• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Completely disabling all usb storage devices

Looks like the malware creators are at it again and this one targets industry right now but no doubt it will not be long before other malware uses the exploit. So the question is what is the easiest way to to disable usb storage devices for different OS ?
It has to be disabled to the point that windows explorer will not even read the drive contents. Turning off autorun has no effect .
The fix from MS is to disable icons:
Disabling icons from being displayed for shortcuts prevents the issue from being exploited on affected systems. When this workaround is implemented, the system may display most icons as a "white" default object icon, which does impact usability. We recommend that system administrators test this workaround thoroughly prior to deployment. When the workaround is undone, all icons will reappear.

http://blogs.technet.com/b/mmpc/archive/2010/07/16/the-stuxnet-sting.aspx
What is unique about Stuxnet is that it utilizes a new method of propagation. Specifically, it takes advantage of specially-crafted shortcut files (also known as .lnk files) placed on USB drives to automatically execute malware as soon as the .lnk file is read by the operating system. In other words, simply browsing to the removable media drive using an application that displays shortcut icons (like Windows Explorer) runs the malware without any additional user interaction. We anticipate other malware authors taking advantage of this technique. Stuxnet will infect any usb drive that is attached to the system, and for this reason we’ve classified the malware as a worm. This classification for the malware should not be confused with another vector used by this worm, the newly disclosed vulnerability (CVE-2010-2568) covered in today’s advisory. The vulnerability itself is not wormable.

Stuxnet uses the aforementioned .lnk technique to install additional malware components. It first injects a backdoor (Worm:Win32/Stuxnet.A) onto the compromised system, and then drops two drivers:

Trojan:WinNT/Stuxnet.A - hides the presence of the .lnk files
Trojan:WinNT/Stuxnet.B - injects (formerly) encrypted data blobs (.tmp files) into memory, each of which appear to serve different purposes as the Stuxnet deployment system infrastructure (drivers, .lnk files, propagation, etc.).
These drivers are signed with a digital certificate belonging to a well-known hardware manufacturer called Realtek Semiconductor Corp., which is unusual because it would imply that the malware authors somehow had access to Realtek’s private key. Microsoft MMPC has been working with Verisign to revoke this certificate, and did so at 08:05:42 PM UTC with the agreement and support of Realtek.
 
heh yeah I read about this yesterday.
Most work places that have Group Policy in effect can easy block this.
Even on a indivual PC its easy:
  1. Click Start, and then click Run.
  2. In the Open box, type regedit, and then click OK.
  3. Locate and then click the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
  4. In the details pane, double-click Start.
  5. In the Value data box, type 4, click Hexadecimal (if it is not already selected), and then click OK.
  6. Exit Registry Editor.
Of course if you're like the crack IT department at my job, you enforce Group Policy but everyone has full access to their registry too, so I can just reverse anything they lock me down with. ProxyServer? Whats that?
 
heh yeah I read about this yesterday.
Most work places that have Group Policy in effect can easy block this.
Even on a indivual PC its easy:
  1. Click Start, and then click Run.
  2. In the Open box, type regedit, and then click OK.
  3. Locate and then click the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
  4. In the details pane, double-click Start.
  5. In the Value data box, type 4, click Hexadecimal (if it is not already selected), and then click OK.
  6. Exit Registry Editor.
Of course if you're like the crack IT department at my job, you enforce Group Policy but everyone has full access to their registry too, so I can just reverse anything they lock me down with. ProxyServer? Whats that?

as well

c:/windows/system32/inf/(usbstor.inf,usbstor.pnf) set the system permissions to deny.
 
Now that's awesome...
Really! A control system espionage worm...

SOURCE: Eset Discovers Second Variation of Stuxnet Worm

"We rarely see such professional operations," Bureau wrote. "They either stole the certificates from at least two companies or purchased them from someone who stole them. At this point, it isn't clear whether the attackers are changing their certificate because the first one was exposed or if they are using different certificates in different attacks, but this shows that they have significant resources."

Although Eset analysts are still studying the second variant, it is closely related to Stuxnet, Harley said.

It may also be designed to monitor activity on Siemens WinCC supervisory control and data acquisition (SCADA) systems, which are used to manage industrial machines used for manufacturing and power plants.

The code for the second variant was compiled on July 14, Harley said.

Personally, I don't think you have to worry about it, unless you work in an Asian power plant.

SOURCE: Details of the first-ever control system malware (FAQ)

Once the machine is infected, a Trojan looks to see if the computer it lands on is running Siemens' Simatic WinCC software. The malware then automatically uses a default password that is hard-coded into the software to access the control system's Microsoft SQL database. The password has been available on the Internet for several years, according to Wired's Threat Level blog.

The malware is stealing industrial automation layout design and control files specific to control systems, said Kevin Haley, director of Symantec Security Response. Once the malware locates the data it is looking for it encodes it and attempts to upload it to a remote server. The malware waits for a response from the server, which may contain more commands, he said.

Seems obvious that someone is preparing for a war. They don't care about your credit card info, or whatever...

SOURCE: Stuxnet Worm Infects Siemens Computers

Analysts say the Stuxnet Trojan will also be capable of sabotage by instructing computer systems to attack infrastructure.

"It could be very valuable to a nation-state for war-like espionage. It could be very valuable to terrorist organizations," said ESET's Abrams.

The worm is causing serious concern among the IT security community. It is believed Stuxnet has been developed for a thumb drive because SCADA systems are generally unconnected to the internet, meaning a USB is the only way to reach them.
 
Last edited:
I knew it would not take long, now being used by malware in general.


http://www.theregister.co.uk/2010/07/23/win_shortcut_vuln_goes_mainstream/
Virus writers have begun using the unpatched shortcut flaw in Windows first exploited by the Stuxnet worm, which targets power plant control systems, to create malware that infects the general population of vulnerable Windows machines.

Slovakian security firm Eset reports the appearance of two malware strains that exploit security vulnerabilities in the way Windows handles .lnk (shortcut) files, first used by Stuxnet to swipe information from Windows-based SCADA systems from Siemens.

The Chymine-A Trojan uses the same security hole to install a keystroke logger while the Autorun-VB-RP worm has been updated to use the shortcut vulnerability as an infection method. The original hackers developed a technique to embed malicious code in shortcut files in such a way that this code is run when an icon is viewed, an approach now followed by less skilled VXers.
 
You might consider running Linux...

I don't use AV software, firewalls -- nothing -- and sleep very well at night! 😉
 
I simply didn't get your recommendation for running Linux.
It doesn't pertain to the problem the OP posted.
I wasn't thread crapping...

I was simply *suggesting* there are alternatives to hobbling your computer. ()🙂

To answer "the question" directly:

So the question is what is the easiest way to to disable usb storage devices for different OS ?

Your best option is to disable the USB ports in BIOS. Then, set a BIOS password.

Simple pimple!
 
Last edited:
And not use any usb devices .Have about 8 items that would make useless.
I guess we'll have to take your word for it.

It's hard to list 8 items in a single sentence, huh?

It's a 'lifer' thing'... :awe:

Still, I appreciate the 2-sentence reply. Thanks!

You guys must be worried...
 
I guess we'll have to take your word for it.

It's hard to list 8 items in a single sentence, huh?

It's a 'lifer' thing'... :awe:

Still, I appreciate the 2-sentence reply. Thanks!

No, it's a common sense thing. I have 4 USB devices right in front of me. Pretty much everyone uses USB keyboards and mice now so disabling the USB ports in the BIOS makes the computer virtually worthless.
 
Pretty much everyone uses USB keyboards and mice now so disabling the USB ports in the BIOS makes the computer virtually worthless.
True!

So the task becomes, "completely disabling all usb storage devices" in Winders, or finding an OS that is impervious to attack.

How about simply not using "usb storage devices", e.g. not plugging them in?!?!? :hmm:
 
Back
Top