Can This Virus Be 'Rooted' Out?

##AUTHORSPLIT##<--->A new kind of hard-to-detect malware is increasing our vulnerability to hackers andcreating headaches for makers of antiviral software.

SecurityJUST AS REAL VIRUSES mutate to evade antiviral medication, the writers of computer viruses and other forms of malware change their code to elude our antivirus software. If a biological virus were to start mutating more rapidly, it would compromise the ability of medical researchers to develop antiviral drugs. Unfortunately, that’s what is now occurring with computer viruses.

Why is this happening? The short answer is that malware is becoming more modular. An ill-intentioned author can choose from an array of attack strategies. When a new vulnerability is found, a piece of code that exploits the vulnerability can be attached to old, malicious code. Creating more havoc for PC users is the short time it now takes between the announcement of a software vulnerability and the appearance of malware that exploits the vulnerability. This underscores the importance of keeping your computer’s antivirus software up to date. Monthly updates are no longer good enough. (See “How to Keep Your Campus Safe from Infection,” August 2005, for a review of 13 antivirus products.

A Cloak of Invisibility

The latest trend in malware is rootkits. A rootkit is a small piece of software code that runs deep within a computer’s operating system and can be used to conceal other programs. The term rootkit comes from the Unix world and refers to software tools that give an intruder full, or root, access to a computer’s operating system. That access can be used to hide other software code from all but the most technically adept users.

For example, the dir command in Windows allows you to see the available files in the current and/or parent directories. With a rootkit, that command can be intercepted and false information returned. This makes a great tool for creating the software version of Harry Potter’s invisibility cloak—and creates a real problem for antivirus software writers. The good news is that rootkits are difficult to write; the bad news is that they can be easily downloaded from the internet. Expect to see more of them being used to attack your computer.

The use of rootkits to hide software code isn’t confined to hackers; companies use this technology as well. Last year Sony BMG installed rootkit code on their CDs that would install itself whenever the CD was played on a computer running Windows. Sony’s intent was to conceal their copy protection code and prevent people from copying music onto their PCs. Unfortunately, in addition to consuming system resources running in the background, the Sony rootkit could also be used by virus writers to conceal their code. The first virus that made use of the Sony rootkit was observed in December 2005.

Security

A Bug's Life: Although the term bug was used to describe
industrial defects in Thomas Edison’s time, computer scientist
Grace Hopper popularized the use of the word to describe
computer problems. Shortly after World War II, when her
colleagues at Harvard University (MA) found a moth in
one of the relays of the school’s Mark II computer, she
commented that they were "debugging" the machine. You
can actually see remains of the moth taped in the project’s
logbook at the Smithsonian National Museum of American
History in Washington, DC.

Only after a massive public outcry did Sony halt production of CDs containing the XCP and MediaMax 3.0 and 5.0 rootkits. In reaction to the rootkits, class action lawsuits have sprung up in New York and California, and rootkits have earned classification as illegal spyware by the Texas attorney general. The Sony BMG website now recommends: “If you have played a CD on your computer that contains either XCP or MediaMax 5.0 content protection software, you should update or uninstall the software to reduce your risk of security vulnerabilities.” Microsoft, Symantec, and Computer Associates provide antivirus tools to detect and remove the Sony rootkits.

The settlement of one class action suit in New York will bring relief to anyone who bought, received, or used Sony BMG CDs with either XCP or MediaMax software. For example, if you have an XCP CD, you can exchange it for a replacement CD, an MP3 download of the same album, or either a cash payment of $7.50 and one free album download or three free album downloads. See Sony BMG’s website for information about the settlement, as well as an explanation on how to file a claim—along with a list of CDs affected by the settlement. Claims must be filed by Dec. 31, 2006.

Waiting for a Solution

Unfortunately, in their continuing game of cat-and-mouse, the hackers and their rootkits are outrunning the antivirus code vendors. But a solution will come; it’s just a question of when. Until then, the only prescription is a regular dose of the same old same old: Make sure your virus protection software is current. And stay tuned.

Doug Gale is president of Information Technology Associates, an IT consultancy specializing in higher education.

Featured

  • Two figures, one male and one female, stand beside a transparent digital interface displaying AI symbols like neural networks, code, and a shield, against a clean blue gradient background.

    Microsoft-IDC Report Makes Business Case for Responsible AI

    A report commissioned by Microsoft and published last month by research firm IDC notes that 91% of organizations use AI tech and expect more than a 24% improvement in customer experience, business resilience, sustainability, and operational efficiency due to AI in 2024.

  • group of educators working on computer

    Improve Teacher-Student Satisfaction by Removing Procurement Obstacles

    Intuitive tools help teachers gain flexibility and control over purchases, and more time back for doing what they love.

  • abstract geometric pattern of glowing interconnected triangles, hexagons, and circles in blue, gold, and white, spread across a dark navy-to-black gradient background

    OpenAI Introduces 'Operator' AI for Performing Web Tasks

    OpenAI has announced "Operator," an AI agent designed to perform web-based tasks autonomously using its own browser. Currently available as a research preview for Pro users in the United States, the tool aims to automate everyday activities such as filling out forms, ordering groceries, and even creating memes.

  • horizontal stack of U.S. dollar bills breaking in half

    ED Abruptly Cancels ESSER Funding Extensions

    The Department of Education has moved to close the door on COVID relief funding for schools, declaring that "extending deadlines for COVID-related grants, which are in fact taxpayer funds, years after the COVID pandemic ended is not consistent with the Department’s priorities and thus not a worthwhile exercise of its discretion."