Sony Issues Patch As Hackers Pounce On Rootkit - InformationWeek
IoT
IoT
News
News
11/3/2005
02:04 PM
50%
50%
RELATED EVENTS
The Real Impact of a Data Security Breach
Aug 02, 2017
In this webcast, experts discuss the real losses associated with a breach, both in the data center ...Read More>>

Sony Issues Patch As Hackers Pounce On Rootkit

Sony's patch removes the cloaking technology it's been using for audio CDs--but hackers are already talking about ways to use the rootkit to hide their own illegal code.

Reacting to criticism of its CD copy protection, Sony on Wednesday posted a patch that reveals files previously hidden by a rootkit. But that may be closing the barn door after the horses bolted, since hackers are already discussing ways to use the rootkit to conceal their own code.

Wednesday, Sony put a patch on its Web site that "removes the cloaking technology component on SONY BMG content protected CDs," according to a statement on the site. The patch can be downloaded and installed while online, or a 3.6MB file can be retrieved for later installation.

But even as it posted the patch, Sony defended the technology. "This [rootkit] component is not malicious and does not compromise security. However, to alleviate any concerns that users may have about the program posing potential security vulnerabilities, this update has been released."

Although Sony said it has been using the First4Internet-developed digital rights management (DRM) software on selected CDs for several months, it was only this week that researchers discovered the technology relied on a rootkit to hide files. The practice was quickly condemned by other security experts because rootkits are typically only used by virus, worm, and spyware writers to hide their code.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll