ROOTKIT, that's when you know you are F*cked
What Is a
Rootkit?
A rootkit is a
malicious computer program designed to provide continued privileged access to a
computer while actively hiding its presence. The term rootkit is a connection
of the two words "root" and "kit." Originally, a rootkit
was a collection of tools that enabled administrator-level access to a computer
or network.
Root refers to the Admin account on Unix and Linux systems, and kit
refers to the software components that implement the tool. Today rootkits are
generally associated with malware – such as Trojans, worms, viruses – that
conceal their existence and actions from users and other system processes.
Rootkit
installation can be automated, or an attacker can install it once
they've obtained root or Administrator access. Obtaining this access is a
result of direct attack on a system, i.e. exploiting a known vulnerability
(such as privilege escalation) or a password (obtained by cracking or social
engineering tactics like "phishing"). Once installed, it becomes
possible to hide the intrusion as well as to maintain privileged access.
The
key is the root or administrator access. Full control over a system means that
existing software can be modified, including software that might otherwise be
used to detect or circumvent it.
What Can a
Rootkit Do?
- A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine. A rootkit on an infected computer can also access log files and spy on the legitimate computer owner’s usage.
- Rootkits and their payloads have many uses:
- Provide an attacker with full access via a backdoor, permitting unauthorized access to, for example, steal or falsify documents. One of the ways to carry this out is to subvert the login mechanism, such as the /bin/login program on Unix-like systems. The replacement appears to function normally, but also accepts a secret login combination that allows an attacker direct access to the system with administrative privileges, bypassing standard authentication and authorization mechanisms.
- Conceal other malware, notably password-stealing key loggers and computer viruses.
- Appropriate the compromised machine as a zombie computer for attacks on other computers. (The attack originates from the compromised system or network, instead of the attacker's system.) "Zombie" computers are typically members of large botnets that can launch denial-of-service attacks, distribute e-mail spam, conduct click fraud, etc.
- In some instances, rootkits provide desired functionality, and may be installed intentionally on behalf of the computer user:
- Conceal cheating in online games from software like Warden(i bet you liked this you cheater)
- Enhance emulation software and security software. Alcohol 120% and Daemon Tools are commercial examples of non-hostile rootkits used to defeat copy-protection mechanisms such as SafeDisk and SecuRom uses techniques resembling rootkits to protect itself from malicious actions. It loads its own drivers to intercept system activity, and then prevents other processes from doing harm to itself. Its processes are not hidden, but cannot be terminated by standard methods (It can be terminated with process hacker).
- Anti-theft protection: Laptops may have BIOS-based rootkit software that will periodically report to a central authority, allowing the laptop to be monitored, disabled or wiped of information in the event that it is stolen.
- Bypassing Microsoft product activation
Rootkit
Detection:
It is
difficult to detect rootkits. There are no commercial products available that
can find and remove all known and unknown rootkits. There are various ways to
look for a rootkit on an infected machine. Detection methods include
behavioral-based methods (e.g., looking for strange behavior on a computer
system), signature scanning and memory dump analysis. Often, the only option to
remove a rootkit is to completely rebuild the compromised system.
Behavioral-based
The
behavioral-based approach to detecting rootkits attempts to infer the presence
of a rootkit by looking for rootkit-like behavior. For example, by profiling a
system, differences in the timing and frequency of API calls or in overall CPU
utilization can be attributed to a rootkit.
Signature-based
Antivirus
products rarely catch all viruses in public tests (depending on what is used
and to what extent), even though security software vendors incorporate rootkit
detection into their products. Should a rootkit attempt to hide during an
antivirus scan, a stealth detector may notice; if the rootkit attempts to
temporarily unload itself from the system, signature detection (or
"fingerprinting") can still find it.
Memory dumps
Forcing a
complete dump of virtual
memory will capture an active rootkit (or a kernel dump in the
case of a kernel-mode rootkit), allowing offline forensic analysis to
be performed with a debugger against
the resulting dump file,
without the rootkit being able to take any measures to cloak itself. This
technique is highly specialized, and may require access to non-public source code or debugging symbols.
Well Known
Rootkit Examples:
- Lane Davis and Steven Dake - wrote the earliest known rootkit in the early 1990s.
- NTRootkit – one of the first malicious rootkits targeted at Windows OS.
- HackerDefender – this early Trojan altered/augmented the OS at a very low level of functions calls.
- Machiavelli - the first rootkit targeting Mac OS X appeared in 2009. This rootkit creates hidden system calls and kernel threads.
- Greek wiretapping – in 2004/05, intruders installed a rootkit that targeted Ericsson's AXE PBX.
- Zeus, first identified in July 2007, is a Trojan horse that steals banking information by man-in-the-browser keystroke logging and form grabbing.
- Stuxnet - the first known rootkit for industrial control systems
- Flame - a computer malware discovered in 2012 that attacks computers running Windows OS. It can record audio, screenshots, keyboard activity and network traffic.
Comments
Post a Comment