Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Rootkit writers outfox Windows 64-bit PatchGuard protection
ITWorld.Com ^ | 5-26-11

Posted on 05/27/2011 8:22:35 AM PDT by Tribune7

Rootkit writers have started exploiting a loophole that lets them write malware able to bypass the PatchGuard driver signing protection built into 64-bit versions of Windows, Kaspersky Lab has reported.

A product of the BlackHole Exploit Kit, a hugely successful kit for building malware to hit specific software vulnerabilities, the first element of the attack on a system is straightforward enough, using a downloader to hit the system through two common Java and Adobe Reader software flaws.

On 64-bit Windows systems open to these exploits, this calls a 64-bit rootkit, Rootkit.Win64.Necurs.a., which executes the 'bcdedit.exe -set TESTSIGNING ON command, normally a programming command for trying out drivers during development.

The loophole abused by the malware writers is that this stops Windows' Patchguard from objecting to the unsigned and insecure nature of the driver (in this case a rootkit driver) being loaded.

(Excerpt) Read more at itworld.com ...


TOPICS: Business/Economy; Culture/Society; News/Current Events
KEYWORDS: blackholeexploitkit; driversigning; malware; microsoft; patchguard; rootkit; security; windows
Navigation: use the links below to view more comments.
first 1-2021-31 next last

1 posted on 05/27/2011 8:22:37 AM PDT by Tribune7
[ Post Reply | Private Reply | View Replies]

To: Swordmaker; ShadowAce

ping


2 posted on 05/27/2011 8:23:18 AM PDT by Tribune7 (We're flat broke, but he thinks these solar shingles and really fast trains will magically save us.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: for-q-clinton

Since you seem to be in a virii mood today. :-)


3 posted on 05/27/2011 8:24:30 AM PDT by Tribune7 (We're flat broke, but he thinks these solar shingles and really fast trains will magically save us.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Tribune7

JAVA, Adobe, and Flash seem to be the biggest vulnerabilities out there, aside from user ignorance.


4 posted on 05/27/2011 8:34:07 AM PDT by Ingtar (Together we go broke (from a Pookie18 post))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Tribune7; rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

5 posted on 05/27/2011 8:35:22 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Tribune7

You are just mean./snicker


6 posted on 05/27/2011 8:38:09 AM PDT by LearnsFromMistakes (How many failed apocalypse predictions is Harold Camping away from getting his Nobel Prize?)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Tribune7

good intel. Glad I’m security aware. But if this was OSX with this attack they’d say it doesn’t count because it requires a 3rd party application to expose it. And a user has to be on the machine and click on something.

See how stupid that sounds?


7 posted on 05/27/2011 8:49:19 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 3 | View Replies]

To: for-q-clinton

Only stupid if it wasn’t the truth. Mac users don’t need to click on “something”, they need to click on the installer of the malware.

Mac users do not click on something in Adobe and, “Voilia!” a trojan is installed. I know you get your rocks off an this stuff, but you are still voluntarily ignorant of the facts.


8 posted on 05/27/2011 8:55:46 AM PDT by Wright Wing
[ Post Reply | Private Reply | To 7 | View Replies]

To: LearnsFromMistakes; Tribune7
I wonder why this was left out of the original post, but is in the article? Hurts don't it :-)

As an aside, Kaspersky reports that the malware also attempts to download Hoax.OSX.Defma.f, a recent and well-publicised fake antivirus program targeting Mac OS X users, which can't run on Windows.

"It appears that the developers of the latest rogue AV program for MacOS are actively distributing it via intermediaries, who don't really understand what it is they are supposed to install on users' computers," said Kaspersky researcher, Vyacheslav Zakorzhevsky, in his blog covering the malware.

This underlines the ominous way that Macs are now seen as just another platform to be targeted where possible using multi-platform malware.

9 posted on 05/27/2011 8:59:35 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Tribune7

It seems the 64 bit update had to be reinstalled for some reason.

My VIPRE antivirus seems to work pretty well.

What do y’all suggest to insure against this nastiness?


10 posted on 05/27/2011 9:00:08 AM PDT by Quix (Times are a changin' INSURE you have believed in your heart & confessed Jesus as Lord Come NtheFlesh)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Wright Wing

Huh? The installer auto runs. But you’re arguing it’s good to have a trojan install without a user password?

Wow, really? Before it was this is impossible on Macs, now the macbot crowd is claiming the viruses on Mac aren’t as bad as the viruses on Windows because Windows requires a 3rd party exploit and the Mac requires only exploiting Safari an Apple program. Now that is lame.

Oh and 4 years in a row OSX was the first one hacked at a hacking competition (pwn2own). I guess they aren’t secure at all.


11 posted on 05/27/2011 9:03:23 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Quix
What do y’all suggest to insure against this nastiness?

Nuking Russia and Pakistan would be the most effective move
12 posted on 05/27/2011 9:03:29 AM PDT by Buckeye McFrog
[ Post Reply | Private Reply | To 10 | View Replies]

To: Buckeye McFrog

LOL.

Sigh.


13 posted on 05/27/2011 9:06:58 AM PDT by Quix (Times are a changin' INSURE you have believed in your heart & confessed Jesus as Lord Come NtheFlesh)
[ Post Reply | Private Reply | To 12 | View Replies]

To: LearnsFromMistakes

On the OSX virus thread you said it doesn’t count because it was reported from an anti-virus software company. Well by that stupid logic this one doesn’t count either since it’s from Kapersky Labs.


14 posted on 05/27/2011 9:12:14 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Ingtar

I’m quite amused at how many popups I get on boot of my Win7 machines for updates to those very same products almost weekly now. Whereas on my Linux boxes, I don’t get anything popping up (no autostart) and can control my package installs when it’s time.

M$, with all of its warts, is still the most common OS distributor and will continue to be exploited by those who wish to steal from the unwitting. A proper mindset on the web along with a comprehensive knowledge of the programs installed on your machine should help to identify any rogue programs trying to make your life Hell.

Of course, with Linux, I do my dirtiest work and save my Win7 machine solely for gaming.


15 posted on 05/27/2011 9:20:50 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: for-q-clinton

Nope. It’s not good to have an installer run without a password. Thing is, how many administrator accounts are set up without passwords. Neither situation good and Apple needs to fix the workaround to that.

Either way, the user still has to manually install an app loader and go through the steps of installing it.


16 posted on 05/27/2011 10:20:17 AM PDT by Wright Wing
[ Post Reply | Private Reply | To 11 | View Replies]

To: for-q-clinton
The article is about a rootkit for Windows -- including 7.

The Mac part is, as noted in the article, "an aside" to indicate that black hatters don't necessarily know what they are doing.

When a rootkit inserted via Adobe Reader is developed for OSX then you can start crowing.

BTW, I don't discount the possibility but it hasn't come close to happening yet.

17 posted on 05/27/2011 10:43:17 AM PDT by Tribune7 (We're flat broke, but he thinks these solar shingles and really fast trains will magically save us.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: LearnsFromMistakes

Yeah :-)


18 posted on 05/27/2011 10:44:22 AM PDT by Tribune7 (We're flat broke, but he thinks these solar shingles and really fast trains will magically save us.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Tribune7

No this article is about 2 things. The title is just about one of those two issues.

Try reading the ENTIRE article. And if you’re going for the it doesn’t count until it happens defense...watch out. Recently Apple got the first malware that didn’t require an admin password to install.

Apple would be wise to start educating their users on security instead of acting like they can ignore it and they will be safe because they are using an apple product.


19 posted on 05/27/2011 11:00:21 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 17 | View Replies]

To: for-q-clinton
What part of the article did I miss, and are you saying that we should count something that hasn't happened?

7, far newer than OSX and despite its vaunted security, has got rootkits.

This has yet to happen to OSX. The worst that involves OSX so far is a socially engineered phishing scheme that involves a user knowingly installing an application, not simply clicking on a pdf file or photo or webgame etc.

20 posted on 05/27/2011 11:20:54 AM PDT by Tribune7 (We're flat broke, but he thinks these solar shingles and really fast trains will magically save us.)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-31 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson