Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Boot Sector Viruses & Rootkits Poised For Comeback 95

Ant writes "Ars Technica says Panda Labs' first quarter 2008 malware report raises a new concern, though it comes from a surprising direction. According to the company, boot sector viruses loaded with rootkits are poised to make a comeback. This honestly sounds a bit odd, considering how long it has been since a boot virus has topped the malware charts, but it's at least theoretically possible (pdf). Such viruses have a simple method of operation. The virus copies itself into the Master Boot Record (MBR) of a hard drive, and rewrites the actual MBR data in a different section of the drive. The report also covers a number of other topics and makes predictions about the types of attacks computer users may see in the future. Forecasting these trends is always tricky."
This discussion has been archived. No new comments can be posted.

Boot Sector Viruses & Rootkits Poised For Comeback

Comments Filter:
  • With or Without TPM? (Score:4, Interesting)

    by sainttX ( 1264044 ) on Thursday April 03, 2008 @04:56PM (#22956452)
    If we have hardware security support, this is not that easy..
  • Let me guess (Score:5, Interesting)

    by WindBourne ( 631190 ) on Thursday April 03, 2008 @04:56PM (#22956456) Journal
    Panda labs has a new product that protects just this? Call me a cynic, but ....
    • Re: (Score:2, Funny)

      by MooseMuffin ( 799896 )
      Yep. Just copy this little protection file into your MBR...
    • Re:Let me guess (Score:5, Insightful)

      by Lumpy ( 12016 ) on Thursday April 03, 2008 @06:09PM (#22957324) Homepage
      That's ok ASUS has had that protection for decades.

      MBR protection has been in every bios on ASUS motherboards for at least 12 years now. turn it on and NOTHING can write to the mbr.

      gotta love how old tech solves the "new hotness".
      • Re: (Score:3, Informative)

        by Molochi ( 555357 )
        MBR bios protection seems to be pretty common on "homebuilt" and "mom and pop" machines. But my laptop (acer) doesn't seem to have it. I don't see an option to enable it on our toshiba (though it runs vista so NBD). I don't do PC support anymore, do the vast number of Dells running XP have MBR protection in bios?
        • Re: (Score:1, Informative)

          by Anonymous Coward
          Professional laptops like Panasonic tough books have it.

          Maybe the toy grade stuff like toshiba and dell dont.
        • I won't use anything but ASUS motherboards. Once you get used to the feature set on a good motherboard, the crap you get from the big computer manufacturers is just intolerable.

          Most of them skimp on the motherboard because most consumers don't understand the difference between a fast processor on a good motherboard, and a fast processor on a terrible motherboard. They just look at mhz and ram, and ignore bus speed/bandwidth.
      • Re:Let me guess (Score:5, Informative)

        by Anonymous Coward on Thursday April 03, 2008 @07:34PM (#22958178)
        Not quite. It protects the bios from hard disk writes using int 13h. It won't protect from programs accessing the hard drive directly using I/O ports, which any modern MBR virus is likely to do.
        • Re: (Score:3, Interesting)

          by tlhIngan ( 30335 )

          Not quite. It protects the bios from hard disk writes using int 13h. It won't protect from programs accessing the hard drive directly using I/O ports, which any modern MBR virus is likely to do.

          True, most protection does this, especially from 12 years ago when DOS was still a viable platform.

          However, I don't see why more modern systems can't store a copy of the MBR in the CMOS - it is, after all, only 512 bytes in size. On boot, it simply does a compare between the MBR on the hard disk and the one it stored

    • by mrbluze ( 1034940 ) on Thursday April 03, 2008 @07:03PM (#22957882) Journal

      Windows is a program which inserts code into the master boot record, often before the user has broken open the packaging of their new computer, resulting in loading of malicious code at power-on which causes the computer to phone-home and results in the gradual loss of available disk space on the affected drive. Multiple other vulnerabilities have also been reported.

      Various removal tools [ubuntu.com] are available free of charge. This is considered a critical and urgent update.

  • by oni ( 41625 ) on Thursday April 03, 2008 @05:03PM (#22956548) Homepage
    GNU GRUB version 0.95 (638 lower / 288704K upper memory)

    Ubuntu, kernel 2.6.12-9-386
    Ubuntu, kernel 2.6.12-9-386 (recovery mode)
    Ubuntu, memtest86+
    Other operating systems:
    Windows NT/2000/XP
    omfgh4xorz-r00tk1tz3113

    Use the up and down keys to select which entry is highlighted.
    Press enter to boot the selected OS, 'e' to edit the commands
    before booting, or 'c' for a command-line


    hmm, something's not right here
  • by ais523 ( 1172701 ) <ais523(524\)(525)x)@bham.ac.uk> on Thursday April 03, 2008 @05:06PM (#22956572)
    I still check to make sure that there aren't any floppy disks left in the drives before I power-on (and I still have floppy drives, even an external one for the laptop); it seems now the old habits may have a reason. Of course, nowadays malware doesn't have to rely on floppy disks accidentally left in drives and sharing of executables from one computer to another because the Internet exists; but that doesn't stop the old threats working, just provides a more modern alternative that gets more attention.
    • Re: (Score:2, Insightful)

      by Tanman ( 90298 )
      You can boot from a cd/dvd as well as a floppy.
      • Re: (Score:2, Insightful)

        by Digi-John ( 692918 )
        Or a usb stick in many cases. Sneaky.
        • Re: (Score:2, Insightful)

          Why do you have to boot it?
          Don't a lot of USB sticks have u3?

          u3 installs a device driver on Windows and creates a fake cd rom so that the memory stick can autorun.

          Fuck waiting for the autorun, its the device driver I would be worried about.
          • Autorun.inf also allows autorunning from USB drives without installing special drivers. This is how many USB keys spread, plug in the drive and it copies the virus to the host machine. Plug a clean USB key into an infected machine, it copies onto the USB key. The University I went to had a constant virus infection in one of the computer labs that didn't disable autorun.
            • Re: (Score:2, Informative)

              by jmadren ( 1142353 )
              No, Autorun.inf will not automatically run on plain USB flash drives. Microsoft didn't think to support that. Autorun.inf will only work on CD drives. That's why U3 flash drives have firmware in them that emulates a CD drive, to trick Windows into automatically running the Autorun.inf. U3 doesn't install special drivers on the computer, Windows does that itself in response to seeing a new CD hardware device (except for Win95/98, for which you have to install some drivers).
              • Not true. If I stick autorun.inf on any plain old USB drive (including external enclosures) autorun.inf is triggered. I use this all the time to set the drive icon and to prevent Windows popping up the default autorun window that prompts whether you want to open music files in WMP, pictures in the picture viewer, open explorer to browse files etc. Heck, I can even do this on SATA hard drives and hotplug them and it still uses autorun.inf. See http://dailycupoftech.com/usb-drive-autoruninf-tweaking/ [dailycupoftech.com]
        • Re: (Score:3, Insightful)

          by Nullav ( 1053766 )
          And sometimes hard drives. (I know, I was shocked, too.)
    • Re: (Score:3, Insightful)

      by Anonymous Coward
      Or just disable floppy, cdrom and usb from the boot order in your bios
    • Funnily, I do the exact opposite. I boot from a floppy, all the time. It's write-protected, of course. It contains GRUB. I eject it as soon as it loads the Linux, and plug it back in when I need to boot. Thus, the probability of corruption of my boot sector mattering is greatly reduced.
      • Re: (Score:2, Insightful)

        by GigaplexNZ ( 1233886 )
        The fact that it is on a floppy drive is enough to corrupt it. None of my floppy disks have valid data anymore, it self-corrupts over time.
    • it seems now the old habits may have a reason.


      "All this has happened before. All this will happen again"
  • Cool (Score:4, Funny)

    by dedazo ( 737510 ) on Thursday April 03, 2008 @05:07PM (#22956594) Journal
    The last time any of my machines had anything resembling a virus, malware or trojans it came in a floppy boot sector and it was called "Natas" or something like that.

    Bill Clinton was president, the Nasdaq was at 5,000 or something like that and I was smoking pot. Maybe we'll go back to the old days in more ways than one!

    • Re: (Score:3, Funny)

      by Abreu ( 173023 )
      Well, I don't know about boot sector viruses or about pot, but theres a chance you might get a 'President Clinton' once more...

      -

      *Disclaimer: The above is a joke and not an endorsement or criticism of any US candidate... I am not USian and I don't really care much for american policies.
      • by Artuir ( 1226648 )
        From the looks of it, most of us "USians" (that is my new favorite term) haven't cared much for American policies or politics for quite some time!
    • by Mista2 ( 1093071 )
      I work in an IT department, our engineers all know about AV security, or home PCs are given free copies of what we have at work, All is good. Yesterday an engineer plugged in a brand new external USB drive, it was r00ted already. Trojan attempted to load into one of the local disks and was picked up by a scanner. It can happen to anyone these days.
      • Re: (Score:2, Funny)

        I remember back in college (1992) I bought a box of 10 floppy disks. All 10 were infected (with ripper I think). I wrote to the disk company letting them know the numbers that were on the box. About three weeks later I got a huge box. It had over 1000 brand new floppies and a letter thanking me for letting them know about that issue. Also was an apology for getting infected disks. I didn't have to buy floppy disks for years.
    • by MrMr ( 219533 )
      Exactly, the last time any of my machines had anything resembling a virus it was running DOS 2.11, Btw I keep hearing about this new gui you can put on top of that, is that any good?
    • Geez, you sound too much like me. My first day in MIS in 1993 I found a PC with Natas on it. Then I went searching around the building and found a few more, along with infected floppies. That was nasty just because when it popped up after hiding for a while it destroyed all executables that ran.

      I suddenly feel so old.
  • Bah! (Score:4, Funny)

    by Well-Fed Troll ( 1267230 ) on Thursday April 03, 2008 @05:07PM (#22956596)
    I spit on thee, thou foul virus writing knaves.
    Wilt it doth survive the lowly Format?
    Truly I say unto thee, Real Men write CMOS infecting viruses.
  • by Digi-John ( 692918 ) on Thursday April 03, 2008 @05:09PM (#22956622) Journal
    A danger to be alert to is the possibility of viruses and rootkits that ship with the computer. Consider that most computers have a lot of parts made in China; suppose the Chinese government decides it's going to slip something into your BIOS? That is a major issue for national security, and it's not just speculation; I've seen test viruses that sit in the BIOS and do a SUID root on a specific file in /tmp on every bootup. EFI is just as vulnerable, because it's basically a complete Unix-like OS just for booting.
  • Why? (Score:5, Insightful)

    by Rurik ( 113882 ) on Thursday April 03, 2008 @05:11PM (#22956640)
    I wonder why a virus writer would even want to do this? Nearly all have learned that instead of wreaking havoc for fun, they can wreak havoc and make money off it. There's a reason most writers stopped writing boot sector viruses. Viruses are more fun when they can perform click-fraud, and other long-term money making actions, instead of destroying a user's computer.
    • Re:Why? (Score:4, Insightful)

      by eldavojohn ( 898314 ) * <eldavojohn@noSpAM.gmail.com> on Thursday April 03, 2008 @05:34PM (#22956940) Journal
      I don't think this article was talking about viruses that merely hose your hard drive. Granted, that's what most of those did, I think they are dreaming up something that writes your MBR to another piece of the hard drive and gains root access right when you start your computer. If virus writers are sophisticated enough, maybe the write something like an extended firmware interface that loads your operating system normally and you don't even know about it running in the background. Again, that's a high level of sophistication but I was blown away by what the virtual machines have been able to do.

      There's also evidence that I am skeptical of like:

      The problem with boot viruses is that their attack vector is fairly well-guarded. Any antivirus program worth beans will detect a suspicious attempt to modify the MBR and will alert the end user accordingly. Running as a user rather than an administrator should also prevent such modification even if you don't have an antivirus scanner installed. Panda implies that this kind of exploit could be an issue in Linux, and I suppose that's theoretically possible, but Linux always creates a user account without root access by default.
      If Panda's report really did imply that, they just lost a whole shitload of credibility in my book. I'm not stupid enough to think that Linux is impenetrable but I know that the Unix-like security scheme with users in userland and superusers in kerneland is always observed.
      • The obvious use being running a hypervisor which then boots the original OS.
      • Seems funny Panda would go out and name Linux as a sole heir to
        this possible infection, I wonder how much money they are getting
        under the table from M$ to write this bull...
    • Re:Why? (Score:4, Insightful)

      by sjames ( 1099 ) on Thursday April 03, 2008 @05:42PM (#22957032) Homepage Journal

      Consider the MBR just one of several potential hooks into the system. It need not destroy the machine at all. It could (for example) install itself as ring 0, load the OS below itself and then the fun begins.

      Consider the havoc it could create if it can manage to get itself into the SMI handler by playing dirty tricks with the RAM controler that are only possible before the OS switches to protected mode.

    • Re:Why? (Score:4, Insightful)

      by darkmeridian ( 119044 ) <william.chuangNO@SPAMgmail.com> on Thursday April 03, 2008 @06:05PM (#22957286) Homepage
      I think the plan is to have a MBR virus plant a rootkit that pwns the OS and zombies the system without anyone realizing what's going on.
    • Re: (Score:2, Interesting)

      by LowlyWorm ( 966676 )
      I have often suspected antivirus companies themselves. They are the ones who always benefit from the never ending array of new viruses. Sure, there are a lot of hacker want-to-bes that write them but are there really that many malicious hackers? I am sure there are more viruses than hackers. Just look at the list of viruses you antivirus "protects" against. There must be a few virus writers making a LOT of viruses. Who would do that and what would their motivation be?
      • This is a reply to your signature. But I believe the word "bad" has been stricken from the dictionary from now on you are advised to use "doubleplus ungood." Of course admitting to having been exposed to something ungood is sufficient reason to have you erased, you are hereby ordered to sit in front of your telescreen with your hands in plain sight until representatives from the Ministry of Truth arrive.
        • The Ministry of Truth can put it in their memory holes. Besides, we have always been at war with Iraq. Unless it was Afghanistan... or Iran ... or North Korea ... or Venezuela ... or Cuba... or The U.S.S.R. ... or ...
      • by m50d ( 797211 )
        Who would do that and what would their motivation be?

        Less dangerous are the bored teenagers, doing it out of boredom. Think of how you were when you were 14, now imagine you could code pretty well. A decent percentage of our modern 14 year olds can, and a few of them will put it into practice writing virii for amusement.

        More dangerous are the professional criminals, doing it because it's easy money. Own the machines, sell them to a spammer. Or if you don't want to worry about handling the business side you

        • That certainly happens but it would surprise me that AV companies don't see the easy money too. A virus writer approached by a spammer or crime syndicate (or vice-versa) can't be that common of a scenario. AV companies have been in business for some time. There are some reputable free AV programs but there are bad apples everywhere.
    • Wasn't there a lot of hubbub a few months ago when drive mfg's were planning to increase the sector size? That would sure make, uh, interesting boot sector viruses more practical.
    • I predicted a comeback of the BSV (boot sector virus) immediately following the end of the DOS-based antivirus apps that could run from a floppy boot, and here we are today... as to WHY:

      1) Wonderful place to hide your spyware. The MBR space is about 5k. Of this only about 500 bytes is typically in use; the remainder is large enough to host compact spyware with its own SMTP server (there are already malwares out there with these functions packed into only 3k of code).

      2) Blackmail. Encrypting BSVs were at one
  • by Anonymous Coward
    Sorry for being off topic, but it should be pointed out that Panda is strongly linked [wikipedia.org] with the cult of Scientology. While it doesn't make them necessarily evil, the recent events of people being harassed for protesting against the cult and the tactics employed by the cult to obtain at any cost personal data of protesters, should suggest the use of different antivirus/antispam programs, especially in a close source environment like Windows where the user cannot easily monitor what the software does and what
  • Widespread? (Score:3, Interesting)

    by gmuslera ( 3436 ) on Thursday April 03, 2008 @05:21PM (#22956800) Homepage Journal
    If well that kind of virus could be made, and work, the odds of getting infected looks so low (EVEN for windows users) that probably wont be very widespread.

    In the other hand, if you have already something ugly running as admin/root in your box in a way or another, it could deploy the MBR part, but dont see the advantage of this if is anyway already in control (afaik some rootkits/trojans (?) for windows hide themselves from scanners intercepting network/disk drivers or something similar, so no big advantage there)
    • Re: (Score:3, Interesting)

      by Culture20 ( 968837 )
      Imagine an MBR virus shipping from the factory on floppies, USB sticks, USB HDDs, or a BIOS or MBR virus/rootkit on new Lenovo machines (sorry, China's an easy target these days).
      • Re: (Score:2, Insightful)

        by AvitarX ( 172628 )
        Where do you think Apples are made?

        And they have that fancy BIOS that could be a lot of fun too.

        It doesn't even need to be China. The potential payout is enough that organized crime anywhere could pull it off, though in a country like China it is probably easier to bribe enough people to slip your stuff into the assembly line.
      • by gaspyy ( 514539 )
        Actually, my USB flash memory got infected when I went to a nearby service office to print something.

        My AV (Bitdefender) caught it. It was an executable and autorun.inf

        Subsequently, I disabled autorun for all drives.
  • by wheatking ( 608436 ) on Thursday April 03, 2008 @05:27PM (#22956872)
    so what happens w/ all this virtualization (VMware, Xen, Microsoft/Kidaro, RingCube, Moka5,...) coming in... aren't bare metal vulnerabilities @ the hypervisor layer a bigger deal?
  • by jdb2 ( 800046 ) * on Thursday April 03, 2008 @05:37PM (#22956974) Journal
    For a rootkit, the lower the level it can modify the system at, the better. We've seen this progression, from user-mode,to kernel mode hooks,to kernel mode data structures etc. So, obviously the rootkit authors know that their current methods will be obsolete in the near future, and have "lowered the bar" (pun intended ;) to the MBR. (Heh, that also rhymes ;) Anyway, if you think this is the last safe haven for rootkits, you're wrong -- really wrong. How about a rootkit that splits itself into tiny chunks, compresses them, and then inserts them into the free space available on the various BIOS's in your system eg. Video, Hard Drive, RAID Controller etc.? Impossible you say, well, I advise you to watch this presentation :

    http://youtube.com/watch?v=G26oZtzluAQ&fmt=6 [youtube.com]

    Systems with the ability to boot from a storage device other than a hard drive, say, a USB drive, are especially vulnerable, as the rootkit doesn't have to gain access to the BIOSs via the OS. Instead, it modifies the boot sector of the USB drive and then, upon bootup, after the BIOS boots off the USB drive, hides itself via the previously mentioned technique, so as to ensure it will run even if the boot sector of the USB drive is modified. This is possible as, upon bootup, the BIOS scans for memory mapped expansion ROMs (the previously mentioned BIOS's spread throughout your system) and then transfers control to each one.

    Something to think about.

    jdb2
    • It's funny a hundred years ago in the mid to late 90s floppy viruses stopped being effective because people stopped exchanging floppies, but at that same time network viruses thrived due to connection to the internet. Now with USB keys so common, a floppy type virus should/could make a good living. No one worries about the potential that someones USB key carries a virus.
    • by Reziac ( 43301 ) *
      And even simpler, the hidden "recovery partitions" that are now so common on OEM machines. (Or the 7mb hidden partition that Partition Magic creates on every HD that isn't set up with an active partition.)

      Point being, free space is free space, and there is always some way INTO that free space.

      I imagine some protection might be achieved for a BIOS by filling the leftover space with spurious data, but it only takes one clever virus writer to figure out how to delete the junk data...

      As to write-protection, if
  • EFI / intel atm / amd Remote IT may be targets that are not part of the OS on the system and are tied to the NIC controllers, chipset , video and other hardware parts and there is not that many report tools for keeping the bios / firmware up to date.

    EFI can use a partition on the hard disk to store Extensions and the Extensions can also come form add in cards / on board roms and other places.

    The hardware based Remote IT tools may be holes that hackers can use and can be limited by flash rom space to store u
  • by analog_line ( 465182 ) on Thursday April 03, 2008 @07:45PM (#22958272)
    ...which from my (limited) understanding, an MBR is set aside, but not actually used for booting anything. I guess technically it's free space, so another hiding place, but nothing normally accesses that record, so would this kind of thing have any effect? You know, on computers like Intel Macs, which all use EFI.
    • by greed ( 112493 )
      You'd have to attack the EFI "system volume" instead of the MBR. Seeing as rEFIt can replace the default Mac OS booter, there's definitely a way to do it.
    • by Reziac ( 43301 ) *
      It doesn't matter. All a BSV or rootkit needs is a small amount of hidden free space -- on the HD (isn't EFI essentially BIOS-type code but located on the HD?) or as others have pointed out, in any system ROM, such as the BIOS on your video card.

      Considering that some video cards and most HDs can be used in either PC or Mac... a smart virus need only check which type of system it's in, and configure itself accordingly.

      I foresee a return to jumper-based write-protection for system ROMs. (A flag in software ca
  • great idea (Score:3, Funny)

    by ILuvRamen ( 1026668 ) on Thursday April 03, 2008 @07:59PM (#22958398)
    And you know what really helps is writing detailed how-to theory articles, saying it's inevitable, and repeating how effective it could be. That will ensure that all these gloom and doom virus articles come true! That must be what all these authors want or something or they'd all shut up.
  • There are some really good comments here, (checks, sees if it's /.)
    After the jump - read the comments, starting here:
    Further:

    http://www.securityfocus.com/comments/articles/11372/33017/threaded#33017 [securityfocus.com]

    http://slashdot.org/comments.pl?sid=453034&cid=22412440 [slashdot.org]
  • Panda Labs talks up the malware scare to sell PRODUC~1 ..

    "The report also covers a number of other topics and makes predictions about the types of attacks computer users may see in the future"

    Like, what kind of 'computers' does the vast majority of this malware run on.
  • New rootkits? Is Sony releasing some new gadget this year?

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...