"Most people, I think, don't even know what a rootkit is, so why should they care about it?" - Thomas Hesse, President of Sony's Global Digital Business.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
1 The Sony CD DRM Debacle A case study of digital rights management.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
To Protect or Not Protect Sony/BMG’s DRM Dilemma Sony’s Attempt-- Sony/BMG’s digital right’s management (DRM) “rootkit” inclusion on their music.
Rootkits: Sneaky, Stealthy Toolboxes
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Project By Ben Woodard ISC 110 Professor: Dr. Elaine Wenderholm.
Quiz Review.
Security Advice Georgie Pepper Campsmount Acadamy.
Chapter Nine Maintaining a Computer Part III: Malware.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Security for Seniors SeniorNet Help Desk
Hacker Zombie Computer Reflectors Target.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
D. Beecroft Fremont High School VIRUSES.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
1 Higher Computing Topic 8: Supporting Software Updated
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Mathieu Castets October 17th,  What is a rootkit?  History  Uses  Types  Detection  Removal  References 2/11.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
We are here to help you… Fight something like this Brownies !
Computer security By Isabelle Cooper.
All about viruses, hacking and backups By Harriet Thomas.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
Internet safety By Suman Nazir
Viruses. Learning Objectives: At the end of this lesson you should be able to:
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
Computer safety Filip Hruby.
Joseph J. Malone Security for Seniors Joseph J. Malone
Managing Windows Security
How to build a good reputation online
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
By Jake Schmitt, Seth Raleigh, Neil McLain
Get Rid of a Trojan Horse? Even with a competent anti-virus installed, PCs could still be susceptible to malicious programs such.
G061 - Network Security.
Presentation transcript:

"Most people, I think, don't even know what a rootkit is, so why should they care about it?" - Thomas Hesse, President of Sony's Global Digital Business operations.

Why should we care? Rootkits do not actually harm a computer, and have many useful applications. Their only purpose is to conceal other processes from both the user and any security software. They are often used in combination with keyloggers or Trojan horses.

Extended Copy Protection Sony started using Extended Copy Protection (or XCP), DRM software developed by First 4 Internet, on their CDs in late This program was bundled with MediaMax CD-3, another DRM program designed to prevent users from unauthorized playback or duplication of CDs.

XCP MediaMax CD-3 was relatively easy to disable, so XCP was designed to hide both MediaMax CD-3 and itself from the user. This was accomplished by modifying the operating system to conceal all files beginning with the tag $sys$. The program was set to install as soon as an infected CD was inserted, even if the user declined the license agreement.

Problems with XCP XCP did not limit the concealed files to those it installed – ANY file beginning with $sys$ would be concealed, even if it was installed afterwards. The first Trojan horse which exploited this flaw was reported on November 10 th, 2005 – less than two weeks after this flaw had first been discovered.

World of Warcraft World of Warcraft uses a program nicknamed “The Warden” to scan a user’s active processes for known cheat and hack programs. If it discovers one, the information is sent back to Blizzard, and the player’s account may be suspended. By installing the Sony XCP, and adding the $sys$ tag to a hacking program, people would be able to use these programs without detection.

Additional Problems XCP added filter drivers for the CD-ROM, which intercepted all requests to read from the CD. Removing XCP would cause the CD-ROM to stop functioning. XCP monitored all processes a user was running, which required nearly constant read attempts on the hard drive. This can shorten the drive’s lifespan.

The Patch Sony eventually released a patch to decloak and remove the XCP. This patch required users to install an ActiveX control, as well as provide their name, address, and address. Sony’s terms of service specifically stated this information would be shared with “reputable third-parties who may contact you directly.”

CodeSupport.ocx Users could only download the patch with the CodeSupport.ocx ActiveX control installed, using Microsoft Internet Explorer, on the computer they had first requested the patch with. This control essentially gave Sony’s website full control of a user’s computer, including the ability to install and remove programs.

Problems The ActiveX control was marked safe, and was not specifically tied to Sony’s website. With a little work, it could be run from ANY website, without the user’s knowledge. This control was not removed after the installation of the patch. It remained on the user’s machine until they manually removed it. Additionally, because of the way the patch was designed, there was a small chance of a system crash during its operation.

Questions?