Re: [Full-Disclosure] Rootkit For Spyware? Hide your adware from all Adware removers and Anti-viruses

From: GuidoZ (uberguidoz_at_gmail.com)
Date: 09/23/04

  • Next message: GuidoZ: "Re: [Full-Disclosure] Rootkit For Spyware? Hide your adware from all Adware removers and Anti-viruses"
    To: Harlan Carvey <keydet89@yahoo.com>
    Date: Thu, 23 Sep 2004 10:03:00 -0700
    
    

    I stand corrected. I hadn't thought about this...

    > More specific to the Windows environment, what we're
    > talking about is API hooking, and then more advanced
    > stuff such as DKOM, or direct kernel object
    > manipulation. This is where the linked listed used to
    > maintain a list of processes is modified (kernel
    > scheduling relies on threads, not processes) so that
    > the process is there, but no longer part of the linked
    > list maintained by the kernel.

    Windows is likely the most susceptible to such an attack due to the
    limited amount of people that fully understand the kernel and "flow
    chart" of processes. (Or those that don't put 2 and 2 together, like
    myself.) Excellent points, Harlan.

    --
    Peace. ~G
    On Thu, 23 Sep 2004 08:41:36 -0700 (PDT), Harlan Carvey
    <keydet89@yahoo.com> wrote:
    > 
    > 
    > > The thing that has me worried about this (at least
    > > enough to justify the
    > > posts) is that this seems to be an avenue for growth
    > > in kits.
    > 
    > That's exactly what it is.
    > 
    > On a slightly tangential note, while many people I
    > know of in the security community bash Microsoft, I've
    > more often been thankful that they've created entire
    > economies.  With the variety of MS products, there is
    > an entire economy for intergrators...and for those
    > that don't do quite as good a job as could be done,
    > "sweepers" (security folks, other integrators, etc) to
    > come in and clean up.
    > 
    > My point is that when you combine (a) the perceived
    > glut of things that need to be done when managing
    > Windows systems, and (b) the simple fact that most of
    > them aren't done, you've got great opportunities for
    > additional economies.  It wasn't so long ago that
    > three folks were arrested for renting out botnets of
    > upwards to 45,000 systems.  In the security arms race,
    > the use of rootkits significantly ups the ante,
    > particularly when dealing w/ home users and even
    > MCSEs.
    > 
    > > One of the things that has been protecting (perhaps
    > > that is too optimistic
    > > of a word here) people from rootkits is that most of
    > > them don't work very
    > > well or if so very pervasively. (admittedly there
    > > are exceptions to this)
    > > Admin's may never find the actual kits but the kits
    > > (or their operators)
    > > cause enough problems that he admin rebuilds the box
    > > to get rid of the
    > > annoying unexplainable problems (OK only in a shop
    > > that is well kept, this
    > > might not pertain in many IT departments)
    > >
    > >
    > >
    > > If there is a new source of revenue I expect the
    > > quality and therefore the
    > > danger from kits will greatly increase.
    > 
    > I'd agree with that.
    > 
    > > You are probably right in what you were saying about
    > > the need to get the word out.
    > 
    > Not just the word...tools and techniques for
    > preventing and detecting infections from this type of
    > malware.
    > 
    > > In addition to setting proper user rights (something
    > > that can be exceedingly
    > > irritating to do in a Windows environment although I
    > > am sure they are
    > > working on it [I don't want to get into a religious
    > > war here])
    > 
    > I can see how the political/corporate culture can be
    > an impediment to such things...though technically,
    > it's a pretty trivial task.
    > 
    > > and
    > > tightening system account settings admins need to
    > > start looking at tools
    > > like Tripwire or other MD5 based monitoring
    > > mechanisms. There are a number
    > > out there and they don't all cost a fortune.
    > 
    > True.  In addition, there are great many freely
    > available mechanisms that can be employed, with the
    > only real "cost" being the time it takes for the admin
    > to learn something new.
    > 
    > > For those who are hazy we are not talking about
    > > typical BO or NC type stuff
    > > here (as useful as those tools might be to hackers
    > > [and geeky/slightly
    > > independent admins]) This is stuff that either
    > > replaces Kernel components or
    > > for some of the more advanced stuff sits between the
    > > kernel and the hardware/bios.
    > 
    > More specific to the Windows environment, what we're
    > talking about is API hooking, and then more advanced
    > stuff such as DKOM, or direct kernel object
    > manipulation.  This is where the linked listed used to
    > maintain a list of processes is modified (kernel
    > scheduling relies on threads, not processes) so that
    > the process is there, but no longer part of the linked
    > list maintained by the kernel.
    > 
    > For more detail, go to http://www.rootkit.com.
    > 
    > > This means the OS can't even see what
    > > is happening let alone the Admin or AV programs
    > 
    > Given that the OS 'sees' what's going on through the
    > use of it's own APIs, you're correct.
    > 
    > > (Properly configured AV's could probably be made to
    > > look for default settings but for alterable kits
    > > this wouldn't matter.
    > 
    > Some research I presented in my book supports this.
    > 
    > > To go a step further if the code gets small enough
    > > and public enough there
    > > is a potential for some of it to end up in viruses.
    > > I would think this is pretty difficult but ...
    > 
    > Not at all.
    > 
    > > By the way good site.
    > 
    > Thanks.  The book's even better.
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    

  • Next message: GuidoZ: "Re: [Full-Disclosure] Rootkit For Spyware? Hide your adware from all Adware removers and Anti-viruses"