Microsoft cripples USB drive worms with new XP, Vista update

Adds optional download to Windows Update to disable AutoRun, feature abused by Conficker and Stuxnet to infect PCs

Microsoft yesterday started offering Windows XP and Vista users an optional update that disables AutoRun, a feature of the operating system that the notorious Conficker and Stuxnet worms used to infect millions of PCs.

The move, said Microsoft, was a response to malware's continued reliance on infection tactics that abuse AutoRun and AutoPlay, a pair of technologies that automatically launch executable files on removable media, especially USB flash drives.

Both Conficker , a worm that spread widely in early 2009, and Stuxnet , the worm that analysts suspect was developed to sabotage Iran's nuclear programs, used AutoRun and flash drives to infect Windows PCs.

Researchers believe that Stuxnet first infiltrated Iran's nuclear program through infected USB drives, then used that foothold to spread through networks to reach the machines that controlled uranium enrichment centrifuges.

In-the-wild malware continues to abuse AutoRun to compromise PCs, Microsoft said. Four of the top 10 malware families in the last quarter of 2010 use AutoRun, among other techniques, to spread. Those four families accounted for 41% of all successful infections in the last three months of 2010.

Others see AutoRun as a major threat, too. Last August, Panda Software said that 25% of all worms were designed to propagate through the handy drives.

Microsoft changed AutoRun's behavior in Windows 7 to block automatic execution of files on a USB drive, and backported that functionality to Windows XP and Vista with an update in August 2009. Users of XP and Vista, however, had to seek out and manually download that update from Microsoft's site.

With that change in place, flash drives inserted into a PC running XP or Vista users no longer offered the option to run programs; the AutoRun extinction did not affect CDs or DVDs -- what Microsoft calls "shiny media."

Yesterday's move makes it easier for XP and Vista users to retrieve and install the AutoRun deactivation update, since it now appears as an optional download in Windows Update and Windows Server Update Services (WSUS), the consumer and business update mechanisms, respectively.

Microsoft security spokesman Jerry Bryant said Tuesday that the more than year-and-a-half delay in pushing the AutoRun update to Windows Update was designed to give legitimate software vendors that used the feature time to recraft their programs.

Most have turned to the U3 specification -- a standard backed by SanDisk, a major maker of flash drives -- to automatically run their software from removable media.

Microsoft hopes that the update will better protect Windows machines, particularly those running XP, which have been harder hit by malware that uses AutoRun as one of several spreading strategies.

According to data gleaned from Microsoft's antivirus software, XP systems are more than 10 times more likely to become infected by malware that uses AutoRun than PCs running Windows 7.

"Although causative proof is difficult to quantify, it is quite possible that these figures reflect, at least in part, the improvements made to the security of AutoRun in Windows 7," said Holly Stewart, a senior program manager at the Microsoft Malware Protection Center (MMPC), in a post to the team's blog Tuesday.

The AutoRun change can be installed by selecting the "KB971029" update from the "Software, Optional" section of Windows Update in XP. The same update is listed in Vista's Windows Update panel under "Important" -- the same section devoted to Tuesday's patches -- but the KB971029 entry's box must be checked to add it to the download and install list.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer , or subscribe to Gregg's RSS feed . His e-mail address is gkeizer@ix.netcom.com .

Read more about malware and vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags MicrosoftMalware and Vulnerabilities

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Gregg Keizer

Gregg Keizer

Computerworld (US)
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Cate Bacon

Aruba Instant On AP11D

The strength of the Aruba Instant On AP11D is that the design and feature set support the modern, flexible, and mobile way of working.

Dr Prabigya Shiwakoti

Aruba Instant On AP11D

Aruba backs the AP11D up with a two-year warranty and 24/7 phone support.

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?