Language Selection

English French German Italian Portuguese Spanish

Black Hat conference: Newest Stealth Rootkits

Filed under
Security

Just when anti-virus vendors think they have a bead on the threat from stealth rootkits, along comes word that a pair of researchers have discovered a new way to hide malicious programs.

Jamie Butler, director of engineering at HBGary Inc., and Sherri Sparks, a PhD student at the University of Central Florida, demonstrated the technique at the Black Hat Briefings here with a chilling warning that anti-virus scanners must "completely revamp" existing rootkit detection technologies.

The proof-of-concept, dubbed Shadow Walker, is a modification of Butler's FU rootkit, a kernel-level program capable of hiding processes and elevating process privileges. The rootkit uses DKOM (Direct Kernel Object Manipulation) to fake out the Windows Event Viewer to make forensics virtually impossible and can also hide device drivers, Butler explained.

With Shadow Walker, Butler and Sparks explore the idea of memory subversion to hide the rootkit in memory with almost no performance impact.

"This is a prototype for a fourth generation of rootkits that would defeat the current rootkit detection technology," said Sparks, who is renowned for her work around offensive/defensive malicious code technologies.

Some existing rootkit defense technologies use behavior detection, integrity detection and signature-based detection to find the stealth programs. Others, like Microsoft Corp.'s Strider Ghostbuster, F-Secure Corp.'s BlackLight and Sysinternals Freeware's RootkitRevealer, search for registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit.

These guys are here showing us that we haven't even scratched the surface where rootkits are concerned.

Internet security practitioners in attendance described the Shadow Walker prototype as "scary."

Full Story.

More in Tux Machines

Parental Controls for Linux Unleashed

For years, one of the overlooked areas for the Linux desktop was access to “effective” parental controls. Back in 2003, I remember the now defunct Linspire (then known as Lindows) offered a proprietary option called SurfSafe. Surprisingly, at least back then, the product worked very well in providing accurate content filtering capabilities; something that was not,in fact, available and easy-to-use at that time. Years later, an open-source alternative was released to the greater Linux community known as GNOME Nanny. Fantastic in terms of usage control, its web content web filter was laughably terrible. As expected, crowd-sourcing a filtering list isn’t a great solution. And like SurfSafe, the project is now defunct. Read more

Chapeau 24 Cancellara - Same same but different

Fedora plus Moka icons plus some extra software, mainly coming from proprietary sources. I guess that's the best way to describe Chapeau. But then, what separates one distro from another if not a collection of decorations, as software is essentially the same, apart from a very small number of standalone distributions trying to develop their own identity with their own desktop environments and app stack, re: elementary or Solus + Budgie? Except they struggle, too. Chapeau 24 is a nice effort to make Fedora friendlier, but then it does not achieve the needed result without pain. The biggest issues included a botched smartphone support. Samba woes and the horrible bootloader bug. Other than that, it behaved more or less the same way as the parent distro. Then again, why bother if you can pimp up Fedora without any loss of functionality? I do like Chapeau Cancellara, but I cannot ignore the fact Fedora does the same with fewer problems. All in all, it's a welcome effort, but it needs more polish. It does not quite capture the heart the way Fuduntu did. And with some issues looming high above the distro, the grade can only be about 6/10. Most importantly, the bootloader setup must be flawless, and there's not excuse for small app errors that we've seen. We know it can do more. Anyhow, if you're not keen on any self-service round Fedora, this could be a good test bed for your games. A moderately worthy if somewhat risky and flawed experience. Read more

Mofo Linux: The Raw Materials for Security

The developers of Mofo Linux talk a good game. From the name’s origin in abusive street slang to its self-description on the home page as “Linux designed to defeat state censorship and surveillance,” Mofo presents itself as a champion of security and privacy. Nor is the claim unjustified. However, rather than putting security and privacy into the hands of ordinary users, Mofo simply presents the tools and leaves users to figure them out with a minimum of help. The result is a promising distribution that with only slightly more work, could be a leading one. Just possibly, though, this approach is a deliberate tactic, and not the carelessness it appears. Based on Ubuntu, the current release of Mofo offers nothing different in the way of productivity tools. It uses Unity for a desktop, and its applications are the standard GNOME ones. In fact, Mofo shows such little interest in such matters that it does not bother to change the title bar in the installer from Ubuntu. Read more

Happily Announcing Mageia 5.1

As we’re getting closer to the end of the year, Mageia has a present for you! We are very pleased to announce the release of Mageia 5.1! This release – like Mageia 4.1 was in its time – is a respin of the Mageia 5 installation and Live ISO images, based on the Mageia 5 repository and incorporating all updates to allow for an up to date installation without the need to install almost a year and a half worth of updates. It is therefore recommended for new installations and upgrades from Mageia 4. The new images are available from the downloads page, both directly and through torrents. Read more Also: After a long wait, Mageia was released! Well, sort of...