Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Rootkit writers outfox Windows 64-bit PatchGuard protection

Sets developer test mode to slip past security

Article comments

Rootkit writers have started exploiting a loophole that lets them write malware able to bypass the PatchGuard driver signing protection built into 64-bit versions of Windows, Kaspersky Lab has reported.

A product of the BlackHole Exploit Kit, a hugely successful kit for building malware to hit specific software vulnerabilities, the first element of the attack on a system is straightforward enough, using a downloader to hit the system through two common Java and Adobe Reader software flaws.  

On 64-bit Windows systems open to these exploits, this calls a 64-bit rootkit, Rootkit.Win64.Necurs.a., which executes the ‘bcdedit.exe –set TESTSIGNING ON command, normally a programming command for trying out drivers during development.

The loophole abused by the malware writers is that this stops Windows’ Patchguard from objecting to the unsigned and insecure nature of the driver (in this case a rootkit driver) being loaded.

The power of the technique is double-edged, however. Once loaded, the rootkit is able to block the correct loading of antivirus software that might detect and remove it, but this is also a giveaway. Security programs that do not work correctly could be taken to infer the presence of something unusual.

Windows PatchGuard, formally known as Kernel Patch Protection (KPP), is a design feature of 64-bit versions of Windows, including XP, Vista, Windows 7, and Windows Server, designed to stop malware undermining the operating system at the highest level of privilege.

As an aside, Kaspersky reports that the malware also attempts to download Hoax.OSX.Defma.f, a recent and well-publicised fake antivirus program targeting Mac OS X users, which can’t run on Windows.

“It appears that the developers of the latest rogue AV program for MacOS are actively distributing it via intermediaries, who don’t really understand what it is they are supposed to install on users’ computers,” said Kaspersky researcher, Vyacheslav Zakorzhevsky, in his blog covering the malware.

This underlines the ominous way that Macs are now seen as just another platform to be targeted where possible using multi-platform malware. 




Share:

More from Techworld

More relevant IT news

Comments

Arshdeol2 said: how about firewall tunal patch rootkit well it seamsimpossiblebut it can be done and when it will they playload will rule that entire computer running on that AV which got hacked



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *