{"id":71987,"date":"2014-08-28T11:21:49","date_gmt":"2014-08-28T15:21:49","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-25T15:19:12","modified_gmt":"2021-08-25T19:19:12","slug":"millions-of-pcs-still-have-stuxnet-bug","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/millions-of-pcs-still-have-stuxnet-bug\/","title":{"rendered":"Millions of PC&#8217;s Still Have Stuxnet Bug"},"content":{"rendered":"<p><em><a href=\"https:\/\/web.archive.org\/web\/20191231171208\/http:\/\/stormforcemarine.com:80\/upgrade-your-boat-part-7.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-97242 size-medium\" title=\"Millions of PC's Still Have Stuxnet Bug\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bug-e1562725889787-150x109.jpg?resize=150%2C109&#038;ssl=1\" alt=\"Millions of PC's Still Have Stuxnet Bug\" width=\"150\" height=\"109\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bug-e1562725889787.jpg?resize=150%2C109&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bug-e1562725889787.jpg?resize=75%2C55&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bug-e1562725889787.jpg?w=321&amp;ssl=1 321w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Lately, I have covered a few pieces of old IT business <a title=\"Bach Seat - Clock Ticking on Server 2003 Deployments\" href=\"http:\/\/wp.me\/p2wgaW-ipQ\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>, <a title=\"Bach Seat - Many Ex-employees Can Still Access Privileged Info\" href=\"http:\/\/wp.me\/p2wgaW-ipV\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>, <a title=\"Bach Seat - More Server Admin Passwords Exposed\" href=\"http:\/\/wp.me\/p2wgaW-ieq\" target=\"_blank\" rel=\"noopener noreferrer\">and<\/a> <a title=\"Bach Seat - MSFT Clossing More Windows Support \" href=\"http:\/\/wp.me\/p2wgaW-iyZ\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. And here is another piece of old business from <a title=\"Infosecurity Magazine\" href=\"http:\/\/www.infosecurity-magazine.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Infosecurity Magazine<\/a>.<\/em>\u00a0<a title=\"Tara Seals\" href=\"http:\/\/www.infosecurity-magazine.com\/profile\/tara-seals-1\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tara Seals<\/a> at <em>Infosecurity Magazine<\/em> recently <a title=\"Stuxnet Vulnerability Still Present on Millions of Machines\" href=\"http:\/\/www.infosecurity-magazine.com\/news\/stuxnet-vulnerability-still-present\/\" target=\"_blank\" rel=\"noopener noreferrer\">pointed out<\/a> new research from <strong><a title=\"Kaspersky\" href=\"https:\/\/usa.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kaspersky<\/a>. <\/strong>They are reporting that there are 10&#8217;s of <strong>millions of systems<\/strong> that are still <strong>vulnerable<\/strong> to the most infamous malware families that enabled Stuxnet.<\/p>\n<h3>Patched in late 2010<\/h3>\n<p><a href=\"https:\/\/globerove.com\/italy\/italy-world-war-ii-long-range-microwave-radar\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-97244 \" title=\"Radar\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Microwave-Radar.jpg?resize=140%2C100&#038;ssl=1\" alt=\"Radar\" width=\"140\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Microwave-Radar.jpg?resize=150%2C107&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Microwave-Radar.jpg?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Microwave-Radar.jpg?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 140px) 100vw, 140px\" \/><\/a>Research by Kaspersky has found the vulnerability that allowed <strong><a title=\" Report: Stuxnet Worm Attacks Iran, Who is Behind It?\" href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2369745,00.asp\" target=\"_blank\" rel=\"noopener noreferrer\">Stuxnet<\/a><\/strong>, <a title=\"What is Flame?\" href=\"https:\/\/www.kaspersky.com\/flame\" target=\"_blank\" rel=\"noopener noreferrer\">Flame<\/a>, and <a title=\"What is Gauss?\" href=\"https:\/\/www.kaspersky.com\/no\/gauss\" target=\"_blank\" rel=\"noopener noreferrer\">Gauss<\/a> <a title=\"Malware\" href=\"http:\/\/en.wikipedia.org\/wiki\/Malware\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">malware<\/a> campaigns (<a title=\"www.cvedetails.com\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2010-2568\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2010-2568<\/a>) is <strong>still being exploited. <\/strong>They are still being exploited despite the flaw having been <strong><a title=\"Microsoft Security Bulletin MS10-092 - Important\" href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms10-092.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">patched<\/a> in late 2010 by Microsoft<\/strong>. <a title=\"Kaspersky Lab\" href=\"https:\/\/www.kaspersky.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Kaspersky Lab<\/a> reported more than 50 million detections on more than 19 million computers worldwide in the past eight months.<\/p>\n<p>The lack of patching by IT administrators is surprising given that the vulnerability has an infamous history. The author explains that the\u00a0vulnerability is an error in processing tags in\u00a0<a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.google.com\/finance?cid=358464\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) Windows OS. The flaw enabled the download of the random dynamic library without the user&#8217;s awareness. The vulnerability affects <strong><a title=\"Windows XP\" href=\"http:\/\/www.cnet.com\/news\/a-salute-to-windows-xp-the-last-great-operating-system\/\" target=\"_blank\" rel=\"noopener noreferrer\">Windows XP<\/a>, <a title=\"Windows Vista\" href=\"https:\/\/support.microsoft.com\/lifecycle\/search\/default.aspx?alpha=Vista\" target=\"_blank\" rel=\"noopener noreferrer\">Vista<\/a>, and <a title=\"Windows 7\" href=\"http:\/\/www.pcmag.com\/Windows-7\/\" target=\"_blank\" rel=\"noopener noreferrer\">Windows 7<\/a>, as well as <a title=\"Windows Server 2003\" href=\"http:\/\/en.wikipedia.org\/wiki\/Windows_Server_2003\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Windows Server 2003<\/a> and <a title=\"Windows Server 2008\" href=\"http:\/\/technet.microsoft.com\/en-us\/library\/dd349801%28v=ws.10%29.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">2008<\/a><\/strong>.<\/p>\n<h3>Sality worm<\/h3>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-97246 \" title=\"Malware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-2.jpg?resize=107%2C107&#038;ssl=1\" alt=\"Malware\" width=\"107\" height=\"107\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-2.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-2.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-2.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 107px) 100vw, 107px\" \/>The first malware exploiting this vulnerability appeared in July 2010: the worm <strong><a title=\"Sality\" href=\"http:\/\/en.wikipedia.org\/wiki\/Sality\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Sality<\/a>. Sality <\/strong>generated vulnerable tags and distributed them through the LAN. Ms. Seals writes that if a user opens a folder containing one of these vulnerable tags, a malicious program immediately begins to launch. The summer of 2010 then saw the appearance of <strong>Stuxnet. <\/strong>Stuxnet is\u00a0a computer worm that was specifically designed (likely <a title=\"Confirmed: US and Israel created Stuxnet, lost control of it\" href=\"http:\/\/arstechnica.com\/tech-policy\/2012\/06\/confirmed-us-israel-created-stuxnet-lost-control-of-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">by the US and Israel<\/a>) to <strong>sabotage the uranium enrichment process<\/strong> at several factories in <a title=\"Iran\" href=\"https:\/\/web.archive.org\/web\/20201229023715\/https:\/\/www.cia.gov\/library\/publications\/the-world-factbook\/geos\/ir.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Iran<\/strong><\/a>. Subsequently, the state-sponsored Flame and Gauss spyware made use of the security hole.<\/p>\n<h3>Windows XP vulnerable to Stuxnet<\/h3>\n<p><em>Infosecurity Magazine<\/em> dug into the statistics and found that most of the unpatched systems were running Microsoft&#8217;s outdated Windows XP. Kaspersky said the report.<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em><a href=\"https:\/\/daily-devotional.org\/daily-devotions\/no-ive-never\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-97249 \" title=\"Knife in the toaster\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/knife-in-toaster.jpg?resize=106%2C88&#038;ssl=1\" alt=\"Knife in the toaster\" width=\"106\" height=\"88\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/knife-in-toaster.jpg?resize=150%2C124&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/knife-in-toaster.jpg?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/knife-in-toaster.jpg?w=550&amp;ssl=1 550w\" sizes=\"auto, (max-width: 106px) 100vw, 106px\" \/><\/a>The lion&#8217;s share of detection&#8217;s (64.19%) registered .. involved XP and only 27.99% were on Windows 7 &#8230; Kaspersky Lab products protecting Windows Server 2003 and 2008 also regularly report detection of these exploits (3.99% and 1.58% detection&#8217;s respectively)<\/em><\/p>\n<p style=\"text-align: justify;\">Kaspersky data suggests that the problem is self-inflicted.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em> The large number of detection&#8217;s coming from XP users suggests that most of these computers either don&#8217;t have an installed security solution or use a vulnerable version of Windows &#8211; or both.<\/em><\/p>\n<p>Kaspersky also analyzed the geographical distribution of CVE-2010-2568 detections. According to <em>Infosecurity<\/em>, the top nations with the vulnerability <a href=\"https:\/\/web.archive.org\/web\/20190419234353\/https:\/\/www.csuchico.edu\/soa\/press-releases\/2019-04-27-earthsings.shtml\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-97252\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Earth.jpg?resize=84%2C84&#038;ssl=1\" alt=\"\" width=\"84\" height=\"84\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Earth.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Earth.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Earth.jpg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Earth.jpg?w=1000&amp;ssl=1 1000w\" sizes=\"auto, (max-width: 84px) 100vw, 84px\" \/><\/a>were:<\/p>\n<ol>\n<li><a title=\"Vietnam\" href=\"https:\/\/www.worldbank.org\/en\/country\/vietnam\/overview#1\" target=\"_blank\" rel=\"noopener noreferrer\">Vietnam<\/a> (42.45%)<\/li>\n<li><a title=\"Indua\" href=\"https:\/\/web.archive.org\/web\/20210101083105\/https:\/\/www.cia.gov\/library\/publications\/the-world-factbook\/geos\/in.html\" target=\"_blank\" rel=\"noopener noreferrer\">India<\/a> (11.7%) and<\/li>\n<li><a title=\"Algeria\" href=\"https:\/\/web.archive.org\/web\/20210103101924\/https:\/\/www.cia.gov\/library\/publications\/the-world-factbook\/geos\/ag.html#Econ\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">Algeria<\/a> (5.52%)<\/li>\n<\/ol>\n<p>Kaspersky researchers told the author, \u201c<em>So many users of outdated versions of Windows mean these exploits are effective even though almost four years have passed since the disclosure and patching of the vulnerability<\/em>.\u201d<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>C&#8217;mon, if you are going to use an orphaned operating system, update it as far as you can and get off it as fast as possible. <\/em><\/p>\n<p><em>As Kaspersky pointed out, using an outdated version of an operating system is fraught with the risk of cyber-attacks involving exploits, special programs that target vulnerabilities in legitimate software to infect a computer with other dangerous malware.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20140626120426\/http:\/\/www.securelist.com\/en\/analysis\/204792238\/Gauss_Abnormal_Distribution\" target=\"_blank\" rel=\"noopener noreferrer\">Gauss: Abnormal Distribution<\/a> (securelist.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anti-malware firm Kaspersky says that after 4 years millions of PCs still not patched against the Stuxnet worm which is still exploiting Windows XP PC&#8217;s.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2195,2196,2292,1754,2233,2234,401,2738,82,421,2232,4,2194,765,445,1756],"class_list":["post-71987","post","type-post","status-publish","format-standard","hentry","category-security","tag-2195","tag-2196","tag-2292","tag-1754","tag-flame","tag-gauss","tag-iran","tag-israel","tag-microsoft","tag-msft","tag-sality","tag-security","tag-server","tag-stuxnet","tag-windows","tag-xp"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/71987","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=71987"}],"version-history":[{"count":17,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/71987\/revisions"}],"predecessor-version":[{"id":130234,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/71987\/revisions\/130234"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=71987"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=71987"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=71987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}