Rutkowska Faces 'Blue Pill' Rootkit Challenge 223
Controll3r writes "Three high-profile security researchers — Thomas Ptacek of Matasano Security, Nate Lawson of Root Labs and Symantec's Peter Ferrie — have issued a challenge to Joanna Rutkowska to prove that her 'Blue Pill' technology can create "100 percent undetectable" malware. The Black Hat 2007 challenge will feature two untouched laptops of the make/model of Rutkowska's choosing for her to plant Blue Pill on one. From the article: 'She picks one in secret, installs her kit, sets them up however she wants,' Lawson explained in an interview. 'We get to install our software on both and run it, [and] we point out which machine [Blue Pill] is on. If we're wrong, she keeps the laptop.' No word on whether Rutkowska will accept the challenge."
More Laptops (Score:5, Interesting)
Re:More Laptops (Score:5, Informative)
http://theinvisiblethings.blogspot.com/ [blogspot.com]
"First, we believe that 2 machines are definitely not enough, because the chance of correct guess, using a completely random (read: unreliable) detection method is 50%. Thus we think that the reasonable number is 5 machines."
She then goes on to detail how at least one but no more than four of the machines are infected and that the detection method must be automatic and return only "infected" or "not infected" as output.
There are some other details she proposes, some of which are head-scratchers such as "The detector can not consume significant amount of CPU time (say > 90%) for more then, say 1 sec."
Whole thing sounds pretty interesting though
Re:More Laptops (Score:5, Informative)
http://rdist.root.org/2007/06/28/undetectable-hyp
Re: (Score:2)
If Joannas time estimate is correct, its about 16 times harder to build a hypervisor rootkit than to detect it. Id say that supports our findings.
What a bullshit response.
First, they say that they are trying to debunk her claim: that it is possible to make a rootkit which is undetectable from within the system. Now they're trying to say that it's "good enough" for it to be 16 times harder to build the rootkit than to detect it.
Nope.
If Joanna is right, and Blue Pill is undetectable through automated processes, then it could take 3 years to develop--the results would still be devestating once it was released.
Also, I imagine that there are many more p
Re:More Laptops (Score:5, Insightful)
Re:More Laptops (Score:4, Interesting)
Re:More Laptops (Score:4, Interesting)
In summary:
-Multiple machines. Fine.
-"bluepill.exe and bluepill.sys" wil be installed on ALL machines. Okay, I guess they don't want them to just check the drive's free space to see if extra files were added?
-ALL machines will have the driver loaded, but not necessarily be "infected". Is that a reasonable condition for a rootkit "in the wild"? If the rootkit is doing it's job you shouldn't be able to detect the driver being loaded in the first place.
-Detector.exe must be completely autonomous and return only a single flag value to indicate infection. This sounds like a completely unreasonable requirement, since even rudamentary human review of the results is a realistic real-world scenario.
-The detector can not cause system crash or halt the machine. I fail to see why this would be a requirement, unless you argue that whatever system that might be tested is mission critical and can't afford ANY unplanned downtime... unexpected crashes are bad, but shouldn't be an instant-lose condition.
-The detector can not consume significant amount of CPU time. Why not? If the user is scanning for a rootkit, they probably understand it's a fairly serious issue and should be willing to devote resources to it. Inconvenient? Sure, but again not a condition of failure.
-Compensation for working on the project. I can understand this, but really... even if Blue Pill fails to stay hidden, they "win" 6 months of full employment with no repercussions for failure to deliver a working project other than bad reputation.
Basically, it sounds to me that they aren't really claiming Blue Pill is "undetectable" - only that it is undetectable by one-click idiot-proof software that is run under conditions unlikely to be seen in the wild. I see no reason why the detection team would be prevented from using a boot CD to examine the contents of the hard drive, for example, perhaps even loading their OWN virtual machine to virtualize the malware-infected system and monitor for suspicious activity. I see it as completely fair game.
=Smidge=
Re: (Score:2)
It sounds like the rootkit is designed to be undetectable for stock anti-virus software - i.e. the most likely conditions to be found in the wild. Even the CPU usage requirement makes sense there - once you consider 100 detection modules for different
Re:More Laptops (Score:5, Informative)
There's another reason for not consuming huge amounts of CPU. The reason is fairly obvious once you think about it hard enough.
The simple test for a rootkit that puts the computer into a virtual machine (I'm assuming that's happening here) is to test for the performance impact of a VM. If you monopolize the CPU (disable interrupts to prevent anything else from being scheduled, etc.) and run some complex processing for several seconds, you would be able to easily detect the difference in time needed to complete the operation (assuming that all of the computers are otherwise configured identically).
Such a test, while workable in theory, is not workable in real-world practical use, and thus should not be allowed. Putting a time limit on detection prevents such theory-only tests from succeeding. The same for other impractical tests like scanning the entire surface of the disk for signatures, doing comparisons of expected versus actual disk I/O performance to look for virtualized hard drives, etc.
Re: (Score:3, Insightful)
I think everything is fairly obvious once you think about it hard enough ...
Re: (Score:2)
I think you need to have another step in place so that the detection crew don't have any more information available than would be available in a real world situation where they are faced with a random box that might o
Re: (Score:2)
Except nowhere was it suggested that the machines would be compared to each other, or even another machine or system image, so there is no "control" in this case either.
Your average home user won't (and probably isn't qualified to) do manual inspection of results. Not even once in a while, certainly not on a routine basis as would be required to protect a real system.
Even so, such an "idiot l
Re: (Score:2)
Except nowhere was it suggested that the machines would be compared to each other, or even another machine or system image, so there is no "control" in this case either.
Nowhere was it suggested that they wouldn't be compared to each other. In fact, for the purposes of the challenge, the challenger didn't even say that the software itself would detect bluepill--he said, "We get to install our software on both and run it, [and] we point out which machine [Blue Pill] is on." My first reaction to that sentence was that there would be human interpretation as to the results--for example, they could drive up the CPU and then watch how many context switches each computer can pe
Re:More Laptops (Score:5, Funny)
Re: (Score:2)
The only way it is truly undetectable is if it does nothing, and takes up cluster space that the machine has allocated, but not actually filled.
Re: (Score:2)
Re: (Score:2)
Re:More Laptops (Score:5, Funny)
Re: (Score:2, Insightful)
If there's no such requirement of proof, I'll happily offer a test of my completely undetectable root kit. And I'll not even demand the source of the detector program (I'll also not offer mine).
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
More than that, even. The very act of virtualizing the OS will steal cycles even if the rootkit itself is idle.
Ob Princess Bride (Score:5, Funny)
"You only think we guessed wrong. That's what's so funny! We switched laptops when your back was turned! Ha ha! You fool! You fell victim to one of the classic blunders! The most famous is never get involved in a land war in Asia, but only slightly less well-known is this: never go in against three high-profile security researchers when a laptop is on the line! Ahahahahaha! Ahahahaha! Ahaha-"
"And to think, all that time it was your laptop that had malware."
"They both had malware. I spent the last few years building up an immunity to blue pills."
Re: (Score:2)
Re:Ob Princess Bride (Score:4, Funny)
You're going to regret that decision in another thirty years.
Re: (Score:2)
If 5 laptops is what it takes to get this challenge off the ground, then we'll do 5 laptops.
However, I don't know what the number of laptops has to do with removing luck from the challenge. If she wants to reduce our likelihood of a lucky guess to below 3%, we can use repeated trials on the same hardware (with Joanna's team stipulating how cleanup after each trial is to occur) to the exact same effect.
Re: (Score:3, Insightful)
Step one: Pull the BIOS chips or stick a reader on them. Compare the images between the two laptops. Obviously flash them to the same revision beforehand.
Step two: Pull the hard disks and diff them in another system.
Step three: If the BIOS images are the same on the first two computers, put the drives in new computers of the same model and ask the rootki
Re: (Score:2, Insightful)
Re: (Score:2)
c'mon... (Score:2, Interesting)
Re: (Score:2)
or what if she installs on non, and they say one or both has it....
kinda makes me feel like watching Princess Bride again
Re: (Score:2)
Re: (Score:2)
Cunning Plan (Score:5, Funny)
Then snigger while these guys spend hours scratching their huge domed craniums wondering how she did it.
Re: (Score:2)
Re: (Score:2)
Simple enough. Insist on videotaping the install or something similar.
Of course, if she still wanted to cheat, just install this:
Detect that!
Re: (Score:2)
How to win the challenge (Score:4, Insightful)
Installed on both would be best (Score:2)
and to make it even more fun, put something extra on them too.
Re:How to win the challenge (Score:5, Interesting)
I think they should have her set it up, then give the two laptops to a pair of teenage girls for 3 weeks with $300 to spend on any software they choose and an unencumbered internet connection. Then have them search the two. Think of it as two decks of cards, but shuffling them before you try to find the differences.
Re: (Score:2)
Re:How to win the challenge (Score:5, Funny)
Re: (Score:2)
If you do that, you can bet at the end both laptops would have the Rutkowska's rootkit.
Never mind it's not in the wild, never mind it's not infectious: trust a teenage girl with 3 weeks and unencumbered internet access, and she'll find a way to get infected with it.
Re: (Score:2, Informative)
"...it should be simple to find ANYTHING that was added to either one."
While it might not always have been simple, it was at least in theory possible to find anything installed on a computer prior to hardware virtualization technologies [wikipedia.org] being introduced. The crux of this new challenge is that the newer chips from Intel [intel.com] and AMD [amd.com] have support for cpu-based virtualization. In other words, they implemeted some of the hard parts of VMWare in the processor itself.
With one of these newer processors, the h
Re: (Score:2)
It is trivial to figure out if something has changed, but it's much harder to determine if the change is malicious.
Actually, this is good for the white hats..... (Score:2, Informative)
Either way, they can come out ahead here...
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Didn't she offer to open-source the code anyway? With the code, they can get a whole bunch of clues.
Obvious Request I Can Think Of (Score:5, Interesting)
Another obvious thing I would request is that different services software be installed (and running) on the laptops. Like maybe put MySql on one running as a service and PostGres on the other. That way they can't do something as ridiculously simple like a memory or CPU profiler to find out which one is using up (all beit small) more CPU resources & memory. That seems to be the strategy of the challenging team:
Re: (Score:2)
Re: (Score:2)
Unless I'm already infected. OH MY GOD, IT'S LIKE SUPER-AIDS!
Re: (Score:2)
But yeah, there should definitely be more than two machines, perhaps one out of five or ten machines. And each machine should have different hardware configurations as well.
Or...she could load both of them up with so much malware that they'll throw their arms up in disgust and quit, which is the same behavior I've seen from some of the malware scanning products out there.
Re: (Score:3, Interesting)
Better yet: Let each laptop (out of maybe 20 or so, instead of just two) be used by someone for maybe a few days or a week leading up to the test. Rutkowska is the only one allowed to (deliberately) install a rootkit, or any kind of malware, but everyone else is allowed to do pretty much whatever they want. Then, let
Re: (Score:2)
I guess you could. I think that defeats the point of the exercise, though. Many Windows computers get rebooted daily; even my Kubuntu box does, to save power, and so I don't have to mess with hibernation. The point of a rootkit is to stay there, undetected, probably for a long time, in order to do something permanent.
That's the point. I'm not trying to prove that any rootki
Re: (Score:2)
uh what's the point? (Score:2)
Also any such rootkit wouldn't work if the O/S starts off virtualized in the first place so that the rootkit would be "trapped". Then you can scan for the rootkit from "outside".
Of course this assumes no bugs in the virtualization stuff. But as we know there are tons of bugs in CPUs
I hope she accepts the challenge (Score:2)
Only 2 laptops? (Score:2)
not a fair test (Score:5, Insightful)
now if they wanted to test on an E-machine
Re: (Score:3, Interesting)
If Joanna wants to stipulate that we pick Blue Pill out of a morass of pre-installed kernel and userland rootkits, we would of course agree to that term. Neither Joanna's team nor ours seems to think that's a meaningful addition to the test. Like the Vitriol rootkit Dino Dai Zovi wrote for Matasano last year, Joanna's rootkit lives in a special slice of memory inside of a special execution context carved out by the hardware. It is unlike any other X86 rootkit in how it intercepts control of the platform and
No file access dates. (Score:2)
comparison (Score:2)
easier than that (Score:2)
To win, she needs laptops that are NOT identical.
Not quite 50/50 (Score:2)
It's time to put your money where your mouth is..
Re: (Score:2)
You are assuming elements of the challenge that aren't there. That is a sure setup to lose.
Imagine you're in a bar with your friends. You ask the waitress for three glasses of water and two shot glasses of water. You say to a friend, "I'll bet you a drink that I can down three 12oz glasses of water before you can down those two shot g
Re: (Score:2)
Re: (Score:2)
A different challenge for Rutkowska (Score:2)
Timing Analysis (Score:3, Informative)
There are many other sources of timing information in a computer. Serial ports, parallel ports, USB ports, ethernet ports, IO space reads and writes, disk operations, the RTC (real-time clock), etc. I haven't thought too hard about using any of these things in particular, but I would be very surprised if a hypervisor could alter the behavior of all of these things in such a way that they couldn't be used as an alternate source of timing information when determining if an instruction you suspect is being intercepted is taking "too long" or not.
Given 2 identicle computers (Score:3, Informative)
1. create dd dumps of both drives and run diffs on the images. Added benefit of also seeing if any lower level filesystem stuff was changed and not just files.
2. find / -type f -exec md5sum {} \; compare md5sums to find which files are different. Though this will cause a problem with storing the md5, maybe use a ram drive or exclude /media or /mnt.
Re: (Score:2)
The State Of The Challenge So Far (Score:5, Informative)
Helu. I'm Thomas Ptacek, one of the four challenge team members --- Slashdot left out Dino Dai Zovi, who kicked this off by writing a virtualized rootkit at Matasano last year.
Joanna has responded to our challenge [blogspot.com]. We invited her to stipulate any terms she deemed reasonable. She proferred:
You can probably predict our response [matasano.com].
Here's where it stands: all parties agree that by Black Hat '07, Blue Pill will not be in a state where it is hard to detect. Our detection techniques are likely to detect Blue Pill at Black Hat. Blue Pill requires six months of engineering time to get to a state where Joanna is confident that we can't detect it.
Here's why you care: a few weeks ago, Microsoft decided that Vista Home would not allow virtualization, in part because of the threat of virtualized malware. To the best of our knowledge, there have been two (2) real hypervisor rootkits ever produced: Joanna's Blue Pill, and Matasano's Vitriol. Neither has ever been seen in the wild, because neither has been released to the public. Meanwhile, our team is preparing to demonstrate at Black Hat this year that hypervisor malware is actually even easier to detect than the kernel malware operating systems like Vista are already exposed to.
Joanna's Blue Pill work, along with all the rest of her work (check out this project [matasano.com], where she turns AMD security hardware against forensics devices), is top-notch. In a weird, secretive space like security, this is how science gets done. Joanna chooses a side: it's possible to make undetectable malware. We square off on the opposite side. Then we debate it using code, presentations, papers, and I guess Slashdot stories. Hopefully, in the end, we all learn something.
Hope this stays interesting for everyone. Thanks for paying attention!
Re: (Score:2)
I see a ton of research teams contradicting each other on a daily basis online and often they take things very personally. It brings me a rare bit of optimism to see two tea
Re: (Score:3, Interesting)
Re: (Score:2)
"We would expect an industry standard fee for this work, which we estimate to be $200 USD per hour per person." I have never heard of a programmer being paied 200$ an hour... Perhaps I should have stayed in Computer Engineering rather than switch to Electrical?
<shrug> I'm often billed out at more than $200 per hour as a programmer skilled in security. My employer keeps most of that, of course. Were I working freelance I couldn't bill that much, but I could easily get $100, and I'm nowhere near as good as Rutkowska and her colleagues. My company has plenty of people that are in her league, and they bill out at over $400 per hour.
Security engineering and research is a fairly well-compensated field, because it takes a certain kind of person and it requi
Virii and RootKits (Score:5, Interesting)
The last machine I worked on actually had 'new' virii on them, which went off to AVira and Norton as a 'new' virus and was included in the next days updates. Insane.
My brother in law wants a new computer because he no longer trusts his disk - it's been infected so many times that he figures it's easier to get a new system (I've reimaged it several times to fix the problems). I keep pointing out that it only takes one infection to get ruin the new computer, but he's adamant
Why can't we just get along...
(and don't tell me to put Ubuntu on peoples laptops...)
Re: (Score:2)
Put Kubuntu on these people's laptops.
Pfft. As if I would (Score:2)
HTH
Drinking cocoa (Score:3, Funny)
The doctor, shocked at the condition of his new patient's eye, runs a gamut of tests, ruling out allergies or other clinical issues. Thinking the issue may be psychosomatic, he sits his patient at a table on which rests a tin of cocoa mix, a thermos of hot water, a cup, and a spoon. He invites the gentleman to mix up the cocoa and take a sip.
The man po
Re: (Score:2)
or long enough to know it's Viruses.
Why don't you set their machine up correctly?
The only virus I have even had on my windows machines was one I compiled myself when I did security work.
Yes, I scan my system regularly.
Yes, I monitor my connection.
Yes, I have a router and firewall separate from my machines.
Also, my family isn't stupid, so when I explained the issues with email and links and banners, they starting usin
Re: (Score:2)
I do instruct with proper firewalls, etc, but if they don't listen... and they now run nearly a dozen apps to keep the systems clean. Sounds like Over kill to me, b
A better strategy for Rutkowska (Score:4, Interesting)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
OT: Slashdot IT slogan (Score:2)
Debunking Blue Pill myth (Score:5, Informative)
Debunking Blue Pill myth [virtualization.info]
Blue Pill and Windows? (Score:2)
A Duck (Score:5, Funny)
which means that (Score:5, Funny)
If Blue pill was true (Score:2, Insightful)
Just use Computer Forensics! (Score:2)
Malware (Score:2)
Current climate... (Score:2)
they should give her the software first (Score:2, Interesting)
If it's something new, they should give her a change to play with it first.
Re:Rutkowska is such a babe. (Score:5, Informative)
Re: (Score:2)
it's creepy shit like this that makes me love slashdot.
Re: (Score:3, Insightful)
I don't disagree with her theory, but in pra