Blizzard's Warden Thwarted by Sony's DRM Rootkit 418
shotfeel writes "First, news of Warden -a bit of code from Blizzard's WoW to trounce game cheats. Then, a Sony rootkit to make your computer safe for music. Now, news that you can use the Sony rootkit to make your game cheats safe from the Warden."
Just goes to show.. (Score:5, Insightful)
Re:Just goes to show.. (Score:5, Insightful)
Re:Just goes to show.. (Score:5, Funny)
Wait a minute...
Re:Just goes to show.. (Score:5, Interesting)
[/wishful thinking]
-nB
Re:Just goes to show.. (Score:5, Funny)
Ugly, ugly.
Re:Just goes to show.. (Score:5, Informative)
-nB
Re:Just goes to show.. (Score:3, Insightful)
Nintendo tried to sue the makers of the NES game genie 'game enhancer', but lost. Although, the NES wasn't a multiplayer console, so who knows?
Re:Just goes to show.. (Score:3, Insightful)
Two controller ports means that the NES was indeed multiplayer.
Re:Just goes to show.. (Score:3, Insightful)
However, the continued existence of the makers of the Game Shark would seem to indicate that such devices are either not in violation of the DMCA or the game makers, quite reasonably, don't consider the devices a threat to their sales.
Re:Just goes to show.. (Score:5, Informative)
It doesn't for two reasons.
First, Warden is not a copyright protection system. It essentially is a EULA protection system. For example, if I use a third party utility to run a speed hack, I can be banned from the game for violating the EULA. I can't be hit up for thousands of dollars for copyright infringement.
Second, as it is installed it in no way would assist in cheating in WoW. A third party can take advantage of what it does do. In other words Sony is not shipping this DRM software with the primary intent to enable cheating in WoW.
In fact, Warden has a greater chance of violating the DMCA since it could access memory that contains copyrighted material after the DRM system has decrypted the work. Luckily the primary design purpose of Warden is also not copyright infringement.
Of course some lawyer may figure out some way to twist all of this around, so who knows.
Re:Just goes to show.. (Score:5, Funny)
Yet. Turnabout however is fair play.
I can see it now.
Blizzard:Those DRM bastards want to make it easier to cheat on our games. Lets include a P2P music sharing client into our next release!
Player:Hey... WTF? Did that monster just drop a Metalica CD?
What goes around comes around (Score:3, Interesting)
While we are talking about blizzard, lets go back to similar incident in blizzard's past. Bnetd, as written, did not support the Warcraft III beta. The authors of bnetd did not want to support the beta and the intent of bnetd was not to support pirating. Some third party (warfor
Re:Just goes to show.. (Score:5, Insightful)
If I create something to beat The Warden, that uses Sony's rootkit to hide, then *I* am the one liable, not Sony, just like Kitchen Devil aren't liable for any psychotic killing sprees I may go on with their products.
Unfortunately.
Re:Just goes to show.. (Score:5, Funny)
Re:Just goes to show.. (Score:5, Informative)
Re:Just goes to show.. (Score:4, Insightful)
Re:Just goes to show.. (Score:4, Insightful)
I NAME THEE... (Score:5, Funny)
noun: software program that interferes with another software program's attempt to interfere with the actions of a given user.
symnonyms: see windows, et al
Next fun hack? (Score:5, Funny)
Re:Next fun hack? (Score:5, Interesting)
Re:Just goes to show.. (Score:2)
Doh! Thats' just too difficult to process in my poor brain.
Would this mean that two wrongs, do in fact, make a right? My other enemy is my enemies enemy? The Axis of evil becomes the Triumvarate of unplanned good?
Norman
Re:Just goes to show.. (Score:5, Insightful)
Re:Just goes to show.. (Score:5, Insightful)
Re:Just goes to show.. (Score:5, Informative)
It was a total b*tch just to find. The thing would build its directory/itself on shutdown (it seemed) and load then delete any trace of itself at startup, even in Safe Mode. It hid itself from Windows Task Manager and every other scan a could run. I ran some Sysinternals [sysinternals.com] apps such as RootkitRevealer and Autoruns, and showed nothing over and above anything I could account for. Suspecting it was a rootkit anyway, I found some good apps such as Process Guard, and F-Secure's Blacklight(stand-alone executable, pretty nice), and a CLI app called RkDetector. Once I had ran PG I could see what was happenning to my poor little PC. Explorer launches a program called ddrssapi.exe from System32, then would go onto to launch mchshisn.exe every 3 seconds or so. At one point Process Guard counted mchshisn.exe loading over 350 times before grinding to a crashing halt!
Googling ddrssapi.exe or mchshisn.exe yields no hits (or at least didn't, now it'll probably link to this thread), so I renamed the former (because I knew where it was). I was hoping that was the app that created the directory at startup so I rebooted to see if things calmed down.
Process Guard makes no mention of ddrssapi, but is still continuously launching mchshisn, and I notice that it says it's launching from Program Files/Weslorer... Takes about 4 minutes to bring the box down to it's knees, but that gave me enough time to realize that I could do nothing to find this mysterious directory (Weslorer).
I boot into Knoppix 4.0 and low and behold there is PF/Weslorer. Unfortunately for me, Knoppix didn't want to play nice with NTFS, so I couldn't delete the dir. Then I remembered that I had build the Windows Ultimate Boot Disk based on BartPE a few weeks ago. Booted into it and removed the Weslorer (which also shows no google hits) directory and ran a Spybot S&D scan for good measure. I rebooted into my XP install and all was well. No more popups (which caused the autopsy in the first place), no more stray process launching hundreds of times. Just a new systray icon for Process Guard. That things going onto every removable media I have.
I know I still don't really know how it got in and what process it was using to launch itself initially, and that bothers me; but I do not have any symtoms and will have to live with the thought that I got pwned.
Re:Just goes to show.. (Score:4, Interesting)
That is why you should install 2 Windows installations side-by-side when you install it in the first place. One is your "normal", work and games related one, the other one is for snooping on the first one if you need to do something it won't let you by itself (like replacing some registry files, etc.).
Works like a charm when you want to restore a system backup too, and there's no need to play with CaptiveNTFS or such.
It worked quite well in NT4 with the NT bootloader (boot.ini), so you can probably do the same with XP's bootloader without resorting to a 3rd party boot loader (like grub :)). Don't forget to have different desktop backgrounds (like a red one for the administrative install), so you don't end up doing stuff you don't want to in the wrong environment.
This is the Future of Trusted Computing (Score:5, Insightful)
Sony just jumped the gun. They weren't willing to wait until Microsoft put a formal system for this kind of bullshit to take place. The only difference between this and 'trusted' computing is that there's no formalized mechanism in place .... yet.
Re:Just goes to show.. (Score:3, Insightful)
We already have tools to remove Linux rootkits, is there any for Windows ? And if there is none, why not ?
Re:Just goes to show.. (Score:3, Informative)
They've apparently been working closely with Sony and the company who wrote the rootkit to resolve some of these issues, and Sony released some kind of software update tool that removes the rootkit pretty cleanly
Re:Just goes to show.. (Score:3, Insightful)
Also that removal tool won't work without that pile of shit called IE.
Re:Just goes to show.. (Score:5, Informative)
Sort of. Good ones already employ techniques to try to hide themselves. The difficult part is getting into the kernel, as the Sony DRM software does when you install it.
Virus writers might at this point decide to start using file and process names that start with $sys$, in which case anybody who has installed the Sony DRM app (in particular, WoW cheaters) will be especially vulnerable. I doubt that's a large enough population for the technique to be considered useful, though.
Mostly this is useful for hiding things from prying eyes on your own machine. It is remarkably effective. To prevent malicious apps from taking advantage of it, you might hack the Sony DRM software so it uses, say, $-q8f790vpae-$ as the 'hiding' tag instead of $sys$.
Just watch what you're doing, because as Mark Russinovich points out in the original article, it's not hard to nuke your box by accident in messing with the Sony/First4Internet drivers.
Re:Just goes to show.. (Score:4, Funny)
hmm...
Re:Just goes to show.. (Score:3, Insightful)
Are you sure? Remember, anyone who wants to listen to one of Sony's recent CDs on their computer (unless they have used workarounds) has this rootkit. Be careful in assuming how many people know these workarounds - there are a lot of end users out there, and would you like to be slashdotted by a bunch of zombie end-users because they have a worm that virus scanners can't detect?
Re:Just goes to show.. (Score:4, Insightful)
Of course, the 31337 WoW cheaters write their own DRM software... Um, I mean, "rootkits"
It's funny how quickly words can become synonyms of another.
Re:Just goes to show.. (Score:3, Insightful)
Umm, no... they'll be equally vulnerable as anyone else foolish or unfortunate to be infected with this particular piece of malware.
Honestly, why take a perfectly good and telling point and then weaken it with some unsupportable moralising sneer?
Unless of course you have inside information not mentioned in TFA, in which case, do please share.
Re:Just goes to show.. (Score:4, Funny)
Hilarious irony, however, appears to be a universal constant.
Re:That's the beauty of it. (Score:4, Interesting)
Re:Just goes to show.. (Score:5, Funny)
Re:Just goes to show.. (Score:2)
Makes you wonder if you could use Sony's rootkit as a way to hide DRM breaking software. It seems to me that this rootkit might actually be more useful to everyone than it might have previously thought.
Thank you Sony
Unfortunately, I don't run Windows...
Sony owns Everquest (Score:5, Funny)
Re:Sony owns Everquest (Score:2)
But again, it's probably just a coincidence
Re:Sony owns Everquest (Score:2, Interesting)
Re:Sony owns Everquest (Score:2)
Comment removed (Score:5, Funny)
Hmmmm, are you scratching your beard? (Score:5, Funny)
Re:Hmmmm, are you scratching your beard? (Score:2)
Re:Hmmmm, are you scratching your beard? (Score:5, Funny)
-(Sony Rootkit) X -(The Warden) = -(Cheating)
Re:Hmmmm, are you scratching your beard? (Score:2, Insightful)
Oh, that's right. You were just blowing it all out your ass.
Re:Hmmmm, are you scratching your beard? (Score:2)
O.o (Score:2)
Sorry, the database is currently unavailable, please try your request again shortly
Wow, this Sony rootkit works MUCH BETTER than I expected!
Now can we have a lawsuit? (Score:5, Funny)
Wow (Score:2)
Yup... definitely works (Score:5, Funny)
Re:Yup... definitely works (Score:5, Funny)
Never thought I'd get a chance to say that again!
Re:Yup... definitely works (Score:2)
There are no AK-47s in the game you noob! Just Colt M16A's...and the rhubarb isn't in the forest. LOL, right right, the rhubarb is in the forest....it's in the fricken meadows.
And everyone knows a level 13 unicorn can't take on a White Wizard...you need a group for that!
Sheesh...
Re:Yup... definitely works (Score:3, Insightful)
You need to move beyond your reality-based thinking.
This post has no content but (Score:5, Funny)
And that the first (known) exploit of this thing should be a game cheat. The world is a strange place; Sony has made it just a bit stranger.
Re:This post has no content but (Score:2)
Re:This post has no content but (Score:2)
Sony: We Make Your DRM a Little Less Evil (tm)
Obviously, this was just a way for Sony to try to bring WoW to its knees; after all, that's a lot of potential EQ2 subscribers who might have changed over had Sony been able to cripple the WoW economy.
/tinfoil plate armor, shield, and helm securely equipped
Re:This post has no content but (Score:2)
YRO? (Score:2, Interesting)
This is just a classic hack. Nothing impacting free speech or even property rights. Yes, it belongs on
Yeah but... (Score:2)
Game Cheaters are human beings too! (Score:2, Interesting)
Re:YRO? (Score:5, Insightful)
Are we suddenly interested in the rights of game cheaters? Whose rights are being impacted here?
The "rights" issue is with peoples' right to listen to music they've bought without the CD compromising their system and infecting it with rootkits. This article is signifigant more as a new development in that story, than as a "a victory for the rights of online cheaters everywhere!" thing.
To underscore the point, consider that yesterday on GlobeAndMail.com, we have:
The company dismissed the prospect of hackers exploiting its rootkits for their own purposes as an "academic" concern.
I guess it isn't so academic anymore.
Re:YRO? (Score:3, Insightful)
Seems like people are more interested in the rights of non-cheating WoW players? People who play WoW SHOULD know that their systems are monitored, and if they don't like it they can quit. Presumably, they are ok with the trade off of "my system is monitored, but so is everyone else's, so at least I can play the game knowing that it is an even field". Sony has given people a way to defeat that, and in doing so ta
Let's bash Sony (Score:5, Insightful)
Do other cheat protection systems use similar methods to look for files? If so, why are they not affected? Why am I only hearing about Warcraft?
Re:Let's bash Sony (Score:2)
Re:Let's bash Sony (Score:5, Insightful)
Re:Let's bash Sony (Score:5, Informative)
Another cheat program http://www.wowglider.com/ [wowglider.com] is also getting around WOW's Warden technology by running WOW in a normal user profile in xp, removing access to said user in the wowglider folder, then running wowglider as an admin account. But more than likely you could just install Sony's rootkit, rename your wowglider folder and do the above step for double protection against Warden detecting wowglider.
My point being Sony and First4Internet are saying that the rootkit does not compromise a system's security, when in fact it can and does. And the Cheaters are proving it now, next will be the virus writers.
Re:Let's bash Sony (Score:3, Informative)
Hardly. They're just the first to publicize... this has been floating around in some forums for a little while.
There's less of an advantage to cheating if everyone can do it. So those exploiting this have been keeping their mouths shut...
Re:Let's bash Sony (Score:5, Insightful)
Wrong! How can you say Sony and First4Internet are no way responsible???
Taken from the original article from Mark's blog over at Sysinternals And here is the URL again in case you want to read the whole thing again. http://www.sysinternals.com/blog/2005/10/sony-root kits-and-digital-rights.html [sysinternals.com]
I studied the driver's initialization function, confirmed that it patches several functions via the system call table and saw that its cloaking code hides any file, directory, Registry key or process whose name begins with "$sys$". To verify that I made a copy of Notepad.exe named $sys$notepad.exe and it disappeared from view.
If that does not compromise security what does?
Re:Let's bash Sony (Score:3, Interesting)
And it is always the latest of the breed that would be the most desireable, especially when it could be found on many systems innocently. The rootkit comes with it's own human shield of innocents.
And Blizzard would violate the DMCA if they removed Sony's DRM software that restricts access to Sony's so-protecte
Re:Let's bash Sony (Score:2, Insightful)
Re:Let's bash Sony (Score:2)
Re:Let's bash Sony (Score:5, Informative)
$sys$Warcraft and Sony Suxorz$sys$ (Score:4, Funny)
Hell, you knew it was coming. (Score:5, Interesting)
So hypothetically, ANY rootkit could be used to hide processes - HackerDefender and the others out there would do the job nicely.
Of course, the other edge of the sword is that you don't know just what _else_ is hiding... unless you wrote and compiled the rootkit yourself using your home-brewed compiler.
Re:Hell, you knew it was coming. (Score:5, Informative)
Any program that uses the operating system hooks to find out what is going on risks being fooled. The only way around it is to do what RootkitRevealer [sysinternals.com] does, ignore what the OS is saying and go byte-level reading the disk to see what you get, then if you like compare it with what the OS is reporting to see if there's any differences.
Not bad, (Score:5, Funny)
I pray for the day (Score:5, Interesting)
Re:I pray for the day (Score:5, Insightful)
Time for the whore-off (Score:4, Funny)
In this corner, the DRM people, making sure you don't listen to any music you paid for.
And in this corner, the 1337 gamer d00ds, making sure you have to buy it on ebay instead of getting it yourself.
And there is the bell... wait, they don't appear to be fighting... why are they taking off their clothes... what is the Sony guy doing to the spammer... they appear to be... oh my, that's just not right... this fight is called on account of an orgy breaking out...
Meanwhile...
Enjoy the nice cozy comfort of your OSX and Linux boxes
I wonder how complete the irony is? (Score:4, Funny)
Yes, the software industry is the best way of fulfill the Recommended Daily Allowance for irony.
Sony to Blizzard: (Score:2)
In related news (Score:3, Insightful)
Only slightly OT (Score:5, Insightful)
1: Why are people celebrating victory because Sony announced they will remove the cloak, they're still leaving all the rest of the crap on your system - including the memory and cpu wasting scan that runs continually, even when you're not playing their DRM infested CD's.
2: Now that the cloak is removed, what was that registry key that keeps track of how many CD's you've burned under their DRM system?
3: Don't you think you're celebrating a bit early since Warden 2.0 should be able to use the same tricks as RootKitRevealer to diagnose your system? And how long will this take to appear?
4: If you detecting and removing this software from your computer violates the DMCA, then the DMCA is so cleary wrong that it should be repealed this afternoon.
5: Profit! Or in other words, who is profiting from this now? I don't see Sony going broke yet.
Re:Only slightly OT (Score:3, Insightful)
It probably isn't necessary for their system to install anything anyway. Even removing the hiding the stuff they insert could have other consequences. e.g. what happens if different versions of this software attempt to install on the same
GLOWING BRIGHTWOOD STAVES FOR ALL (Score:2, Funny)
glowing brightwood staves for none!
boooo!
glowing brightwood staves for some, miniature American flags for the others!
YAY!
It's like Godzilla versus Mothra! (Score:2)
I'm going to pop some corn and watch the sparks fly.
Profit line (Score:5, Funny)
2: Install Sony Music CD.
3: Install Cheat Hacks.
4: Win at WoW.
5: Profit!
6: Discover that Sony RookKit drops frame rate to unacceptable levels.
7: Buy new AMD64 gaming system.
8: Discover that game gold no good in the real world.
9: Profit^-1.
This whole rootkit business leads one to wonder (Score:3, Interesting)
And speaking of WoW, you mean there is no game hack that changes it's name each instance so that The Warden will never have it in its signature file?
Re:This whole rootkit business leads one to wonder (Score:3, Informative)
Wow, that's hard to get around.
Once you turn off "Autorun", it's just another quick step with EAC to do a rip and convert to any format you want... I had thought of using my laptop to actually install their DRM to see what kind of crappy quality they had the tracks at, but I'm glad I didn't do that after reading yesterday's article.
Anyways, I'm sure the "other" OS I run isn't affected by th
Sony : Tylenol or FPU (Score:3, Insightful)
Instead, Sony is using the Intel Floating Point strategy of obfuscation, excuses, hard line statements etc.
From BBC News:
"A spokesman for Sony BMG said the licence agreement was explicit about what was being installed and how to go about removing it. It referred technical questions to First 4 Internet.
Mr Gilliat-Smith said Mr Russinovich had problems removing XCP because he tried to do it manually something that was not a "recommended action". Instead, said Mr Gilliat-Smith, he should have contacted Sony BMG which gives consumers advice about how to remove the software.
Getting the software removed involves filling in a form on the Sony website, visiting a unique URL and agreeing to have another program downloaded on to a user's PC that then does the uninstallation. "
Two Great Tastes! (Score:5, Funny)
Sony: Hey! Your spyware's in my rootkit!
Blizzard: Your rootkit's in my spyware!
User (taking a bite): Mmmm, now that's good computing! So liberating...
Announcer Don Pardo: Two great tastes that go together.
This is silly (Score:5, Insightful)
This demonstrates .... (Score:3, Insightful)
Before long, if you get 10 or 15 different toolkits which all try to change your system behaviour to ensure no cheating/copying/peeking is taking place, then absolutely NOTHING will keep working.
An arms race of installed crap to keep you honest will just leave everyone with busted machines.
Cheers
Re:Slashdotted already. (Score:3, Informative)
Re:Came up fine for me. (Score:5, Insightful)
Not really. The presence of the rootkit has a measureable effect. They just have to have Warden create a file with a name starting with $sys$ and then test to see if it is still there. If it has disappeared, it has detected the presence of the rootkit.
Re:What's the term? (Score:2)
Re:did /. just dupe ME?! (Score:2, Funny)
Depends.. Do you live in Soviet Russia?
Re:Rootkit = new buzzword? (Score:3, Informative)