Jump to content

Sony uses rootkits again


Humpty

Recommended Posts

A line of USB drives sold by Sony installs files in a hidden folder that can be accessed and used by hackers, a Finnish security company charged Monday, raising the specter of a replay of the fiasco that hit Sony's music arm two years ago when researchers discovered that its copy protection software used rootkit-like technologies.

 

According to F-Secure, the fingerprint-reader software included with the Sony MicroVault USM-F line of flash drives installs a driver that hides in a hidden directory under "c:\windows". That directory and the files within it are not visible through Windows' usual APIs, said F-Secure researcher Mika Tolvanen in a posting to the company's blog Monday.

 

"[but] if you know the name of the directory, it is possible to enter the hidden directory using [the] Command Prompt, and it is possible to create new hidden files," said Tolvanen. "There are also ways to run files from this directory."

Infoworld

 

F-Secure

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.