Welcome Guest ( Log In | Register )


 
Reply to this topicStart new topic
> Rootkit - A New Threat ?, Protect Yourself
www.yourforum.gr
post 25 Oct 2005, 02:57 PM
Post #1


No comments
Group Icon

Group: Admin
Posts: 31721
Joined: 8-July 05
Member No.: 121
Zodiac Sign: I'm a leo!
Gender: I'm a m!



The Threat - Rootkits


What is a rootkit?

The term rootkit is very old and is dated back to the days when UNIX ruled the world. Rootkits for the UNIX operating system were typically used to elevate the privileges of a user to the root level (=administrator). This explains the name of this category of tools.

Rootkits for Windows work in a different way and are typically used to hide malicious software from for example an antivirus scanner. Rootkits are typically not malicious by themselves but are used for malicious purposes by viruses, worms, backdoors and spyware. A virus combined with a rootkit produces what was known as full stealth viruses in the MS-DOS environment.

How dangerous is a rootkit?

The rootkit itself does typically not cause deliberate damage. Its purpose is to hide software. But rootkits are used to hide malicious code. A virus, worm, backdoor or spyware program could remain active and undetected in a system for a long time if it uses a rootkit.

The malware may remain undetected even if the computer is protected with state-of-the-art antivirus. And the antivirus can't remove something that it can't see. The threat from modern malware combined with rootkits is very similar to full stealth viruses that caused a lot of headache during the MS-DOS era. All this makes rootkits a significant threat.

How common is the problem?

There are currently several spyware programs and viruses that use rootkits to hide. There are also a couple of publicly reported intrusions where rootkits have been used (for example the theft of the Half-Life 2 source code).

Rootkits are already quite common in spyware programs but not as common in viruses. There is clear evidence that rootkits is a technique that works in practice. But the actual threat is still small compared to the potential of this technique.

What malware uses rootkit techniques?

First of all, "real" rootkits such as Hacker Defender and FU, of course. Then some spyware/adware programs such as EliteToolbar, ProAgent, and Probot SE. Some Trojans such as Berbew/Padodor and Feutel/Hupigon, and also some worms e.g. Myfip.h and the Maslan-family.

Shouldn't antivirus detect rootkits before they go into hiding?

Yes, and in some cases it will. However, rootkits are usually distributed in source code and that means a hacker can modify the rootkit until antivirus products no longer detect it. In fact, many rootkit and Trojan authors sell "undetection service" to their "customers". This means that for a certain amount of money they guarantee that the rootkit binary they sell is not at that point detected by any antivirus vendors. There are also some other features in modern antivirus products that may detect rootkits. For example F-Secure Internet Security 2005 has a feature we call "Manipulation Control". It is a behavioral blocking mechanism that prevents malicious processes from manipulating other processes. This will prevent the activation of some rootkits, but not all.

What's the forecast for rootkits?

Rootkits are already quite common in the spyware field and they are becoming more commonly used among virus authors as well. Virus writers of today are becoming more professional and have a business purpose for their activities. They certainly have the skills and motivation to implement the added complexity that rootkits introduce in a virus or worm.

Rootkits can make hidden backdoors or spam-relays in infected computers useful for a much longer time. There is reason to believe that the use of rootkits will increase in the future.

Source : F-Secure user posted image



--------------------
Go to the top of the page
 
Bookmark this: Post to Del.icio.usPost to DiggPost to FacebookPost to GooglePost to SlashdotPost to StumbleUponPost to TechnoratiPost to YahooMyWeb
+Quote Post
www.yourforum.gr
post 25 Oct 2005, 02:59 PM
Post #2


No comments
Group Icon

Group: Admin
Posts: 31721
Joined: 8-July 05
Member No.: 121
Zodiac Sign: I'm a leo!
Gender: I'm a m!



What is F-Secure BlackLight?

F-Secure BlackLight Rootkit Elimination Technology detects objects that are hidden from users and security tools and offers the user an option to remove them. The main purpose is to fight rootkits and all kinds of malware that use rootkits. The F-Secure BlackLight Rootkit Elimination Technology works by examining the system at a deep level. This enables BlackLight to detect objects that are hidden from the user and security software.

What are the key benefits of F-Secure BlackLight Rootkit Elimination Technology?

F-Secure BlackLight can detect and eliminate active rootkits from the computer. Traditional antivirus scanners can't detect active rootkits.
On a normal system F-Secure BlackLight does not confront the user with a long list of suspected objects. This makes F-Secure BlackLight useful even for non-technical users.
F-Secure BlackLight Rootkit Elimination Technology can be used in the background during normal system operation. Other available scanners require a reboot during scan or may produce false positives if the system is used during scanning.
For whom is F-Secure BlackLight intended?

F-Secure BlackLight is intended for all computer users who want additional security by checking their system for rootkits. F-Secure BlackLight is suitable for use in both home and business environments.

How can I try F-Secure BlackLight Rootkit Elimination Technology?

NOTE: Stand-alone BlackLight beta's expiration has been extended until 1st of January 2006. An integrated BlackLight engine has been included in the F-Secure Internet Security 2006 suite.

Try Blacklight BETA


--------------------
Go to the top of the page
 
+Quote Post
www.yourforum.gr
post 22 Mar 2006, 04:12 PM
Post #3


No comments
Group Icon

Group: Admin
Posts: 31721
Joined: 8-July 05
Member No.: 121
Zodiac Sign: I'm a leo!
Gender: I'm a m!



[center]user posted image[/center]

Future Threats Are Coming Closer

Did you know that it is possible to hide spyware or a virus in a way that will fool even the traditional antivirus products?
Some spyware programs are already using so-called rootkits to hide deep in the system. And, virus authors are joining in. Learn more about the threat called rootkit.



The Cure - Innovative New Technology

Now, there is a cure, F-Secure BlackLight Rootkit Elimination Technology. And, it's time to find out, whether your computer is infected by invisible rootkits. Read more about this innovative counter-measure F-Secure BlackLightTM.

user posted image


--------------------
Go to the top of the page
 
+Quote Post
NickTheGreek
post 18 Aug 2006, 09:10 AM
Post #4


Administrator
Group Icon

Group: Admin
Posts: 118202
Joined: 3-June 05
From: Athens, Greece
Member No.: 1
Zodiac Sign: I'm a leo!
Gender: I'm a m!



[title]F-Secure BlackLight 2.2.1046 Beta user posted image[/title]

F-Secure BlackLight Rootkit Elimination Technology detects objects that are hidden from users and security tools and offers the user an option to remove them. The main purpose is to fight rootkits and all kinds of malware that use rootkits. The F-Secure BlackLight Rootkit Elimination Technology works by examining the system at a deep level. This enables it to detect objects that are hidden from the user and security software.

F-Secure BlackLight is able to correctly ignore non-malicious objects and alerts only on real rootkits, which makes it useful even for users without technical knowledge. It is also able to deal correctly with files that have been modified during the scanning process. This makes it possible to use it in the background without interrupting normal work.

Rootkits for Windows work in a different way and are typically used to hide malicious software from for example an antivirus scanner. Rootkits are typically not malicious by themselves but are used for malicious purposes by viruses, worms, backdoors and spyware. A virus combined with a rootkit produces what was known as full stealth viruses in the MS-DOS environment.
The rootkit itself does typically not cause deliberate damage. Its purpose is to hide software. But rootkits are used to hide malicious code. A virus, worm, backdoor or spyware program could remain active and undetected in a system for a long time if it uses a rootkit.
The malware may remain undetected even if the computer is protected with state-of-the-art antivirus. And the antivirus can't remove something that it can't see. The threat from modern malware combined with rootkits is very similar to full stealth viruses that caused a lot of headache during the MS-DOS era. All this makes rootkits a significant threat.

Homepage - http://www.f-secure.com/blacklight

Size: 799 KB

Download Freeware


--------------------

c:\ When the going gets tough, the tough get going ...
Go to the top of the page
 
+Quote Post
Aciid
post 29 Aug 2006, 07:55 PM
Post #5


Newbie
Group Icon

Group: Members
Posts: 5
Joined: 29-August 06
Member No.: 2424
Gender: I'm a m!



Well as far as i know rootkit's have been around really long. Not like theyre not dangerous but u can admin like an entire server as in said in the f-secure report.
Hiding the cracker n its files and processes. So its only dangreous in wrong hands sad.gif my self im fearing it greatly because i use linux as an primary os.
I have SuSE 10.0 32bit x86. I dont use windows any more because it has much more problems and leaks and leafs default.biggrin.gif
But im quite sure about my privacy & security that i cant get attacked and cracked.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic
1 User(s) are reading this topic (1 Guests and 0 Anonymous Users)
0 Members:

 



RSS Lo-Fi Version Time is now: 26th June 2025 - 05:30 PM
Skin and Graphics by Dan Ellis and Anubis. Hosting by Forums & More © 2005-2011.
InvisionGames - Your #1 Arcade Games Repository | AllSigs - Signatures for all | Rock Band + Guitar Hero = RockHero ! | The Remoters - Remote Assistance | FileMiners - You ask, We find