Incident: Malware Spread via Xunlei Software Impacts Windows and Android Users

Published Date: 2013-10-15

Postmortem Analysis
Timeline 1. The software failure incident of Xunlei spreading malware to Windows and Android users happened in August, as mentioned in the article [22162]. Therefore, the software failure incident happened in August.
System 1. Xunlei file sharing service 2. Xunlei software 3. Xunlei's security certificate 4. INPEnhSetup.exe dropper program 5. Office plugin for Word, Excel, and PowerPoint 6. Android updater 7. Android phone call app 8. Chinese app stores 9. Phone call app 10. Android's ADB (Android Debug Bridge) 11. Xunlei's BitTorrent client 12. KFC app for Android [22162]
Responsible Organization 1. Xunlei Networking Technologies employees were responsible for creating and distributing the malware named "Win32/Kankan" to Windows and Android users, signed with the company's security certificate [22162].
Impacted Organization 1. Windows users in China were impacted by the malware spread by the Xunlei file sharing service [22162]. 2. Android users in China were also affected by the malware, which silently installed applications onto their phones [22162].
Software Causes 1. The software failure incident was caused by the Xunlei file sharing service spreading malware named "Win32/Kankan" to Windows and Android users, signed with the company's security certificate [22162].
Non-software Causes 1. The incident involved employees of Xunlei using company resources to create and distribute the malware, indicating a human factor in the failure [22162].
Impacts 1. The software failure incident led to the spreading of malware named "Win32/Kankan" to thousands of Windows and Android users, affecting Chinese users specifically [22162]. 2. The malware was designed to avoid detection by security software and analysts, making it challenging to identify and remove [22162]. 3. The malware silently installed applications onto Android phones connected to infected computers, potentially compromising the security and privacy of the users [22162]. 4. The incident highlighted the risk of Android malware infection, especially on rooted phones, where crucial built-in security services are disabled [22162]. 5. The malware incident contributed to the overall increase in malicious or high-risk Android apps circulating, indicating a significant growth in the problem of mobile malware [22162].
Preventions 1. Implementing strict security measures and protocols within the company to prevent employees from misusing company resources to create and distribute malicious programs [22162]. 2. Conducting regular security audits and checks on software and applications to detect any anomalies or malicious activities [22162]. 3. Enhancing user education and awareness about cybersecurity threats, malware, and safe software practices to prevent unintentional installations of malicious programs [22162]. 4. Utilizing robust antivirus and security software that can detect and prevent the installation of malware, especially those designed to evade detection [22162]. 5. Enforcing strict access controls and permissions to prevent unauthorized installations or modifications to software and systems [22162].
Fixes 1. Implement stricter internal controls and monitoring within Xunlei Networking Technologies to prevent employees from misusing company resources to create and distribute malware [22162]. 2. Enhance security measures to detect and prevent the spread of malware, such as improving malware detection capabilities and strengthening security protocols [22162]. 3. Conduct a thorough review of the software development and distribution processes to identify and address vulnerabilities that allowed the malware to be spread undetected [22162]. 4. Collaborate with security companies like Eset to continuously monitor and analyze potential threats, ensuring prompt detection and mitigation of any malicious activities [22162]. 5. Educate users on safe software practices and provide guidance on how to protect their devices from malware, including avoiding suspicious downloads and maintaining up-to-date security software [22162].
References 1. Security company Eset [Article 22162] 2. Joan Calvet from Eset [Article 22162] 3. Rik Ferguson, vice president of security research at Trend Micro [Article 22162]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization (a) The software failure incident related to spreading malware has happened again within the same organization, Xunlei. The incident involved Xunlei spreading malware named "Win32/Kankan" to Windows and Android users, signed with the company's security certificate. Some of Xunlei's employees used company resources to create and distribute the malicious program, indicating an internal issue within the organization [22162]. (b) The incident of spreading malware is not specifically mentioned to have occurred at multiple organizations in the provided article.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase: The incident involving the Xunlei file sharing service spreading malware to Windows and Android users was a result of the software being specifically programmed to avoid detection by security software and analysts. The malware was signed with the company's security certificate, indicating a flaw in the design or implementation of the security measures [22162]. (b) The software failure incident related to the operation phase: The malware incident also involved the malware silently installing applications onto Android phones that were connected to the infected computer. This operation was carried out by an updater that automatically checked a server for new versions of the programs and installed updates when available, indicating a failure in the operation or misuse of the system [22162].
Boundary (Internal/External) within_system (a) The software failure incident reported in Article 22162 falls under the within_system category. The malware named "Win32/Kankan" was spread by Xunlei, a Google-backed file sharing service, to Windows and Android users. The malware was signed with the company's security certificate, indicating that the issue originated from within the system itself [22162]. Additionally, the malicious programs were installed onto systems through deceptive methods like posing as a Windows installer and silently installing applications on connected Android phones, all orchestrated by the Xunlei software [22162].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: The malware named "Win32/Kankan" was spread to Windows and Android users by the Xunlei file sharing service, signed with the company's security certificate. The malware was specifically programmed to avoid detection by security software and analysts, and it was initially spread through a "dropper" program named "INPEnhSetup.exe" posing as a Windows installer [22162]. (b) The software failure incident occurring due to human actions: During a press conference, Xunlei Networking Technologies officially admitted that some of its employees used company resources to create and distribute the malicious program. The degree to which Xunlei is implicated in the incident is unclear from the outside [22162].
Dimension (Hardware/Software) software (a) The software failure incident related to hardware: - The malware incident involving Xunlei spreading malware to Windows and Android users was primarily a software failure incident rather than a hardware failure incident. The incident involved malicious software being distributed through the Xunlei software and other programs, exploiting vulnerabilities in the software and systems rather than hardware-related issues [22162]. (b) The software failure incident related to software: - The software failure incident involving Xunlei spreading malware to Windows and Android users was a result of software-related factors. The incident was caused by the distribution of malware through the Xunlei software and other malicious programs, highlighting vulnerabilities in the software and the way it interacted with users' systems [22162].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in Article 22162 is malicious in nature. The incident involved the Xunlei file sharing service spreading malware named "Win32/Kankan" to Windows and Android users, signed with the company's security certificate. The malware was specifically programmed to avoid detection by security software and analysts, and it was spread through deceptive means such as posing as a Windows installer and silently installing malicious applications onto Android phones connected to infected computers. Additionally, some Xunlei employees were involved in creating and distributing the malicious program, indicating malicious intent [22162].
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions (a) The intent of the software failure incident: - The software failure incident involving the Xunlei file sharing service spreading malware to Windows and Android users was primarily due to poor decisions made by some employees of Xunlei Networking Technologies. These employees used company resources to create and distribute the malware, named "Win32/Kankan," which was signed with the company's security certificate [22162]. - Xunlei's involvement in creating and distributing the malicious program was acknowledged during a press conference, indicating a deliberate action taken by some employees within the company [22162]. - The malware was specifically programmed to avoid detection by security software and analysts, indicating a level of premeditation and intent to evade detection [22162]. - The malware included an updater that automatically checked a server for new versions of the programs, installing updates when they became available, showcasing a systematic approach to maintaining and updating the malicious software [22162]. (b) The intent of the software failure incident: - The software failure incident also involved accidental decisions or unintended consequences, as the malware silently installed applications onto Android phones that were connected to the infected computer. This action was dependent on the security setting being disabled on the Android phone, enabling developer actions over USB, which is often required for legitimate software modifications and operating system customizations [22162]. - The focus on China for spreading the Trojan may have inadvertently limited the risk of widespread infection, as rooted phones are more common in China due to restrictions on apps and services, leading to unintended consequences of increased vulnerability to malware [22162].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident in Article 22162 can be attributed to development incompetence. The incident involved Xunlei, a Google-backed file sharing service, spreading malware named "Win32/Kankan" to Windows and Android users. It was revealed that some Xunlei employees used company resources to create and distribute the malware, which was specifically programmed to avoid detection by security software and analysts. The malware included various malicious programs that were installed on users' systems, including an Office plugin that evaded detection by shutting down if analysis tools were detected. Additionally, the malware silently installed applications onto Android phones connected to infected computers, indicating a level of sophistication in the malicious software's design [22162]. (b) The software failure incident in Article 22162 does not seem to be accidental. The deliberate actions of some Xunlei employees to create and distribute the malware, as well as the specific programming of the malware to evade detection and silently install applications, suggest a level of intent and planning behind the incident rather than it being accidental [22162].
Duration permanent, temporary (a) The software failure incident in the article is more of a permanent nature. The malware named "Win32/Kankan" was specifically programmed to avoid detection by security software and analysts, indicating a deliberate and persistent effort to spread malicious software [22162]. (b) The software failure incident can also be considered temporary to some extent as the daily number of infections has dropped significantly since Xunlei took remedial actions, suggesting that the impact of the malware was reduced over time [22162].
Behaviour value, other (a) crash: The software failure incident did not involve a crash where the system loses state and does not perform any of its intended functions. The malware was actively spreading and performing malicious actions on infected systems [Article 22162]. (b) omission: The software failure incident did not involve omission where the system omits to perform its intended functions at an instance(s). The malware was actively performing malicious actions as designed by the attackers [Article 22162]. (c) timing: The software failure incident did not involve timing issues where the system performs its intended functions correctly but too late or too early. The malware was designed to execute its malicious activities promptly upon infection [Article 22162]. (d) value: The software failure incident involved the system performing its intended functions incorrectly. The malware was spreading and installing malicious programs on both Windows and Android devices, compromising user security and privacy [Article 22162]. (e) byzantine: The software failure incident did not exhibit byzantine behavior where the system behaves erroneously with inconsistent responses and interactions. The malware consistently executed its malicious activities as designed by the attackers [Article 22162]. (f) other: The software failure incident involved the system behaving in a way not described in the options (a to e). The malware was specifically programmed to avoid detection by security software and analysts, indicating a sophisticated and deliberate attempt to evade detection and spread malicious programs [Article 22162].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, non-human, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving the Xunlei file sharing service spreading malware resulted in the installation of malicious programs onto users' systems, including an Office plugin that scanned for analysis tools and sent user information to a remote server [22162]. Additionally, the malware silently installed applications onto connected Android phones, including Chinese app stores and a phone call app, impacting users' devices and potentially compromising their data [22162].
Domain information (a) The software failure incident reported in Article 22162 is related to the information industry. The incident involved a Google-backed file sharing service, Xunlei, spreading malware to Windows and Android users, affecting Chinese users specifically. The malware was designed to avoid detection by security software and analysts, and it silently installed applications onto Android phones connected to infected computers [22162].

Sources

Back to List