Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Sony, Rootkits and Digital Rights Management Gone Too Far
Mark's Sysinternals ^ | Monday, October 31, 2005 | Mark's Sysinternals

Posted on 10/31/2005 7:59:57 PM PST by zeugma

From slashdot.org article:
"SysInternals.com guru Mark Russinovich has a detailed investigation of a rootkit from Sony Music. It's installed with a DRM-encumbered music CD, Van Zant's "Get Right with the Man". (Mmmm, delicious irony!) The rootkit introduces several security holes into the system that could be exploited by others, such as hiding any executable file that starts with '$sys$'. Russinovich also identifies several programming bugs in the method it uses to hook system calls, and chronicles the painful steps he had to take to 'exorcise the daemon' from his system."

Last week when I was testing the latest version of RootkitRevealer (RKR) I ran a scan on one of my systems and was shocked to see evidence of a rootkit. Rootkits are cloaking technologies that hide files, Registry keys, and other system objects from diagnostic and security software, and they are usually employed by malware attempting to keep their implementation hidden (see my “Unearthing Rootkits” article from the June issue of Windows IT Pro Magazine for more information on rootkits). The RKR results window reported a hidden directory, several hidden device drivers, and a hidden application:


TOPICS: Business/Economy; Culture/Society; News/Current Events; Technical
KEYWORDS: drm; malware; privacy; privacylist; rootkit; sony; windows
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-88 next last
To: Golden Eagle

Nope. No "standardized" system for committing computer crime.


41 posted on 11/01/2005 12:42:56 PM PST by steve-b (A desire not to butt into other people's business is eighty percent of all human wisdom)
[ Post Reply | Private Reply | To 29 | View Replies]

Mark


42 posted on 11/01/2005 1:04:21 PM PST by Jack of all Trades (Never underestimate the speed in which the thin veneer of civilization can be stripped away.)
[ Post Reply | Private Reply | To 1 | View Replies]

This is quite an eye-opening link. Even for those not intimately aware of your OS's inner workings (98% of us, I'd guess)it is absolutely fascinating....and something someone posted below the tech jargon and screengrabs is also quite interesting. Seems it is a UK firm that came up with this particular DRM scheme and from what a friend in the UK tells me, it is quite illegal....

"First4Internet, eh?... let's see... according to public records, they were incorporated 24/11/1999. In 2004 they had a turnover of £709,941 and operating expenses of £1,301,546 -- meaning an operating loss of £591,605. In the last five years they have, on average, lost £541,067 a year. For 2004, their credit rating is "HIGH RISK" (complete with capitalisation). Meanwhile, the four directors share annual renumeration of £224,413 between them (average £56,103 each).

One of the directors, Nicholas Bingham, (appointed in 2002) was director of "Sony pictures home entertainment Ltd." from 1989 to 1997, and director of "Sony pictures television production UK Ltd." from 1996 to 2000, and director of "Sony digital radio europe Ltd." from 1994 to 2000.

A cynic might say Sony selected this inept copy protection technology because it was supplied by one of thier cronies. The reason this is a bad business practice can be seen by the software's many failings.

# posted by Michael Tandy : 3:20 AM, November 01, 2005


43 posted on 11/01/2005 1:37:37 PM PST by Range Rover (Kerry is STILL a Fraud...Rather is the Court Jester)
[ Post Reply | Private Reply | To 42 | View Replies]

To: zeugma

Sysinternals is a magnificent site. I love their free utilities.

This is a great catch by Russinovich. Having just installed a Sony version of Nero for a DVD burner, I wonder if I also installed this spyware. Probably not, but I'll check.

This seems similar to the recent discovery that many color laser printer manufacturers covertly install software that prints tiny yellow dots on every printout, that can be used to identify the exact printer used.

I'm not big on government regulation, but maybe this sort of thing should be illegal, if it is not already.


44 posted on 11/01/2005 3:18:11 PM PST by TChad
[ Post Reply | Private Reply | To 1 | View Replies]

To: TChad

I should not have said "install software" above. The code is in the printer firmware.


45 posted on 11/01/2005 3:19:28 PM PST by TChad
[ Post Reply | Private Reply | To 44 | View Replies]

To: monkapotamus
Those are some awesome tools!

/nerdhug
46 posted on 11/01/2005 3:21:31 PM PST by KoRn
[ Post Reply | Private Reply | To 37 | View Replies]

To: All

bump


47 posted on 11/02/2005 5:54:24 AM PST by monkapotamus
[ Post Reply | Private Reply | To 46 | View Replies]

To: zeugma

Question: How can I look at any given person's machine and know if this rootkit is loaded.

Without running Rootkit Revealer that is.


48 posted on 11/02/2005 6:42:50 AM PST by AppyPappy (If you aren't part of the solution, there is good money to be made prolonging the problem.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TChad

The yellow dots are there at the request of the government.


49 posted on 11/02/2005 6:49:59 AM PST by Born to Conserve
[ Post Reply | Private Reply | To 45 | View Replies]

To: zeugma; Dan Nunn; Iconoclast2; ShadowAce; monkapotamus; All
You might be interested in another overreach by the "content" industry -- see Hollywood After The Anal. Hole Again.
50 posted on 11/02/2005 7:03:49 AM PST by steve-b (A desire not to butt into other people's business is eighty percent of all human wisdom)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma; Dan Nunn; Iconoclast2; ShadowAce; monkapotamus; All
Also, see this Washington Post story, which confirms that Sony's cracking scheme effectively disables the security on the victim's computer, leaving a wide-open hole for other comptuer criminals.

Really, some Sony executives need to join Billy Bob's cellblock harem for this.

51 posted on 11/02/2005 7:19:46 AM PST by steve-b (A desire not to butt into other people's business is eighty percent of all human wisdom)
[ Post Reply | Private Reply | To 50 | View Replies]

To: AppyPappy
I don't know that there is a way to tell without some serious digging. The article was written by a fellow who knows more about windows than just about anyone on the planet, and he had do do some serious digging to find it.

Of course, now that he has told us what to look for, it makes things a lot easier for us. I'd strongly recommend getting a knoppix boot disk and use that to look for directories or files that start with “$sys$”. That's the easiest thing you can do IMO, though I can't really call myself any kind of windows guru anymore because I avoid it like the plague.

Automated tools to find this particular corporate back door are going to be moderately problematic, as the rootkit hides itself by modifying windows APIs. You have to be able to boot from a known good kernel to check things out. Virus scanners aren't going to be able to do this unless they load before the targeted APIs.

Simple solution: dump windows. Unfortunately, that's the only way to be reasonably safe from this stuff.

52 posted on 11/02/2005 7:35:01 AM PST by zeugma (Warning: Self-referential object does not reference itself.)
[ Post Reply | Private Reply | To 48 | View Replies]

To: AppyPappy
I just thought of a really easy way to determine if this rootkit is installed on your computer.
  1. Open a command prompt
  2. enter the following:
    echo "test" > $sys$test 
    dir
    
  3. If the file shows up in the directory listing, you haven't been hit by this. (yet) If it ain't there, you've been rooted by Sony/BMG.
  4. to delete the file...
    del $sys$test

53 posted on 11/02/2005 8:05:29 AM PST by zeugma (Warning: Self-referential object does not reference itself.)
[ Post Reply | Private Reply | To 48 | View Replies]

To: Golden Eagle
Buy a CD, play it on your computer, get p0wned.

Download the same MP3's from Usenet after they've been unDRM'd, your PC stays safe.

Ever heard of the concept of "negative reinforcement?"

54 posted on 11/02/2005 8:18:01 AM PST by Uncle Fud (Imagine the President calling fascism a "religion of peace" in 1942)
[ Post Reply | Private Reply | To 29 | View Replies]

To: zeugma

I saw the file. If I hide the file and make it read-only, does that protect me from this infestation? That works pretty well with most virus files.


55 posted on 11/02/2005 8:18:14 AM PST by AppyPappy (If you aren't part of the solution, there is good money to be made prolonging the problem.)
[ Post Reply | Private Reply | To 53 | View Replies]

To: zeugma
Perhaps it is time for the anti-Microsoft crowd to wake up and realize that any OS can be compromised if the user gives permission.

Nearly all modern malware is installed with user permission. The trick is to lure users into giving it. If UNIX based systems offer a lucrative target, then effort will be made to attack these systems.
56 posted on 11/02/2005 8:22:53 AM PST by js1138 (Great is the power of steady misrepresentation.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: AppyPappy
If I hide the file and make it read-only, does that protect me from this infestation?

I don't believe so. The solution at the moment, is to just not purchase or play any CD from Sony/BMG. That's my recommendation anyway.

57 posted on 11/02/2005 8:42:10 AM PST by zeugma (Warning: Self-referential object does not reference itself.)
[ Post Reply | Private Reply | To 55 | View Replies]

To: js1138
Perhaps it is time for the anti-Microsoft crowd to wake up and realize that any OS can be compromised if the user gives permission.

It's a little bit more obvious to the user when a program to be installed requires the root password to install than it is on windows, which will happily run off and do any and all kinds of hidden and potentially nasty things on your PC when you select "yes" to install.

I wouldn't have much of a problem installing most software in user-space as it couldn't make changes to the base operating system. About the worst thing it could do to me is trash my files. I do regular backups so I am less concerned about that. I have a bunch of programs here that I installed as a local user because I wanted to see if they are worthwhile.

The problem in windows land is that there are too many programs out there written in such a (stooopid) way that they require Admin privs to run. This causes many, if not the vast majority of windows users (especially on home boxes) to run with administrative priviledges. Bad idea, but most are blissfully unaware of the danger.

OTOH, with Linux, I have a few programs that give really bold warnings every time you start them if you are running as root, and point out what a stupid idea it is to do it. Very few user programs need to run as root, thankfully, because unix developers have always known it is a bad idea.

58 posted on 11/02/2005 8:53:55 AM PST by zeugma (Warning: Self-referential object does not reference itself.)
[ Post Reply | Private Reply | To 56 | View Replies]

To: zeugma
It's a little bit more obvious to the user when a program to be installed requires the root password to install than it is on windows...

Windows allows non-administrator accounts. This will become more user friendly in the next version of Windows, which will allow non-administrators to install programs for their own use, without touching the main registry. Non-admins who install programs will get a private programs folder and a private copy of the registry.

Perhaps something like this should have been done years ago, but MS has been obsessed with making Windows work with legacy programs. I have programs from 1982 that still run on XP.

59 posted on 11/02/2005 9:37:01 AM PST by js1138 (Great is the power of steady misrepresentation.)
[ Post Reply | Private Reply | To 58 | View Replies]

To: Born to Conserve
The yellow dots are there at the request of the government.

Right. The code was installed by private companies in their products at the request of the government, without disclosure to their customers. So what is hidden in Windows at the request of the government? What is hidden in applications? These no longer sound like paranoid questions.

60 posted on 11/02/2005 9:59:45 AM PST by TChad
[ Post Reply | Private Reply | To 49 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-88 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson