News
News
11/3/2005
02:04 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Sony Issues Patch As Hackers Pounce On Rootkit

Sony's patch removes the cloaking technology it's been using for audio CDs--but hackers are already talking about ways to use the rootkit to hide their own illegal code.

Reacting to criticism of its CD copy protection, Sony on Wednesday posted a patch that reveals files previously hidden by a rootkit. But that may be closing the barn door after the horses bolted, since hackers are already discussing ways to use the rootkit to conceal their own code.

Wednesday, Sony put a patch on its Web site that "removes the cloaking technology component on SONY BMG content protected CDs," according to a statement on the site. The patch can be downloaded and installed while online, or a 3.6MB file can be retrieved for later installation.

But even as it posted the patch, Sony defended the technology. "This [rootkit] component is not malicious and does not compromise security. However, to alleviate any concerns that users may have about the program posing potential security vulnerabilities, this update has been released."

Although Sony said it has been using the First4Internet-developed digital rights management (DRM) software on selected CDs for several months, it was only this week that researchers discovered the technology relied on a rootkit to hide files. The practice was quickly condemned by other security experts because rootkits are typically only used by virus, worm, and spyware writers to hide their code.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Government, May 2014
NIST's cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work?
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.