Joanna Rutkowska Discusses VM Rootkits 105
Unwanted Software writes "There's an interesting interview on eWeek with Joanna Rutkowska, the stealth malware researcher who created 'Blue Pill' VM rootkit and planted an unsigned driver on Windows Vista, bypassing the new device driver signing policy. She roundly dismisses the quality of existing anti-virus/anti-rootkit products and makes the argument that the world is not ready for VM technology. From the article: 'Hardware virtualization, as recently introduced by Intel and AMD, is very powerful technology. It's my personal opinion that this technology has been introduced a little bit too early, before the major operating system vendors were able to redesign their systems so that they could make a conscious use of this technology, hopefully preventing its abuse.'"
been around forever (Score:2)
Re:been around forever (Score:4, Insightful)
Virtual 8088 mode was not comparable. The 8088 virtual machine was entirely controlled by the 80386 software, and was not able to affect the 80386 in any dangerous fashion. The best one could have done was build an 80386 program to "rootkit" an 8088 Operating System. Considering that the OSes of the day (e.g. DOS) didn't have security to begin with, I'm not sure what you would have gained.
Modern virtualization allows for a machine on top of a machine. So I could, in theory, place a controlling bit of kit above your Operating System where it can't see it, can't modify it, and can't realize that it's being toyed with by a rootkit overlord.
Of course, the Blue Pill may work a bit different. I haven't studied it. But there is at least a potential for abuse here.
Re: (Score:2)
Wouldn't that be "beneath" it? (Score:2)
I don't see how that is possible. If something is running on top of the OS, it should be subject to the OS.
Something running beneath the OS would be able to control the OS.
The "Blue Pill" stuff she's talking about starts above the OS, but then it (supposedly)
Re: (Score:2)
Beneath it, above it, outside of it, however you want to describe it. Yes, the malicious rootkit would be the host, and the regular OS would be the client.
So far, so good. (Score:2)
I just don't see how she can accomplish that. And accomplish it in an undetectable fashion. Particularly given the state of hypervisors today. If it's difficult to do in a controlled environment today (run Win2003 with SQL 2005 in a hypervisor on Linux and see what hoops you have to jump through and what your performance is) I don't see it being a threat in the wild.
Seriously. If she can do this, then she's just
Re: (Score:3, Informative)
The way the rootkit works (and this particular MMU in general) is by allowing direct hardware access to the virtualized host. That is, under the rootkit scenario, if Windows makes a call to the video card to do anything (from getting EDIC info to rendering 3d), the MMU passes the request directly to the graphics hardware. Windows still needs to know how to talk to the hardware--because Windows uses a driver to make the call.
Only a few instructions must (by design) be trapped and
That's my point. (Score:2)
That's my point. She seems to be saying that this is easy. And that it is undetectable.
Yet when I start pointing out the obvious benefits of her system, suddenly it isn't as "easy" or "undetectable" as it was before.
No. When the guest OS's have direct access to the hardware such as the video card or network card, the "threat" breaks down.
I
Re: (Score:2)
If my "cracked" OS has direct access to the NIC, then I can monitor what is sent over it. I can tell if the "Blue Pill" has cracked my box and is calling home.
Maybe, depending on how much and
How to instrument a network driver. (Score:2)
You could detect this using timing tests, but it's not reliable. You need a good "before" profile which may be impossible to obt
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Except ... she's wrong. Once you pass through underlying hardware, you regain the ability to detect the rootkit. How?
If you ever find a difference, you're either in a hypervisor,
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
You wouldn't. The virus/rootkit would. The fact that the features exist are enough for it to exploit. If you were already running virtualization, you'd probably be safer.
Re: (Score:2)
There isn't a great deal of information about how it actually works, but from I've been able to read from the author's blog, apparently when Blue Pill starts up it's able assert itself as a hypervisor and force the OS into running as a VM - dynamically, witho
Re: (Score:1)
The hardware issue is very different for a rootkit versus VMWare. VMWare has to virtualize the hardware so that it can redirect the guest OS's calls to the host OS and make it play nice. A rootkit doesn't have to do this. It can let the "guest" OS directly access the hardware.
The rootkit doesn't have to help the guest OS share the hardware with another OS. All it has to do is hide itself and watch for interes
Re: (Score:2)
But it would if you changed it from a host OS to a guest OS without rebooting it. Or even if you did reboot it for that matter. That's what I was wondering about.
Re: (Score:1)
Not to say that pulling this off is easy... Just that the challenge is not in fooling Windows or preventing it from freaking out.
Re: (Score:2)
With that said, you'd think the
Re: (Score:2)
The correct way to fight blue-pill would be to create a minimal hypervisor that always runs under windows, and only prevents new code from joining it in hypervisor mode.
Adding an instruction to check if you're inside a VM, without having that instr
Re: (Score:2)
Virtualization has been around much longer (Score:4, Informative)
Hardware virtualization, as recently introduced by Intel and AMD, is very powerful technology. It's my personal opinion that this technology has been introduced a little bit too early
Virtualization was used in commercial machines as long ago as the early 1970s - IBM's VM/370 product was announced in 1972. The amount of hardware assistance for the virtualization depended on the 370 model. But this was the same kind of virtualization as recently introduced by Intel. You could run multiple different IBM operating systems under VM/370, and you could even run VM/370 under VM/370.
Re: (Score:2)
That said, I don't understand the new virtualization features anyways. I'm a longtime VMWare Workstation user, and was hoping for a big performance boost due to hardware virtualization support with my n
Re: (Score:2)
Frankly, I was expecting to be disappointed. Parallels seemed like a lot of hype. Not so! The only drawback is a lack of snapshot support, which I feel is somewhat necessary if you're doing development.
Re: (Score:1)
Re: (Score:2)
I use VMWare daily at my job, too (Linux is the host, though). I only have 1gig of RAM, so that's probably my limiting factor. Nevertheless, it feels more sluggish to me than the Macbook does.
Relative specs: P4-3.2GHZ vs CoreDuo 1.87GHZ, 1gig ram in each machine, slightly faster hard drive on the Linux box. I
Re: (Score:2)
And It Spreads (Score:2)
Gahh, NO! You can't force-virtualise my mind!
Half Baked (Score:1)
Why should we be worried about stealth malware? Do you see this as a big trend going forward?
To which we received only a half baked answer. Why didn't she say more about this?
Personally, however, I think it's mostly irrelevant to discuss whether this going to be a big trend or not. It's not about whether 100 companies or 100,000 companies are going to be infected next year using targeted, sophisticated attacks using "Stealth by Design" malware (i.e. one which does not creat
What? (Score:2)
I could give a damn what the major operating system vendors are unable to do. I'm more worried about what the hobbyist operating system authors are able to do.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
No Win Situation (Score:1)
In a business enviroment (Score:1)
But honestly, isn't that what drives a market? I know that the jury is still out on this specific technology, and it may never see its full potential... this isn't to s
Re:In a business enviroment (Score:4, Informative)
Where I work, it's common (Score:3, Interesting)
You do know that it doesn't matter if people are using hardware virtualization, right? All new Intel and AMD chips have it, whether you use it or not, it's there for a rootkit to exploit.
There are several other VM packages that also use the hardware VM. Xen is one, and it's open source. And in any case, it's not about how VMWare or
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
From what
Re: (Score:2)
Your cpus will run warmer, but they will be in sync.
Re: (Score:1)
I didn't see this mentioned in the other replies so I thought I'd mention it.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
This has nothing to do with typical VMWare. (Score:2)
On your hardware assisted virtual machines, your guest OSs run "native", in that you can give them access to actual hardware and they directly manipulate page tables. A hypervisor makes it possible for more than one guest (with an associated group of tasks, GDTs and LDTs, etc.) can feel like they have the whole box. You can emulate hardware that you can't or won't dedicate to each guest (say a common network interface, iSCSI volu
Comment removed (Score:4, Insightful)
I'd hit it like the fist from an angry god! (Score:5, Insightful)
http://common.ziffdavisinternet.com/util_get_imag
http://static.flickr.com/66/206241643_d48861f49c.
I am subscribing to her newsletter.
Re:I'd hit it like the fist from an angry god! (Score:4, Funny)
Re: (Score:2)
That one's not a good metaphor.
Re: (Score:3, Funny)
I almost feel like posting a lengthy rant on the immaturity of the average slashdotter, and the repellent factor it has towards women in the industry, like has been discussed before here. This post would be the poster child. But...
.. I laughed too. Damn you, hypocrisy!
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
sudo do me a blowjob
Re: (Score:2)
I wish I had mod points -- I'd mod you all down.
Respect and admire her for the brilliance of her work -- leave the gender issues out of it.
Oh, and remember -- this is
Re: (Score:1)
And if you think any woman grows weary of admiration, well...that's just plain silly.
Re: (Score:3, Insightful)
Re: (Score:2)
I'm sure she has no problem with compliments that point out, not only is she an intelligent and skilled researcher but she is also quite attractive.
It is just as likely that she wants people to concentrate on her ideas and not focus on her looks. You're not in her head and neither am I. What we do know for sure is that it isn't going to offend her or other female readers if we focus on the technology issues. So why don't we do that and leave the catcalls for wrestling fans and strip club patrons.
Security in the Market and Risk Assessment (Score:2)
I think she's mostly right. If you're migrating your OS to a chipset that enables virtualization, you bloody well better make sure code run on top of your OS can't take over and become the hypervising OS. I rather assumed that this was the case, but it seems I was mistaken. Upon reflection, I realize I have no clear idea of how the hypervisor is determined and what it takes to get code running in that mode. My laptop is running OS X with parallels using the VM technology to run Linux and Windows. I assumed
Rootkits (Score:1)
WHAT major operating system vendors? (Score:2)
Most architectures other than x86 in common use today either have supported virtualisation for years or don't at all. In either case, the "problem" as described is unique to the x86-64 architecture.
And there's only one major OS vendor there. Almost everyone else is using a kernel which by its very nature is open to all - so as soon as the issue is addressed, it will be available to all.
You dont need hardware assisted virtualization (Score:2)
VM malware threat is overblown (and isn't new) (Score:2)
If chips weren't available (publicly, not just a few samples to big OS vendors), the OS vendors wouldn't have bothered to even start t
Potential Uses Not Good For PC Manufacturers? (Score:3, Interesting)
What I'm getting at is many families are getting multiple PCs in the house now. One (or more) for the kids and one (or more) for the parents. Most of these people are just browsing the web, checking email, low CPU usage things. What if, like on these enterprise class platforms, you could order one PC with a dual core (ore more) CPU, two (or more) keyboards, monitors, mice then slice up the processing power in two then run two OSes and basically have 2 virtual PCs out of the same hardware?
It may not save money just running 2 virtual PCs but if it could run 3 or 4 it should save money once they get into mass production.
Okay, this is slightly OT but someone mentioned that there isn't much use for this technology at the consumer level but I disagree. Of course a rootkit running on top of it all wouldn't be good.
Backstreet Ruby (Score:2, Informative)
But dou you honestly think that anyone would market that? Instead, overtime to buy multiple whatevers is proposed to be the best.
CC.
Writing-low-level-assembly female? (Score:1)
Which side does she take??? (Score:2)
Riiiiiight... So, for fear of future threats, we should totally ignore current ones? Why do I not feel inclined to take advice from this person?
Overall, she makes a good point about how vulnerable current systems seem to VM rootkits. I disagree about the recentness of VM tech (we've had it in the x86 line since the 386, and in Big Iron for almost half a
Blue Pill (Score:3, Interesting)
IBM Mainframe VM (Score:2)
BUT, in the long term, I only saw it used as a solution to solving temporary problems. It was used often when customers were migrating from/to other IBM Operating System (DOS to MVS). It was used to temporarily house a new OS build while new hard
Sic! (Score:2)
The z/OS Workload Manager (WLM) component introduces the capability of dynamically allocating or re-distributing server resources, such as CPU, I/O, and memory across a set of workloads based on user defined goals and their resource demand within a z/OS image. Looking over the fence of the z/OS image the Workload Manager is able to perform this function also across multiple images of z/OS, Linux or VM operating systems sharing the zSeries
Re: (Score:2)
I disagree.
The reason the mainframe virtualization of the 1970s didn't become "mainstream" was simply due to the fact that the mainstream can't afford mainframes.
If a major player in the OS (or even server app) market decides to use virtualization as a security/compartmentalization technique, then use of the feature will spread like wildfire. It'll be just another feature like chroot or ja
Can user mode install a hypervisor? (Score:2)
The thing I don't get about the "blue pill" threat, is that I ass/u/me that you have to be running in Supervisor mode in order to install a hypervisor. True?
If no, then it sounds like the virtualization "feature" is really a bug -- a way around the supervisor/user distinction. So yeah, I see a threat, but it's such a glaringly huge and obvious one that I can't believe the designers didn't anticipate it. And that's really what it comes down to: I don't believe it. If anyone tells me user mode is able t
That's exactly what's broken in Vista (Score:2)
The whole thing is really about DRM, protecting wmplayer.exe from debuggers' eyes. (Of course, you could just virtualize the whole OS
Re: (Score:2)
Are you really sure about that?
DMCA violations are felonies, and disclosing details (as opposed to "trafficking in" actual implementations) isn't a violation anyway, and there's also a quite a bit of lattitude about what the "primary purpose" of an implementation would be, anyway. If there aren't already products on the market that depend
Kernel holes, not virtualization, are the problem. (Score:5, Interesting)
Before an attack can install something like "Blue Pill", it has to be running in kernel mode. At that point, it already has full control of the machine. The only question is what to do with that control. Installing a hypervisor underneath the OS is kind of neat, but there are lots of other things to do.
What this does demonstrate is that after-the-fact malware detectors are a dead end.
There's a great comment in the article:
The solution (includes) checking all the possible "dynamic hooking places" in kernel data sections.
(This) is actually impossible to achieve 100 percent as nobody knows all those dynamic hooking places, but we could at least start building a list of them. I believe the number of the hooking places is a finite number for every given operating system.
In other words, there is only a finite number of "ways" to write Type II malware of any specific kind (e.g. a keystroke logger).
Now that's a big part of the problem - Microsoft's use of "dynamic hooking", or places where user code can insert callbacks which privileged code might access, is so messed up that security researchers can't even find all the places where it is allowed. "Dynamic hooking" is really a lame method of interprocess communication left over from the DOS version of Windows. It should never have made it into NT/W2000/XP/etc.
There's less of a temptation to do this in open source operating systems, since, if you really need to legitimately add a feature, you can put it in the source, rather than tapping into some binary. The Linux netfilter/ipchains mechanism offers a "dynamic hooking" attack vector into the kernel, though, so Linux isn't immune to attacks of this type.
I speak for hundreds of geeks... (Score:2)
Re: (Score:3, Funny)
http://www.prabu.us/wp-content/Fabio_Joanna_prabu
Please don't confuse the leftmost man named Fabio there with the model of the same name.
Her name should be (Score:1, Funny)
Not ready? (Score:3, Insightful)
Major operating systems aren't ready for virtualization? We could have used virtualization five years ago.
The only OS that has any sort of problem with virtualization is Windows, and there is no reason to believe that Microsoft would have suddenly fixed thingsif hardware virtualization had been put off for another 5-10 years.
"Blue Pill" is quasi-illiterate gibberish. (Score:2, Informative)
o Keith Adams, of VMware fame (binary translation and Intel VT work): http://x86vmm.blogspot.com/2006/08/blue-pill-is-qu asi-illiterate.html [blogspot.com]
o Anthony Liguori, of Xen fame (paravirtualization work): http://www.virtualization.info/2006/08/debunking-b lue-pill-myth.html [virtualization.info]
quasi-technical personal abuse .. (Score:2)
When people have to resort to abuse to support their argument it makes me suspect that they are trying to distract from the facts. Adams don't actually debunk blue-pill, he calls the research quasi illiterate gibberish and accuses the researcher of a