Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

'Blue Pill' Prototype Creates 100% Undetectable Malware
PC Magazine (excerpt) ^ | June 28, 2006 | Ryan Naraine

Posted on 06/28/2006 7:35:03 PM PDT by HAL9000

Excerpt -

A security researcher with expertise in rootkits has created a working prototype of new technology that is capable of creating malware that remains "100 percent undetectable," even on Windows Vista x64 systems.

Joanna Rutkowska, a stealth malware researcher at Singapore-based IT security firm COSEINC, says the new Blue Pill concept uses AMD's SVM/Pacifica virtualization technology to create an ultra-thin hypervisor that takes complete control of the underlying operating system.

Rutkowska plans to discuss the idea and demonstrate a working prototype for Windows Vista x64 at the end at the SyScan Conference in Singapore on July 21 and at the Black Hat Briefings in Las Vegas on August 3.

The Black Hat presentation will occur on the same day Microsoft is scheduled to show off some of the key security features and functionality being fitted into Vista.

Rutkowska said the presentation will deal with a "generic method" of inserting arbitrary code into the Vista Beta 2 kernel (x64 edition) without relying on any implementation bug.

~ snip ~


(Excerpt) Read more at news.yahoo.com ...


TOPICS:
KEYWORDS: blackhats; bluepill; coseinc; hackers; hypervisor; lowqualitycrap; malware; microsoft; rootkit; rootkits; spyware; stealth; stealthmalware; virus; viruses; vista; windows; windowsvista; worm; worms
Navigation: use the links below to view more comments.
first 1-2021-33 next last

1 posted on 06/28/2006 7:35:08 PM PDT by HAL9000
[ Post Reply | Private Reply | View Replies]

To: HAL9000

That's nice. The arms race continues.


2 posted on 06/28/2006 7:37:32 PM PDT by Perdogg
[ Post Reply | Private Reply | To 1 | View Replies]

To: Perdogg

Skynet IS the virus!


3 posted on 06/28/2006 7:38:32 PM PDT by rintense
[ Post Reply | Private Reply | To 2 | View Replies]

To: HAL9000

I wonder if the same people who write anti viral code are the same people who create the virus. LOL!


4 posted on 06/28/2006 7:38:58 PM PDT by Perdogg
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000

For a second I thought this was another Rush Limbaugh article.


5 posted on 06/28/2006 7:53:48 PM PDT by GnL
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
If this is stored on the hard drive, boot from a CD, and find it sitting unexecuted on the hard drive.

What do I win?

6 posted on 06/28/2006 7:54:12 PM PDT by InMemoriam
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000

The creators of malignant computer viruses need some serious jail time.


7 posted on 06/28/2006 7:57:49 PM PDT by TheLion
[ Post Reply | Private Reply | To 1 | View Replies]

To: TheLion

Wrong!

These cretins need to be taken out behind the courthouse -- after being tried and convicted by a jury, of course -- and SHOT!!!

Nahhhhh. Forget the part about the jury. Just shoot the sumbitches.


8 posted on 06/28/2006 8:03:31 PM PDT by Dick Bachert
[ Post Reply | Private Reply | To 7 | View Replies]

To: Dick Bachert

I have an HP with a divided hard drive (forgot the term). Anyway, I was recently suffering some kind of worm which my antivir program couldn't even solve. Eventually the system locked down and was not functunal. They are now disabling the protection.

Anyway I was able to restore the complete system by selecting "restore" on booting with the program that came with the system. It takes a while but was well worth it. I was amazed and congradulate HP.

The only small problem is that it rewrites windows and critical files. Games and stuff will not have the ini file in windows. No big deal really, compared to trying to get rid of the malware.


9 posted on 06/28/2006 8:10:51 PM PDT by TheLion
[ Post Reply | Private Reply | To 8 | View Replies]

To: TheLion

I say we jail them and set them to work curing cancer, once they cure cancer we will free them.


10 posted on 06/28/2006 8:12:43 PM PDT by Ainast
[ Post Reply | Private Reply | To 7 | View Replies]

To: Dick Bachert

Partitioned was the term I was looking for....it always comes to you....sometimes the next day!


11 posted on 06/28/2006 8:30:02 PM PDT by TheLion
[ Post Reply | Private Reply | To 8 | View Replies]

To: Ainast

Since they are announcing themselves in advance, I'd say, someone ought to go to work!


12 posted on 06/28/2006 8:31:37 PM PDT by TheLion
[ Post Reply | Private Reply | To 10 | View Replies]

Comment #13 Removed by Moderator

To: HAL9000

I hate those ultra-thin hypervisors.


14 posted on 06/28/2006 8:55:28 PM PDT by Theo
[ Post Reply | Private Reply | To 1 | View Replies]

To: Theo

Microsoft: Vista Most Secure OS Ever


15 posted on 06/28/2006 9:07:42 PM PDT by Neidermeyer
[ Post Reply | Private Reply | To 14 | View Replies]

To: Dick Bachert

The geeks and hackers are the only reason we have anything remotely like functional security. The holes, hacks and exploits they discover and sometimes drive us crazy with are already there in the software. They did not create them they only discovered them. Black Hats, White Hats and even the Script Kiddies have done more to improve security, the programs, operating systems and hardware you own than anyone will ever acknowledge.

They are a pain but they have in most cases brought about improvements, reform and change where none would have occurred.

It was a White Hat that discovered the Sony Root kit Spy ware Hack that automatically installed when people simply played Sony music disks on their computer. At the time he was hunting for Black Hat Exploits. It was the Black hats who wrote a script to exploit that Corporate Hack and give them control of your computer. Had the Black Hats not written the exploit and there would have been no basis for damages in the class action suit against Sony installing Spy ware on peoples computers. Instead Sony was forced to remove the Root Kit or disable it ( in many cases it cannot be removed without wreaking the operating system of your computer and requiring a completer reinstall of the operating system). Sony also was required to pay fines and compensate everyone who purchased one of Music CDs that had the Spy ware Root kit Installed. Sony now must now cope with a public sees them as an unethical bunch of slugs. Further other companies will think long and hard about installing commercial hacks on the people’s computers. Need more evidence? Microsoft is already backpedaling over it's operating system "Genuine Advantage" anti piracy program checking in and registering your hard drive serial number, CPU and a number of other metrics every time you log on.

Like Yin and Yang Black Hats and White Hats keep each other and Corporations most egregious wrongs in check.


W


16 posted on 06/28/2006 9:24:29 PM PDT by WLR ("fugit impius nemine persequente iustus autem quasi leo confidens absque terrore erit")
[ Post Reply | Private Reply | To 8 | View Replies]

To: Perdogg
That's nice. The arms race continues.

''''''''''''''''''''''''''''''''''''''''''''''''''''''

With Vista due out ,I wonder if this story is put out there by someone short selling Microsoft stock and who would benefit by many stockholders selling on some bad news?
17 posted on 06/28/2006 9:28:34 PM PDT by photodawg
[ Post Reply | Private Reply | To 2 | View Replies]

To: 1234; 6SJ7; Action-America; af_vet_rr; afnamvet; Alexander Rubin; anonymous_user; ...
"Rutkowska stressed that the Blue Pill technology does not rely on any bug of the underlying operating system. "I have implemented a working prototype for Vista x64, but I see no reasons why it should not be possible to port it to other operating systems, like Linux or BSD which can be run on x64 platform," she added.

FreeBSD (OS X) could be vulnerable... PING!

If you want on or off the Mac Ping List, Freepmail me.

18 posted on 06/28/2006 9:33:17 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!")
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000

If it cannot be detected, the prevention of the RESULTS of occupation of your system by this malware will be the primary thrust. Outgoing Firewalls will become much more important.


19 posted on 06/28/2006 9:35:49 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!")
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000

We need to start identifying the authors of such malware as international economic terrorists and treat them as such.


20 posted on 06/28/2006 9:37:29 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!")
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-33 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson