Language Selection

English French German Italian Portuguese Spanish

Malicious Bots Hide Using Rootkit Code

Filed under
Security

Computer viruses and remote control programs called bots are adopting features from stealthy programs called rootkits to avoid detection, according to researchers at Finnish anti-virus software company F-Secure.

New versions of Rbot, a malicious and ubiquitous remote control program, have features copied and pasted from a well known open-source rootkit called FU. The new features make Rbot invisible to system monitoring tools.

This is just the latest example of malicious programs borrowing strategies used by rootkits to evade detection on systems they infect, said Mikko Hyppönen, manager of anti-virus research at F-Secure Corp.

New versions of Rbot are identified almost daily, but recent variants come with a version of a software driver from FU, Hyppönen said.
When the driver is placed on an infected system, it allows Rbot to hide its process from the Windows task manager, or other task management tools that show users what programs are running on their Windows system.

The integration of FU with Rbot is crude and was probably done by an inexperienced hacker, or "script kiddie," who lifted the code wholesale from the FU source code, which was posted on the Internet by the rootkit's author, Jamie Butler (aka "Fuzen") as a proof of concept.

However, other malicious code authors are doing a more thorough job of tying rootkit features into their creations, Hyppönen said.

A recent variant of the Myfip worm, Myfip.h, incorporated features from FU that allowed it to manipulate data in the system kernel, or Windows core processing center, allowing it to hide its processes, he said.

The FU source code, available from Web sites like RootKit, is a rich source of information for malicious code writers. However, FU is not a true rootkit and doesn't try to evade detection.
That means that viruses and malicious programs that use FU components might still raise red flags from security programs that miss the virus processes running, but spot FU running on infected systems, he said.

Other virus authors seem to be catching on to tricks used by rootkit authors to avoid detection, also.

A recent version of the Sober worm, Sober.P, used a strategy called "I/O blocking" that doesn't prevent infected e-mails from being spotted, but can keep anti-virus products from detecting Sober.P on infected systems, according to experts.

F-Secure is testing a rootkit detection program called BlackLight that can spot some rootkits. Jamie Butler, author of the FU rootkit, has also released a free program called VICE that can spot FU, but most anti-virus companies don't have rootkit detection features in their products, he said.

Full Story.

More in Tux Machines

Linux Foundation's certification sets new benchmark for admins

At LinuxCon last week, the Linux Foundation announced a new certification scheme for Linux professionals to complement their existing training activities. The Linux Foundation Certification Program offers a peer-verified certification for both early-career and engineer-level systems administrators for a fee of $300. The process involves a real-time skill test administered via a remote-access virtual machine running one of several Linux distributions. To ensure the rules are followed, a human proctor watches the test via screen-sharing and video camera using your own computer at a location of your choice. The certification tests real-world skills for both sys admins and more senior engineers at the command line and in configuration files. Read more

Linux Mint Debian to Be Called "Betsy"

"The upcoming release of LMDE will be version 2, codename 'betsy' and it will use a Debian 'jessie' package base. The team is currently adapting to the new LMDE, setting up its repositories and porting various packages onto it. The target for a stable release is estimated for this November, along with an official upgrade path from UP8 to Betsy," said the leader of the Linux Mint project, Clement Lefebvre. Read more

Adapting to the Mobile World

Now more than ever companies are gaining a mobile presence due to the popularity of smartphones and tablets. It is important to any company’s success to become part of the mobile world if they want to build business. Consumers used to look up companies in the phonebook, but now the first action consumers take when they need to find a company is to look them up online. If consumers cannot find a company online, they are likely to find a different company instead of continuing the search through other means. Because the Internet is so easily accessed from mobile devices now, consumers use their devices to find their favorite companies so a strong mobile presence is a must if companies do not want to lose business. Hasbro goes mobile According to Mobile Marketer, Hasbro has decided to create a mobile presence in order to keep up with video games. So far Hasbro’s Monopoly application has been a great success because it promotes family and friend engagement and users can personalize the app by uploading pictures of themselves to use as game pieces. Consumers like personalization, and so if companies want to see success from their mobile marketing strategies they should consider personalizing them to consumers in some way. Companies hesitate to go mobile because they are set in their ways, and they might already be seeing success, however as technology advances all companies should consider building a mobile presence if they want to continue to be successful. Successful mobile marketing techniques Thanks to mobile devices there are a number of ways companies can reach out to consumers who use them. SMS advertisements are a great way to personalize advertising for consumers making them feel important and ultimately driving in business. Marketing applications are another way companies can engage with consumers on a more personal basis. Consumers like to be in control, and applications are a great way they can control the type of marketing they receive. If apps are intriguing enough, consumers are likely to promote them to friends and family, which will ultimately promote business. Convenience of being mobile Consumers like the convenience of being able to locate and engage with their favorite companies from their mobile devices, so it is important that companies maintain that presence. Consumers are looking for ways to make their lives easier, and being able to purchase products with the click of a button or pay bills on the fly will only increase business for companies because consumers are always looking for convenience. Being mobile can benefit companies in several ways, but one way that is especially appealing to companies is the ease of keeping track of business thanks to their mobile presence. Mobile devices and websites help companies to keep track of important data such as which marketing strategies are working the best and where most of the sales are coming from. Being mobile can enhance business in several ways and should be a priority for all companies. Mobile Technology News brought to you by businesstexter.com Source: mobilemarketer.com/cms/news/gaming/18437.html

Why we use open source - Australia’s Immigration agency explains

Why choose open source? “In some ways, [the open source software used by the agency] is effectively more capable” than commercial products, he said. “In terms of cost-effectiveness, [it] wins hands down: no license/maintenance fees, extensible architecture [and] global open source R&D.” The team uses an open source software package called ‘R’. Read more