[conspire] Lessons of twelve years ago

Rick Moen rick at linuxmafia.com
Mon Oct 23 09:53:31 PDT 2017


Twelve years further on, and people are _still_ outsourcing their
thinking to proprietary antimalware companies proven eager to
deliberately sell them out and turn a blind eye to malware if it 
is distributed by the 'right' people.

----- Forwarded message from Rick Moen <rick at linuxmafia.com> -----

Date: Mon, 23 Oct 2017 09:45:49 -0700
From: Rick Moen <rick at linuxmafia.com>
To: lug-nuts at saclug.org
Subject: Re: [Lug-nuts] test
Organization: If you lived here, you'd be $HOME already.

Quoting linus at fullsack.com (linus at fullsack.com):

> Their reputation is. "A vast bot net".
> https://arstechnica.com/information-technology/2017/09/ccleaner-backdoor-infecting-millions-delivered-mystery-payload-to-40-pcs/

I've always been intrigued by the mental model of proprietary
anti-malware software:  'Install with superuser authority a piece of
unauditable software from people you know nothing about and have zero
reason to trust, and hope they'll do good things for you.'  I mean, 
what could possibly go wrong?  ;->

Remember the Sony malware?  The First 4 Internet XCP rootkit Sony BMG
Music Entertainment deliberately distributed on 22 million CDs to
security-compromise customers' Windows machines and modify the OSes to
prevent audio CD-ripping/copying?
https://www.schneier.com/blog/archives/2005/11/sonys_drm_rootk.html

When caught doing this, Sony attempted to defend itself by claiming it
was entitled to break into customers' machines to prevent 'piracy' 
(after first pretending it wasn't a rootkit and releasing a 'fix' that
didn't remove it), but the _really_ interesting bit was to note the role
of the anti-malware companies in this. 

I'll just quote Bruce Schneier:

  What do you think of your antivirus company, the one that didn't
  notice Sony's rootkit as it infected half a million computers? And this
  isn't one of those lightning-fast internet worms; this one has been
  spreading since mid-2004. Because it spread through infected CDs, not
  through internet connections, they didn't notice? This is exactly the
  kind of thing we're paying those companies to detect -- especially
  because the rootkit was phoning home.

  But much worse than not detecting it before Russinovich's discovery was
  the deafening silence that followed. When a new piece of malware is
  found, security companies fall over themselves to clean our computers
  and inoculate our networks. Not in this case.

  McAfee didn't add detection code until Nov. 9, and as of Nov. 15 it
  doesn't remove the rootkit, only the cloaking device. The company admits
  on its web page that this is a lousy compromise. "McAfee detects,
  removes and prevents reinstallation of XCP." That's the cloaking code.
  "Please note that removal will not impair the copyright-protection
  mechanisms installed from the CD. There have been reports of system
  crashes possibly resulting from uninstalling XCP." Thanks for the
  warning.

  Symantec's response to the rootkit has, to put it kindly, evolved. At
  first the company didn't consider XCP malware at all. It wasn't until
  Nov. 11 that Symantec posted a tool to remove the cloaking. As of Nov.
  15, it is still wishy-washy about it, explaining that "this rootkit was
  designed to hide a legitimate application, but it can be used to hide
  other objects, including malicious software."

  The only thing that makes this rootkit legitimate is that a
  multinational corporation put it on your computer, not a criminal
  organization.

  You might expect Microsoft to be the first company to condemn this
  rootkit. After all, XCP corrupts Windows' internals in a pretty nasty
  way. It's the sort of behavior that could easily lead to system crashes
  -- crashes that customers would blame on Microsoft. But it wasn't until
  Nov. 13, when public pressure was just too great to ignore, that
  Microsoft announced it would update its security tools to detect and
  remove the cloaking portion of the rootkit.

  Perhaps the only security company that deserves praise is F-Secure, the
  first and the loudest critic of Sony's actions. And Sysinternals, of
  course, which hosts Russinovich's blog and brought this to light.

Everyone else sold their customers out.  In fact, according to a
Cnet news.com story at the time (mentioned in comments to the Schneier
article), "The company's [First 4 Internet] team has worked regularly
with big antivirus companies to ensure the safety of its software, and
to make sure it is not picked up as a virus, he said."

I should add that another exception was ClamAV, the open-source malware
scanner, which IIRC also did the right thing.  And, there is also some
reason to think that even F-Secure added detection of the rootkit only
because they figured out the gig was up, not because they were acting
on behalf of their customers:
https://web.archive.org/web/20051202044828/http://www.businessweek.com/technology/content/nov2005/tc20051129_938966.htm

_______________________________________________
Lug-nuts mailing list
Lug-nuts at saclug.org
http://lists.saclug.org/cgi-bin/mailman/listinfo/lug-nuts

----- End forwarded message -----




More information about the conspire mailing list