Microsoft Warns of Impossible to Clean Spyware 813
darkjedi521 writes "The Inquirer has a story that the next generation of Windows spyware and exploits are starting to make use of "kernel rootkits". A paper at Microsoft Research has details on a prototype detection tool. Computerworld has more details, as well." From the article: "Newer rootkits can intercept system calls that are passed to the kernel and filter out queries generated by the software. This makes them invisible to administrators and to detection tools..."
Unpossible to Clean SpyWare? (Score:3, Interesting)
Sounds almost malaprop. "It works, I threatened to rip a copy of Ghostbusters II onto my HD and I heard a tiny scream! My spyware aragorn!"
However the paper admits that the only way to be sure that you have killed a kernel rootkit is to completely erase an infected hard drive and reinstall the operating system from scratch.
That sounds rather drastic. How about drilling a hole through it, smashing it with a sledgehammer and throwing it into the Tiber while you're at it? Microsoft seems to be making a stronger case all the time for not exposing a Windows PC to the internet. Maybe it is time to look at a Mac.
Microsoft's XBox Firewire [technewsworld.com]
Re:Unpossible to Clean SpyWare? (Score:5, Insightful)
Re:Unpossible to Clean SpyWare? (Score:5, Insightful)
Not likely, as you and I may have XP Developer Edition, but where are you in your patches? Hmm?
Seems the best way to handle this is to run all browser processes at a very low security level.
Sheesh! (Score:3, Funny)
Re:Unpossible to Clean SpyWare? (Score:4, Interesting)
And what's hard about that? It's exceedingly unlikely that any particular version of any Windows system file will have the same MD5 checksum as a trojaned version. Plus, if you know that patch X contains this list of files with this list of checksums, you can determine what patchlevel it has. It's not easy to do as it takes some intelligent coding, but it's far from impossible. Or just go the lazy way -- based on the different versions of each file Microsoft has released, you will know that the file is either good (because of all the patched versions Microsoft has released, its MD5 checksum matches one) or the file is bad (because its checksum doesn't match one released by Microsoft).
Re:Unpossible to Clean SpyWare? (Score:5, Insightful)
Re:Unpossible to Clean SpyWare? (Score:5, Informative)
So, it surprises me that a report about this kind of ad-ware/viruses is just now coming out because we have been dealing with impossible-to-remove software for at least a year now. Fortunately the only way to defeat a BartPE scan is to install a BIOS virus - and almost nobody does that any more. :-)
Re:Unpossible to Clean SpyWare? (Score:5, Informative)
My BartPE disk has Ad-Aware SE, and I use SFX to make self-extracting executable of Spybot. For AV stuff, I use Mcafee GUI plugin for their command line scanner, and Sysclean (by the same folks that make pc-cillin). Also Mcafee's Stinger is loaded, too.
I put it on a CD-RW, and once a week d/l the updates, then use the Bart PEBuilder program to rebuild an ISO, and burn that to a CD-RW.
Virus scans, spyware files... all are gone without having to boot into the compromised OS. Registry cleaning requires you to boot into the OS, but once the files are gone, that makes it a lot easier to clean.
It's not 100%, but it vastly improves the chances of fixing the system, with minimal time (30 mins a week to get the updates, 20 mins of actual work running the Bart disk to clean a system)
Re:Unpossible to Clean SpyWare? (Score:4, Informative)
I'd link you myself, but I'm stuck on dial up at the moment.
Re:Unpossible to Clean SpyWare? (Score:4, Informative)
Hands down, bar none, the best place to start your BartPE plugin collection.
Re:Unpossible to Clean SpyWare? (Score:4, Insightful)
The only problem being that Joe User won't think of downloading until the first sign of trouble. Which could mean that he's running \/\/1nd0z3 already, which means any downloaded CD image from that point in time forward can be made to appear bona fide.
A bootable CD with a checksum or digital signature checker ought to come with the system.
Re:Unpossible to Clean SpyWare? (Score:4, Insightful)
At first glance, it even seems like it would be fairly trivial to build one yourself assuming that you can maintain a clean set of files to generate checksums from. Once you have the files you can use the live distro and checksumming tool of your choice to do the comparisons and replace suspect files accordingly. However...
The obviously problem is going to be dealing with DLL hell, especially if you want to include third party DLLs in your scanning tool. There are dozens of legitimate versions of some DLLs out there, especially for widely deployed things like the expoitable GDI DLLs that were at the centre of a "critical" patch a few months ago. Best of all, some apps are coded to require specific versions of those files and refuse to work with other versions. Yes, that's appallingly broken and terrible design, but it does happen, and checking the embedded DLL version number is no help - what's to stop a rootkit replacing a DLL's with a version with an unused version number? How would you deal with an unknown version of a critical DLL in a known shared file directory for a third party vendor that wouldn't confuse a typical user? Ignore it, and risk missing a rootkit? Delete it, and risk breaking an application (providing an option to restore it being an obvious safety net)? Or give the user a choice they probably won't understand between the two previous options?
Re:Unpossible to Clean SpyWare? (Score:5, Insightful)
It's recommended, but not 100% necessary. (Score:5, Insightful)
You can even chroot the system, wipe the boot sector and re-install the kernel.
This might be "impossible" to clean on Windows, but on Linux, it's just really annoying.
Re:It's recommended, but not 100% necessary. (Score:5, Informative)
Step 1: Take you Fedora or whatever installation cd's with all the original RPM files.
Step 2: Issue the command: rpm -Vp *.rpm
Step 3: All files that have a "5" in front of them have a wrong MD5 checksum.
Re:It's recommended, but not 100% necessary. (Score:5, Informative)
Re:Unpossible to Clean SpyWare? (Score:3, Funny)
Re:Unpossible to Clean SpyWare? (Score:5, Informative)
You think it's a joke, but actually I do almost exactly that: for the few times I actually do need to use Windows, chiefly to use AutoCAD, I boot Win98 in VMWare and set it to always return to the hard-disk snapshot it booted with. That way, I can get as many xyz-wares on the Windows box, it'll always come back pristine the next time I restart it. And whenever I need to install something new, or change something in the Windows install, I do it carefully and take a new snapshot when I'm happy with it.
Honestly, VMWare is the best way to use Windows
Re:Unpossible to Clean SpyWare? (Score:4, Interesting)
I have set up 98SE, 2000Pro, XP environments (clean) under VMware and can easily create a 'clean' environment to test stuff. The snapshot feature is excellent, just snapshot the VM in question and if/when the software fucks up, restore.
The virtual hardware is the same every time. No driver issues. In fact, the current desktop PC's are so fast that it would make sense to run Winblows in them exclusively under VMware.. just store the user dirs on server. Get a new PC? Just copy the virtual disks and configuration.
I've been using VMware since its introduction and am currently using the 4 (and 5beta) versions for desktop use. I've had no use for the expensive server version yet since most of the servers are already running Linux.. but for those legacy Win32 apps VMware is really a blessing. Even been testing BSD's and SuSE distros with it.
Re:Unpossible to Clean SpyWare? (Score:5, Insightful)
Kernel-level rootkits have plagued Unixes (including Linux) for a long time. Fortunately on Linux most suck, and can be detected with chkrootkit (yet how many out there that aren't detectable...), and (this is true for windows as well) any of them can be found simply by inspecting the drive from a known clean boot media.
Removing rootkits (kernel level or not) from any OS requires either guruhood, an exact knowledge of which rootkit(s) was used and what files they trojan (as well as a clean source to restore those files from), or a reformat-reinstall-restore(dataonly)frombackups.
Re:Unpossible to Clean SpyWare? (Score:3, Insightful)
Re:Unpossible to Clean SpyWare? (Score:5, Insightful)
What it boils down to is GIGO. If you don't trust to code running on your system, you can't trust ANY result reported by the system. The only solution is to force the system to run code you trust - ie boot to a floppy or CD.
Re:Unpossible to Clean SpyWare? (Score:4, Insightful)
Re:Unpossible to Clean SpyWare? (Score:3, Informative)
The downside is, the repository of known sizes and checksums are stored on local disk. The upside is they are also recorded, in a fairly easy to retrieve form, on the original install media an
Not nearly the same problem (Score:3, Insightful)
However, how did those rootkits get installed? Typically through holes in services, like FTP server exploits or web server exploits or whatever.
But OSX has none of those running by default. That's right, none. So while in theory possibly you could develop an exploit against, say, Apache on the Mac (the port you'd most likely be able to get to) it wouldn't reach many people at all, and so the user base would have to be quite huge to make it worth
Yes, it is the same problem (Score:5, Insightful)
Then, the hacker uses a second exploit to elevate his local shell access to local root. Typical exploits of this nature include thread race conditions in the kernel, the kernel failing to properly sanitize input, or problems when a process is shifted from one kernel security infrastructure to another. The Linux kernel had a number of local root exploits in the past few months. IIRC Apple usually doesn't publish its list of security vulnerabilities (it just puts the fixes on Sofware Update, without fully explaining what they fix), so I can't comment on the security of the darwin xnu kernel.
Thus, I would say it's about as easy to install a rootkit on a Linux workstation as on an OSX desktop (and similarly, it's as easy to install a rootkit on a Linux server as on an OSX server). In other words, you need an unpatched system vulnerable to a specific pair of exploits, a clueless admin, and a skilled hacker -- which is not an impossible combination.
Re:Unpossible to Clean SpyWare? (Score:5, Informative)
Yes, absolutely every general purpose OS can be rooted, spywared, hacked, or otherwise compromised.
By analogy, anything can kill you, poison can kill you, water can kill you, a bullet can kill you and a butterfly can kill you. Being possible is not the same as being probable.
In the binary, off/on, sense, security can theoretically be compromised. But we don't live in theory, we live in practice. There are no known kernel exploits for Mac OS X, there is no known spyware, there are no known viruses, there have been a handful of OS X specific exploits that require the user to run a program (and generally ask you to supply an admin password), and have all been "proof of concepts". The bulk of OS X security updates have been for Open Source/Unix apps, which are all turned off by default, and have never been reported as actually exploited.
It's virtually impossible to just randomly get rooted, trojaned, hit by a virus, or otherwise find your Mac is pwn3d. On Windows, you need to be fairly diligent, and even then you can't be sure.
You gotta ask yourself why this is. The answer isn't just "Windows is more common" (although that is a part of it. Windows is inherently flawed from a security standpoint. Mac OS X is inherently secure (relatively speaking). That doesn't mean it's impossible to hack a Mac, but it does mean that the risks are fewer, and are far more easily mitigated.
When someone says, "Windows is malware-ridden, I'm switching to a Mac" (sometimes a toothless threat, sometimes not), the response, "but it's possible to write a rootkit for Mac OS X too," is not a counter-argument. It's, at best, a warning that someday that Mac might possibly, but not very likely, get a virus or something... maybe, probably not though.
Re:Unpossible to Clean SpyWare? (Score:4, Insightful)
That's because the open source apps have all their exploits reported as separate incidents, with incident IDs and so on. Apple (and Microsoft) slipstream security fixes into other patches all the time and just don't report them.
For Microsoft this technique is no longer useful because hackers reverse engineer the patches to determine the security flaws.
Rootkit cleaning (Score:4, Insightful)
It's been widely recognised for a while that if your system is cracked, the only way to be fairly sure you've cleaned it is to reformat it and start again then *carefully* restore data from backups. I don't see how this is news.
Re:Unpossible to Clean SpyWare? (Score:5, Insightful)
Um, dude, a rootkit for *any* OS that hides itself by intercepting kernel calls is effectively uneradicable except by total reinstall. How the hell would a Mac save you from that?
Re:Unpossible to Clean SpyWare? (Score:5, Funny)
Re:Unpossible to Clean SpyWare? (Score:3, Insightful)
Re:Unpossible to Clean SpyWare? (Score:3, Funny)
OSX definitely has some positives. (Score:4, Informative)
Re:OSX definitely has some positives. (Score:3, Informative)
Impossible commands... (Score:3, Funny)
This isn't really a problem (Score:5, Funny)
1. Buy new PC
2. DO NOT PLUG IN NETWORK CABLE
3. Image drive to external storage wth Ghost or the like
4. Unplug external storage
5. Plug in network cable
6. Connect to Internet. Save any info needed for storage.
7. Unplug network cable
8. Print all info obtained in step 6
9. Plug external storage back in
10. Restore image made in step 3
11. File hardcopies in cabinet
12. Knock back 3 or more shots of your favorite liquor
13. Unplug network cable
14. Return to step 3 for new Internet sessions
What could be simpler?
Re:This isn't really a problem (Score:5, Informative)
Re:This isn't really a problem (Score:3, Funny)
Sorry, I've been channeling Steven Wright since wednesday. Which is really strange because he's not dead. And may be why I'm not funny when I do it.
Re:This isn't really a problem (Score:4, Interesting)
Either install a non-Windows OS on your existing hardware or buy a Mac. Linux, any BSD, or Macos X are simpler choices. BSD or Linux are harder in the short run but require less on-going maintenance once the user is settled in. Macos X requires changing both hardware and software, but is likely to be an easier transition for most users.
Whether you like it or not, the Wintel platform is no longer a very good choice for the average computer user, and has become a quite unpleasant environment for most people.
Re:This isn't really a problem (Score:5, Funny)
Re:This isn't really a problem (Score:4, Funny)
Re:This isn't really a problem (Score:3, Informative)
But you are correct that it does not help prevent spyware and other viruses that come in through IE, email, and infected executables. Since most spyware either comes with commercial software, or installs itself through IE and ActiveX,
They should know (Score:5, Funny)
Re:They should know (Score:4, Interesting)
thishouseisclear.bat Moments later the fixit wizard will more than likely pop up, hit cancel, and yes. Viola.
Re:They should know (Score:3, Funny)
A terrible spyware is in your system. So much rage, so much betrayal. I've never seen anything like it. I don't know what hovers over your kernel but it was strong enough to punch a hole in your security and take control away from you. It keeps system calls very close to it and away from the kernel. It lies to you...it does things only a geek can understand. It has been using your system to infect others. To your kernel, it simply is another system
Argument for Partitioning (Score:3, Interesting)
Then you can keep /home on a separate partition, /var on a sep...
Oh wait.
Re:Argument for Partitioning (Score:5, Informative)
So you install a system. Use two partitions. Pull the drive. Install 2nd drive on working windows machin. Copy the "Documents and Settings" to the second partition of the newly installed drive. Then use linkd to create a "Documents and Settings" mount point from one partition to the other.
As a semi-serious builder/hobbyist, when I build a system, I use preconfigured sysprep images where I have already done this (the mount point linkage IS copied by programs like ghost that support NTFS5). I can restore a single partition or the whole disk. Either way. I distribute a restore DVD to my customers that can fix their spyware- and virus-hosed Windows installs without killing all the pictures they took with their digital camera etc.
It took me a bit of fiddling to make sure I have the process right, but for the number of times it's saved me two hours' work, I almost want to cry.
Still behind the times (Score:5, Funny)
Re:Still behind the times (Score:3, Insightful)
Just do what UNIX people do (Score:4, Funny)
I am not surprised... (Score:3, Insightful)
I stopped providing "free technical support" to my brothers in law a short while after that episode. And yes, my machines run Linux or OpenBSD.
Don't get too smug... (Score:4, Insightful)
Probably the same five who spool logs to another sever as well as write-only tape and run everything in chroot I suspect.
Re:Don't get too smug... (Score:3, Insightful)
Bruce Schneier on the Prototype Detection Tool (Score:5, Informative)
Re:Bruce Schneier on the Prototype Detection Tool (Score:3, Informative)
The difference is that you don't need to run the ms program on a regular basis in order to build the database. The MS program will create 2 md5 databases and compare them to see if you've been infected. Although you could do that with tripwire, that really isn't what was designed for.
Impossible to clean now (Score:3, Insightful)
Re:Impossible to clean now (Score:3, Informative)
It's not rocket science, but what ma
Here's the link to a free SP2 CD from Microsoft (Score:5, Informative)
The last time I connected a fresh Windows XP RTM box to the internet, it was infected with MS Blaster in 6 minutes.
Windows XP Service Pack 2 on CD FREE [microsoft.com]
Windows is catching up to Linux! (Score:3, Insightful)
I can't even imagine having this type of situation on a Windows box. There's just so many more places to hide things and most even technically knowledgable people wouldn't know what to do if their favorite process list application or network connection lister only shows you what the spyware author wants you to see.
If you can even discern there is a problem, re-formatting is your only hope.
This is the Legion of Doom Reporting (Score:3, Funny)
Bizarro: On Bizarro world people like spyware. People no clean from computer. Go now live to Solomon Grundi.
Solomon Grundi: Errrr! Solomon Grundi say Microsoft full of crap. Solomon Grundi crush Microsoft like piece of paper.
Bizzaro: This Legion of Doom reporting. Back to Zonk at Slashdot.
So? (Score:4, Funny)
Oh wait...
recovering from kernel mode rootkits is hard... (Score:3, Informative)
It's also possible to use a software hardening tools to prevent changes to the kernel (can't remember the exact company, think the name was "Server-Lock", or something like that).
The real answer is layered security, well managed backup and data protection strategies, and the understanding that no networked PC is immune.
Non infected scanner? (Score:3, Informative)
Wouldn't it still be quite possible to scan the system from a non infected source, such as the UBCD4Win [ubcd4win.com]? Its a bootable cd, like knoppix and others, but with a light version of windows XP and a ton of cleaning tools. I use it regularly for cleaning spyware and viruses off thoroughly infected systems.
It's be able to cope with systems having hundreds of virii and such. If you trust it to remove simpler malware, then ingrained rootkits should be a similar problem, for an 'external' system. Not to mention it has all the critical XP system files handy for replacements. A bit easier than the 'nuke it all' aproach, which is beginning to sound like 'reboot and see if the problem goes away'.
In defense of Microsoft.... (Score:3, Funny)
Ok. I got nothing.
Re:In defense of Microsoft.... (Score:3, Informative)
Hmm (Score:5, Informative)
Unless there's something really new and complex going on here, not only is this not new, but IT professionals already have ways of dealing with it. In our case, on a live system with one reboot required. I wouldn't call it minor, certainly (10 minutes of downtime is 10 minutes of downtime), but... hell, if script kiddies have been using this for months and months...
Happened to me 2 days ago. (Score:5, Interesting)
Easy enough I thought, I'll just remove physically the file and the process. But no; the file wasn't ANYWHERE. Yes, I unchecked the "Hide protected system files" checkbox and I was on SHOW HIDDEN FILES, so ALL files were displayed. Heck, a dir /s on the root of the filesystem didn't even work... I thought that it would be possible that the file has another name, renamed itself to that, made its dirty business then renamed itself. I fired up Filemon (from Sysinternal) and sure enough, I see plenty of activity from a process named elitegfk.exe but STILL no sign of the file and/or process. I scanned the registry, and regedit.exe took 2 seconds to complete the scan... !
I was on the verge of reformatting the system when I thought about something: I accessed the laptop through the admin share (\\computer\c$); sure enough, the file was there, sitting quietly sitting in c:\winnt\system32 (Win2k system)...
The spyware prevented its own display through taskmgr, explorer and regedit. Regedt32 didn'T work, I got a virtual memory low error when I tried to scan the registry. The ONLY way I could see the file was through Filemon AND through the file sharing...
I'm guessing next one will palliate to those things by attaching themselves to the most common troubleshootings tools like regmon and attach themselves to the SMB protocol to make sure they can't be displayed through the shares...
This is getting ridiculous. Yes, you'll tell me to switch to Firefox, but we can't; I work in an artistic company with 1000+ PC and non-tech-savyy users, and tons of internal apps that were developped either with .Net or massive ACtiveX and other MS-only stuff, so we can't switch everything to Firefox, and having 2 browsers isn't a viable option either, since most of our users would simply get confused.
Anyway.
Re:Happened to me 2 days ago. (Score:4, Insightful)
of course you could switch browsers etc. what you mean is that it is more work than you are willing to do.
just a nitpick on an otherwise interesting story.
but I think it's an important nitpick because things can't keep going the way they are. with all the spam, spyware, viruses etc. there is going to come a point when businesses can't afford to have stupid employees running crap software.
there ARE alternatives available for EVERYONE. adapting will be harder for some than others, but when the options become adapt or die, those using words like "can't" will find themselves on the wrong side of the evolutionary process.
Re:Happened to me 2 days ago. (Score:5, Insightful)
You say
and I say "That's the price of committing your business to propriatary software and interfaces that are someone elses profit centre."I know that this doesn't help you in your situation, but it does serve as a cautionary note for those who are not yet in that position, but are considering a move to propriatary software.
Cheer up, though. Once the cost of supporting such a fragile situation exceeds the cost of migrating to a saner environment, you can put the case forth to move to a more secure, more open platform.
Until then, you have my deepest sympathies.
Re:Happened to me 2 days ago. (Score:3, Interesting)
You know, if Microsoft ever does get a clue and fix the real security holes that let these spyware apps in in the first place, you'll have to rewrite all that stuff... because there's no way to fix Windows properly without changing the API.
Bite the bullet already.
No Clean Boot? (Score:3, Insightful)
Once you're infected, in order to detect or clean, you have to cold boot from known clean media. How to conveniently do this with Windows, I have no idea. (I used to sometimes check clients' machines by booting from an MS-DOS 6.22 floppy and running F-Prot, but it got harder'n'harder to make that work, for a variety of reasons. It eventually got where the only way I knew to reliably do it, was to physically transplant their hard disk to another Windows machine that was known to be ok. As this was usually impractical, expensive, etc, people stopped asking me for help. ;-)
That's one of the reasons I consider the Windows AV market to mainly be snake-oil. In my limited experience with Windows, all the AV products I've seen, were just applications that the user was expected to run while possibly already compromised. It amused me that people paid for that stuff.
If you're relaying on a scanner to detect and clean stuff after the fact, it's too late and you have no reasonable expectation of the product actually working. The only workable defense is to not get infected in the first place.
Security Levels (Score:3, Interesting)
I would also add a digital signature check to the bootstrap process, so that critical operating system code wouldn't be loaded unless it was signed by Microsoft.
Universal spyware solution! (Score:3, Insightful)
GHOSTBUSTERS! (Score:5, Funny)
When there's something weird,
and it don't look good
Who ya gonna call?
MI-CRO-SOFT??! (Wait..)
MS needs to release a bootable CD version (Score:3, Insightful)
Knoppix rocks but there are some Windows-maintenance things that are much easier in a Windows-booted environment.
I know, right? (Score:3, Funny)
This proves once more... (Score:4, Interesting)
Flaw #1: Any app can make arbitrary changes to the registry.
Flaw #2: Any app can make arbitrary changes to the system files.
Flaw #3: There is no "safe-mode" for core utilities, that would bypass any hijacking of system calls.
Now can anybody explain to me what was the point of having "system, readonly" attributes, if they can just be turned off?
Bill Gates never wanted to admit it. But this is just proof that Windows is nothing but MS-DOS "on steroids".
Till a few days ago, I thought Linux would be the doom of Microsoft, defeating it like David defeated Goliath. But it turns out.. Goliath is about to die from a genetic anomaly. His very nature gave him a short lifespan.
Oh joy...
Re:This proves once more... (Score:4, Insightful)
Already in the wild? (Score:4, Interesting)
1. The process would not show up in task manager
2. The related files would not show up in Explorer
3. The related registry keys did not show up in regedit
4. It some how was being called by Winlogin, so it ran even in safe mode.
The way I detected it was by using several Sysinternals utilities http://www.sysinternals.com/ [sysinternals.com]. I have a script that uses pslist to monitor all processes on the network and this spyware was not smart enough to hide from that. A remote regedit session enabled you to see the related registry files. I had to use BartPE http://www.nu2.nu/pebuilder/ [nu2.nu] to mount the drive and clean out the related files and registry keys.
Beware of trusted computing (Score:5, Insightful)
trusted computing [smh.com.au]
Enjoy,
Re:Beware of trusted computing (Score:5, Informative)
Yes, the "push" has begun ... "this is why computers should only run software from 'trusted', 'licensed' software vendors, and only on 'trusted', 'licensed' hardware", they will say ... the ultimate industry lockout to new potential competitors. And the sad thing is the excuse is a flawed premise; the current widespread and rapidly increasing malware problems are primarily because Windows is such a mess internally. Windows is imploding. And they must have known it was going to happen, over a year ago already, when they suddenly decided to start this massive new focus on security .. they knew their security sucked, they saw this coming, and now they're doing two things: (a) trying to patch Windows fast enough to prevent a total implosion and sudden mass exodus from the platform, and (b) try to capitalise on all the spyware and viruses to push 'trusted' computing platforms in order to gain control of the platform to create artificial barriers to entry for new small competitors.
Don't let users login as either administrators (Score:4, Insightful)
Re:You're infected! Not me. (Score:5, Interesting)
Re:You're infected! Not me. (Score:5, Insightful)
Ive even seen macromedia flash boxes pop up to alert you that IE has blocked their activeX script, and the user should do the following steps to install the plugin. And people do.
Re:Nothing is impossible to clean (Score:5, Insightful)
Funny how many people seem to take this lightly. The way I see it:
Reinstall Windows
Reinstall all Software, include some pesky registrations
Update all drivers to where you were before hand
Put back all your customizations, default settings, etc.
Yeah, not impossible, but makes a boot to the head sound appealing.
Re:Nothing is impossible to clean (Score:4, Insightful)
Well, you can make a custom XP CD slipstreamed with SP2 including all of your drivers and programs that get installed automatically.
It's not quick, and it's not for Mom and Pop, but once it's done, reinstalling is a breeze and the time spent pays off the first time you use it.
Re:Nothing is impossible to clean (Score:3, Insightful)
But then again, that's not the goal of spyware companies, not that they'll be the ones you *really* have to worry about.
Re:Nothing is impossible to clean (Score:3, Funny)
Re:Nothing is impossible to clean (Score:3, Insightful)
Re:Nothing is impossible to clean (Score:5, Insightful)
Is this a joke? You boot off the CD and then the most complicated thing you have to do from there is choose your timezone. You don't have to know anything to install Windows XP...
Re:Nothing is impossible to clean (Score:4, Insightful)
Re:Further proof (Score:5, Informative)
Re:Further proof (Score:3, Informative)
Re:Further proof (Score:5, Informative)
It would have taken all of 30 seconds to google in advance:
http://www.google.com/search?hl=en&q=unix+rootkit
--A closed mouth gathers no foot.
Dark horse anti-spyware apps: (Score:5, Funny)
Re:Ok... (Score:5, Informative)
Re:Boot from Knoppix CD (Score:3, Insightful)
Re:Once a machine is compromized... (Score:3, Interesting)
In theory, nothing should take down the internal systems.
Re:Ease of rootkitting on Windows vs. other (Score:3, Interesting)
An attack vector that gives access
A method to escalate to root.
On Windows, typically, user runs as "admin", which means only the first need be found. Any convenient buffer overflow will do.
On Unix, typically, services are not run as "root", meaning local priviledge escalations are useful. (suid programs, etc.)
In general, its easier with Windows.
HOWEVER, the art of writing the rest of the rootk