Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Windows Technology

New Rootkit Bypasses Windows Code-Signing Security 160

Trailrunner7 writes "In recent versions of Windows, specifically Vista and Windows 7, Microsoft has introduced a number of new security features designed to prevent malicious code from running. But attackers are continually finding new ways around those protections, and the latest example is a rootkit that can bypass the Windows driver-signing protection."
This discussion has been archived. No new comments can be posted.

New Rootkit Bypasses Windows Code-Signing Security

Comments Filter:
  • Re:Well, DUH... (Score:5, Informative)

    by tompaulco ( 629533 ) on Tuesday November 16, 2010 @03:02PM (#34245786) Homepage Journal
    Code signing is just a money making scheme for Microsoft cleverly disguised as a protective measure for us users. Smaller projects can not afford to have their code digitally signed by Microsoft. People have been writing workarounds for this involving spoofing the driver as being in TEST mode, but this is a hassle for the end user.
  • by PatPending ( 953482 ) on Tuesday November 16, 2010 @03:04PM (#34245822)

    Old sk00l. When was the last MBR infector seen in the wild? 2002? Most of this class are from the DOS era, fercryingoutloud.

    From the second paragraph of the fine article (emphasis added):

    TDSS has been causing serious trouble for users for more than two years now, and is an example of a particularly pernicious type of rootkit that infects the master boot record of a PC. This type of malware often is referred to as a bootkit and can be extremely difficult to remove once it's detected. The older versions of TDSS--TDL1, TDL2 and TDL3--are detected by most antimalware suites now, but it's TDL4 that's the most problematic right now.

  • Not a "New" Rootkit (Score:5, Informative)

    by Avohir ( 889832 ) on Tuesday November 16, 2010 @03:11PM (#34245920)
    This is a new version of a ~2 year old rootkit, also known as TDSS, and the company responsible for this particular parasite is a russian outfit known as Dogma Millions. Eset did a good writeup on the older version here [eset.com]. This newer version is actually even more interesting than the article indicates. It's intelligent enough to send tools like MBRCheck off to look at a backup of the MBR so that they'll erroneously return a "clean" verdict while the system remains infected. The best bet for removal is TDSSKiller [kaspersky.com] by Kaspersky (the company that wrote the blog entry).
  • Re:Well, DUH... (Score:3, Informative)

    by Applekid ( 993327 ) on Tuesday November 16, 2010 @04:28PM (#34247164)

    Code signing is just a money making scheme for Microsoft cleverly disguised as a protective measure for us users. Smaller projects can not afford to have their code digitally signed by Microsoft. People have been writing workarounds for this involving spoofing the driver as being in TEST mode, but this is a hassle for the end user.

    Um, code signing can be by any trusted authority. You need not pay Microsoft for user code.

    Drivers are another story. They need to pass WHQL, but that's no big deal because it's already paid through the licensing fees collected if you want to put a Windows logo on your product certifying it's compatible with Windows. Naturally, if it's going to have the logo on the box, Microsoft wants to make sure your crappy driver doesn't cause problems that will be blamed on Windows.

    Installing unsigned drivers in testing mode is a pain in a live environment for the same very good reason you don't want to perform crash testing on a live motorway.

  • by iMouse ( 963104 ) on Tuesday November 16, 2010 @04:28PM (#34247178)

    The MBR isn't the only point of infection. TDSS also patches legitimate system files, resulting in reinfection of the MBR if the infected files on the drive are not taken care of first.

  • Once and for all... (Score:3, Informative)

    by WaroDaBeast ( 1211048 ) on Tuesday November 16, 2010 @05:00PM (#34247700)
    The nominative plural ending for Latin nouns following the second declension is -i, so if virus was a masculine noun, which it is not [wikipedia.org] ("n." means it's neutral), it would then take an i, which would give "viri." But since "virus" is neutral, its plural is "vira," so next time you wanna brag about how well you know Latin — without sounding like a fool —, say that instead.

    Or you can say "viruses" if you feel like speaking English. My €0.02.


    P.S.: The only time you get that double i in the nominative plural is when you inflect a second declension masculine noun that ends in -ius, such as "filius."
  • by Myria ( 562655 ) on Tuesday November 16, 2010 @05:47PM (#34248488)

    Vista and 7's driver signing requirement is mainly for DRM purposes.

    No, the driver signing requirement is for quality control purposes. 60% of Windows crashes used to be driver-related. Now, Microsoft actually requires a proof of correctness, using their Static Driver Verifier [microsoft.com], before a driver is signed.

    You're talking about the Windows Hardware Quality Labs [wikipedia.org] signature, not the kernel-mode driver signing [microsoft.com] requirement in 64-bit Vista and 7. A WHQL signature is not required in order to have a driver load, a kernel-mode driver signature is. Microsoft only does their quality testing with drivers submitted to WHQL; an appropriate VeriSign certificate is enough to get the driver to load, without any quality checking on the part of Microsoft.

    It is the kernel-mode driver signing requirement that this rootkit bypasses, not the WHQL signature.

  • by gad_zuki! ( 70830 ) on Tuesday November 16, 2010 @07:00PM (#34249354)

    You are correct. Here are the peerguardian people talking about this. When running 64-bit signing is required. 32-bit it is not.

    http://www.raymond.cc/blog/archives/2009/08/24/loading-unsigned-drivers-in-windows-7-and-vista-64-bit-x64/ [raymond.cc]

Our business in life is not to succeed but to continue to fail in high spirits. -- Robert Louis Stevenson

Working...