Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Privacy PC Games (Games)

Blizzard's Warden Thwarted by Sony's DRM Rootkit 418

shotfeel writes "First, news of Warden -a bit of code from Blizzard's WoW to trounce game cheats. Then, a Sony rootkit to make your computer safe for music. Now, news that you can use the Sony rootkit to make your game cheats safe from the Warden."
This discussion has been archived. No new comments can be posted.

Blizzard's Warden Thwarted by Sony's DRM Rootkit

Comments Filter:
  • Came up fine for me. (Score:1, Informative)

    by Anonymous Coward on Thursday November 03, 2005 @03:23PM (#13943520)
    World of Warcraft hackers using Sony BMG rootkit
    Published: 2005-11-03

    Want to cheat in your online game and not get caught? Just buy a Sony BMG copy protected CD.

    World of Warcraft hackers have confirmed that the hiding capabilities of Sony BMG's content protection software can make tools made for cheating in the online world impossible to detect. The software--deemed a "rootkit" by many security experts--is shipped with tens of thousands of the record company's music titles.

    Blizzard Entertainment, the maker of World of Warcraft, has created a controversial program that detects cheaters by scanning the processes that are running at the time the game is played. Called the Warden, the anti-cheating program cannot detect any files that are hidden with Sony BMG's content protection, which only requires that the hacker add the prefix "$sys$" to file names.

    Despite making a patch available on Wednesday to consumers to amend its copy protection software's behavior, Sony BMG and First 4 Internet, the maker of the content protection technology, have both disputed claims that their system could harm the security of a Windows system. Yet, other software makers that rely on the integrity of the operating system are finding that hidden code makes security impossible.
  • by Dugsmyname ( 451987 ) <thegenericgeek@gm a i l.com> on Thursday November 03, 2005 @03:28PM (#13943594) Homepage
    http://mirrordot.com/ [mirrordot.com] has a cached link here [mirrordot.com]
  • by networkBoy ( 774728 ) on Thursday November 03, 2005 @03:32PM (#13943666) Journal
    I do believe that "circumvention of a protection device" may actually apply. . .
    -nB
  • by LostCluster ( 625375 ) * on Thursday November 03, 2005 @03:36PM (#13943719)
    And, if we're going by Security Now [grc.com]'s definition of a "rootkit", Norton SystemWorks is a rootkit because its Undelete component hides files from the operating system that are really still there, SystemWorks just fools all applications into thinking they're not there.

    Any program that uses the operating system hooks to find out what is going on risks being fooled. The only way around it is to do what RootkitRevealer [sysinternals.com] does, ignore what the OS is saying and go byte-level reading the disk to see what you get, then if you like compare it with what the OS is reporting to see if there's any differences.
  • Re:Let's bash Sony (Score:5, Informative)

    by xSquaredAdmin ( 725927 ) on Thursday November 03, 2005 @03:39PM (#13943760)
    I just dug up the description of what it actually does. Turns out it also does a brief memory scan of the processes in memory to look for hacks as well. So even if they do that, as soon as Blizzard gets their hands on it, they could just add it's signature to the definition.

    I recently performed a rather long reversing session on a piece of software written by Blizzard Entertainment, yes - the ones who made Warcraft, and World of Warcraft (which has 4.5 million+ players now, apparently). This software is known as the 'warden client' - its written like shellcode in that it's position independant. It is downloaded on the fly from Blizzard's servers, and it runs about every 15 seconds. It is one of the most interesting pieces of spyware to date, because it is designed only to verify compliance with a EULA/TOS. Here is what it does, about every 15 seconds, to about 4.5 million people (500,000 of which are logged on at any given time):

    The warden dumps all the DLL's using a ToolHelp API call. It reads information from every DLL loaded in the 'world of warcraft' executable process space. No big deal.

    The warden then uses the GetWindowTextA function to read the window text in the titlebar of every window. These are windows that are not in the WoW process, but any program running on your computer. Now a Big Deal.

    I watched the warden sniff down the email addresses of people I was communicating with on MSN, the URL of several websites that I had open at the time, and the names of all my running programs, including those that were minimized or in the toolbar. These strings can easily contain social security numbers or credit card numbers, for example, if I have Microsoft Excel or Quickbooks open w/ my personal finances at the time.

    Once these strings are obtained, they are passed through a hashing function and compared against a list of 'banning hashes' - if you match something in their list, I suspect you will get banned. For example, if you have a window titled 'WoW!Inmate' - regardless of what that window really does, it could result in a ban. If you can't believe it, make a dummy window that does nothing at all and name it this, then start WoW. It certainly will result in warden reporting you as a cheater. I really believe that reading these window titles violates privacy, considering window titles contain alot of personal data. But, we already know Blizzard Entertainment is fierce from a legal perspective. Look at what they have done to people who tried to make BNetD, freecraft, or third party WoW servers.

    Next, warden opens every process running on your computer. When each program is opened, warden then calls ReadProcessMemory and reads a series of addresses - usually in the 0x0040xxxx or 0x0041xxxx range - this is the range that most executable programs on windows will place their code. Warden reads about 10-20 bytes for each test, and again hashes this and compares against a list of banning hashes. These tests are clearly designed to detect known 3rd party programs, such as wowglider and friends. Every process is read from in this way. I watched warden open my email program, and even my PGP key manager. Again, I feel this is a fairly severe violation of privacy, but what can you do? It would be very easy to devise a test where the warden clearly reads confidential or personal information without regard.

    This behavior places the warden client squarely in the category of spyware. What is interesting about this is that it might be the first use of spyware to verify compliance with a EULA. I cannot imagine that such practices will be legal in the future, but right now in terms of law, this is the wild wild west. You can't blame Blizz for trying, as well as any other company, but this practice will have to stop if we have any hope of privacy. Agree w/ botting or game cheaters or not, this is a much larger issue called 'privacy' and Blizz has no right to be opening my excel or PGP programs, for whatever reason.

  • by Proaxiom ( 544639 ) on Thursday November 03, 2005 @03:40PM (#13943780)
    Wouldn't it be trivial to modify existing worms or viruses to take advantage of the exact same concept, hiding themselves from virus scanners?

    Sort of. Good ones already employ techniques to try to hide themselves. The difficult part is getting into the kernel, as the Sony DRM software does when you install it.

    Virus writers might at this point decide to start using file and process names that start with $sys$, in which case anybody who has installed the Sony DRM app (in particular, WoW cheaters) will be especially vulnerable. I doubt that's a large enough population for the technique to be considered useful, though.

    Mostly this is useful for hiding things from prying eyes on your own machine. It is remarkably effective. To prevent malicious apps from taking advantage of it, you might hack the Sony DRM software so it uses, say, $-q8f790vpae-$ as the 'hiding' tag instead of $sys$.

    Just watch what you're doing, because as Mark Russinovich points out in the original article, it's not hard to nuke your box by accident in messing with the Sony/First4Internet drivers.

  • Re:Let's bash Sony (Score:5, Informative)

    by HavokDevNull ( 99801 ) <eric@linux s y s t e m s . net> on Thursday November 03, 2005 @03:49PM (#13943884) Homepage Journal
    The reason the "link to Blizzard" is because the guys over at www.wowsharp.net thought to use the rootkit first, and it is so easy to use that anyone who can rename a file can use it. And WOW is very popular in the first place (4 million users now), so this impacts a bunch of people.

    Another cheat program http://www.wowglider.com/ [wowglider.com] is also getting around WOW's Warden technology by running WOW in a normal user profile in xp, removing access to said user in the wowglider folder, then running wowglider as an admin account. But more than likely you could just install Sony's rootkit, rename your wowglider folder and do the above step for double protection against Warden detecting wowglider.

    My point being Sony and First4Internet are saying that the rootkit does not compromise a system's security, when in fact it can and does. And the Cheaters are proving it now, next will be the virus writers.
  • by Anonymous Coward on Thursday November 03, 2005 @04:01PM (#13944027)
    IANAL...

    It doesn't for two reasons.

    First, Warden is not a copyright protection system. It essentially is a EULA protection system. For example, if I use a third party utility to run a speed hack, I can be banned from the game for violating the EULA. I can't be hit up for thousands of dollars for copyright infringement.

    Second, as it is installed it in no way would assist in cheating in WoW. A third party can take advantage of what it does do. In other words Sony is not shipping this DRM software with the primary intent to enable cheating in WoW.

    In fact, Warden has a greater chance of violating the DMCA since it could access memory that contains copyrighted material after the DRM system has decrypted the work. Luckily the primary design purpose of Warden is also not copyright infringement.

    Of course some lawyer may figure out some way to twist all of this around, so who knows.
  • by karnal ( 22275 ) on Thursday November 03, 2005 @04:10PM (#13944132)
    Actually, from what I've seen on the Our Lady Peace CD is that you "DECLINE" their EULA and the OS spits out the disc.

    Wow, that's hard to get around.

    Once you turn off "Autorun", it's just another quick step with EAC to do a rip and convert to any format you want... I had thought of using my laptop to actually install their DRM to see what kind of crappy quality they had the tracks at, but I'm glad I didn't do that after reading yesterday's article.

    Anyways, I'm sure the "other" OS I run isn't affected by this attempt to put shit on my computer that I really don't need....
  • Re:Let's bash Sony (Score:3, Informative)

    by Red Flayer ( 890720 ) on Thursday November 03, 2005 @04:18PM (#13944229) Journal
    "because the guys over at www.wowsharp.net thought to use the rootkit first"

    Hardly. They're just the first to publicize... this has been floating around in some forums for a little while.

    There's less of an advantage to cheating if everyone can do it. So those exploiting this have been keeping their mouths shut...

  • by Dionysus ( 12737 ) on Thursday November 03, 2005 @04:34PM (#13944427) Homepage
    Remember, anyone who wants to listen to one of Sony's recent CDs on their computer (unless they have used workarounds) has this rootkit

    According to this BBC report [bbc.co.uk], it only affected Windows users. Everybody else (Mac, Linux, *BSD users) could listen to the CD without problems.
  • by clymere ( 605769 ) on Thursday November 03, 2005 @04:43PM (#13944516) Homepage
    I recall F-secure mentioning on their blog that their product detects the rootkit, but does not remove it. This is because they have decided that its too dangerous to do so, and are referring users to Sony for instructions on removal...which apparently work.

    They've apparently been working closely with Sony and the company who wrote the rootkit to resolve some of these issues, and Sony released some kind of software update tool that removes the rootkit pretty cleanly

  • by F_Scentura ( 250214 ) on Thursday November 03, 2005 @04:48PM (#13944552)
    The court did award a settlement, as policy was to set their coffee far about safe levels, and had ignored previous court rulings that required that McDonalds have a safer product.
  • by toomanyhandles ( 809578 ) * on Thursday November 03, 2005 @05:36PM (#13945072)
    Just as McDonalds hamburgers aren't made for the purpose of causing childrent to be obese, and McDonalds coffee is not sold for the causing 3rd degree burns... but look how the courts went on that one.

    Actually McD deserved to lose on that one. They were intentionally flaunting/ignoring health department warnings and citations because they had their coffee makers turned up too high, and the liquid was not "safe". Food service code says you can't serve hot liquids at a temp. which causes 3rd degree burns in less than ?20? 30? seconds- time to wipe it off etc. They were serving their stuff at a temp that caused 3rd degree burns in 3 seconds (IIRC). Yes, litigious society, nuisance lawsuits, etc, but this was big evil corp ignoring safety rules that were in place for a reason. HTH.
  • by bhsx ( 458600 ) on Thursday November 03, 2005 @06:01PM (#13945322)
    I submitted a story that got rejected regarding this type of "rootkit." Somehow (my girlfriend's daughter uses this system in a reletively locked-down mode) I got something installed on my system that slipped past the Spybot S&D, MS AntiSpyware, AVG antivirus, and ewido.
    It was a total b*tch just to find. The thing would build its directory/itself on shutdown (it seemed) and load then delete any trace of itself at startup, even in Safe Mode. It hid itself from Windows Task Manager and every other scan a could run. I ran some Sysinternals [sysinternals.com] apps such as RootkitRevealer and Autoruns, and showed nothing over and above anything I could account for. Suspecting it was a rootkit anyway, I found some good apps such as Process Guard, and F-Secure's Blacklight(stand-alone executable, pretty nice), and a CLI app called RkDetector. Once I had ran PG I could see what was happenning to my poor little PC. Explorer launches a program called ddrssapi.exe from System32, then would go onto to launch mchshisn.exe every 3 seconds or so. At one point Process Guard counted mchshisn.exe loading over 350 times before grinding to a crashing halt!
    Googling ddrssapi.exe or mchshisn.exe yields no hits (or at least didn't, now it'll probably link to this thread), so I renamed the former (because I knew where it was). I was hoping that was the app that created the directory at startup so I rebooted to see if things calmed down.
    Process Guard makes no mention of ddrssapi, but is still continuously launching mchshisn, and I notice that it says it's launching from Program Files/Weslorer... Takes about 4 minutes to bring the box down to it's knees, but that gave me enough time to realize that I could do nothing to find this mysterious directory (Weslorer).
    I boot into Knoppix 4.0 and low and behold there is PF/Weslorer. Unfortunately for me, Knoppix didn't want to play nice with NTFS, so I couldn't delete the dir. Then I remembered that I had build the Windows Ultimate Boot Disk based on BartPE a few weeks ago. Booted into it and removed the Weslorer (which also shows no google hits) directory and ran a Spybot S&D scan for good measure. I rebooted into my XP install and all was well. No more popups (which caused the autopsy in the first place), no more stray process launching hundreds of times. Just a new systray icon for Process Guard. That things going onto every removable media I have.
    I know I still don't really know how it got in and what process it was using to launch itself initially, and that bothers me; but I do not have any symtoms and will have to live with the thought that I got pwned.
  • by jrockway ( 229604 ) * <jon-nospam@jrock.us> on Thursday November 03, 2005 @07:39PM (#13946184) Homepage Journal
    Excuse me? It is indeed a fucking rootkit. A rootkit is a program that hooks OS calls so that their behavior is "wrong" in some way. In this case, it hides files. That is, objects physically on the filesystem are no longer visible, thanks to this rootkit's intervention. That's a classic example of a rootkit. (Actually the classic example is hiding processes, and ... this rootkit does that.)

For God's sake, stop researching for a while and begin to think!

Working...