Rootkit Creators Turn Professional 117
pete richards writes "Signalling a trend towards increased 'outsourcing' of some elements of malware creation, worm authors are increasingly turning to commercially available rootkits to help their creations slip past virus detection engines. Those root kits in the mean time are becoming more professional. Antivirus vendor F-Secure reported last week that it had detected a first rootkit designed to bypass detection by most of the modern rootkit detection engines."
How dare they! (Score:5, Funny)
At the very least they should be GNU/Rootkits.
Somebody contact the EFF or like start throwing chairs or something.
Re:How dare they! (Score:5, Informative)
Re:How dare they! (Score:5, Funny)
"All your oil belong to us."
Re:How dare they! (Score:5, Interesting)
Re:How dare they! (Score:3, Interesting)
Easy prey? (Score:3, Insightful)
Re:Easy prey? (Score:5, Insightful)
A law against rootkits would be very problematic. Is VNC a rootkit? If there's a bug in SSH that is exploitable to gain root access I bet it would suddenly fall under the domain of being labeled a rootkit by any law banning them, should the mainatainers of SSH be prosecuted because of that?
It really comes down to liberty though. If I want to hack my own computer I should be allowed to do so. If I want to write a virus I should be allowed to do so, but I should not be allowed to release it into the wild.
Re:Easy prey? (Score:5, Informative)
A rootkit isn't a tool to break into a machine; it's a tool to hide your presence once you've already broken into the machine...
Is VNC a rootkit?
No. But a tool hiding VNC from the process list might be.
Re:Easy prey? (Score:2)
Re:Easy prey? (Score:2, Informative)
Re:Easy prey? (Score:2)
Re:Easy prey? (Score:1, Insightful)
You do have a point there... PING is another example as well, & it ships with most OS.
It too, can be used to issue a "ping of death" though iirc, most OS are
Re: (Score:3, Interesting)
Re:Easy prey? (Score:2, Interesting)
I agree with your point of view that a blanket "all are responsible" response is not the best course of action, as I've wondered how long it will be before people like the authors of security books get bundled into the category of "they supplied the knowledge to make this attack possible, th
Risk to burn karma but... (Score:5, Funny)
When an Australian male carries a few spare condoms with him on a night out.
Ahhh.. maybe I shouldnt have bothered..
-- Jim.
Re:Risk to burn karma but... (Score:3, Funny)
If that's the aussie definition of a rootkit, what's the aussie definition of a trojan? Ahhh... never mind...
EricHow the Vioxx recall reduced worldwide spam [ericgiguere.com]
Re:Risk to burn karma but... (Score:5, Funny)
Re:Risk to burn karma but... (Score:1)
Remember, the reason we enjoyed beating the Aussies so much is that they're such insufferably bad winners. Rise above it, mate.
Re:Risk to burn karma but... (Score:1)
Re:Risk to burn karma but... (Score:5, Funny)
In India, where they really do have sunlight, that might be true.
Re:Risk to burn karma but... (Score:2)
Re:Risk to burn karma but... (Score:2)
If I stand take that kind of climate I would move to Malaysia.
Re:Risk to burn karma but... (Score:1)
Re:Risk to burn karma but... (Score:2)
Re:Risk to burn karma but... (Score:1)
Oh, and for any perplexed readers, the Telstra Dome has a roof.
.
Re:Risk to burn karma but... (Score:2)
Wicked (Score:3, Insightful)
Seriously though - Golden Hacker Defender. I've never heard of this. It it were seriously a commercial product, I doubt it would be a rootkit, perhaps a "Remote administration tool." I can't goole (verb) where to purchase it.
So here's the thing. I wrote a virus, and now I'm going to sell it. It's a commercial virus. Oops! Not it isn't, it's just me selling a virus.
Move along, nothing to see here.
Re:Wicked (Score:3, Informative)
Re:Wicked (Score:1)
Re:Wicked (Score:3, Informative)
Re:Wicked (Score:1)
This is a big problem, I do application/infrastructure attack and penentration and have seen/had co-workers see this fairly often in mainly financial and defense clients. This problem definetly exists and is causing some major headaches in the info sec world.
Re:Wicked (Score:3, Interesting)
Sell rootkits and become a billionaire! (Score:5, Funny)
Re:Sell rootkits and become a billionaire! (Score:2)
Commercially available? Whatever.... (Score:2, Insightful)
In other news, we learn that script kiddies don't actually write software.
What's with the "commercially available" business? From TFA:
So you can buy it, so what - you can buy cocaine on street corners, does that make it 'commercially available'? Or are they simply heralding Rootkit 101 as the latest product to hit the v-scene?
Re:Commercially available? Whatever.... (Score:1, Redundant)
In other news, we learn that script kiddies don't actually write software.
I'd have thought 450 euros (see here [czweb.org], select "Golden Hacker Defender" from combo box) was a bit beyond the price range of your average copy/paste script kiddies, but then I've never met any so I wouldn't know. Either way, it's not clear to me that the site is breaking any laws by selling this software. Any lawyers around?
What's next, Virus Writers Monthly?
How about this [rootkit.com]?
Re:Commercially available? Whatever.... (Score:2)
One "l337 virii crew" gets a copy, and boom, it has a new home in the gnutella bitstream for all eternity.
Re:Commercially available? Whatever.... (Score:2)
If the attacker were to freely distribute the code they got, it would show up on Norton's radar pretty quick, and bec
What's the point of this type of hacking? (Score:2, Interesting)
Or is there a Matrix-esque cabal of midnight hackers out there dressed in trenchcoats and sunglasses who are busy at work undermining the government? I find that hard to believe.
I find it easy to believe that there are foreign governments very interested in this type of thing, but it is difficult to imagine ordinary citizens having both the desire and the wherewithal to perform serious attacks a
It's organised crime becoming more sophisticated (Score:2, Interesting)
Re:What's the point of this type of hacking? (Score:2, Insightful)
True, that's what happens to all industries while professionalizing. I guess it's similar to people willing to work in arms industry, so this doesn't just concern foreign governments.
what do you think? (Score:2)
Re:What's the point of this type of hacking? (Score:2)
There's a constant struggle to defeat the detection measures, or detect newer, stealthier rootkits. I've played around with seeing how well I can hide something on my own system, never used it in anger but there's an intellectual challenge there. Like chess or go, it's basically the same every time but I can see people constantly finding new pleasure in it.
Fact or fiction? (Score:5, Interesting)
I guess Bruce Schneier is right when he suggests that the way to improve some aspects of security, anyway, is by placing responsibility firmly on outfits like banks and ISPs who'll get smacked mightly hard in the wallet - by law, this time - unless they raise their game. That might put some pressure on OS-makers and their pals to design products that don't also need AV checkers that are dependent on signature libraries and prey to zero-day exploits.
Love the quote from a researcher saying that the alleged sale of rookits means that "there is a criminalisation of the virus world going on." As if it hasn't been criminal till now, just good clean fun ho ho.
Re:Fact or fiction? (Score:3, Informative)
I think what he meant (tho he could have phrased it much better) is that previously virus writers were just sad spotty adolescents with no social skills in their bedroom writing viruses to prove something to themselves or to impress they're equally sad and
spotty online "friends". These days a lot of it is paid for by organised crime who have specific targets and specific agendas.
designed to by-pass detection? (Score:2)
Re:designed to by-pass detection? (Score:3, Informative)
Virus writers go by their own rules. (Score:4, Insightful)
Doesn't this again bring up the question which was discussed a while ago. 'Why should Operating systems have a policy of default accept? Run programs only which you trust.' Not that this will solve the problem in one shot but it will make the problem more manageable. By the way things are going and the speed with which new viruses are created, i guess the day is not far when we will need huge databases to store the signatures for the viruses on each machine.
Re:Virus writers go by their own rules. (Score:2)
No it won't. A default deny policy is simply not practical unless you can afford a lot of extra trouble. If I was developing on such a machine, would I have to get every revision of my code signed?
Re:Virus writers go by their own rules. (Score:2)
The "real" software developers (i.e. Microsoft, IBM, Adobe, Sun, Macromedia, etc., etc.) won't have a problem with the required code signing.
All that will be harmed is the "freeware" and "open source" software. They will claim that this is a good thing. After all, that software merely serves to undermine the profitability of the "real" software developers.
We'll hear arguments like: if The GIM
Re:Virus writers go by their own rules. (Score:2)
This is what selinux brings to the table. It allows you to specify a policy for your system that will block programs from doing things that they should not do. Of course if most windows systems operated with the least privilege rule most of the viruses out there would be unable to work as they do now. Instead of an arms race between
Misuse of the term (Score:5, Insightful)
A rootkit is a tool that helps worm authors to slip past malware detection tools. The rootkit is 'wrapped around' the virus, and hides its payload from detection engines. After the rootkit has penetrated a system's defences, the worm can start doing its work.
Wrong. A "rootkit" is a series of hacks to the underlying operating system, which make a running process harder to detect. In other words, a rootkit will keep your process from turning up in the Windows Task Manager, or a Linux "ps".
Definition from the Jargon File [catb.org].
Re:Misuse of the term (Score:1, Informative)
root access on a system either by buffer overflow of a running
process/server or some other method. To prevent a process
showing up in ps all you have to do is put your own version of
the ps command in place, hardly rocket science.
Re:Misuse of the term (Score:5, Informative)
There is more to a root kit than just a replacement ps, but of course that is a critical element.
No it's not rocket science, but in practice modding system binaries whilst on the outside keeping the system appearing to be running normally is much harder, different library / operating system / architectures to deal with and the fact that you are messing around with core system files.
Re:Misuse of the term (Score:5, Insightful)
Not necessarily. There are rootkits which are based on kernel modules (so that the kernel API are not reporting the process either, just in case the sysadmin brings in a statically compiled ps, or manually digs through /proc).
It's the primitive rootkits that only replace some common utilities such as ps, ls, and netstat. Many of these don't even bother to doctor md5sum or rpm, so they can be trivially detected by an rpm -qa --verify.
The good ones on the other hand do a much more thorough job, and can only be detected by booting from a known-good media (i.e. a Knoppix CD)
Re:Misuse of the term (Score:1)
Re:Misuse of the term (Score:2)
What if rmp is repleaced as well to spit bogus results for a --verify?
Knoppix is probably the only way to really find this stuff. And what do you look for? A new version of ls that is a different size than it should be?
Re:Misuse of the term (Score:4, Informative)
See also Sysinternals's Rootkit Revealer [sysinternals.com]:
Re:Misuse of the term (Score:3, Informative)
Re:Misuse of the term (Score:1)
Always has been. If I get root access then I rm the ps command
does "rm" suddenly become a rootkit? No, of course not.
Re:Misuse of the term (Score:5, Interesting)
We can sit here all night posting back and forth "is not," "is too" but I don't think that we'll get any further. If you're so certain on your position please take 30 seconds and find something reasonably definitive to support your position.
Mods - before modding anything else in this thread please take the time to actually look up what a rootkit is...
For the record, an exploit is software designed to gain unauthorized access to a system. A rootkit is a set of tools used to maintain such access without the knowledge of the admin of the cracked system. Typically it includes modified ps, login/su/sshd, etc.
The whole idea of a rootkit is to make sure you can get back into the system a week later when the admin has patched the original vulnerability. If you rm the ps command it probably won't take long for the admin to figure out what happened.
The best way to detect a rootkit is via tripwire, run from a boot CD. There really isn't any way of defeating this method of detection, but it is very inconvenient since it requires brining the system offline for scanning. There are tools like rkhunter which search for rootkits on running systems, and in theory these can be defeated by a very clever rootkit.
Re:Misuse of the term (Score:2)
A framework for this (mtree, tools for package file checksumming, cron scripts etc.) has been part of the default installation on the *BSDs for ages, but I haven't seen anything like it in the default installation for any Linux distros.
Of cour
Re:Misuse of the term (Score:1)
You could just tar the rfs or a selection of critical system files, copy to tape, untar and md5sum those files on a non-networked box you keep hanging around for the purpose. For a limited number of key servers this wouldn't be too onerous.
Now md5 hacks exist but a combination of creation date, filesize and md5 would be a fairly good fingerprint - or you could just diff against known good versions for a limited set of
Re:Misuse of the term (Score:3, Informative)
You can also easily run it on a running system.
The problem is that on a running system your executable is subject to the whims of the currently-running kernel, glibc, linker, etc. If the rootkit installed a kernel module, or a modified glibc, or something else, then when you scan ps it could just point you to a saved unmodified copy of ps, and then your scan would miss the changes. When you
Re:Misuse of the term (Score:1)
I think the weakest link in most companies are idiot staff (like an ex-boss who brought more viruses into the company via his laptop than a Bombay hooker) and idiot sysadmins. In years of having a computer directly connected to the Internet I only got hit once when I installed a dodgy bina
Re:Misuse of the term (Score:2, Interesting)
Now that we have seen proof of checksum collisions, I do not doubt that
Re:Misuse of the term (Score:2)
Re:Misuse of the term (Score:1)
Re:Misuse of the term (Score:2)
In a technology-centric company that is able to build all its software in-house, this would make more sense, but would be adding "another layer" to what is already a significant amount of work.
Re:Misuse of the term (Score:2)
Rootkits get you root.
That's pretty much it.
A given rootkit may well do more than that, and evading detection would be a great value-added extra, but making a running process harder to detect is not the core feature of a rootkit.
Even if the jargon file says it is.
Re:Misuse of the term (Score:2, Informative)
Don't let the name fool you because thats all it is is a name. Exploits and rootkits are 2 entirely different things. You can get all the exploits you want from packetstormsecurity [packetstormsecurity.nl] but
Re:Misuse of the term (Score:1)
No. When I first started using the term 'rootkit', a rootkit implemented an exploit to enable you to acquire root access.
The point of the rootkit was that it allowed a relatively inexperienced attacker to automate exploitation of vulnerabilities.
Maybe you use the term a different way; that makes neither of us inherently right. It certainly doesn't mean the article mis-used the term any more than either of us.
Re:Misuse of the term (Score:2, Informative)
Isn't that a contradiction?*
You can get all the exploits you want from packetstormsecurity but I dare you to find a single rootkit there.
Homepage: Assessments -> RootKits [linuxsecurity.com]
What you really want to watch out for are kernel level RootKits, as even checking the integrity of programs doesn't help as they aren't altered. The kernel runs a different program when you call the correct one. Evil I tell you!
*Laugh, it was supposed to be a joke
Re:Misuse of the term (Score:2)
Rootkits are indeed designed to hide malware from the tools that are designed to show what applications, network connections, etc. are running. The article went on to explain this a bit more clearly, but it may have been a bit subtle. Yes, the purpose of a rootkit is to hide running processes from things like ps, and the windows task manager and such. But, the deal is that many Antivirus products include not only static pattern based detection algorithms that look for malware, but also behavior-based dete
Re:Misuse of the term (Score:2)
arms race (Score:5, Funny)
Re:arms race (Score:1)
www.hxdef.org....nuff said (Score:2, Informative)
http://www.hxdef.org/antidetection.php [hxdef.org]
They even have a license..
Paid versions are not released under GPL licence.
Every customer who buys antidetection service agrees with this licence.
Customer is not allowed to spread the product or its parts in neither binary nor source code form.
Violating of this licence will issue in loss of any support
and also in impossibility of buying new updates and other products and services.
Customer can do
Re:www.hxdef.org....nuff said (Score:1)
Ah, very clever. So if you actually put it on someone elses system they can say you were violating the licence agreement?
Customer is fully responsible for the application of boughten product.
Actually, maybe they're just retarded after all.
In other news (Score:1, Offtopic)
Quick! How do I give F-Secure all my money? (Score:3, Insightful)
Rootkits can be used for good. (Score:4, Insightful)
It is like a formatting tool, when used properly it deletes what you want but if someone wrote a program to access the formatting tool and run it on a drive that you wanted things on now it has just been turned into something bad.
There is a legitimate use to everything
Re:Rootkits can be used for good. (Score:1)
Really?!?
They have good purposes such as in the enterprise world to watch what you are doing/logging what you are doing
Rootkits are not nessesarily bad
I Rest my case (Heh,Heh)
MOD PARENT DOWN! (Score:1)
What about kernel level RootKits? (Score:1)
I'm not entirely sure why you would use a RootKit(legitimally) other than for limiting access on machines under your control, something that could surely be done with proper account setups.
Re:What about kernel level RootKits? (Score:1)
Is there actually such a thing as a non-kernel level rootkit?
Re:What about kernel level RootKits? (Score:1)
Worried about Rootkits? (Score:1)
Also, check out SysInternal's RootKitRevealer [sysinternals.com]. Not only is it a handy tool, but the page gives a pretty good definition of rootkits as they apply to Windows.
Re:Waiting for Vista (Score:3, Informative)
Re:Waiting for Vista (Score:4, Interesting)
Which is the principle difference between *nix and windows. Most of the holes in unices have been found over the years. Windows was only exposed to wide area networks in a serious way over the last ten years. The bugs are still being found.
Re:Waiting for Vista (Score:1)
Rootkits don't just get into a computer magically, they have to exploit a vulnerability in the OS or trick the user. *nix based systems don't let user stupidity do