Breaking News

Samsung announces Galaxy Tab S11 and Galaxy S25 FE series TEAMGROUP Launches EXPERT P34F Find My External SSD NIKON RELEASES A NEW SILVER EDITION OF THE Z F FULL-FRAME MIRRORLESS CAMERA JSAUX Showcases Upcoming Switch 2 Ecosystem Solutions Ahead of IFA Berlin 2025 Viltrox Joins the L-Mount Alliance, Expanding Creative Possibilities

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Symantec Reports Rootkit in Master Boot Record of Windows XP

Symantec Reports Rootkit in Master Boot Record of Windows XP

Enterprise & IT Jan 10,2008 0

Responding to recent reports of an MBR (Master Boot Record) rootkit in the wild, Symantec released on Thusday an analysis of the problem. An MBR is the first sector of a storage device such as a hard disk, and is generally used for bootstrapping the operating system after the computer's BIOS has done its startup checks. Basically, if you can control the MBR, you can control the operating system and therefore the computer it resides on.

MBR-based attacks have been around since the MS-DOS era. In 2007, Nitin and Vipin Kumar of NVLabs published a second PoC MBR rootkit called "Vbootkit" , which was able to exploit the latest version of Microsoft Vista. But, now the bad news is that this time the MBR rootkit is not in the form of a PoC demonstration, but is an active threat found in the wild and infecting computers through drive-by exploits via Web sites. Symantec detects this threat as Trojan.Mebroot.

Trojan.Mebroot takes control of the system by overwriting the MBR with its own code. Analysis of Trojan.Mebroot shows that its current code is at least partially copied from the original eEye BootRoot code. The kernel loader section, however, has been modified to load a custom designed stealth back door Trojan 467 KB in size, stored in the last sectors of the disk.

The main problem is that some versions of Microsoft Windows allow programs to overwrite disk sectors directly (including the MBR) from user mode, without restrictions. As such, writing a new MBR into Sector 0 as a standard user is a relatively easy task. This issue has been known for quite some time, and still affects the 2K/XP families, while Vista was partially secured in 2006 (after Release Candidate 2) after a successful attack demonstration made by Joanna Rutkowska. The attack is called the "Pagefile Attack".

Rootkits themselves are hardly a new threat, but the inclusion of the MBR as part of the infection is not considered common. They were previously demonstrated as possible, but were not identified in the wild. Now that this has changed, Symantec expects to see more variants targeting the MBR to appear in the future.

For now, Trojan.Mebroot seems to run successfully only on Windows XP (all Service Packs) due to some hard-coded values inside the attack code. For a complete analysis of the threat, please refer to Symantec's writeup for Trojan.Mebroot.

There appears to be a link between Trojan.Mebroot and Trojan.Anserin. Similarities such as the main distribution Web site and the polymorphic packer used in both threats suggest that they may be closely related.

The rootkit cannot be removed while the OS is running, as it must be removed while the rootkit code itself is not running. During our tests, running the "fixmbr" command from within the Windows Recovery Console successfully removed the malicious MBR entry. To help prevent similar attacks in the future, and if your system BIOS includes the Master Boot Record write-protection feature, Symantec suggests that now is a good time to enable it.

Tags: SymantecrootkitsVirus
Previous Post
Panasonic's Wireless Home Theater with Integrated Blu-ray Player
Next Post
Matsushita to Change Corporate Name to Panasonic

Related Posts

  • Broadcom Buys Symantec's Enterprise Security Assets for $10.7 Billion

  • Deal Talks Between Symantec and Broadcom Said to Stall

  • Broadcom Close to Acquiring Symantec

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

  • Hotel Websites Leak Guest Booking Details and Allow Access to Personal Data

  • Symantec Probes Accounting

  • Western Energy Sector Targeted by Dragonfly Cyber Espionage Group

  • Symantec Points at North Korean Hackers in Ransomware Attacks

Latest News

Samsung announces Galaxy Tab S11 and Galaxy S25 FE series
Smartphones

Samsung announces Galaxy Tab S11 and Galaxy S25 FE series

TEAMGROUP Launches EXPERT P34F Find My External SSD
Consumer Electronics

TEAMGROUP Launches EXPERT P34F Find My External SSD

NIKON RELEASES A NEW SILVER EDITION OF THE Z F FULL-FRAME MIRRORLESS CAMERA
Cameras

NIKON RELEASES A NEW SILVER EDITION OF THE Z F FULL-FRAME MIRRORLESS CAMERA

JSAUX Showcases Upcoming Switch 2 Ecosystem Solutions Ahead of IFA Berlin 2025
Gaming

JSAUX Showcases Upcoming Switch 2 Ecosystem Solutions Ahead of IFA Berlin 2025

Viltrox Joins the L-Mount Alliance, Expanding Creative Possibilities
Cameras

Viltrox Joins the L-Mount Alliance, Expanding Creative Possibilities

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

Noctua NH-D15 G2

Noctua NH-D15 G2

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Soundpeats Pop Clip

Soundpeats Pop Clip

be quiet! Pure Base 501

be quiet! Pure Base 501

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed