US considers banning DRM rootkits – Sony BMG

Keep on Guard!


Now after the huge Sony BMG Rootkit fiasco, this has become quite a hot topic, how far can vendors go to enforce their ‘Digital Rights Management’ (or Digital Restrictions Management as we like to call it), can they install a rootkit on your machine and hook into your OS? Can they take over your PC just so they can check you aren’t pirating their music?

Thankfully the US government has taken this matter into consideration and is considering banning DRM rootkits.

US government officials are considering introducing legislation if companies continue to distribute copy-protection measures that compromise computer security.

The Department of Homeland Security’s Border and Transportation Security Directorate warning followed the discovery last year that Sony BMG employed two different types of digital rights management (DRM) on music CDS sold in the US and both installed rootkit software on PCs that made them vulnerable.

The Sony Case did indeed cause a massive storm and raised quite a large anti-Sony sentiment.

Sony has begun compensating customers who inadvertently installed the rootkit by inserting the affected CDs into PCs. However the swathes of bad publicity that it received over the whole affair have not deterred others. F-Secure reports that German DVD of the Mr & Mrs Smith movie starring Brad Pitt and Angelina Jolie contains the Settec Alpha-DISC system that installs a user-mode rootkit.

I’m glad the government are taking this seriously.

It does show however how weak the security Architecture is on Windows by default..How many Linux users do you see inserting random CD’s as root?

Source: PC Pro

Digg this Post

Posted in: Malware, Privacy

, , ,


Latest Posts:


OWASP ZSC - Obfuscated Code Generator Tool OWASP ZSC – Obfuscated Code Generator Tool
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.
A Look Back At 2017 – Tools & News Highlights A Look Back At 2017 – Tools & News Highlights
So here we are in 2018, taking a look back at 2017, quite a year it was. Here is a quick rundown of some of the best hacking/security tools released in 2017, the biggest news stories and the 10 most viewed posts on Darknet as a bonus.
Spectre & Meltdown Checker - Vulnerability Mitigation Tool For Linux Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
Hijacker - Reaver For Android Wifi Hacker App Hijacker – Reaver For Android Wifi Hacker App
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app.
Sublist3r - Fast Python Subdomain Enumeration Tool Sublist3r – Fast Python Subdomain Enumeration Tool
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.
coWPAtty Download - Audit Pre-shared WPA Keys coWPAtty Download – Audit Pre-shared WPA Keys
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys.


Comments are closed.