Author Topic: Sony installs Rootkits in DRM Software  (Read 2845 times)

0 Members and 1 Guest are viewing this topic.

Snowthrower

  • Guest
Sony installs Rootkits in DRM Software
« on: November 17, 2005, 08:08:02 pm »
This is an old story (about 1 week)

Quote
    It's a David and Goliath story of the tech blogs defeating a mega-corporation.

    On Oct. 31, Mark Russinovich broke the story in his blog: Sony BMG Music Entertainment distributed a copy-protection scheme with music CDs that secretly installed a rootkit on computers. This software tool is run without your knowledge or consent -- if it's loaded on your computer with a CD, a hacker can gain and maintain access to your system and you wouldn't know it.

    The Sony code modifies Windows so you can't tell it's there, a process called "cloaking" in the hacker world. It acts as spyware, surreptitiously sending information about you to Sony. And it can't be removed; trying to get rid of it damages Windows.

    This story was picked up by other blogs (including mine), followed by the computer press. Finally, the mainstream media took it up.

    The outcry was so great that on Nov. 11, Sony announced it was temporarily halting production of that copy-protection scheme. That still wasn't enough -- on Nov. 14 the company announced it was pulling copy-protected CDs from store shelves and offered to replace customers' infected CDs for free.

    But that's not the real story here.

    It's a tale of extreme hubris. Sony rolled out this incredibly invasive copy-protection scheme without ever publicly discussing its details, confident that its profits were worth modifying its customers' computers. When its actions were first discovered, Sony offered a "fix" that didn't remove the rootkit, just the cloaking.

    Sony claimed the rootkit didn't phone home when it did. On Nov. 4, Thomas Hesse, Sony BMG's president of global digital business, demonstrated the company's disdain for its customers when he said, "Most people don't even know what a rootkit is, so why should they care about it?" in an NPR interview. Even Sony's apology only admits that its rootkit "includes a feature that may make a user's computer susceptible to a virus written specifically to target the software."

    However, imperious corporate behavior is not the real story either.

    This drama is also about incompetence. Sony's latest rootkit-removal tool actually leaves a gaping vulnerability. And Sony's rootkit -- designed to stop copyright infringement -- itself may have infringed on copyright. As amazing as it might seem, the code seems to include an open-source MP3 encoder in violation of that library's license agreement. But even that is not the real story.

    It's an epic of class-action lawsuits in California and elsewhere, and the focus of criminal investigations. The rootkit has even been found on computers run by the Department of Defense, to the Department of Homeland Security's displeasure. While Sony could be prosecuted under U.S. cybercrime law, no one thinks it will be. And lawsuits are never the whole story.

    This saga is full of weird twists. Some pointed out how this sort of software would degrade the reliability of Windows. Someone created malicious code that used the rootkit to hide itself. A hacker used the rootkit to avoid the spyware of a popular game. And there were even calls for a worldwide Sony boycott. After all, if you can't trust Sony not to infect your computer when you buy its music CDs, can you trust it to sell you an uninfected computer in the first place? That's a good question, but -- again -- not the real story.

    It's yet another situation where Macintosh users can watch, amused (well, mostly) from the sidelines, wondering why anyone still uses Microsoft Windows. But certainly, even that is not the real story.

    The story to pay attention to here is the collusion between big media companies who try to control what we do on our computers and computer-security companies who are supposed to be protecting us.

    Initial estimates are that more than half a million computers worldwide are infected with this Sony rootkit. Those are amazing infection numbers, making this one of the most serious internet epidemics of all time -- on a par with worms like Blaster, Slammer, Code Red and Nimda.

    What do you think of your antivirus company, the one that didn't notice Sony's rootkit as it infected half a million computers? And this isn't one of those lightning-fast internet worms; this one has been spreading since mid-2004. Because it spread through infected CDs, not through internet connections, they didn't notice? This is exactly the kind of thing we're paying those companies to detect -- especially because the rootkit was phoning home.

    But much worse than not detecting it before Russinovich's discovery was the deafening silence that followed. When a new piece of malware is found, security companies fall over themselves to clean our computers and inoculate our networks. Not in this case.

    McAfee didn't add detection code until Nov. 9, and as of Nov. 15 it doesn't remove the rootkit, only the cloaking device. The company admits on its web page that this is a lousy compromise. "McAfee detects, removes and prevents reinstallation of XCP." That's the cloaking code. "Please note that removal will not impair the copyright-protection mechanisms installed from the CD. There have been reports of system crashes possibly resulting from uninstalling XCP." Thanks for the warning.

    Symantec's response to the rootkit has, to put it kindly, evolved. At first the company didn't consider XCP malware at all. It wasn't until Nov. 11 that Symantec posted a tool to remove the cloaking. As of Nov. 15, it is still wishy-washy about it, explaining that "this rootkit was designed to hide a legitimate application, but it can be used to hide other objects, including malicious software."

    The only thing that makes this rootkit legitimate is that a multinational corporation put it on your computer, not a criminal organization.

    You might expect Microsoft to be the first company to condemn this rootkit. After all, XCP corrupts Windows' internals in a pretty nasty way. It's the sort of behavior that could easily lead to system crashes -- crashes that customers would blame on Microsoft. But it wasn't until Nov. 13, when public pressure was just too great to ignore, that Microsoft announced it would update its security tools to detect and remove the cloaking portion of the rootkit.

    Perhaps the only security company that deserves praise is F-Secure, the first and the loudest critic of Sony's actions. And Sysinternals, of course, which hosts Russinovich's blog and brought this to light.

    Bad security happens. It always has and it always will. And companies do stupid things; always have and always will. But the reason we buy security products from Symantec, McAfee and others is to protect us from bad security.

    I truly believed that even in the biggest and most-corporate security company there are people with hackerish instincts, people who will do the right thing and blow the whistle. That all the big security companies, with over a year's lead time, would fail to notice or do anything about this Sony rootkit demonstrates incompetence at best, and lousy ethics at worst.

    Microsoft I can understand. The company is a fan of invasive copy protection -- it's being built into the next version of Windows. Microsoft is trying to work with media companies like Sony, hoping Windows becomes the media-distribution channel of choice. And Microsoft is known for watching out for its business interests at the expense of those of its customers.

    What happens when the creators of malware collude with the very companies we hire to protect us from that malware?

    We users lose, that's what happens. A dangerous and damaging rootkit gets introduced into the wild, and half a million computers get infected before anyone does anything.

    Who are the security companies really working for? It's unlikely that this Sony rootkit is the only example of a media company using this technology. Which security company has engineers looking for the others who might be doing it? And what will they do if they find one? What will they do the next time some multinational company decides that owning your computers is a good idea?

    These questions are the real story, and we all deserve answers.

What companies are resorting to to prevent piracy is ridiculous. And I for one am boycotting ALL Sony products, having a company BLATANTLY install software that can be used to SPY and MAKE CHANGES, WITHOUT YOUR CONSENT is dead wrong. I seriously hope some kind of lawsuit happens because some B.S. settlement isnt enough.

Sony KNEW what they were doing, they should be charged just as any other Black Hat hacker would be charged. They should be fined HEAVILY for EACH cd with the XCP software that was installed on it, in addition, they should be forced to replace each CD with it AT THEIR EXPENSE (including shipping)

DRM [Digital Rights Management] severly limits the usage of things consumers LEGALLY own. I'm not going to go all politics, but by allowing DRM, you are giving up your rights, and when these BS organizations (such as RIAA) know that you will give them up, they will put more things inplace. BTW, RIAA is working on a way so you can listen to a CD on ONLY ONE MACHINE, if you want to listen to it in the car, you need to buy a second CD.

Many artists (such as Dave Matthews Band) who have the DRM installed on their CD DO NOT want the DRM installed.

To check to see whether you have an infected CD click http://www.eff.org/deeplinks/archives/004144.php

Don't give up your rights to content that you legally own, don't let the music industry pull BS on you and bully you around. Before you know it, letting your friend listen to your CD will be illegal. They're already putting 'red flags' on DVR programs allowing you to keep it for 7 days, these are a violation of your rights.

Every day, rights are being taken away from you, dont let it prevent you from enjoying the entertainment you love.

For more DMCA, DRM, and any other related cases, click the link below.
http://action.eff.org/site/PageServer?pagename=ADV_homepage
« Last Edit: November 17, 2005, 08:10:41 pm by Snowthrower »

Offline VulturEMaN

  • Global Moderator
  • SpongeBob
  • *****
  • Posts: 3,853
  • Gender: Male
  • Dengaku Man xD
    • View Profile
Sony installs Rootkits in DRM Software
« Reply #1 on: November 17, 2005, 08:10:42 pm »
actually i think it's closer to 2weeks old :D
i didn't want to post anything about it, because i saw the insainity about to erupt because of it

btw, don't use the removal tool yet: it actually makes you more vulnerable XD

Offline IceFox

  • SpongeBob
  • *****
  • Posts: 5,712
  • Jacked up on Red Bull
    • View Profile
    • http://Nothing.
Sony installs Rootkits in DRM Software
« Reply #2 on: November 19, 2005, 12:32:11 pm »
SO, bassically, its spyare that sony put into their CDs to stop piracy?

Offline SizzlinSean

  • Honorable
  • SpongeBob
  • ******
  • Posts: 3,962
    • View Profile
    • http://
Sony installs Rootkits in DRM Software
« Reply #3 on: November 19, 2005, 12:52:35 pm »
I'm so glad I bought that Switchfoot CD. I have that junk on my computer. -_-

Snowthrower

  • Guest
Sony installs Rootkits in DRM Software
« Reply #4 on: November 19, 2005, 02:22:24 pm »
Quote
SO, bassically, its spyare that sony put into their CDs to stop piracy?
[snapback]254945[/snapback]

Its worse than spyware. (Most) Spyware isnt malicious, this is. It is dangerous to have on CD's.

Offline VulturEMaN

  • Global Moderator
  • SpongeBob
  • *****
  • Posts: 3,853
  • Gender: Male
  • Dengaku Man xD
    • View Profile
Sony installs Rootkits in DRM Software
« Reply #5 on: November 19, 2005, 02:57:52 pm »
i believe if you bought the cd online, most websites will take them back.

Offline IceFox

  • SpongeBob
  • *****
  • Posts: 5,712
  • Jacked up on Red Bull
    • View Profile
    • http://Nothing.
Sony installs Rootkits in DRM Software
« Reply #6 on: November 19, 2005, 03:13:14 pm »
So how malicious is it? What EXACTLY does it do?

Offline VulturEMaN

  • Global Moderator
  • SpongeBob
  • *****
  • Posts: 3,853
  • Gender: Male
  • Dengaku Man xD
    • View Profile
Sony installs Rootkits in DRM Software
« Reply #7 on: November 19, 2005, 04:05:04 pm »
It creates a hole for people to use a windows feature to hide files from you. those hidden files can then download more files onto your comp then automatically hide em. basically, from what i get, it's just an easier way for viruses to get onto ur comp.

but then again, maybe i'm completely wrong...

oh well...*back to final fantasy 10*

Offline IceFox

  • SpongeBob
  • *****
  • Posts: 5,712
  • Jacked up on Red Bull
    • View Profile
    • http://Nothing.
Sony installs Rootkits in DRM Software
« Reply #8 on: November 23, 2005, 04:36:42 pm »
Haha. Thanks. So its on Sony pproduced Music CDs?

Fifth Dynasty

  • Guest
Sony installs Rootkits in DRM Software
« Reply #9 on: November 23, 2005, 06:04:27 pm »
Umm...I'm way too lazy to read all of that (I haven't got that much time on my hands) so can you tell me what it says in a nutshell? Something about spyware is all I know.

GIR

  • Guest
Sony installs Rootkits in DRM Software
« Reply #10 on: November 23, 2005, 06:13:57 pm »
cough, cough, cd player.

Snowthrower

  • Guest
Sony installs Rootkits in DRM Software
« Reply #11 on: November 23, 2005, 08:07:55 pm »
Cough cough Limewire. After this, they deserve to have the music pirated.

Offline VulturEMaN

  • Global Moderator
  • SpongeBob
  • *****
  • Posts: 3,853
  • Gender: Male
  • Dengaku Man xD
    • View Profile
Sony installs Rootkits in DRM Software
« Reply #12 on: November 24, 2005, 09:00:52 am »
actually, if u send it back to them, they'll send u a new one without any spyware, and then give you money for their online music store.

*atleast i think*