Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-15 Thread Raymond Horton


 WASHINGTON POST.COM


 SECURITY FIX


 Brian Krebs on Computer Security


 More Sony Problems to Be Revealed


Several groups of privacy and security experts are expected to release 
research later today that points to multiple, serious security flaws 
present in *XCP*, the anti-piracy software used on an undisclosed 
number of *Sony BMG* music CDs. (For the record, *Security Fix* observed 
that experts were busily searching for such flaws 
http://blogs.washingtonpost.com/securityfix/2005/11/hackers_raid_so_1.html 
shortly after this whole fiasco began).


According to details provided by prominent security researcher *Dan 
Kaminsky http://www.doxpara.com*, the resulting public outcry could 
make Sony feel like the last two weeks of consumer backlash were a walk 
in the park.


Kaminsky will be unveiling research that indicates just how many 
computer networks have Sony's anti-piracy software installed on them. 
Kaminsky declined to be more specific, but numbers referenced 
http://www.washingtonpost.com/wp-srv/technology/daily/graphics/complaint_111405.pdf 
in a class-action lawsuit filed Tuesday in New York 
http://blogs.washingtonpost.com/securityfix/2005/11/sony_faces_anot.html 
against Sony and XCP maker *First4Internet* indicate that Sony sold 
approximately 3 million music CDs carrying the software.


The net effect is that it's not in doubt that Sony has created a major 
security event on the Net, Kaminsky said in an online chat last night.


But wait, it gets ... er ... better. The researchers discovered a 
security flaw in XCP (which stands for extended copyright protection) 
that could afford attackers a window through which to break into 
computers running the software and install additional software or viruses.


Kaminsky told me that one of the researchers involved in the 
investigation is *Edward Felten 
http://www.cs.princeton.edu/%7Efelten/*, a professor of computer 
science and public affairs at Princeton University.


And indeed, Felten's blog -- *Freedom to Tinker* 
http://www.freedom-to-tinker.com/?p=926 -- hints as to the research he 
will release tomorrow along with *Alex Halderman 
http://www.princeton.edu/%7Ejhalderm/*, a Ph.D. student at Princeton 
whose research http://www.cs.princeton.edu/%7Ejhalderm/cd3/ includes 
digital rights management technologies, including *SunnComm Technologies 
http://www.sunncomm.com/index_flash.html*, a different anti-piracy 
program used by other Sony titles 
http://www.boingboing.net/2005/11/10/sony_music_cds_infec.html :


Alex Halderman and I have confirmed that Sony’s Web-based XCP 
uninstallation utility exposes users to serious security risk. Under at 
least some circumstances, running Sony’s Web-based uninstaller opens a 
huge security hole on your computer. We have a working demonstration 
exploit. ... In the meantime, we recommend strongly against downloading 
or running Sony’s Web-based XCP uninstaller.


(The name of Felten's blog is a nod to his prior 
http://www.boingboing.net/2005/11/10/sony_music_cds_infec.htmlhigh-profile 
legal dust-up with the entertainment industry 
http://www.eff.org/IP/DMCA/Felten_v_RIAA/faq_felten.html over alleged 
violations of the Digital Millennium Copyright Act 
http://www.copyright.gov/legislation/dmca.pdf.)


I tried to contact Felten earlier today, and no doubt he was too busy 
with this research to grab the phone. I contacted Halderman by e-mail, 
who confirmed that the uninstaller can create even worse problems than 
those created by the anti-piracy software itself. Halderman said further 
details would be available on Felten's site later today.


One of XCP's most alarming traits for security researchers has been its 
ability to hide not just its own files on a user's PC but also those of 
any other files, viruses or worms that follow the program's file-naming 
rules -- hidden so well that even antivirus programs can't find it.


Last week, about the same time that someone mass-spammed several 
versions of a virus 
http://blogs.washingtonpost.com/securityfix/2005/11/virus_writers_e.html 
designed to take advantage of XCP's file-hiding abilities, Sony issued a 
patch to help users remove the file-hiding function. (The patch did 
not uninstall the program itself, which resists removal so effectively 
that security researchers have equated it to a rootkit 
http://en.wikipedia.org/wiki/Rootkit.)


But according to research to be presented tomorrow, that very same patch 
Sony issued to help close the security hole exposed by its software 
actually introduces additional security flaws.


While exposing oblivious users to additional risks when someone or 
something has already compromised their computer is in itself 
inexcusable, opening that user's system to backdoor security flaws and 
then paving the way for attackers to install whatever they please 
without fear of detection or removal is unconscionable.


Imagine the potential consequences of military personnel or government 

Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-15 Thread David W. Fenton
On 15 Nov 2005 at 10:38, Raymond Horton wrote:

   WASHINGTON POST.COM
   SECURITY FIX
   Brian Krebs on Computer Security
   More Sony Problems to Be Revealed
[]

 Imagine the potential consequences of military personnel or government
 employees at work on a sensitive government network popping one of
 these CDs into their computer to listen to their favorite Sony-label
 music artist. If only half of this research turns out to be supported
 by the broader security community, Sony is about to find itself in
 big-league legal trouble.

If the military is running its Windows PCs with admin-level user 
logons, then this Sony rootkit is the least of our worries.

You can't be infected with this by accident, and if you're running 
your Windows computer properly (with a user logon that lacks 
administrative capabilities), then you simply can't be infected by 
it.

-- 
David W. Fentonhttp://www.bway.net/~dfenton
David Fenton Associateshttp://www.bway.net/~dfassoc

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-15 Thread Raymond Horton




Don't tell me/us - tell Brian Krebs at the Washington Post.


David W. Fenton wrote:


  On 15 Nov 2005 at 10:38, Raymond Horton wrote: (forwarded)

  
  
  WASHINGTON POST.COM
  SECURITY FIX
  Brian Krebs on Computer Security
  More Sony Problems to Be Revealed

  
  []

  
  
Imagine the potential consequences of military personnel or government
employees at work on a sensitive government network popping one of
these CDs into their computer to listen to their favorite Sony-label
music artist. If only half of this research turns out to be supported
by the broader security community, Sony is about to find itself in
big-league legal trouble.

  
  
If the military is running its Windows PCs with admin-level user 
logons, then this Sony rootkit is the least of our worries.

You can't be infected with this by accident, and if you're running 
your Windows computer properly (with a user logon that lacks 
administrative capabilities), then you simply can't be infected by 
it.

  




___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-13 Thread dhbailey

Lora Crighton wrote:
[snip]
I do alot of my CD listening at the computer, and I will certainly think 
twice before I buy another Sony CD.
 


In order to have any effect in the marketplace, you need to tell Sony 
about your decision, don't just tell your friends.


--
David H. Bailey
[EMAIL PROTECTED]
___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-12 Thread Lora Crighton

On 11/11/05, David W. Fenton [EMAIL PROTECTED] wrote:
On 11 Nov 2005 at 12:47, Robert Patterson wrote: Christopher Smith wrote:  I would sue if
  something like this was installed on my computer by a so-called  reputable company. As much as I agree with the sentiment, I suspect anyone who is infected with this thing clicked thru a license agreement that allowed
 Sony to install their software.But the EULA was deceptive and did not fully explain what thesoftware was doing and what its risks were. To me, almost every EULAI've ever seen is so misleading as to be practically a lie, but this
one was an actual LIE in that it omitted crucially importantinformation about what you were agreeing to.

I read the EULA, and it seemed to imply that the program was removable. I usually just click without reading all the clauses, but after reading that one, I realize that I have been silly - I think it is scary just how onesided the agreement is. You are basically letting them say they can disable your computer and destroy your data, but have no liability to you.

But, even if none of the lawsuits against Sony succeed, Sony hasalready lost revenue, because a large number of people who were
wholly unaffected by this rootkit will refuse to ever buy Sonyproducts of any kind, for fear of some other nefarious activity onSony's part.

I do alot of my CD listening at the computer, and I will certainly think twice before I buy another Sony CD.

Lora
___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-12 Thread BC2

 
Sony drops antipiracy technology from its CDs
Ted Bridis, Associated Press
November 12, 2005


WASHINGTON - Stung by continuing criticism, the world's second-largest music label, Sony BMG Music Entertainment, promised Friday to temporarily suspend making music CDs with antipiracy technology that can leave computers vulnerable to hackers.

Sony defended its right to prevent customers from illegally copying music but said that, as a precautionary measure, it will halt manufacturing CDs with the XCP technology. We also intend to reexamine all aspects of our content protection initiative to be sure that it continues to meet our goals of security and ease of consumer use, the company said in a prepared statement.

The antipiracy technology, which works only on Windows computers, prevents customers from making more than a few copies of the compact disc and prevents them from loading the CD's songs onto Apple Computer's popular iPod music players.

Some other music players, which recognize Microsoft's proprietary music format, would work.

Sony's announcement came one day after leading security companies disclosed that hackers were distributing malicious programs over the Internet that exploited the antipiracy technology's ability to avoid detection. Hackers discovered that they can effectively render their programs invisible by using names for computer files similar to ones cloaked by the Sony technology.

A Homeland Security official cautioned entertainment companies against discouraging piracy in ways that also make computers vulnerable. Stewart Baker, assistant secretary for policy at DHS, did not cite Sony by name in his remarks Thursday but described industry efforts to install hidden files on consumers' computers.

It's very important to remember that it's your intellectual property, it's not your computer, Baker said at a trade conference on piracy. And in the pursuit of protection of intellectual property, it's important not to defeat or undermine the security measures that people need to adopt in these days.

Sony's program is included on about 20 popular music titles, including releases by Van Zant and the Bad Plus.

This is a step they should have taken immediately, said Mark Russinovich, chief software architect at Winternals Software, who discovered the hidden copy-protection technology Oct. 31 and posted his findings on his Web log. He said Sony did not admit wrongdoing, nor did it promise not to use similar techniques in the future.

Security researchers have described Sony's technology as spyware, saying it is difficult to remove and transmits without warning details about what music is playing. They said Sony's notice to consumers about the technology was inadequate. Sony executives have rejected the description of their technology as spyware.

Some leading antivirus companies updated their protective software this week to detect Sony's antipiracy program, disable it and prevent it from reinstalling.

After Russinovich criticized Sony, it made available a software patch that removed the technology's ability to avoid detection. It also made more broadly available its instructions on how to remove the software permanently. Customers who remove the software are unable to listen to music CDs on their computers.
On Nov 12, 2005, at 3:43 PM, Lora Crighton wrote:

On 11/11/05, David W. Fenton [EMAIL PROTECTED]> wrote: On 11 Nov 2005 at 12:47, Robert Patterson wrote:
> Christopher Smith wrote:
>
> > I would sue if 
> > something like this was installed on my computer by a so-called
> > reputable company.
>
> As much as I agree with the sentiment, I suspect anyone who is
> infected with this thing clicked thru a license agreement that allowed 
> Sony to install their software.

But the EULA was deceptive and did not fully explain what the
software was doing and what its risks were. To me, almost every EULA
I've ever seen is so misleading as to be practically a lie, but this 
one was an actual LIE in that it omitted crucially important
information about what you were agreeing to. 
I read the EULA, and it seemed to imply that the program was removable.  I usually just click without reading all the clauses, but after reading that one, I realize that I have been silly - I think it is scary just how onesided the agreement is.  You are basically letting them say they can disable your computer and destroy your data, but have no liability to you.

But, even if none of the lawsuits against Sony succeed, Sony has
already lost revenue, because a large number of people who were 
wholly unaffected by this rootkit will refuse to ever buy Sony
products of any kind, for fear of some other nefarious activity on
Sony's part. 
I do alot of my CD listening at the computer, and I will certainly think twice before I buy another Sony CD.
 
Lora

 ___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale
___

Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread Darcy James Argue

On 10 Nov 2005, at 8:58 PM, Brad Beyenhof wrote:


On 11/10/05, Robert Patterson [EMAIL PROTECTED] wrote:

Mac users (as with a previous CD/CP scheme) are immune.


Not completely true:
http://digg.com/apple/Sony_Music_CDs_infect_Macs,_too_

It's not as invasive or as automatic, but there is DRM software on
Sony CDs for Macs as well.


Uh, saying that it's not as invasive or automatic is the  
understatement of the year.


From the comments to the thread you linked to:

It does NOT install anything on your Mac unless you dig deep into a  
seperate partition of the disc, run a hidden program, and enter an  
admin password.


This is not to excuse Sony's implementation of this, of course, but  
Mac users aren't at risk from it unless they go to quite a lot of  
trouble to put themselves at risk.


- Darcy
-
[EMAIL PROTECTED]
http://secretsociety.typepad.com
Brooklyn, NY


___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread Phil Daley

At 11/10/2005 08:03 PM, Gerhard Torges, geb. Hölscher wrote:

When one of these CDs is put into the computer's CD or DVD drive,
it 
installs software that

- hides itself from the user
- opens backdoors enabling the PC to be controlled from the
internet
- submits infos on played CDs (and maybe more) to Sony BMG
- disturbs MP3 playback and iPod filling
- consumes up to 2% CPU time EVEN IF NO CD OR SOUND FILE IS
PLAYED
- is not removeable
True that it installs a rootkit, which is horrible to do to any user,
but it IS removable by a knowledgeable user.


Phil Daley 
AutoDesk 
http://www.conknet.com/~p_daley




___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread Phil Daley

At 11/10/2005 08:21 PM, John Howell wrote:

OK, esteemed computer gurus:  urban legend, spam or confirmed terrorism?

Confirmed, it is even on radio and TV news.

But, again, it is removable.

Phil Daley   AutoDesk 
http://www.conknet.com/~p_daley



___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread Phil Daley

At 11/10/2005 08:43 PM, David W. Fenton wrote:

One of the things it does is hook into low-level file I/O subroutines
to hide its own files and its own activities. This is accomplished by
hiding every file/directory that begins with $sys$ (or a similar such
pattern -- I could be misremembering the exact prefix).

That's exactly the correct prefix.

Phil Daley   AutoDesk 
http://www.conknet.com/~p_daley



___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread dhbailey

Christopher Smith wrote:
[snip] I'm glad (for now!) that I'm unaffected by this. Of course, at 
any time

that may change...


[snip]

One thing I have NOT seen in all these discussions is a list of the CDs 
that had that awful stuff on them, so we can avoid purchasing them and 
if we already own them, avoid using them on our computers.


Has anybody seen such a list?

--
David H. Bailey
[EMAIL PROTECTED]
___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread Christopher Smith


On Nov 11, 2005, at 6:59 AM, dhbailey wrote:


Christopher Smith wrote:
[snip] I'm glad (for now!) that I'm unaffected by this. Of course, at 
any time

that may change...

[snip]

One thing I have NOT seen in all these discussions is a list of the 
CDs that had that awful stuff on them, so we can avoid purchasing them 
and if we already own them, avoid using them on our computers.


Has anybody seen such a list?




Here's a partial list, from the original post:


The EFF has made a list of CD's being affected with this software:

http://www.eff.org/deeplinks/archives/004144.php



But when it says Content Protected on the label and you see mention 
of the word XCP in the fine print that you should probably worry.



In response to someone who said it WAS removable, my understanding is 
that removing it disables your CD drive. I don't know enough about PCs 
to comment, but a pretty smart guy (Mark Russinovich) with some 
sophisticated tools, some of which he wrote himself, spent a lot of 
time to get his system back into shape. How many casual users have that 
kind of knowledge?



But on the plus side, disabling Auto run prevents it.

(Macs have this option, too. I remember one virus years ago that I 
never got, but the inoculation was turn off auto play for cds.)


Christopher

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread Phil Daley

At 11/11/2005 08:20 AM, Christopher Smith wrote:

In response to someone who said it WAS removable, my understanding is
that removing it disables your CD drive. I don't know enough about PCs
to comment, but a pretty smart guy (Mark Russinovich) with some
sophisticated tools, some of which he wrote himself, spent a lot of
time to get his system back into shape. How many casual users have that
kind of knowledge?

Sony has an uninstaller available on a web site somewhere.

Phil Daley   AutoDesk 
http://www.conknet.com/~p_daley



___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread Brad Beyenhof
On 11/11/05, Phil Daley [EMAIL PROTECTED] wrote:
 At 11/10/2005 08:43 PM, David W. Fenton wrote:

 One of the things it does is hook into low-level file I/O subroutines
 to hide its own files and its own activities. This is accomplished by
 hiding every file/directory that begins with $sys$ (or a similar such
 pattern -- I could be misremembering the exact prefix).

 That's exactly the correct prefix.

In fact, I know of a guy who put a file called $sys$_canary on his
desktop, so that he'll know if he ever gets this rootkit because the
file will disappear (like the canaries used by miners). While
humorous, I think it's kind of silly... just don't ever click OK to
Sony's EULA, or hold Shift when inserting one of their CDs so that
AutoRun won't kick in. As previously mentioned, you can disable
AutoRun altogether, but that seems a bit extreme to me.

--
Brad Beyenhof
Real-time Finale discussion: http://www.finaleirc.com
my blog: http://augmentedfourth.blogspot.com
Silence will save me from being wrong (and foolish), but it will also
deprive me of the possibility of being right.   ~ Igor Stravinsky

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread Brad Beyenhof
On 11/11/05, Phil Daley [EMAIL PROTECTED] wrote:
 Sony has an uninstaller available on a web site somewhere.

That uninstaller does not remove the rootkit in its entirety, it
just disables the $sys$ file hiding (which has already been exploited
in a new Trojan that just came out).

--
Brad Beyenhof
Real-time Finale discussion: http://www.finaleirc.com
my blog: http://augmentedfourth.blogspot.com
Silence will save me from being wrong (and foolish), but it will also
deprive me of the possibility of being right.   ~ Igor Stravinsky

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread Christopher Smith


On Nov 11, 2005, at 8:42 AM, Phil Daley wrote:


At 11/11/2005 08:20 AM, Christopher Smith wrote:

In response to someone who said it WAS removable, my understanding is
that removing it disables your CD drive. I don't know enough about PCs
to comment, but a pretty smart guy (Mark Russinovich) with some
sophisticated tools, some of which he wrote himself, spent a lot of
time to get his system back into shape. How many casual users have 
that

kind of knowledge?

Sony has an uninstaller available on a web site somewhere.




Unless something has come out very recently, the Sony uninstaller 
doesn't uninstall anything; it just makes the hidden files visible. You 
still can't remove them without disabling your CD drive, unless you are 
savvy enough to know how to work around it.


This seems to me to be destructive in the extreme. I would sue if 
something like this was installed on my computer by a so-called 
reputable company.


Christopher


___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread Robert Patterson

Christopher Smith wrote:



I would sue if 
something like this was installed on my computer by a so-called 
reputable company.




As much as I agree with the sentiment, I suspect anyone who is infected 
with this thing clicked thru a license agreement that allowed Sony to 
install their software.


Yesterday's msnbc.com mentioned a lawsuit filed against Sony due to 
malware that is now in the wild that exploits the software Sony 
installed. This seems like a more promising case. No matter what, 
though, I suspect Sony has not the heard the end of it in court.


And of course, if found liable, Sony will turn around and sue their CP 
vendor. It's lovely, I think. The whole lot of 'em deserves their 
stinking mess.


--
Robert Patterson

http://RobertGPatterson.com
___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread David W. Fenton
On 11 Nov 2005 at 6:56, Phil Daley wrote:

 At 11/10/2005 08:21 PM, John Howell wrote:
 
  OK, esteemed computer gurus:  urban legend, spam or confirmed
  terrorism?
 
 Confirmed, it is even on radio and TV news.
 
 But, again, it is removable.

This is ridiculous. It is *extremely difficult* to remove without 
rebuilding your Windows installation almost from scratch.

If a sexual partner gave you syphilis, the fact that it is a disease 
easily treatable with pencillin would not make it any less terrible.

-- 
David W. Fentonhttp://www.bway.net/~dfenton
David Fenton Associateshttp://www.bway.net/~dfassoc

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread David W. Fenton
On 11 Nov 2005 at 8:42, Phil Daley wrote:

 At 11/11/2005 08:20 AM, Christopher Smith wrote:
 
  In response to someone who said it WAS removable, my understanding
  is that removing it disables your CD drive. I don't know enough
  about PCs to comment, but a pretty smart guy (Mark Russinovich) with
  some sophisticated tools, some of which he wrote himself, spent a
  lot of time to get his system back into shape. How many casual users
  have that kind of knowledge?
 
 Sony has an uninstaller available on a web site somewhere.

All the uninstaller does is reveal the files.

In fact the uninstaller adds *more* files to the program (at least, 
that was the case with the version that was out last week; perhaps 
with all the bad press they got from that, they've replaced it with a 
*real* uninstaller?).

This is ridiculous, Phil. Why are you defending Sony on this odious 
practice?

-- 
David W. Fentonhttp://www.bway.net/~dfenton
David Fenton Associateshttp://www.bway.net/~dfassoc

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread David W. Fenton
On 11 Nov 2005 at 6:13, Brad Beyenhof wrote:

 On 11/11/05, Phil Daley [EMAIL PROTECTED] wrote:
  At 11/10/2005 08:43 PM, David W. Fenton wrote:
 
  One of the things it does is hook into low-level file I/O
  subroutines to hide its own files and its own activities. This is
  accomplished by hiding every file/directory that begins with $sys$
  (or a similar such pattern -- I could be misremembering the exact
  prefix).
 
  That's exactly the correct prefix.
 
 In fact, I know of a guy who put a file called $sys$_canary on his
 desktop, so that he'll know if he ever gets this rootkit because the
 file will disappear (like the canaries used by miners). While
 humorous, I think it's kind of silly... just don't ever click OK to
 Sony's EULA, or hold Shift when inserting one of their CDs so that
 AutoRun won't kick in. As previously mentioned, you can disable
 AutoRun altogether, but that seems a bit extreme to me.

And if you're not running an administrative logon, it won't make any 
difference if you *do* have Autoplay on and click YES to the EULA -- 
it won't be able to install. Perhaps it's smart enough to use the 
RunAs service to ask you for an administrative logon/password 
(somewhat like SU on UNIXen), but if you don't supply it, it won't be 
able to install, since it can only work by modifying Windows system 
files and registry settings that on Win2K and WinXP are read-only for 
user-level logons.

-- 
David W. Fentonhttp://www.bway.net/~dfenton
David Fenton Associateshttp://www.bway.net/~dfassoc

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread David W. Fenton
On 11 Nov 2005 at 6:15, Brad Beyenhof wrote:

 On 11/11/05, Phil Daley [EMAIL PROTECTED] wrote:
  Sony has an uninstaller available on a web site somewhere.
 
 That uninstaller does not remove the rootkit in its entirety, it
 just disables the $sys$ file hiding (which has already been exploited
 in a new Trojan that just came out).

Something I read said there were already THREE exploits that used the 
file hiding technique provided by Sony's rootkit.

And that will surely be just the beginning.

My bet is that there's only a very small number of PCs that have this 
thing installed on them, but given the huge numbers of Windows PCs 
sitting connected to the Internet unprotected by any firewall, that 
very well might still be enough to justify going after those PCs for 
a botnet. A couple thousand computers is still a valuable commodity 
in the black hat world.

-- 
David W. Fentonhttp://www.bway.net/~dfenton
David Fenton Associateshttp://www.bway.net/~dfassoc

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-11 Thread David W. Fenton
On 11 Nov 2005 at 12:47, Robert Patterson wrote:

 Christopher Smith wrote:
 
  I would sue if 
  something like this was installed on my computer by a so-called
  reputable company.
 
 As much as I agree with the sentiment, I suspect anyone who is
 infected with this thing clicked thru a license agreement that allowed
 Sony to install their software.

But the EULA was deceptive and did not fully explain what the 
software was doing and what its risks were. To me, almost every EULA 
I've ever seen is so misleading as to be practically a lie, but this 
one was an actual LIE in that it omitted crucially important 
information about what you were agreeing to. 

I think there's a good chance that many EULAs could be challenged in 
court, and this one is one of most egregious. Contracts can be 
structurally OK and still be invalidated if the two parties don't 
have appropriate standing to negotiate the terms. Many contracts 
include terms that wouldn't actually hold up in court if one of the 
parties challenged them, and most EULAs, in my opinion (and in the 
opinion of many legal experts) are borderline in terms of their 
contents.

The Sony EULA for this software is not even borderline. It's 
factually deceptive. 

 Yesterday's msnbc.com mentioned a lawsuit filed against Sony due to
 malware that is now in the wild that exploits the software Sony
 installed. This seems like a more promising case. No matter what,
 though, I suspect Sony has not the heard the end of it in court.

All avenues should be pursued against Sony on this one. Corporations 
need to be taught that they can't take actions like this without 
great cost.

 And of course, if found liable, Sony will turn around and sue their CP
 vendor. It's lovely, I think. The whole lot of 'em deserves their
 stinking mess.

That would be an interesting lawsuit. My bet is that the Sony 
officials responsible for the implementation of this lame copy 
protection software were fully aware of what the software did and 
duly authorized the outside contractor to implement it the way they 
did. The only way Sony could win such a suit was if some rogue 
executive within Sony had pursued this against the orders of her 
superiors and against corporate policy. Sony would have to reveal an 
awful lot of internal corporate policy and correspondence to win this 
lawsuit. You can bet that the contract between Sony and the software 
writers is very explicit on exactly what the software would do, so I 
don't really think there's much possibility that Sony could win such 
a case, and that the information that would have to come out to even 
try would be far too damaging for them to risk such a suit.

But, even if none of the lawsuits against Sony succeed, Sony has 
already lost revenue, because a large number of people who were 
wholly unaffected by this rootkit will refuse to ever buy Sony 
products of any kind, for fear of some other nefarious activity on 
Sony's part.

I just don't understand how these media companies can be run by such 
incredibly stupid people. How can they make any money at all with 
such idiots at the helm?

-- 
David W. Fentonhttp://www.bway.net/~dfenton
David Fenton Associateshttp://www.bway.net/~dfassoc

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-10 Thread John Howell

At 2:03 AM +0100 11/11/05,  Gerhard Torges, geb. Hölscher  wrote:

Hello!

This is heavily offtopic on this list but I 
couldn't stand to let anyone here get into the 
pitfall which would be even more serious to 
anyone using his/her PC for business.


Sony BMG and their subsidary record labels [1] 
have released a couple of music CDs that contain 
malicious software claiming to simply be a copy 
protection system called XPC.

But it's worse.
Far worse.


OK, esteemed computer gurus:  urban legend, spam or confirmed terrorism?

John


--
John  Susie Howell
Virginia Tech Department of Music
Blacksburg, Virginia, U.S.A 24061-0240
Vox (540) 231-8411  Fax (540) 231-5034
(mailto:[EMAIL PROTECTED])
http://www.music.vt.edu/faculty/howell/howell.html

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-10 Thread Raymond Horton


This is heavily offtopic on this list but I couldn't stand to let  
anyone here get into the pitfall which would be even more serious to  
anyone using his/her PC for business.


Sony BMG and their subsidary record labels [1] have released a couple  
of music CDs that contain malicious software claiming to simply be a  
copy protection system called XPC.



As long as the issue has been opened on-list I'll cross-post David 
Pogue's NY Times e-column on the subject which is just a bit less 
flamitory:


Thursday, October 10, 2005
From the Desk of David Pogue

Sony BMG's Copy-Protecting Watchdog

My In box usually bursts to the seams with reader reaction to stuff I've 
written. What was unusual this week, though, was the amount of mail that 
came in on a topic that I've never even mentioned: the Sony BMG rootkit 
tactic.


The story goes like this. Starting in June 2004, Sony BMG records began 
copy-protecting its pop-music CD's. Over the months, the company has 
used several software schemes for preventing you, the customer, from 
making illegal copies of its discs. But 20 albums are protected by a 
scheme devised by a company called First 4 Internet-and it's caused an 
incredible online furor.


These CD's, all bearing Content Protected labels on the packaging 
(meaning copy protected), do something very sneaky if you try to play 
them on a Windows PC: they install a proprietary watchdog program that 
prevents you from copying the CD more than twice. (On a Macintosh or 
Linux machine, these CD's play just fine, without any copy protection.)


Last week, a programmer and blogger named Mark Russinovich dug a little 
deeper, and found out something disturbing: the Sony watchdog program 
not only installs itself deep in the core of Windows-it's what's called 
a rootkit-but it also makes itself invisible.


The record company doesn't dispute Russinovich's findings. The cloaking 
is an additional level of protection to hide the protection files 
themselves, Mathew Gilliat-Smith, CEO of First 4 Internet, told me. 
It's an extra speedbump to make it that much more difficult [for 
prospective music pirates] to circumvent the protection. But Sony BMG 
didn't seem to be prepared for the outcry from privacy advocates and 
ordinary citizens who felt violated.


To them, Sony BMG's tactic was dangerous, sneaky, intrusive and maybe 
even illegal. Some of the problems:


* The hidden-rootkit trick has been used by virus writers to conceal 
their tracks. It doesn't give you such a rosy feeling to know that Sony 
BMG is treating you the same way.


* Once hidden, the copy-protection software is invisible to antivirus 
programs, too. So the baddies of the Internet could, in theory, use 
Sony's software as a backdoor to infect your machine, and your virus 
checker would miss it.


* If you try to remove the software manually, you risk disabling your CD 
player completely. (Instead you should use the Uninstall link on Sony 
BMG's customer-service Web site, whose link appears on the Help screens 
of Windows Media Player. Of course, then you can't play the CD on your 
computer.)


* When you insert one of these music discs into your PC, one of those 
software license agreements appears. It says explicitly what's about to 
occur: This CD will automatically install a small proprietary software 
onto your computer. The software is intended to protect the audio files 
on this CD. It will reside on your computer until it is removed or deleted.


But this note does not say that the software hides itself. And, even 
more damning, you don't see this note until you've scrolled down to the 
third page of legalese in the license agreement. Let's not kid 
ourselves: NOBODY ever reads those license agreements. They're too long, 
too opaquely written and generally of little use to anyone except the 
lawyers.


* Sony's copy-protection software prevents you from playing the music 
you've bought on your iPod, which happens to be the world's most popular 
music player.


Once the true nature of the Sony BMG software tactic became public, the 
company wasted no time in attempting to defuse the issue. Within 48 
hours, it released a patch that makes its software visible again; you 
can download it from http://cp.sonybmg.com/xcp. (Click the Software 
Updates button.) Sony also provided the rootkit-cloaking information to 
antivirus-software companies, so that the software will no longer be a 
potential virus magnet.


At that same Web site, you'll find, incredibly, a link to a 
Sony-sanctioned workaround that lets you copy the protected songs to the 
iPod. (Sony says it will send you the workaround by e-mail once you 
supply the name of the CD and other information.)


Finally, Sony has abandoned the rootkit protection method. (It says, in 
fact, that it had planned to do so even before the trick became public.) 
It still intends to install copy-protection software on every audio 
CD-but it will use other methods.


For now, then, it seems that 

Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-10 Thread Dennis Bathory-Kitsz
At 08:21 PM 11/10/05 -0500, John Howell wrote:
OK, esteemed computer gurus:  urban legend, spam or confirmed terrorism?

Absolutely true. I hope it's a nightmare for Sony, who deserves every lawsuit
that comes their way.

Reading for the evening:
http://www.sysinternals.com/blog/2005/10/sony-rootkits-and-digital-rights.html
http://www.sysinternals.com/blog/2005/11/more-on-sony-dangerous-decloaking.html
http://www.sysinternals.com/blog/2005/11/sonys-rootkit-first-4-internet.html
http://www.sysinternals.com/blog/2005/11/sony-you-dont-rlly-want-to_09.html
http://www.f-secure.com/v-descs/xcp_drm.shtml
http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=76345
http://blogs.washingtonpost.com/securityfix/2005/11/calif_ny_lawsui.html
http://www.pcworld.com/news/article/0,aid,123454,00.asp

There's a reason I've complained about copy protection and all its kin

Dennis



___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-10 Thread Robert Patterson

Unfortunately, all too real. This IS NOT A HOAX.

Today msnbc.com has a front-page article about it. There are also 
relevant articles at eff.org and others.


FWIW: You can safeguard your Windows machine by disabling Autorun. A 
number of website will show you the registry key to modify.


Mac users (as with a previous CD/CP scheme) are immune.

Gerhard Torges, geb. Hölscher wrote:

Hello!

This is heavily offtopic on this list but I couldn't stand to let  
anyone here get into the pitfall which would be even more serious to  
anyone using his/her PC for business.


Sony BMG and their subsidary record labels [1] have released a couple  
of music CDs that contain malicious software claiming to simply be a  
copy protection system called XPC.

But it's worse.
Far worse.
When one of these CDs is put into the computer's CD or DVD drive, it  
installs software that


- hides itself from the user
- opens backdoors enabling the PC to be controlled from the internet
- submits infos on played CDs (and maybe more) to Sony BMG
- disturbs MP3 playback and iPod filling
- consumes up to 2% CPU time EVEN IF NO CD OR SOUND FILE IS PLAYED
- is not removeable

In my eyes, this is a violent attack against consumer rights worldwide  
and a clear case of computer sabotage.


The EFF has made a list of CD's being affected with this software:

http://www.eff.org/deeplinks/archives/004144.php

Do NOT put any of these in a Windows PC's drive!

The main EFF article on this issue can be found at:

http://www.eff.org/deeplinks/archives/004117.php

In-depth technical information on the software by Mark Russinovich who  
discovered it:


http://www.sysinternals.com/blog/2005/10/sony-rootkits-and-digital- 
rights.html


Be very careful bying CD's from one of the Sony BMG labels (according  
to http://www.sonybmg.com/labels.html):


   Arista Records
   BMG Classics
   BMG Heritage
   BMG International Companies
   Columbia Records
   Epic Records
   J Records
   Jive Records
   LaFace Records
   Legacy Recordings
   Provident Music Group
   RCA Records
   RCA Victor Group
   RLG - Nashville
   Sony Classical
   Sony Music International
   Sony Music Nashville
   Sony Wonder
   Sony Urban Music
   So So Def Records
   Verity Records

One last beg: SPREAD THIS WARNING!
Pass it over to friends and collegues. If they dont' have email,  
printit out and copy it!


Protecting creative work is one thing, but attacking user's privacy  
like this is not tolerable.


Thanks you all for reading.


Gerhard Torges


___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale




--
Robert Patterson

http://RobertGPatterson.com
___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-10 Thread David W. Fenton
^On 10 Nov 2005 at 20:21, John Howell wrote:

 OK, esteemed computer gurus:  urban legend, spam or confirmed
 terrorism?

It's unquestionably real.

And it's very dangerous.

One of the things it does is hook into low-level file I/O subroutines 
to hide its own files and its own activities. This is accomplished by 
hiding every file/directory that begins with $sys$ (or a similar such 
pattern -- I could be misremembering the exact prefix). Now that it's 
public knowledge, any hacker could exploit this on computers on which 
it has been installed to install their own nefarious files, as long 
as they name them with the same prefix.

It's a hugely dangerous security hole.

But the main issue is that it's a form of trespass -- they are 
installing software on your PC without full disclosure of the 
repercussions of that installation.

And the really sad thing is that it's so poorly implemented that it 
could easily be avoided by:

1. turning off AutoPlay.

2. holding the SHIFT key when you insert a CD (which turns off 
AutoPlay for that CD).

And, most critically:

3. running under a user-level logon that does not have adminstrative 
permissions on your system. This prevents the software from 
installing itself, as on Windows 2000 and XP, the system data areas 
are not available for writing by user-level logons.

I have been saying for years to anyone who listens that it is 
complete idiocy to run a Windows PC with an administrative logon. 
This is a perfect example of just where avoiding that widespread 
practice would immunize you from a very serious problem.

Sony has also been extremely evasive and untruthful in its response 
to this problem, having released a fix that doesn't fix it at all, 
but, in fact, extends the capabilities of the hidden programs.

-- 
David W. Fentonhttp://www.bway.net/~dfenton
David Fenton Associateshttp://www.bway.net/~dfassoc

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-10 Thread Gerhard Torges, geb. Hölscher

Hi!

Am 11.11.2005 um 02:21 schrieb John Howell:

Sony BMG and their subsidary record labels [1] have released a couple 
of music CDs that contain malicious software claiming to simply be a 
copy protection system called XPC.

But it's worse.
Far worse.


OK, esteemed computer gurus:  urban legend, spam or confirmed 
terrorism?


The latter.


Gerhard

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-10 Thread Gerhard Torges, geb. Hölscher

Am 11.11.2005 um 02:36 schrieb Robert Patterson:


Today msnbc.com has a front-page article about it.


See here:
http://www.msnbc.msn.com/id/9991596/


Viruses exploit Sony CD anti-piracy scheme
Hackers use copy-protection software to hide in PCs

SAN JOSE, Calif. - A controversial copy-protection program that 
automatically installs when some Sony BMG audio CDs are played on 
personal computers is now being targeted by malicious software that 
exploits the antipiracy technology’s ability to hide files.


The Trojan horse programs — three have so far been identified by 
anti-virus companies — are named so as to trigger the cloaking feature 
of Sony’s XCP2 antipiracy technology, security experts said Thursday.


“This could be the advanced guard,” said Graham Cluley, senior 
technology consultant at the security firm Sophos. “We wouldn’t be 
surprised at all if we saw more malware that exploits what Sony has 
introduced.”


[...]



Gerhard




___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-10 Thread Brad Beyenhof
On 11/10/05, Robert Patterson [EMAIL PROTECTED] wrote:
 Mac users (as with a previous CD/CP scheme) are immune.

Not completely true:
http://digg.com/apple/Sony_Music_CDs_infect_Macs,_too_

It's not as invasive or as automatic, but there is DRM software on
Sony CDs for Macs as well.

--
Brad Beyenhof
Real-time Finale discussion: http://www.finaleirc.com
my blog: http://augmentedfourth.blogspot.com
Silence will save me from being wrong (and foolish), but it will also
deprive me of the possibility of being right.   ~ Igor Stravinsky

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale


Re: [Finale] OT: Windows users BEWARE of Sony BMG music CD's!

2005-11-10 Thread Christopher Smith


On Nov 10, 2005, at 8:26 PM, Raymond Horton wrote:

Once the true nature of the Sony BMG software tactic became public, 
the company wasted no time in attempting to defuse the issue. Within 
48 hours, it released a patch that makes its software visible again; 
you can download it from http://cp.sonybmg.com/xcp. (Click the 
Software Updates button.) Sony also provided the rootkit-cloaking 
information to antivirus-software companies, so that the software will 
no longer be a potential virus magnet.


At that same Web site, you'll find, incredibly, a link to a 
Sony-sanctioned workaround that lets you copy the protected songs to 
the iPod. (Sony says it will send you the workaround by e-mail once 
you supply the name of the CD and other information.)


Finally, Sony has abandoned the rootkit protection method. (It says, 
in fact, that it had planned to do so even before the trick became 
public.) It still intends to install copy-protection software on every 
audio CD-but it will use other methods.


For now, then, it seems that the cloaked-rootkit issue is dead. If you 
bought one of the 20 affected CD's, you can uncloak the software, and 
Sony won't be using this scheme anymore.





According to another article I read, uncloaking the software still 
won't allow you to remove it without disabling your CD/DVD drive. You 
are hosed in certain cases (as it crashes some versions of Windows), 
unless you reformat.


Plus, I think just about anyone would balk at having to provide their 
email address to a company in order to have physical access to content 
they already have legal access to.


I'm glad (for now!) that I'm unaffected by this. Of course, at any time 
that may change...


Christopher

___
Finale mailing list
Finale@shsu.edu
http://lists.shsu.edu/mailman/listinfo/finale