Kaspersky revealed that Stuxnet Exploits is still used worldwide

Experts at Kaspersky discovered that Stuxnet exploits targeting a Windows Shell Vulnerability is still largely used in cyber attacks.

Stuxnet has changed the history of malware development, it is considered the fist cyber weapon used by a government in an act of Information Warfare. As remarked by most popular security experts, the militarization of the cyberspace has serious consequences on Internet users, even if the malware was spread many years ago. Stuxnet isn’t an exception, one of the main vulnerabilities exploited by the malicious code (CVE-2010-2568), and patched four years ago, is still being used in cyber attacks targeting millions of computers worldwide.

Microsoft issued a security patch on August 2nd, 2010, meanwhile Stuxnet was first discovered in June 2010.

The Windows Shell vulnerability allows a remote or local attacker run code via a malicious .LNK or .PIF file via an improperly handled icon displayed in Windows Explorer.

Experts at Kaspersky Lab discovered that in the period between November 2013 and June 2014, the Windows Shell vulnerability (CVE-2010-2568) exploited by Stuxnet was detected 50 million times targeting nearly 19 million machines all over the world. A report issued by Kaspersky provided the following data on the infection distribution:

 

  • Vietnam (42.45%)
  • India (11.7%)
  • Indonesia (9.43%)
  • Brazil (5.52%)
  • Algeria (3.74%).

The above countries are characterized by a large diffusion of the Windows XP OS so it’s not surprising that they were targeted by bad actors with are trying to exploit the flaw to gain administrative rights on a Windows machine remotely

As expected, the exploits mainly targeted Windows machine:

“The lion’s share of detections (64.19%) registered over the last eight months involved XP and only 27.99% were on Windows 7. Kaspersky Lab products protecting Windows Server 2003 and 2008 also regularly report detection of these exploits (3.99% and 1.58% detections respectively). The large number of detections coming from XP users suggests that most of these computers either don’t have an installed security solution or use a vulnerable version of Windows – or both. ” states the report.

A so high number of attacks are caused by the presence on the Internet for a great number of servers that aren’t updated or that lack proper defensive solutions.

The fact that old vulnerabilities are still exploited in numerous attacks highlights the importance of patch management, cyber criminals and state-sponsored hackers are aware that these exploits are effective even though almost many years have passed since the disclosure.

Unfortunately the diffusion of such complex malware in the cyber space could have serious effects for a long time, consider that exploitation of zero-day flaw seems to be a prerogative of state-sponsored hackers no matter if you are a Government agency or a simple Internet users, the diffusion of such malware will impact you for a long.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Stuxnet exploits, hacking)  

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

U.S. CISA adds Wazuh, and WebDAV flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Wazuh, and WebDAV flaws to its Known…

17 minutes ago

Exposed eyes: 40,000 security cameras vulnerable to remote hacking

Over 40,000 internet-exposed security cameras worldwide are vulnerable to remote hacking, posing serious privacy and…

2 hours ago

Operation Secure: INTERPOL dismantles 20,000+ malicious IPs in major cybercrime crackdown

INTERPOL announced that a joint operation code-named Operation Secure took down 20,000+ malicious IPs/domains tied…

12 hours ago

Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited

A critical remote code execution (RCE) vulnerability in Roundcube was exploited days after patch, impacting…

22 hours ago

A flaw could allow recovery of the phone number associated with any Google account

A vulnerability could allow recovery of the phone number associated with a Google account by…

1 day ago

Texas Department of Transportation (TxDOT) data breach exposes 300,000 crash reports

Hackers breached Texas DOT (TxDOT), stealing 300,000 crash reports with personal data from its Crash…

2 days ago