New rootkit detection technology

  • Thread starter Thread starter Ian JP Kenefick
  • Start date Start date
I

Ian JP Kenefick

F-Secure launched a new scanner today to detect and remove rootkits.
There is a lot of information available on this website...

http://www.europe.f-secure.com/blacklight/


--

Regards, |Windows XP Professional SP2
Ian Kenefick |NOD32 Antivirus system [resident]
http://www.ik-cs.com |AVP 3.5 - [On Demand]
no snake oil here! |Sygate Personal Firewall 5 professional
|Forte Agent 2
|Eudora 6.2 (Paid)
 
Ian JP Kenefick said:
F-Secure launched a new scanner today to detect and remove rootkits.
There is a lot of information available on this website...

http://www.europe.f-secure.com/blacklight/


--

Regards, |Windows XP Professional SP2
Ian Kenefick |NOD32 Antivirus system [resident]
http://www.ik-cs.com |AVP 3.5 - [On Demand]
no snake oil here! |Sygate Personal Firewall 5 professional
|Forte Agent 2
|Eudora 6.2 (Paid)

Excellent link!
There is also a rootkit scanner at sysinternals.com.

I have read some of the associated documentation.
What is the perceived threat level to the average home user, SMB and
enterprise?
Are there any associated statistics?

What is the relative threat level Windows XP vs. Linux?

someone2
 
Ian JP Kenefick said:
F-Secure launched a new scanner today to detect and remove rootkits.
There is a lot of information available on this website...

http://www.europe.f-secure.com/blacklight/

[SNIP]
Excellent link!
There is also a rootkit scanner at sysinternals.com.

Scanner, yes - removal utility, no.

[SNIP]
What is the perceived threat level to the average home user, SMB and
enterprise?

Relativly high. Already rootkits are being imeplemented as part of the
blended threat of new malware.
Are there any associated statistics?

For Win32 platform - no. This is relativly new to my knowledge.
What is the relative threat level Windows XP vs. Linux?

Linux/Unix root kits have been around for a while but as mentioned to
my knowledge Win32 rootkits have not so from a statistics stand point
there doesn't seem to be enough data.

--

Regards, |Windows XP Professional SP2
Ian Kenefick |NOD32 Antivirus system [resident]
http://www.ik-cs.com |AVP 3.5 - [On Demand]
no snake oil here! |Sygate Personal Firewall 5 professional
|Forte Agent 2
|Eudora 6.2 (Paid)
 
Ian said:
F-Secure launched a new scanner today to detect and remove rootkits.
There is a lot of information available on this website...

http://www.europe.f-secure.com/blacklight/

Typical AV industry: call something by a buzzword that gives no clue to
the uninitiated of how the threat actually works.

Could anyone explain how this type of infection works, and how it
differs from existing stealth viruses, trojans and so on?
 
Typical AV industry: call something by a buzzword that gives no clue to
the uninitiated of how the threat actually works.

Could anyone explain how this type of infection works, and how it
differs from existing stealth viruses, trojans and so on?

Wikipedia has a good entry for this...

Functions of a root kit

A root kit typically hides logins, processes, and logs and often
includes software to intercept data from terminals, network
connections, and the keyboard. In many sources root kits are counted
as trojan horses.

A rootkit may also include utilities to help the attacker subsequently
access the system more easily. For example, the rootkit may include an
application that spawns a shell when the attacker connects to a
particular network port on the system.

Types of root kits

Rootkits come in two different flavours, kernel and application level
kits. The idea of kernel level rootkits is to replace a portion of
kernel code with modified code that helps the intruder cover his
tracks. This is often accomplished by existing means of adding new
code to the kernel such as Loadable Kernel Modules in Linux. One
common tactic of kernel root kits is to replace system calls with
versions that hide information about the attacker. With Application
level rootkits regular application binaries are replaced with trojaned
fakes.

Detecting root kits

There are several programs available to detect root kits. On Unix
based systems two of the most popular of these are chkrootkit and
rkhunter. On Windows based systems two rootkit detectors currently
available rootkitrevealer are at available
(http://www.sysinternals.com/ntw2k/freeware/rootkitreveal.shtml) from
Sysinternals and unhackme from Greatis software
http://greatis.com/unhackme/. An additional powerful tool for
detecting Ring 0 (kernel level) rogue processes is taskinfo, the
mother of all process listing utilities at
http://www.iarsn.com/taskinfo.html

.... and now of course F-Secure's Blacklight.
--

Regards, |Windows XP Professional SP2
Ian Kenefick |NOD32 Antivirus system [resident]
http://www.ik-cs.com |AVP 3.5 - [On Demand]
no snake oil here! |Sygate Personal Firewall 5 professional
|Forte Agent 2
|Eudora 6.2 (Paid)
 
Ian JP Kenefick said:
F-Secure launched a new scanner today to detect and remove rootkits.
There is a lot of information available on this website...

http://www.europe.f-secure.com/blacklight/


A month and a half for a beta release? Seems a bit short. The window
of opportunity is rather small of getting hit in that timeframe and
you'll just start getting expert in the product, get some education on
rootkits, and then the product self-destructs. I'm still trying to
figure out the free SysInternals RootKitRevealer.

Anti-virus software has matured to where most users can let it blindly
disinfect the file. Anti-spyware is nowhere near that point. All the
time you hear about a user that didn't check what action the
anti-spyware program was going to commit in eradicating a detected
spyware product (or the anti-spyware program doesn't tell the user
anything which is even worse), they blindy let the anti-spyware program
do its thing, and now TCP doesn't work because an LSP got removed or an
application no longer functions. Rootkit removal tools are even more
risky than using anti-spyware tools, especially because the typical user
that gets their hands on this tool won't know how to use it. It
involves understanding the operating system, components, and
applications beyond the typical user's expertise.

For example, I ran SysInternal's RootKitRevealer. It listed about 4
hidden registry items. Reading the help that comes with the program
might trigger the typical user into eradicating what is not a rootkit.
In my case, it was the free Virtual Daemon Manager (Daemon Tools) used
to run a driver-level CD-ROM drive emulator that lets you have up to 4
virtual CD drives. I create an ISO image of my Windows, Office, and
Bookshelf CDs, save them on the hard drive, and use Daemon Tools to make
it look like I have 3 CD drives with these CDs in them. I can run
Windows and Office updates without having to search for the real CDs, I
can add the Recovery Console at-will, I can recover files, and I can run
the program without having to load the CD (since many CD-based
applications still don't copy everything onto the hard drive). Because
it has some copy-protection bypass abilities, I even have an ISO file of
a copy-protected game that I can play without having to hunt down the
physical CD. Because I know the device ID of d347prt listed in the
hidden registry keys is for the Daemon Tools virtual CD tool, I know
this is a false alert. Actually there are no false alerts by
SysInternals RootKitRevealer as you are assumed to have the expertise to
know which hidden registry keys are good and which might be suspicious
or bad.

The $MFT for the master file table is also listed as a hidden directory.
It isn't directly accessible via the Windows API. However, you
obviously need your Master File Table in order for Windows to function.
The tool identifies where you might start digging but you will have to
do the digging along with some knowledge of what you are digging into.
--

Regards, |Windows XP Professional SP2
Ian Kenefick |NOD32 Antivirus system [resident]
http://www.ik-cs.com |AVP 3.5 - [On Demand]
no snake oil here! |Sygate Personal Firewall 5 professional
|Forte Agent 2
|Eudora 6.2 (Paid)

And why would any of this be important to anyone except you who already
knows what applications they have installed? A bit hard up for some ego
stroking, eh? Only the URL is significant.
 
Ian JP Kenefick said:
F-Secure launched a new scanner today to detect and remove rootkits.
There is a lot of information available on this website...

http://www.europe.f-secure.com/blacklight/


A month and a half for a beta release? Seems a bit short. The window
of opportunity is rather small of getting hit in that timeframe and
you'll just start getting expert in the product, get some education on
rootkits, and then the product self-destructs. I'm still trying to
figure out the free SysInternals RootKitRevealer.

Anti-virus software has matured to where most users can let it blindly
disinfect the file. Anti-spyware is nowhere near that point. All the
time you hear about a user that didn't check what action the
anti-spyware program was going to commit in eradicating a detected
spyware product (or the anti-spyware program doesn't tell the user
anything which is even worse), they blindy let the anti-spyware program
do its thing, and now TCP doesn't work because an LSP got removed or an
application no longer functions. Rootkit removal tools are even more
risky than using anti-spyware tools, especially because the typical user
that gets their hands on this tool won't know how to use it. It
involves understanding the operating system, components, and
applications beyond the typical user's expertise.

For example, I ran SysInternal's RootKitRevealer. It listed about 4
hidden registry items. Reading the help that comes with the program
might trigger the typical user into eradicating what is not a rootkit.
In my case, it was the free Virtual Daemon Manager (Daemon Tools) used
to run a driver-level CD-ROM drive emulator that lets you have up to 4
virtual CD drives. I create an ISO image of my Windows, Office, and
Bookshelf CDs, save them on the hard drive, and use Daemon Tools to make
it look like I have 3 CD drives with these CDs in them. I can run
Windows and Office updates without having to search for the real CDs, I
can add the Recovery Console at-will, I can recover files, and I can run
the program without having to load the CD (since many CD-based
applications still don't copy everything onto the hard drive). Because
it has some copy-protection bypass abilities, I even have an ISO file of
a copy-protected game that I can play without having to hunt down the
physical CD. Because I know the device ID of d347prt listed in the
hidden registry keys is for the Daemon Tools virtual CD tool, I know
this is a false alert. Actually there are no false alerts by
SysInternals RootKitRevealer as you are assumed to have the expertise to
know which hidden registry keys are good and which might be suspicious
or bad.

The $MFT for the master file table is also listed as a hidden directory.
It isn't directly accessible via the Windows API. However, you
obviously need your Master File Table in order for Windows to function.
The tool identifies where you might start digging but you will have to
do the digging along with some knowledge of what you are digging into.
--

Regards, |Windows XP Professional SP2
Ian Kenefick |NOD32 Antivirus system [resident]
http://www.ik-cs.com |AVP 3.5 - [On Demand]
no snake oil here! |Sygate Personal Firewall 5 professional
|Forte Agent 2
|Eudora 6.2 (Paid)

And why would any of this be important to anyone except you who already
knows what applications they have installed? A bit hard up for some ego
stroking, eh? Only the URL is significant.

You don't need to know *HOW* they function. You just need to know what
a rootkit is. Soon enough they will be integrated in AV anyways.
--

Regards, |Windows XP Professional SP2
Ian Kenefick |NOD32 Antivirus system [resident]
http://www.ik-cs.com |AVP 3.5 - [On Demand]
no snake oil here! |Sygate Personal Firewall 5 professional
|Forte Agent 2
|Eudora 6.2 (Paid)
 
Are there root-kit exploits circulating for Windows 98?

Can root-kits be detected on Win-NT/2K/XP drives if the drive is
removed and slaved to a trusted PC and then scanned with NAV or
something like "The Cleaner" ?
 
Ian JP Kenefick said:
You don't need to know *HOW* they function. You just need to know what
a rootkit is. Soon enough they will be integrated in AV anyways.

For detection perhaps. Many rootkits cannot be removed while the
operating system is running. You need to boot using some other
operating system, like Windows or Linux on a bootable CD, so you can
repair the infected OS. Not knowing how the tool proposes to remove the
rootkit means users will end up with dead or partially disabled
computers. You already see that with users of anti-spyware tools that
blindly let those tools make changes without knowing what the changes
will be and whether they should even be allowed. Several times I've
seen a user use Ad-Aware or Spybot to remove spyware that uses an LSP
(layered service provider) in the TCP layer, and the removal of the
spyware ends up removing the LSP which doesn't then chain correctly and
renders the user incapable of any further network connects. Blindly
removing a rootkit without some knowledge of the environment within it
exists and affects will lead to even more corruption of the system by
the uneducated applying these risky tools. Anti-virus software is more
mature in how it eradicates viruses but users sometimes still end up
with dead applications, dead connects, or a dead system after blindly
letting the AV program eradicate a virus. With rootkits, you are
performing major surgery on your OS to remove the rootkit. I doubt such
removal will prove any more robust and reliable than installing service
packs for Windows, and we all know that installing service packs can
result in problems. You know there will be lazy users that will blindly
use the rootkit remover without first saving logical file backups (for
data recovery) and saving disk images (for disaster recovery).

We are just now seeing utilities to remove rootkits, yet the first
exhibited rootkit for Windows was shown, I think, back around 1997. How
long has it been that ADS (alternate data streams) have been available
for files? Ever since NTFS arrived
(http://www.ntfs.com/ntfs-multiple.htm). Yet it is only recently that
some anti-virus products will scan the ADS of files looking for viruses.
They depend on the on-access scanner seeing the ADS getting loaded into
memory and detecting the virus there. That means the virus hides on
your system until something reads the ADS to load it into memory. Okay,
so the virus can't do anything while just sitting in the ADS until it
gets loaded into memory whereupon it gets detected, but many users would
prefer to safely remove the unlit bomb rather than risk trying to defuse
it while the fuse is burning. Some users actually disable the on-access
scanner because it sucks up too many CPU cycles, especially on heavily
loaded hosts, like file servers. Most users don't know about alternate
data streams because Microsoft doesn't include any features in Explorer
or any utilities in Windows to interrogate for their existence and
content. You have to get a utility from the Windows 2000 Resource Kit
or use a 3rd party product, like LADS or CrucialADS, to identify that a
file has an ADS.

Ad-Aware's SE version was the first anti-spyware product I saw that
finally included scanning of the ADS. I haven't found documentation
that says Microsoft/Giant AntiSpyware scans the ADS of files. TDS-3
will scan the ADS of files looking for trojans. Kaspersky AV uses the
ADS but only to record a hash value of the file along with status so it
can later skip scanning that file if it was found clean on a prior scan
(but KAV's uninstall is dirty in that it leaves behinds all the ADS'es
assigned to files), but I don't know if it actually scans the ADS of
files looking for viruses. The last version of Norton AntiVirus that I
used was 2003 and it did not scan the ADS of files. I'm still trying to
find which anti-virus products will scan more than just the primary data
stream (i.e., to scan the multiple streams assigned to a file). I
contacted McAfee through their online chat but obviously got hold of an
India rep who wasn't really interested in handling pre-sales tech
questions, didn't know what I was talking about, and then claimed McAfee
does scan the ADS of files but I suspect the rep just gave up to make me
go away. A McAfee user noted that the command-line version of VirusScan
has the /STREAMS switch, but that means scannings the ADS of files is
*not* the default mode of operation. When I asked TrendMicro if
PC-Cillin scans the ADS of files, their reply was to ask which operating
system I use (but NTFS is, after all, *NT* File System which is
available on *all* versions of NT-based Windows), plus they wanted the
version number of PC-Cillin although I said in my message that it was a
pre-sales inquiry. Guess the tech rep didn't have their coffee yet to
be awake enough to understand the question. Avast's response was "avast
considers NTFS streams as a special type of packed files. That is, it
can detectd viruses in NTFS if archive scanning (unpacking) is enabled.
In the free (Home) Edition, you can choose to use all unpackers or none
(single check box)." Eset's response regarding NOD32 was, "NOD32 does
not scan alternate data streams. It is a feature we are planning to add
in the future, however, there is no word on when it will be available."
So it is still a mixed bag as to whether or not an anti-virus product
will scan the alternate data streams of files.

Most users are recommended to use a firewall when they connect to the
Internet. Most are recommended to use one that includes outbound
firewall rules against applications that ask for a connection, so the
user needs to know a bit more than someone using an inbound-only
firewall. If the firewall provides the option to block fireholing
(where an unauthorized program uses an authorized program to get an
Internet connection, like the tooleaky test which uses IE), the user
will have to understand more of how his system works to know how to
answer the prompts. If the firewall supports DLL authentication (to
ensure the DLLs for the application are used by it when making an
Internet connection and haven't been replaced by malware copies), the
user needs to know how their applications function and possibly
interrogate the DLLs to believe it should be authenticated for use with
the application when making the connection. Removing a virus can be
risky to the security, stability, and reliability of your system.
Removing spyware is more risky. Removing rootkits is very risky. As
the risk increases, it behooves the user to understand more fully what
actions will get committed to eradicate the malware. Dumb users kill
computers.

As the level of security increases, the users needs more education. The
same holds true for eradicating rootkits which is the utmost complexity
in extricating malware. Some rootkits are easy to eradicate. Some are
very, very tough. I'm not saying that you need to be an OS programmer
to understand how to eradicate a rootkit, but you'll need a lot more
expertise than the lazy newbie that can't even figure out that removing
the blocking of attachments in Outlook Express is a configurable option.
At some point, you'll have to decide if it is worth spending the time to
eradicate the rootkit and then spend more time to repair your system
rather than just do a fresh install or restore to a prior snapshot
stored in a disk image which can be quite a bit shorter in time and a
lot easier in effort.
 
Back
Top