Alureon Bootkit Trojan - Crossing the 64 bit Barrier


  1. Posts : 8,608
    Windows 7 Ultimate 32bit SP1
       #1

    Alureon Bootkit Trojan - Crossing the 64 bit Barrier


    UAC is there for a reason!
    Alureon Bootkit Trojan - Crossing the 64 bit Barrier

    By negster22, 17 October 2010

    There is a very prevalent rootkit (hidden malicious program) that has been infecting Windows computers for quite some time now. The general name the Microsoft Malware Protection Center has assigned to this for-profit motivated threat family is Alureon.

    The primary symptom of infection is browser redirects - this means that your search results will take You to sites other than the ones they should normally resolve to. Security companies and researchers have a variety of names for this malicious program - while Microsoft refers to it as Alureon, some call it TDSS, some call it TDL#x where x represents the # of the variant that's detected. The most advanced and most insidious variant of this infection is called TDL4. However, many if not most malware researchers have resisted calling it TDL4, and still consider it to TDL3, because it's infection cycle has too much in common with its TDL3 predecessor to be labeled as a completely new variant.

    Over time, this rookit has progressively gotten more and more crafty and it is now more difficult to detect and remove than it was previously because it began to infect the Master Boot Record (MBR) on an infected computer, making it technically a Bootkit. The MBR code is what enables your computer to boot up when your start it, and if it is corrupted your computer may not boot at all. Because it is so vital to the functioning of a Windows-based computer, Microsoft has provided Windows users with recovery commands that run from the Windows Recovery Environment, to replace the MBR with default Windows code appropriate to the Windows operating system that's installed.

    More recently, in early August 2010, a new Alureon TDL variant that displayed the ability to infect Vista and Windows 7 64 bit based computers emerged.
    This was a very unsettling but significant development, because very strict security measures that were integrated into 64 bit versions of Vista and Windows 7 (Patchguard and very stringent driver signing requirements) had to be bypassed to allow this to happen!

    However, it's important to note, the infection can only compromise a 64 bit Windows 7 or Vista system, if User Account Control (UAC) is turned OFF or if the user casually approves the malicious action. Since UAC is ON by default, a user would either have to intentionally disable it, or approve a questionable action initiated by malware (if it was ON), thereby leaving themselves vulnerable to this type of exploit. When a user's behavior helps usher in a threat in this manner, the infection is said to rely upon "social engineering" techniques to compromise a system! Though this rootkit also infects 32 bit operating systems, it does so without initiating the automatic reboot that's required for it to circumvent the 64 bit operating system kernel safeguards. On 64 bit systems, this random reboot may serve as a small clue that something is amiss.

    http://secure-comput...p_your_mbr.html
      My Computer


  2. Posts : 17,796
    Windows 10, Home Clean Install
       #2

    TY for the information, but its not good news.
      My Computer


  3. Posts : 8,608
    Windows 7 Ultimate 32bit SP1
    Thread Starter
       #3

    No, rootkits are never good news
      My Computer


  4. Posts : 41
    Windows 7 Ultimate x64, 7 Premium, & XP
       #4

    I have a 64 bit 7 ultimate...is this like something I should be watching for? Help me understand this ...lol...
      My Computer


  5. Posts : 8,608
    Windows 7 Ultimate 32bit SP1
    Thread Starter
       #5

    Boot loader level (Bootkit)
    A kernel-mode rootkit variant called a bootkit is used predominantly to attack full disk encryption systems, for example as in the "Evil Maid Attack".[24] The term bootkit itself was coined by Indian security researchers (Nitin Kumar & Vipin Kumar) who presented it at Blackhat Europe 2007.[25][26] A bootkit replaces the legitimate boot loader with one controlled by an attacker; typically the malware loader persists through the transition to protected mode when the kernel has loaded. For example, the "Stoned Bootkit"[27] subverts the system by using a compromised boot loader to intercept encryption keys and passwords. Apart from preventing unauthorized physical access to machines (a particular problem for portable machines), a Trusted Platform Module, configured to protect the boot path, is the only known defense against this attack
    Rootkit - Wikipedia, the free encyclopedia
      My Computer


  6. Posts : 1,036
    Winbdows 7 ultimate x64 | Ubuntu 12.04 x64 LTS
       #6

    That's a not so good news... One of my main reason of running x64 OS was the protection against rootkits and their modified cousin, bootkits... Nevermind, UAC doesn't annoy me much..

    Btw (x64) users having some kind of recovery partition or console pre-istalled and not having OS disc should ave their MBR backed up in case they get infected...
      My Computer


  7. Posts : 2,303
    Windows 7 & Windows Vista Ultimate
       #7

    Emphasis on the following from the article:

    However, it's important to note, the infection can only compromise a 64 bit Windows 7 or Vista system, if User Account Control (UAC) is turned OFF or if the user casually approves the malicious action.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 06:14.
Find Us