Arch-TK
a year ago
I think the things to blame here are the design of Windows and the overall design of the air-gapped environment.
Yes, at the end of the day you're going to need to move stuff from non-air-gapped devices to air-gapped devices and vice-versa. You can assume the non-air-gapped devices are completely compromised. But why is the air-gapped device not configured to always show file extensions?
This is literally working because Windows is configured to hide common file extensions, and the attack relies on hiding a folder and replacing it with an executable with a folder icon and the same name +.exe.
If you're designing an airgapped system, this is literally the first thing you should be worried about after ensuring that the system is actually airgapped.
At least windows explorer should have been configured to show extensions (and some training delivered to ensure that the people using these systems have the diligence to notice unusual file extensions with familiar looking icons).
It would be even better if the file explorer was replaced with something less easy to fool. Something which does not load custom icons, never hides directories, and maybe even prevents access if the flash drive has indications of shenanigans (unusually named files, executables, hidden folders) which would indicate something weird was going on.
It's a good job that unlike with Stuxnet nobody plugged in a flash drive from the literal car park, but this is pretty poor on the part of the people designing/implementing the airgapped environment.
skrebbel
a year ago
> If you're designing an airgapped system, this is literally the first thing you should be worried about after ensuring that the system is actually airgapped.
And next time if some other airgapped vuln is reported, that will be literally the first thing people should be worried about! God, people are so stupid, if only they would just do literally the first things they should be worried about.
bryanrasmussen
a year ago
>if only they would just do literally the first things they should be worried about.
as the sibling comments to this one pointed out, most people change the default Explorer settings, first thing.
In fact changing the default Explorer settings has been a security warning for years.
In conclusion, yes I believe if something is in a common list of things you should do to make your windows system more secure (for like, people who are not security experts) and you don't do it then probably "God, people are so stupid" is a reasonable response.
me-vs-cat
a year ago
In conclusion, yes, I believe if something is in a common list of things that people (who are not security experts) should do to make their system more secure and the developer of that system refuses to make that the default, then "God, that developer is so stupid" is a reasonable response.
I wouldn't blame most people for not changing this setting.
Except air-gapped systems should be setup by security experts, so stupidity all 'round.
avidphantasm
a year ago
Good point re. Windows’s default configuration being less secure due to file extensions being hidden. This is another manifestation of the continuous tax paid for Windows’s insane level of backward compatibility. I think the root cause is that Microsoft thinks files ending in .EXE are ugly (but they don’t want to stop using this convention, which I don’t think is strictly required by the kernel or filesystem, but would probably break other things in the OS and 3rd party tools), so they hide that and all other file extensions (which maybe they also think are ugly, but I don’t see an alternative since files with multiple data streams are not handled well for interchange). Not sure why the default isn’t just to hide the extension of executable files, though I think this is more trouble than it is worth, for the reasons demonstrated by this attack.
I would also consider disabling USB ports in air-gapped systems. You can still buy PS/2 keyboards and mice. Server and maybe some workstation motherboards still have PS/2 ports (and there are PS/2 PCI cards). For sneakernet file transfer you can allow use of an SD card. That way, if you see a USB cable or other device in an air-gapped environment, it should be an immediate red flag.
zahlman
a year ago
>This is another manifestation of the continuous tax paid for Windows’s insane level of backward compatibility. I think the root cause is that Microsoft thinks files ending in .EXE are ugly (but they don’t want to stop using this convention, which I don’t think is strictly required by the kernel or filesystem, but would probably break other things in the OS and 3rd party tools), so they hide that
I don't think they're think the extension is "ugly". I think they expect their users to think that way, on average, and don't want to deal with being told such (or getting support requests because ignorant users tried to remove that part of the filename and now can't open Word or whatever).
I wouldn't call it the result of backwards compatibility, either - although Windows' level of backwards compatibility is insane and does impose a continuous tax. But in the current case, there would need to be a new system for inferring executability before we could talk about removing the existing one. AFAIK Windows uses file headers to determine the format of an executable file (i.e. how to load it), but not to decide whether a given file should be deemed executable at all. And the attrib bits, also AFAIK, don't include anything for execution either.
>I would also consider disabling USB ports in air-gapped systems.
I assume they aren't worried about "BadUSB" type attacks because they're in control of the physical media used for transfer.
Arch-TK
a year ago
> or getting support requests because ignorant users tried to remove that part of the filename and now can't open Word or whatever
Funny side story, windows pops an error confirmation message if you change or remove the extension of a file name as part of a rename operation.
There's no way to disable this message outside of writing an autohotkey script to check for the prompt and auto-accept it. (I did this once, no I don't have the AHK script, but I don't recall it being hard to write.)
On on a similar funny side note, there's no way to tell windows to always open files with no extension in a specified application (e.g. gvim). But you can edit the registry to do it.
hulitu
a year ago
> Funny side story,
> On on a similar funny side note,
Those things are only funny if you don't have to use this "Operating System" hours a day. Because then it becomes a PITA.
zahlman
a year ago
Having to deal with other people using it is far more obnoxious than actually personally using it, IMX. For sophisticated users it's not hard to learn these details, and then one naturally just doesn't hit the pitfalls. Teaching the details to someone less sophisticated, and making them stick, is a whole other ball game.
mcculley
a year ago
But a lot of the systems that are air-gapped are controlling some other piece of hardware, increasingly by USB.
hulitu
a year ago
> This is another manifestation of the continuous tax paid for Windows’s insane level of backward compatibility
Well, no. This bulshit was introduced later by Microsoft to make Windows more "user friendly". In the same line like truncating URLs in briwser bars by Google and Mozilla.
xattt
a year ago
I feel like secure computing environments should be modified to show file extensions at the beginning in order to mitigate human laziness.
hypeatei
a year ago
The first thing I configure on a new Windows installation is the awful file explorer defaults.
zahlman
a year ago
For that matter, would they ever need to move anything executable? Seems to me on Linux they could have just set up a preemptive `chmod -x` of everything copied in from the drive.