Free Sophos tool blocks Windows shortcut attacks
The security firm Sophos released a tool on Monday that it claimed will block any attacks trying to exploit the critical unpatched vulnerability in Windows’ shortcut files.
The tool, dubbed “Sophos Windows Shortcut Exploit Protection Tool,” will protect users until Microsoft releases a permanent patch for the problem, said Chet Wisniewski, a senior security advisor at Sophos.
IDC ROI Report: NetApp: Download now
“The tool replaces Windows’ icon handler, so that anything that calls the handler, we’re going to intercept,” Wisniewski told Computerworld.
But Microsoft refused to condone the Sophos tool, a position it takes whenever third-party solutions to a Windows bug are introduced.
Related Content
* CIOs Reveal Their Picks for Beach Reads
* The CFO¿s guide to managing Key Performance Indicators
* When good projects go bad
* Ensure 360-Degree Border SecurityWHITE PAPER
* iPad case roundup 4: The final frontier
* IT innovation: How to avoid being a one-hit wonder
* Japan pushes high-tech in World Cup bid
* Fujifilm Fires Up New EXR Cameras for Fall
* Email on Cruise Control: How to Guarantee Security, Speed and Confidence in EmailWHITE PAPER
* Career Watch: Creative excuses for tardiness
Get Daily News by Email
“Microsoft does not endorse third-party tools,” said Jerry Bryant, group manager with the Microsoft Security Response Center (MSRC). “We recommend that customers apply the workaround in Security Advisory 2286198 , as it helps to protect customers from all known attack vectors Cisco CCNA Training.”
The vulnerability is in how the Windows parses shortcuts, the small files that graphically represent links to programs and documents. Shortcuts are a key component of the Windows desktop, including the Start menu and the taskbar.
The bug was first described more than a month ago by VirusBlokAda, a little-known security firm based in Belarus. It attracted widespread attention only after security blogger Brian Krebs reported on it July 15.
A day later, Microsoft confirmed the bug and admitted that attackers were already exploiting the flaw.
All versions of Windows contain the vulnerability, including the preview of Windows 7 Service Pack 1 (SP1), and the recently retired-from-support Windows XP SP2 and Windows 2000.
Exploit code has been widely distributed on the Internet, and Microsoft and others have spotted several attack campaigns based on the bug.
Initial attacks using the shortcut vulnerability were aimed at major manufacturing and utility companies. Two weeks ago, Siemens alerted customers of its Simatic WinCC management software that attacks using the vulnerability were targeting computers used to manage large-scale industrial control systems, often called SCADA, for “supervisory control and data acquisition.”
Hackers gained control of computers at least one German customer of Siemens with the shortcut-exploiting “Stuxnet” worm, the electronics giant has confirmed Cisco CCNA Certification.
Nearly 60% of the PCs identified by security vendor Symantec that have been infected by Stuxnet are located in Iran, a statistic that’s sparked speculation that the country’s infrastructure may have been targeted for attack.
Microsoft’s advice has been to disable the displaying of shortcuts, a move many users may resist since it makes much of Windows almost unusable. The Sophos tool leaves shortcut icons untouched.
Wisniewski defended Sophos’ release of the tool. “This is a reasonably unique situation in that we can put ourselves in the way of attacks,” he said. “We’re not suggesting that users not apply the Microsoft patch when it’s ready. And the tool doesn’t modify Windows or other files, so it’s not really a patch.”