Windows patches can be intercepted and injected with malware

New malware turns your computer into a cellular antenna
August 10, 2015
Malware now targeting non-jailbroken iOS 8 devices
August 12, 2015

Can you be certain that patches served through Windows Update aren’t laced with malware?

Researchers at UK-based security firm Context demonstrated at the Black Hat conference in Las Vegas on Wednesday how hackers can compromise corporate networks by exploiting a weakness in Windows’ update mechanism.

The attack is simple enough. Typically, PCs on a corporate network update through a separate Windows Update (WSUS) server on the network. But insecurely configured implementations of the corporate update server can “be exploited in local privilege escalation and network attacks.”

“During the update process, signed and verified update packages are downloaded and installed to the system. By repurposing existing Microsoft-signed binaries, we were able to demonstrate that an attacker can inject malicious updates in order to execute arbitrary commands,” said the paper, seen by ZDNet prior to the scheduled talk on Thursday.

The researchers used low-privileged access rights to set up fake updates that were downloaded and installed automatically by connected machines.

WSUS servers that aren’t configured to use common web encryption, such as a Secure Socket Layer (SSL) certificate, are vulnerable to man-in-the-middle attacks, wherein an attacker injects updates with malware.

“It’s a simple case of a common configuration problem,” said Stone in prepared remarks.

Stone said that corporate update servers that don’t enforce encryption present “an opportunity for an administrator to compromise complete corporate networks in one go.”

“Our concern is that when plugging in a USB device, some of these drivers may have vulnerabilities that could be exploited for malicious purposes,” he said.


And yet, bizarrely, there’s a relatively simple fix to prevent these attacks from happening.

The researchers said if network administrators followed Microsoft’s guidelines to use SSL by default on the update server, that alone will be enough to prevent the described attack. That said, they added there were additional steps to take to offer greater protection, such as using a separate signing certificate to verify updates.

Source – http://www.zdnet.com/article/windows-update-intercept-inject-malware/