Modelworks
Lifer
Looks like the malware creators are at it again and this one targets industry right now but no doubt it will not be long before other malware uses the exploit. So the question is what is the easiest way to to disable usb storage devices for different OS ?
It has to be disabled to the point that windows explorer will not even read the drive contents. Turning off autorun has no effect .
The fix from MS is to disable icons:
http://blogs.technet.com/b/mmpc/archive/2010/07/16/the-stuxnet-sting.aspx
It has to be disabled to the point that windows explorer will not even read the drive contents. Turning off autorun has no effect .
The fix from MS is to disable icons:
Disabling icons from being displayed for shortcuts prevents the issue from being exploited on affected systems. When this workaround is implemented, the system may display most icons as a "white" default object icon, which does impact usability. We recommend that system administrators test this workaround thoroughly prior to deployment. When the workaround is undone, all icons will reappear.
http://blogs.technet.com/b/mmpc/archive/2010/07/16/the-stuxnet-sting.aspx
What is unique about Stuxnet is that it utilizes a new method of propagation. Specifically, it takes advantage of specially-crafted shortcut files (also known as .lnk files) placed on USB drives to automatically execute malware as soon as the .lnk file is read by the operating system. In other words, simply browsing to the removable media drive using an application that displays shortcut icons (like Windows Explorer) runs the malware without any additional user interaction. We anticipate other malware authors taking advantage of this technique. Stuxnet will infect any usb drive that is attached to the system, and for this reason weve classified the malware as a worm. This classification for the malware should not be confused with another vector used by this worm, the newly disclosed vulnerability (CVE-2010-2568) covered in todays advisory. The vulnerability itself is not wormable.
Stuxnet uses the aforementioned .lnk technique to install additional malware components. It first injects a backdoor (Worm:Win32/Stuxnet.A) onto the compromised system, and then drops two drivers:
Trojan:WinNT/Stuxnet.A - hides the presence of the .lnk files
Trojan:WinNT/Stuxnet.B - injects (formerly) encrypted data blobs (.tmp files) into memory, each of which appear to serve different purposes as the Stuxnet deployment system infrastructure (drivers, .lnk files, propagation, etc.).
These drivers are signed with a digital certificate belonging to a well-known hardware manufacturer called Realtek Semiconductor Corp., which is unusual because it would imply that the malware authors somehow had access to Realteks private key. Microsoft MMPC has been working with Verisign to revoke this certificate, and did so at 08:05:42 PM UTC with the agreement and support of Realtek.