Another Sony Rootkit? 317
An anonymous reader writes to tell us F-Secure is reporting that the drivers for Sony Microvault USB sticks uses rootkit techniques to hide a directory from the Windows API. "This USB stick with rootkit-like behavior is closely related to the Sony BMG case. First of all, it is another case where rootkit-like cloaking is ill advisedly used in commercial software. Also, the USB sticks we ordered are products of the same company — Sony Corporation. The Sony MicroVault USM-F fingerprint reader software that comes with the USB stick installs a driver that is hiding a directory under "c:\windows\". So, when enumerating files and subdirectories in the Windows directory, the directory and files inside it are not visible through Windows API. If you know the name of the directory, it is e.g. possible to enter the hidden directory using Command Prompt and it is possible to create new hidden files. There are also ways to run files from this directory. Files in this directory are also hidden from some antivirus scanners (as with the Sony BMG DRM case) — depending on the techniques employed by the antivirus software. It is therefore technically possible for malware to use the hidden directory as a hiding place."
Sony (Score:5, Interesting)
Re:Sony (Score:5, Interesting)
Re:Sony (Score:4, Funny)
So, are rootkits entertainment or technology?
Re:Sony (Score:5, Funny)
Re: (Score:3, Interesting)
Re:Sony (Score:4, Interesting)
MD disks were actually very successful across asia. They didn't find a market in North America. In the same span they have also created the 3.5 inch floppy, the CD, and had a bit of input on the DVD. It's be more accurate to describe their format strategies as being hit and miss since they have been part of some huge dogs (beta, UMD) and some very successful formats (CDs, 3.5 inch floppies).
Re:Sony (Score:5, Informative)
As to DVD - Not sure about the original DVD format, but Sony effectively created the recordable DVD format war with the + series of formats.
And yes, Sony had a role in VHS vs. Beta - Beta was Sony's format.
Re:Sony (Score:5, Informative)
Re:Sony/Phillips (Score:3, Informative)
Re:Sony (Score:4, Interesting)
Re: (Score:3, Informative)
Re: (Score:3, Funny)
Re:Sony (Score:5, Informative)
Re:Sony (Score:5, Interesting)
Since I was there, I pulled out a Sony camera I was trying to get a USB cable for. Again, no deal. This camera was North American Sony, and they didn't have those kinds of Sony cables in Japan.
Sigh. This insistence on ignoring standards and doing everything themselves - not even consistently across the world - bugs me like hell. I doubt I'll buy any more Sony consumer electronics until they get it. Hope they do - they know how to make nicely designed bits of technology.
Re: (Score:3, Informative)
Re:Sony (Score:4, Interesting)
I went there, but no luck. They do not sell laptops in Serbia (mine was brought from UK), so they gave me the telephone of one repair shop, but they were not sure if they could help me. Repair shop sent me to another repair shop, and so on... After three hops, they explained me what's the issue. Sony has very rigid standards for their repair shops. To be their certified repairmen, you have to guarantee that you'll solve all problems in 24 hours. They were not able to find anyone capable of that in Serbia, so they don't have any repair shop in Serbia.
That's very interesting policy. Instead to give second class service to your customers, you give them - none.
Comment removed (Score:4, Insightful)
Re: (Score:3, Insightful)
yeah they made some lemons too, but like any tech company, that actually tries to invent stuff.
Re: (Score:2, Informative)
Re: (Score:2)
Re: (Score:2, Interesting)
All it proves is that since you could get porn on VHS and you couldn't on Beta, people like porn, so they stuck with VHS.
Oversimplification (Score:3, Informative)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Re: (Score:2, Funny)
The proliferation of Windows and the proliferation of x86 processors is the ultimate proof of that statement.
Re:Sony (Score:5, Insightful)
Re:Sony (Score:5, Insightful)
Hype here notwithstanding, this is not a "rootkit". It seems to be a bizarre form of write-protection.
Re:Sony (Score:5, Informative)
Re:Sony (Score:5, Insightful)
Re: (Score:3, Informative)
Generally, yes. A virus could check for the existence of one of these rootkits, and abuse its hidden locations to hide itself. Which means that a virus can hide from even rootkit detectors in the shadow of "legitimate" software.
Re:Sony (Score:4, Informative)
Re: (Score:3, Insightful)
The trick here is it's cheap as shit. Doing it properly on the keychain costs money - you'll need
Re:A virus could put its files in the hidden folde (Score:4, Interesting)
%USERPROFILE%\Local Settings\Temporary Internet Files\Content.IE5
Or this one?
%USERPROFILE%\Local Settings\Temporary Internet Files\OLK6F
Maybe one this windows built in rootkit folder?
c:\$Extend
c:\$AttrDef
c:\$BadClus
c:\$Bitmap
c:\$Boot
c:\$LogFile
c:\$Secure
c:\$Volume
All which the handy SysInternals hides as "Standard NTFS Metadata Files" by default.
The existence of these files/folders are hidden to most users and most of them don't even know about them. You think virus scanners check the c:\$Extend folder? Is someone willing to drop in a known virus and see if it detects it? Honestly, I'm curious as to how many actually check this folder...
Re: (Score:3, Informative)
Yes, it is a rootkit. It's modifying the kernel space to hide directories from the user.
That's not what a rootkit [catb.org] [definition] does. It might be one part of what many rootkits do, but it's not the purpose of a rootkit.
The purpose of a rootkit is to let you get back in easily later, or once you're in, to let you get `root' easily. The Bioshock SecuROM thing *is* a rootkit -- the service it installs is there to let the SecuROM stuff run as a privileged account, and that's what rootkits do (it's also what things like `su' do.) But merely hiding a directory doesn't make it a rootkit. (It
Re:Sony (Score:4, Insightful)
Re:Sony (Score:4, Insightful)
Please note: this software simply creates a directory that is hidden from the Windows API for its fingerprint authentication. It's not actually a rootkit, just using one of the many tools of the trade of rootkits. The concern is that the hidden directory is hidden from all of the Windows API, including virus scanners, and thus could be used by malicious software to hide infected files.
I'm not sure that it's reasonable to accuse Sony of distributing a rootkit when they've simply distributed software which uses a technique that could accidentally help malicious software.
It's also probably a bad thing to keep swinging the rootkit-bat around like this. The next time some large corporation really tries to root all of their customers' machines, no one will believe the story.
Re:Sony (Score:5, Informative)
Please note the defenition of "rootkit," ripped from the beginning of the rootkit wikipedia article:
If it looks like a duck, quacks like a duck, yada yada yada.
Re: (Score:3, Insightful)
I'm almost tempted to buy one, just so that I can submit the software to clamav, symantec, mcafee, et. al.
It looks like a virus, quacks like a virus, and smells like a virus, lets treat it like a virus
If it looks like a duck... (Score:5, Funny)
Then lawyers for some large corporation will argue that it's actually some previously rare form of feathered marsupial?
Re:Sony (Score:5, Informative)
If it looks like a duck, quacks like a duck, yada yada yada.
We need to be more careful to cry wolf when there's, you know... a wolf. Otherwise, when some company decides to deploy a real rootkit again, no one is going to listen to us.
You're missing the point. (Score:5, Informative)
The intentions behind the software are irrelevant. The only thing that matters is what it does. What this software does is an end-run around the operating system, deliberately hiding things that should not and need not be hidden.
Why shouldn't it be hidden? Because as has already been pointed out, malicious software can take advantage of the rootkit—which is what this is—as an attack vector to control someone's machine without their knowledge, and with damn little they can do about it.
Please remember also that a lot of computer viruses and worms didn't start out with people saying, "I'm going to write a computer virus today!" They started out with someone saying, "Hmmm... I wonder if that would work..." and it goes from there. In fact, the guy who is credited with writing the first computer virus [slashdot.org] said, "It was a practical joke combined with a hack. A wonderful hack." Maybe, but it's stupid to deny what it was, a virus, just as it is to deny what this is, a rootkit.
Re: (Score:3, Informative)
The intentions behind the software are irrelevant. The only thing that matters is what it does.
Correct.
What this software does is an end-run around the operating system, deliberately hiding things that should not and need not be hidden.
Mostly True. I'm not sure I agree with "should not and need not," but I'll grant that they did it the wrong way. No question.
The bottom line is that this is not a rootkit. It's simply not. The term rootkit refers to a class of software that hides its existence from the OS, and this software does not do that. There's also the matter of the goal (you mentioned intent, but I think goals are more quantifiable and measurable). Rootkits have as their goal the subversion of system security. It doesn't ma
Re: (Score:3, Informative)
Rootkits have as their goal the subversion of system security
And that's exactly what this software is supposedly doing.
No. There's a difference between making a boneheaded security gaffe and subverting security. If you can't see the difference between the two, then I suppose this conversation is moot, and we'll have to declare every piece of Linux software a rootkit if it's ever had a security issue that wasn't just a bug, but a deliberate design choice that turned out to have security implications.
That said, I'm actually not sure that this is as much of a problem as F-Secure has claimed.
What the software is doing is creat
Re: (Score:3, Funny)
Long time passing
Where have all the rootkits gone?
Long, long ago
Sony picked them, every one.
When will they ever learn?
When will they ever learn.
Consider (Score:4, Insightful)
Re:Consider (Score:5, Insightful)
Re:Consider (Score:5, Insightful)
Hidden files (Score:5, Insightful)
Re: (Score:2)
Re:Hidden files (Score:5, Insightful)
Re: (Score:2)
However any old program can also do similar things by creating badly formated directory names. Rootk
Re: (Score:2)
>There are many files that employ the hidden property (like thumbs.db).
However, by clicking "Show Hidden Files and Directories" they are made visible. This, apparently, is not. This is not OK. It allows things to be hidden from scanners and from the owner of the machine, me. That makes it malware.Re:Hidden files (Score:5, Insightful)
And much like their last rootkit, this one can easily be used to cloak files on your system and is pretty much a fantastic place to put your virus. Way to really push the limits, guys.
Re:Hidden files (Score:5, Informative)
"A rootkit is a set of software tools intended to conceal running processes, files or system data from the operating system"
So, it sounds like a rootkit as described by wikipedia.
Wikipedia? (Score:5, Funny)
Not for long! *rushes to edit wikipedia*
"A rootkit is a set of software tools intended to conceal running processes, files or system data from the operating system, except when it's with Sony products"
There! Now by definition, sony's isn't a rootkit anymore!
(Legal Disclaimer: This was actually a joke, I didn't vandalize wikipedia or the like. <-- you can't never be too sure these days)
Re: (Score:3, Insightful)
Re: (Score:2, Informative)
Re:Hidden files (Score:5, Informative)
Format before use (Score:4, Interesting)
And using OS that won't run anything from the newly attached memry as a default would also help.
Re: (Score:2, Insightful)
Wait...
Re: (Score:2)
It might, but this is a biometric USB memory stick - it requires a fingerprint before you can access files.
Most of these devices do the fingerprint reading in software, so without it you may as well buy a normal memory stick and save a bit of money. (On a side note: has anyone seriously investigated how secure these biometric memory sticks are?).
And using OS that won't run anything from the newly attached memry as a default would also help.
Goo
Re: (Score:3, Informative)
Well, if it is anything like the ones for security doors that are being pushed as "unbeatable" on Homeland Security then yes. The Myth Busters did a whole thing on it and beat it not once, not twice, but ALL the tries they did.
http://www.youtube.com/watch?v=LA4Xx5Noxyo [youtube.com]
Re: (Score:3, Funny)
Come on man, I know mythbusters is cool and all, but whaaaaaaaaaaaaat
Re: (Score:2)
Is there a way to permanantly disable this? (Score:2)
Is there anything that would break if one was to find a way to nullify this functionality in OS calls?
Ryan Fenton
Re: (Score:2, Funny)
No. But, the universe would begin to unravel as Windows became more secure.
Yes. That flushing sound you hear is my karma going down the toilet.
Why? (Score:2, Insightful)
Re: (Score:2)
tsk tsk tsk... (Score:4, Insightful)
kiosk (Score:5, Insightful)
Re: (Score:3, Insightful)
Re: (Score:2)
It seems to me that you are making the classic mistake of saying "personal computers" when you really mean "computers running Microsoft Windows".
Re: (Score:3, Insightful)
I keep trying to convince my customers they'll pay me less money in the long run to do clean setups on new machines versus the time spent both uninstalling conflicting software they won't/can't use (ie, Symantec AV, PDF Complete, etc) and the problems they inevitably run into down the road when the factory installed crapware craps the machine out, requiring a clean load anyway.
I've pretty much quit gaming due to all the copy protection crap that gets installed with most modern games (and
Wow... (Score:5, Interesting)
This is also nothing new in terms of USB drives. I have a USB flash drive, which I can't remember the name of, that essentially keeps a secure partition hidden from Windows unless you run a special app to put in a password to make it visible to Windows.
Re: (Score:2)
Even if it turns out to be a misleading headline, I can live with Sony being vilified some more. I'd consider it appropriate collateral payback for their original rootkit foray.
Re: (Score:2)
Password protected hidden partitions don't patch OS function pointers and can't really be (ab)used by malware in the same way, so not the same thing.
Re:Wow..., double Wow. (Score:2)
Re: (Score:2)
Re: (Score:3, Insightful)
Everybody saying it is not a rootkit needs to define rootkit.
The example you used in your earlier post about partitions on memory sticks is completely different than what is happening here (the windows API is being modified to hide a directory on the c: drive)
Re: (Score:3, Informative)
Re: (Score:2)
Example: See Bioshock.
I'm really getting sick of this. Its like the C-class bloggers and clueless tech writers have discovered a magic word that gets them all the ad impressions they want, and techies dont seem to care as the exposure just lets them bitch and moan. Facts be damned.
Re: (Score:2)
Re:Wow... (Score:4, Insightful)
The intent is irrelevant w.r.t. the fact whether or not it uses rootkit-like behavior to implement it.
It is obvious that user fingerprints cannot be in a world writable file on the disk when we are talking about secure authentication.
This is why file access permissions/restrictions where invented in the 1970's.
That is a completely different technique at about 10 different levels. Of course the driver of some USB device may chose to reserve parts of the storage on said USB device for internal usage such that it cannot be (easily) accessed by normal means (i.e. the API offered by said driver). However, "cloaking" parts of the driver itself using rootkit-like mechanisms has, well, about nothing in common with such techniques.
Re: (Score:3, Insightful)
This is also nothing new in terms of USB drives. I have a USB flash drive, which I can't remember the name of, that essentially keeps a secure partition hidden from Windows unless you run a special app to put in a password to make it visible to Windows.
That's different. Windows can't "see" more than one partition on a USB flash drive... which is why the Disk Management MMC snap-in won't let you create more. If you make more than one partition Windows only mounts the first one it sees.
Of course this assumes you're talking about actual partitions. More likely you're confusing a virtual drive for a real partition; I'm thinking TrueCrypt [truecrypt.org], which is promoted by many as a way to keep files safe and encrypted on your thumb drive. You enter a password and
A Nasty Trick (Score:5, Interesting)
So whenever he ran a common command from his shell, he would first get a random quote from fortune appearing, followed by normal command output. He figured it out pretty quickly, but I like to think that there were a few moments where he entertained the idea of his workstation gaining sentience.
Re: (Score:2, Insightful)
Re: (Score:3, Funny)
echo sleep 1 >>$HOME/.bash_profile
to their
SUCKERS! What did you expect? (Score:2, Insightful)
How fucking stupid can you people be? Stop buying Sony! [mcgrew.info]
-mcgrew
what a bunch of weasels (Score:3, Insightful)
the classy term is "recidivist."
of the others, we can probably safely post "weasel," "snake," "bastard," "crook," and "lowlife."
HDTV is around the bend, and I'm remodelling the basement soon to accomodate its new wiring requirements. Sony, the snake-in-a-box company, is not going to be a part of this undertaking.
Desensitized (Score:5, Interesting)
Not an Accident (Score:2)
Last straw for me... (Score:3, Interesting)
I imagine though, that an outburst of uncontrollable laughter from my boss while telling him about this is a sign of job security.
Is there an anti-rootkit utility that would be updated/recent enough to facilitate this infection? Or the fact that I can view it from command line mean that I can remove it manually from there? I don't have to worry about re-infection because I already threw 2 of them straight in the trash, no use even giving them to a friend.....
But it doesn't work for security, either! (Score:3, Insightful)
I just plain isn't good security. If they're really counting on Registry entries to "protect" the "secure" data, there must be a thousand ways to get around that in Windows, let along just plugging it into a Linux machine. Real security is HARD to do, and promoting something like this as "secure" when it really isn't is a disservice. I read one review a while back that indicated that *none* of these "secure USB" flash plugins were really secure.
Incidentally, I have a USB flash plugin. The data I really care about is AES-encrypted in a container file that I can loopback mount and use the kernel crypto stuff to access.
A propos... (Score:3, Funny)
Karma Abuse Poetry (Score:3, Funny)
Well the Devil had a brand new plan,
"I don't want any ordinary DRM!"
So he called his boys at Sony Corp,
"I'll make this fast and I'll make it short."
"There's a Limey company, as evil as hell,
They've got a rootkit they're waiting to sell.
So grab some cash, make it quick,
There's a half million networks we just gotta fix."
Now Sony knew the Devil well,
Why these guys were already half way to Hell.
So off they went to England fair,
And bought themselves a rootkit there.
To protect themselves and their evil scheme,
They wrote a EULA that would make you scream.
"No problem," they said, "we can do as we please,
We're all scummy bastards, so what's some more sleaze?"
But not all were asleep when they played Van Zant,
And the racket grew so loud Sony just had to recant.
"We'll take back all those discs, we really were wrong,
Oh, and you Mac users, your turn's coming before long."
You can't solve this on a single system. (Score:4, Insightful)
This is an inherent problem in biometrics: you have to trust every scanner that takes a reading not to be trapdoored.
The entire authentication process has to be performed verifiably in the scanner hardware and firmware, and the scanner itself had to be trusted - either it's your scanner or it belongs to someone you have to trust anyway.
But no reversible form of the biometric information can be transferred to potentially untrusted storage.
Re:Rootkits aside... (Score:5, Insightful)
How is this *NOT* a rootkit? This is the very definition of one!
Re: (Score:3, Informative)
Example: Daemon Tools, a popular virtual drive program, uses rootkit-esque behavior to hide its drivers from the various game copy protections it aims to defeat. It's a rootkit for a legitimate purpose. This is not.
It's a malicious driver attempting to hide things from the user without their consent. QED.
Re:This article is retarded (Score:5, Informative)
F-Secure is from Finland. You try writing Finnish some time.
My "Windows API" as this article calls Explorer, is already set to view hidden folders.
Turn in your geek card at the door when you leave.
This is a driver that patches the Windows APIs in order to hide a directory. It will not show in Explorer or in any other program for that matter, even if Explorer is set to show 'hidden files'. Rootkit hunters like Blacklight and Rootkit Revealer do not flag regular 'hidden directories'. They read and parse the raw on-disk directory structure (that is, they have their own NTFS parser) and compare that to what the Windows FS API reports.
Re:This article is retarded (Score:5, Informative)
They are patching 2 API functions, FindFirstFile() and FindNextFile(), not to report the presence of a directory. They are doing this by loading a malicious *DRIVER*.
This is quite different than simply toggling a flag for a given directory.