Microsoft to Flame-proof Windows Update

Microsoft to Flame-proof Windows Update

Summary: Microsoft will harden up Windows Update as part of its defence against Flame and any would-be copycats.

SHARE:
0

Microsoft will harden up Windows Update as part of its defence against Flame and any would-be copycats.

(Computer on Fire image by Matt Mets, CC BY-SA 2.0)

Over the last week, Microsoft revealed that Flame's authors used unauthorised certificates to pretend that the malware was written by Microsoft. This enabled them to use Windows Updateto distribute the malware to any machine receiving updates.

Microsoft released an emergency patch to revoke the trust in these certificates, but has now revealed to ZDNet Australia that it intends to go much farther in its mitigation of the threat, calling the emergency patch a stop-gap measure in what it said is "the first of a series of actions in a phased mitigation strategy".

"The first [action] invalidates the unauthorised certificates used in the 'Flame' malware, thus addressing that issue. Completing the update was the fastest way to protect the largest number of customers, and block the Flame malware from using the unauthorised certificates.

"The next action of our mitigation strategy is to further harden Windows Update as a defence-in-depth precaution. We will begin this update following broad adoption of Security Advisory 2718704 in order not to interfere with that update's worldwide deployment."

The company has not yet announced when this action may occur, or whether it will be a simple matter of applying a patch, but has said that it will provide more information in the near future.

Topics: Security, Microsoft, Windows

Michael Lee

About Michael Lee

A Sydney, Australia-based journalist, Michael Lee covers a gamut of news in the technology space including information security, state Government initiatives, and local startups.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

0 comments
Log in or register to start the discussion