AutoPlay Worms
W32.Flamer: Spreading Mechanism Tricks and Exploits
Banning the use of removable drives may sound like a strict IT policy.
But when faced with a worm introduced to your network by such devices,
it is the sensible thing to do. Recently, the US Department of Defense has done just that in order to protect their networks from such threats.
As the use of removable drives has increased, they have become a
successful vehicle to enter a network and compromise computers. The ease
of infection is facilitated by a feature within Windows called
AutoPlay. Meant as a feature of convenience, AutoPlay allows programs to
automatically launch when CDs, DVDs, removable drives, or any other
form of storage is inserted into a computer.
So how do you protect yourself from such rapidly spreading threats?
Banning the use of removable media does reduce the risk. On many
computers you can also disable the USB ports from within the computer’s
BIOS, rendering the ports inert. At the very least, Symantec recommends
disabling AutoPlay.
If you are running Windows XP, you can download and install a Microsoft “Powertoy” called TweakUI. There are a number of options within TweakUI for customizing AutoPlay under My Computer > AutoPlay.
If you are running Windows Vista, there is now a Control Panel applet dedicated to AutoPlay customization. To reach it, open the Control Panel and then go to Hardware and Sound > AutoPlay.
If you are managing a network of computers, you can use the Group Policy editor
to create Group Policy Objects to assign to your clients. In Windows
2000/XP/2003’s Group Policy editor, AutoPlay options are under Computer Configuration > Administrative Templates > System > Turn off AutoPlay. For Windows Vista/2008, go to Computer Configuration > Administrative Templates > Windows Components > AutoPlay Policies.
Administrators using Symantec Endpoint Protection Manager have the
option to disable programs from running from removable drives entirely.
In the management console, go to Policies > Application and Device Control > Add an Application and Device Control Policy > Application Control, select Block Programs from running from removable devices
and then push the changes out to your clients. Alternatively, you can
prevent autorun.inf files from running entirely by following the
instructions in this support document.
Norton users- no need to do anything. By default, all Norton
products that contain antivirus will scan removable drives when they are
plugged into the computer.
Sometimes AutoPlay doesn’t behave as expected after making changes.
Microsoft has a knowledge base article that covers these situations and how to get AutoPlay working as you’d like it to.
Finally, disable AutoPlay on network drives
as well. While these worms are often introduced to the network via a
removable device, many copy themselves to all drive letters on a
compromised computer, regardless of the device type. When a compromised
network drive is accessed, AutoPlay will launch the malicious code.
Completing any of these tasks should significantly reduce the risk
posed by removable drives and help prevent you or your users from being
an unwitting agent for spreading malicious code.
Author: N/A
Date: Dec 03, 2008 12:02 PM
Source: Symantec
|