Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Rootkit Targets 64-bit Windows

Security researchers have revealed that a new version of the malware, which infected Windows PCs in February 2009, bypass safeguards designed and developed to restrict rootkits from hijacking machines running 64-bit editions of Windows, as reported by Computerworld on August 27, 2010,.

Prevx and Symantec, the two security firms, have discovered that hackers are actively using the updated rootkit which goes by names such as TDL (currently detected as TDL3 by Prevx), Tidserv (currently detected as Backdoor.Tidserv.L Boot.Tidserv by symantec), and Alureon.

This new variant of Tidserv is harmful for two reasons; first - experts have noticed that Tidserv inject user-mode code into Windows 64-bit driver processes found in the likes of 64-bit Windows versions.

Second reason - Tidserv is infecting the Master Boot Record (MBR) of the compromised computer, permitting it to gain control before the operating system gets loaded. The main components of Tidserv are stored in unused space at the end of the hard drive in encrypted form. Hence, it becomes more difficult to detect and remove Tidserv once the system gets infected.

The initial attempts to break this Windows security (64-bit Windows) credited to Whistler rootkit, a framework rootkit sold in the black market and capable of infecting both x64 and x86 versions of Microsoft Windows.

The TDL3 release can be considered as the first x64 compatible kernel mode rootkit infection. In order to penetrate into both Driver Signature verification and Kernel Patch Protection, the rootkit fixes the hard drive's master boot record with the objective to intercept Windows startup routines, possess it, and load its driver.

In case of x86 versions of Windows, it is not required to restart the computer at once as it can load the driver when it wants. However, the steps of infection are different in case of on x64 versions.

The rootkit requires administrative rights to compromise the Master Boot Record in x64 version. Yet, it is unable to load own 64 bit compatible driver owing to Windows's kernel security. Hence, the Windows is required to be restarted as forced by the dropper. This way the patched MBR does the poisoning work.

Therefore, the users are suggested by the security firms to keep their definitions updated to assure protection against these threats.

Related article: Rootkits Can Be Detected And Eradicated

ยป SPAMfighter News - 01-09-2010

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page