>    bypasses local firewalls, as the download is performed by Windows
>    itself, and does not require suspicious actions for process
>    injection, Symantec researcher Elia Florio wrote on the Symantec
>    Security Response blog.
> 
>    According to Florio, there is no workaround for a BITS-based attack
>    and it is difficult to manage what should not be downloaded by BITS.
> 
> Any bets on how long before it's patched? Anybody here believe it *can*
> be patched?

I think the design is to blame here, so one might have to patch the patching
module. I'll admit that I wonder how long it will take Redmond folks to
realise that things like WGA forms, just like updates and other 'goodies',
give a piggyback ride to malicious things. I mean, credit card forms showing
up on your desktop? Who can you trust with so many zombies out there?
Attempts to turn an /operating/ system into a /delivery/ systems/ have
become costly.

-- 
                ~~ Best regards

Roy S. Schestowitz      |    #ff0000 Hot Chilli Peppers
http://Schestowitz.com  |  GNU is Not UNIX  |     PGP-Key: 0x74572E8E
roy      pts/7                         Sun May 13 11:36 - 11:39  (00:02)    
      http://iuron.com - proposing a non-profit search engine

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index