From: philo on
Daave wrote:
> philo wrote:
>> Daave wrote:
>>> philo wrote:
>>>> Daave wrote:
>>>>> philo wrote:
>>>>>> PA Bear [MS MVP] wrote:
>>>>>>> philo wrote:
>>>>>>> <snip>
>>>>>>>> About a year ago I repaired a machine that had been compromised.
>>>>>>>>
>>>>>>>> It had been used for on-line banking and credit card
>>>>>>>> transactions and two accounts had been hacked.
>>>>>>>>
>>>>>>>> First thing I did was scan for root kits in all the places one
>>>>>>>> would expect.
>>>>>>>>
>>>>>>>> Nothing found.
>>>>>>>>
>>>>>>>> After giving the machine a thorough scan...
>>>>>>>> the root kit was found "hiding" in the restore volume!
>>>>>>> So what? That "restore volume" wasn't active & posed no threat
>>>>>>> unless you or the user selected that particular Restore Point.
>>>>>>>
>>>>>> You missed the point entirely..
>>>>>>
>>>>>> the root kit was able to "phone home"
>>>>>>
>>>>>> from within the restore volume.
>>>>>>
>>>>>> those Russian chaps are rather clever
>>>>> If the rootkit was phoing home, it was doing so from a location
>>>>> other than the restore volume. Just because you are unable to
>>>>> detect it doesn't mean it isn't there!
>>>>>
>>>>>
>>>> I'll answer the both of you here:
>>>>
>>>> Wrong
>>> Unsubstantiated.
>>>
>>> It has already been established that certain rootkits are
>>> next-to-impossible to detect.
>>>
>>> The rootkit that you say was "hiding" in the restore point obviously
>>> wasn't hidden! However, the rootkit very likely remained in the
>>> system (the restore volume doesn't count unless you use SR, using
>>> that particular restore point), hidden from you. And your situation
>>> is not the only one.
>>>
>>>
>> I used the word "hiding"
>> as I needed to scan the drive from another system to detect it.
>>
>> The rootkit was designed to operate from within the restore volume.
>
> Please provide documentation.
>
>
some good reading here

(may warp)


http://books.google.com/books?id=5Cs46M9FV0sC&pg=PA4&lpg=PA4&dq=rootkit+in+restore+volume&source=bl&ots=pUMJIDwhIu&sig=e3x1AMGWY-Wuki2uu68TCa1XAk0&hl=en&ei=ue2cS7woi-oz9rm45g0&sa=X&oi=book_result&ct=result&resnum=2&ved=0CAgQ6AEwATgK#v=onepage&q=rootkit%20in%20restore%20volume&f=false
From: glee on
"philo" <philo(a)privacy.net> wrote in message
news:ROidnTsOvtW0cwHWnZ2dnUVZ_s2dnZ2d(a)ntd.net...
>> snip
>>>>
>>> I used the word "hiding"
>>> as I needed to scan the drive from another system to detect it.
>>>
>>> The rootkit was designed to operate from within the restore volume.
>>
>> Please provide documentation.
> some good reading here
>
> (may warp)
>
>
> http://books.google.com/books?id=5Cs46M9FV0sC&pg=PA4&lpg=PA4&dq=rootkit+in+restore+volume&source=bl&ots=pUMJIDwhIu&sig=e3x1AMGWY-Wuki2uu68TCa1XAk0&hl=en&ei=ue2cS7woi-oz9rm45g0&sa=X&oi=book_result&ct=result&resnum=2&ved=0CAgQ6AEwATgK#v=onepage&q=rootkit%20in%20restore%20volume&f=false

VERY Interesting.....thanks for the link. I have not seen mention of
this before.....will send it on to folks in the field to see what kind
of feedback I get from there...should be interesting.
--
Glen Ventura, MS MVP Oct. 2002 - Sept. 2009
A+
http://dts-l.net/

From: philo on
glee wrote:
> "philo" <philo(a)privacy.net> wrote in message
> news:ROidnTsOvtW0cwHWnZ2dnUVZ_s2dnZ2d(a)ntd.net...
>>> snip
>>>>>
>>>> I used the word "hiding"
>>>> as I needed to scan the drive from another system to detect it.
>>>>
>>>> The rootkit was designed to operate from within the restore volume.
>>>
>>> Please provide documentation.
>> some good reading here
>>
>> (may warp)
>>
>>
>> http://books.google.com/books?id=5Cs46M9FV0sC&pg=PA4&lpg=PA4&dq=rootkit+in+restore+volume&source=bl&ots=pUMJIDwhIu&sig=e3x1AMGWY-Wuki2uu68TCa1XAk0&hl=en&ei=ue2cS7woi-oz9rm45g0&sa=X&oi=book_result&ct=result&resnum=2&ved=0CAgQ6AEwATgK#v=onepage&q=rootkit%20in%20restore%20volume&f=false
>>
>
> VERY Interesting.....thanks for the link. I have not seen mention of
> this before.....will send it on to folks in the field to see what kind
> of feedback I get from there...should be interesting.


You are welcome
those evil folks who write rootkits

I must admit ... are quite clever.

That kind of malware is far more dangerous that a virus
in that it may actually result in savings accounts and credit card
compromises.

Rootkits are a very real and a very nasty threat!!!!!

Not to be taken lightly.

I urge all people to take caution

and for the folks at MS to work very hard on the issue of root kits!!!!
From: Ronin on
May warp what? My mind (BTDT)? ;-)

--
Ronin

"philo" <philo(a)privacy.net> wrote in message
news:ROidnTsOvtW0cwHWnZ2dnUVZ_s2dnZ2d(a)ntd.net...
> Daave wrote:
<SNIP>
>>
>> Please provide documentation.
> some good reading here
>
> (may warp)
>
>
> http://books.google.com/books?id=5Cs46M9FV0sC&pg=PA4&lpg=PA4&dq=rootkit+in+restore+volume&source=bl&ots=pUMJIDwhIu&sig=e3x1AMGWY-Wuki2uu68TCa1XAk0&hl=en&ei=ue2cS7woi-oz9rm45g0&sa=X&oi=book_result&ct=result&resnum=2&ved=0CAgQ6AEwATgK#v=onepage&q=rootkit%20in%20restore%20volume&f=false

From: MowGreen on
Upon further review ... root kits that can penetrate System Restore
*** DO EXIST ***. I had downloaded this paper from Microsoft Australia
in January but neglected to read it:

http://www.microsoft.com/downloads/details.aspx?FamilyID=27B9B205-D4AD-49F1-B7D7-66EE185C59CE&amp;displaylang=en&displaylang=en



'I CAN'T GO BACK TO YESTERDAY, BECAUSE I WAS A
DIFFERENT PERSON THEN'
Chun Feng
Microsoft, Level 5

" ABSTRACT
System Restore hardware and software have been widely
implemented, and are commonly used by computer users to
revert back to a pre-preserved 'good' state after being affected
by malware or other threats to system integrity. As these
restore facilities have become commonplace, so too has the
malware that attempts to penetrate them. This type of malware
reaches into the depths of the affected machine and targets the
file system driver.
In late 2007, a mysterious new breed of malware appeared in
China and has been evolving quickly since. This malware,
named Win32/Dogrobot, is designed deliberately to penetrate
a 'hard disk recovery card' – hardware widely used by Internet
cafés in China. Surprisingly, Dogrobot has caused more than
eight billion RMB (around 1.2 billion USD) in losses to
Internet cafés in China. (This cost far exceeds that caused by
the notorious Win32/Viking virus.)
This paper tracks the five generations of Dogrobot and
presents the novel rootkit technique used by Dogrobot to
penetrate System Restore on Windows systems, covering
penetration from the Windows volume management layer used
by early variants, to the Windows IDE/ATAPI Port Driver layer
used by the latest variants. This paper also closely examines
Dogrobot's propagation methods, including the use of
zero-day exploits and ARP spoofing. "


Seeing that paper was published in 2008 I'm wondering what generation
Win32/Dogrobot is now at and what other capabilities it currently has.
Perhaps the MS Malware Protection page has some info. It does:

http://www.microsoft.com/security/portal/Threat/Encyclopedia/Search.aspx?query=Win32%2fDogrobot&showall=False&CBF=False&sortby=relevance&sortdir=desc&size=10&page=1

So the misconception was on my part. Mowa culpa.

MowGreen
================
*-343-* FDNY
Never Forgotten
================

banthecheck.com
"Security updates should *never* have *non-security content* prechecked



philo wrote:
> glee wrote:
>> "philo" <philo(a)privacy.net> wrote in message
>> news:ROidnTsOvtW0cwHWnZ2dnUVZ_s2dnZ2d(a)ntd.net...
>>>> snip
>>>>>>
>>>>> I used the word "hiding"
>>>>> as I needed to scan the drive from another system to detect it.
>>>>>
>>>>> The rootkit was designed to operate from within the restore volume.
>>>>
>>>> Please provide documentation.
>>> some good reading here
>>>
>>> (may warp)
>>>
>>>
>>> http://books.google.com/books?id=5Cs46M9FV0sC&pg=PA4&lpg=PA4&dq=rootkit+in+restore+volume&source=bl&ots=pUMJIDwhIu&sig=e3x1AMGWY-Wuki2uu68TCa1XAk0&hl=en&ei=ue2cS7woi-oz9rm45g0&sa=X&oi=book_result&ct=result&resnum=2&ved=0CAgQ6AEwATgK#v=onepage&q=rootkit%20in%20restore%20volume&f=false
>>>
>>
>> VERY Interesting.....thanks for the link. I have not seen mention of
>> this before.....will send it on to folks in the field to see what kind
>> of feedback I get from there...should be interesting.
>
>
> You are welcome
> those evil folks who write rootkits
>
> I must admit ... are quite clever.
>
> That kind of malware is far more dangerous that a virus
> in that it may actually result in savings accounts and credit card
> compromises.
>
> Rootkits are a very real and a very nasty threat!!!!!
>
> Not to be taken lightly.
>
> I urge all people to take caution
>
> and for the folks at MS to work very hard on the issue of root kits!!!!