{"id":4832,"date":"2012-06-04T20:22:28","date_gmt":"2012-06-05T03:22:28","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=4832"},"modified":"2016-02-12T10:20:09","modified_gmt":"2016-02-12T18:20:09","slug":"important-windows-update-to-combat-flame","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/","title":{"rendered":"Important Windows Update to Combat Flame"},"content":{"rendered":"<p>Malware authors have been spoofing software companies\u2019 digital certificates for years, to gain the trust of potential victims. While this is scary, this isn\u2019t news. What is news (and personally, it gives me the heebie-jeebies) is that the <a href=\"http:\/\/www.techrepublic.com\/blog\/security\/flame-malware-targets-microsoft-update-system-patch-now\/7980\">Flame malware has used this spoofing technique<\/a> to try to intercept the Microsoft Update system in order to stealthily spread itself.<\/p>\n<p>The first thing to keep in mind is not to panic: This technique is only possibly being used by Flame at this point. It\u2019s not yet entirely clear that it succeeded in any instance, just that it had planned for that case. Flame was also not a widespread threat. However, it\u2019s still a good idea to be aware and protect your computers. Better safe than sorry, right?<\/p>\n<p>Other malware writers could try to employ this technique in the future. It could be a whole lot worse if malware writers with financial motivation used this technique to hit a maximum number of targets.<\/p>\n<p>Details of this possible spreading mechanism are still being analyzed, so we will likely hear more details on this in coming days. What Flame was trying to do is to fool the Microsoft Update system into believing that its files were trusted, so that the updater would push malicious files to other systems.<\/p>\n<p>Microsoft released an <a href=\"http:\/\/support.microsoft.com\/kb\/2718704\">emergency update<\/a> on Sunday to automatically block the spoofed certificates, and they have stopped the service that was used to create the certificates. If you are a Windows user, it is important that you update your system as soon as possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware authors have been spoofing software companies\u2019 digital certificates for years, to gain the trust of potential victims. While this is scary, this isn\u2019t news. What is news is that the Flame malware has used this spoofing technique to try to intercept the Microsoft Update system in order to stealthily spread itself.<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,13,5],"tags":[86,119,149],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Malware authors have been spoofing software companies\u2019 digital certificates for years, to gain the trust of potential victims. While this is scary, this isn\u2019t news. What is news is that the Flame malware has used this spoofing technique to try to intercept the Microsoft Update system in order to stealthily spread itself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Important Windows Update to Combat Flame - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Malware authors have been spoofing software companies\u2019 digital certificates for years, to gain the trust of potential victims. While this is scary, this isn\u2019t news. What is news is that the Flame malware has used this spoofing technique to try to intercept the Microsoft Update system in order to stealthily spread itself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-05T03:22:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:20:09+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/\",\"name\":\"Important Windows Update to Combat Flame - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2012-06-05T03:22:28+00:00\",\"dateModified\":\"2016-02-12T18:20:09+00:00\",\"description\":\"Malware authors have been spoofing software companies\\u2019 digital certificates for years, to gain the trust of potential victims. While this is scary, this isn\\u2019t news. What is news is that the Flame malware has used this spoofing technique to try to intercept the Microsoft Update system in order to stealthily spread itself.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Important Windows Update to Combat Flame\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Important Windows Update to Combat Flame\",\"datePublished\":\"2012-06-05T03:22:28+00:00\",\"dateModified\":\"2016-02-12T18:20:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#webpage\"},\"wordCount\":267,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"keywords\":[\"Malware\",\"Security Update\",\"Windows\"],\"articleSection\":[\"Malware\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Malware authors have been spoofing software companies\u2019 digital certificates for years, to gain the trust of potential victims. While this is scary, this isn\u2019t news. What is news is that the Flame malware has used this spoofing technique to try to intercept the Microsoft Update system in order to stealthily spread itself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/","og_locale":"en_US","og_type":"article","og_title":"Important Windows Update to Combat Flame - The Mac Security Blog","og_description":"Malware authors have been spoofing software companies\u2019 digital certificates for years, to gain the trust of potential victims. While this is scary, this isn\u2019t news. What is news is that the Flame malware has used this spoofing technique to try to intercept the Microsoft Update system in order to stealthily spread itself.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-06-05T03:22:28+00:00","article_modified_time":"2016-02-12T18:20:09+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/","name":"Important Windows Update to Combat Flame - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2012-06-05T03:22:28+00:00","dateModified":"2016-02-12T18:20:09+00:00","description":"Malware authors have been spoofing software companies\u2019 digital certificates for years, to gain the trust of potential victims. While this is scary, this isn\u2019t news. What is news is that the Flame malware has used this spoofing technique to try to intercept the Microsoft Update system in order to stealthily spread itself.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Important Windows Update to Combat Flame"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Important Windows Update to Combat Flame","datePublished":"2012-06-05T03:22:28+00:00","dateModified":"2016-02-12T18:20:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#webpage"},"wordCount":267,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"keywords":["Malware","Security Update","Windows"],"articleSection":["Malware","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/important-windows-update-to-combat-flame\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1fW","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4832"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=4832"}],"version-history":[{"count":4,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4832\/revisions"}],"predecessor-version":[{"id":4836,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4832\/revisions\/4836"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=4832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=4832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=4832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}