August 31, 2007 5:49 AM PDT
Sony pleads innocent in latest rootkit fiasco
- Related Stories
Security firms on police spyware, in their own wordsJuly 17, 2007
Spammers phish for iPhone fansJuly 2, 2007
Report: Rootkits becoming increasingly complexApril 18, 2007
Grisoft offers free rootkit fighting toolApril 10, 2007
PC hardware can pose rootkit threatFebruary 28, 2007
Sony settles with FTC in rootkit caseJanuary 30, 2007
Sony has far to go in rootkit caseDecember 20, 2006
Security A to Z: RootkitsNovember 27, 2006
Sony Sweden spokesman Fredrik Fagerstedt told local press this week that sometimes even actions undertaken with "good will" can go wrong.
Fagerstedt's comments came the same day that antivirus firm McAfee joined the growing chorus of companies criticizing Sony for compromising its customers' security. The Micro Vault drive is a USB device featuring fingerprint-reading software intended to add an extra layer of security for PC users. The software needed to be installed on the PC for the USB to work contains the rootkit technology.
The criticism is reminiscent of that directed at Sony BMG Music Entertainment in November 2005, when a programmer revealed that a technique designed to cloak the company's copy-protection software for music CDs also could be used by virus writers to hide malicious software.
McAfee reported that Taiwan's FineArt Technology, which makes encryption software for PCs and laptops, was responsible for creating the offending USB software.
"The authors apparently did not keep the security implications in mind" when designing the installation method, McAfee security specialists Aditya Kapoor and Seth Purdy wrote in a blog.
Kapoor and Purdy cataloged the incident as one of the worst examples of "nasty rootkits that use blended techniques to hide or protect themselves."
Echoing concerns expressed by another security specialist, F-Secure's Patrik Runald, the McAfee bloggers said the default installation path does nothing to stop malicious-software authors from copying code to a directory of their choice and executing it in that location.
They added that another easy hack for malicious-software authors would be to launch code from their chosen directory and add a start-up entry for the software to ensure it is hidden immediately as the PC boots up.
Sony Australia has not responded to multiple requests for comment.
Liam Tung of ZDNet Australia reported from Sydney.
15 commentsJoin the conversation! Add your comment