Microsoft Airs Temporary Fix to Defeat Duqu Worm
November 4, 2011 4:00 PM
comment(s) - last by
Worm is exploiting zero-day exploit in the TrueType Windows component
The Duqu [dyü-kyü] worm
, containing parts of
the Stuxnet code
, is a sophisticated piece of malware that's wreaking havoc on Windows machines worldwide. The authors appear to be specially targeting business and governmental entities in what may be a cyberespionage or cybersabotage attempt.
A Fix for Duqu:
Duqu is essentially the precursor to a future Stuxnet-like attack. The threat was written by the same authors, or those that have access to the Stuxnet source code, and the recovered samples have been created after the last-discovered version of Stuxnet. Duqu’s purpose is to gather intelligence data and assets from entities such as industrial infrastructure and system manufacturers, amongst others not in the industrial sector, in order to more easily conduct a future attack against another third party. The attackers are looking for information such as design documents that could help them mount a future attack on various industries, including industrial control system facilities.
The malware piggybacks inside seemingly legitimate documents from Microsoft Corp.'s (
) Word application. Once infected, the malware takes complete control of the affected system and accesses the address book, sending out infected Word documents to your contacts along with brief, innocuous seeming messages. Microsoft listed the threat as "severe".
Usually Microsoft has a pretty fast turnaround, when it comes to addressing such serious threats, and it did not disappoint here. Just days after the zero-day vulnerability was discovered, Microsoft has published new details of what's going on, along with a temporary fix to remove Duqu.
Microsoft's TechNet Security TechCenter and
in the Microsoft Knowledge Base the Duqu virus is exploiting a zero-day vulnerability in the Win32k TrueType font-parsing engine. The vulnerability allows arbitrary code to be executed in kernel mode (a so called "privileges escalation" exploit).
A peak at the code of Duqu's malware payload [Source: Symantec]
Microsoft has also released a QuickFix tool, available in the above linked Knowledge Base post, which scrounges around and removes the vestiges of known Duqu variants
Symantec Corp. (
) -- one of the world's largest security firms -- is currently working with Microsoft to combat the threat and identify variants of the growing malware threat. The company has published a detailed report on Duqu, which is available
Symantec has chronicled Duqu's sophisticated remote command & control (CaC) scheme. [Source: Symantec]
Symantec researchers say they first received a copy of Duqu from the
Budapest University of Technology and Economics
(BME). BME obtained that piece on Oct. 14.
Some argue that Microsoft
rushes patches for vulnerabilities to market too fast
. They say that rushed patches often fail to completely protect against various variants of a malware threat, hurting the user in the long run. Still, the majority of security firms seem supportive of Microsoft's approach.
In related news chipmaker Intel Corp. (
) is working with recent acquisition McAfee to include
hardware-level protection against escalation of privileges attacks
. The technology seems very promising as it could protect against so-called zero-day vulnerabilities like the TrueType parsing exploit used by Duqu. While it might seem improbable to be able to protect against an attack you've never encountered before, Intel is looking to do this by detecting the kinds of escalation behavior that are ubiquitous among many malware programs.
This article is over a month old, voting and posting comments is disabled
11/8/2011 8:59:19 AM
Hmmm this is very true. The VP of the company I work for sends out memos and letters this way all the time to the staff.
"Paying an extra $500 for a computer in this environment -- same piece of hardware -- paying $500 more to get a logo on it? I think that's a more challenging proposition for the average person than it used to be." -- Steve Ballmer
Nasty "Duqu" Worm Exploits Same Microsoft Office Bug as Stuxnet
November 2, 2011, 12:32 PM
Intel Gets EU Approval to Purchase McAfee
January 28, 2011, 9:16 AM
Israel Suspected in Worm Sabotage of Iran's First Nuclear Plant
September 27, 2010, 10:45 AM
Debate Continues Over Whether Microsoft Should Hurry Patches for Vulnerabilities
December 29, 2008, 12:31 PM
AT&T Launches U-verse with GigaPower Network in Austin, Texas
December 11, 2013, 5:14 PM
Harlem to Receive U.S.' Largest Free Wi-Fi Network
December 11, 2013, 11:48 AM
Google's First Asian Data Centers Now Operational
December 11, 2013, 8:50 AM
Seattle's High-Speed Internet Rollout Delayed Due to Financial Issues
December 10, 2013, 12:14 PM
Report: Spotify Working on Free, Ad-Supported Mobile Service
December 6, 2013, 9:52 AM
Microsoft Protecting International Customer Data Through Increased Encryption, Litigation
December 5, 2013, 6:15 PM
Most Popular Articles
Experts: Masturbation Prevents Cancer, Diabetes, Insomnia, and Depression
December 6, 2013, 2:01 PM
Hackers Nab 2 Million Login Credentials from Facebook, Gmail, Twitter
December 5, 2013, 1:00 PM
Thieves Steal Truck with Cobalt-60 Onboard in Mexico, Will Die "Without a Doubt" from Exposure
December 5, 2013, 12:04 PM
Man Arrested for Using 5 Cents Worth of Electricity to Charge Nissan Leaf at Middle School
December 4, 2013, 8:00 PM
U.S. Navy Fires "XFC" Drone from Underwater Submarine
December 6, 2013, 2:35 PM
Latest Blog Posts
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
Is The Period Becoming an Expression of Anger?
Nov 26, 2013, 2:02 PM
NSA and Congress -- You Will Never Kill the Constitution, It's an Idea
Nov 10, 2013, 2:00 PM
AT&T Explores $100B+ USD Deal to Acquire Vodafone's European Operations
Nov 4, 2013, 7:34 AM
More Blog Posts
Copyright 2013 DailyTech LLC. -
Terms, Conditions & Privacy Information