Was Sony XCP a harmful rootkit towards legitimate end users?

Published by Charlie Davidson on

Was Sony XCP a harmful rootkit towards legitimate end users?

Sony BMG was quoted as maintaining that “there were no security risks associated with the anti-piracy technology”, despite numerous virus and malware reports. They said that XCP uses rootkit technology to hide certain files from the computer user and that this technique is a security threat to computer users.

What did the Sony rootkit do?

He concluded that the rootkit was connected to the proprietary music player that was included in Sony music CDs. The hidden rootkit program was used to spy on users and their listening habits, and share that information with Sony, as well as prevent other third party audio programs from reading the disk.

What is DRM Sony?

Digital Rights Management system, otherwise known by the acronym DRM, is utilised to protect copyrighted works from being downloaded, copied and edited illegally.

Is a copy protection technology introduced by Sony in 1999?

Sony already incorporates various copyright protection technologies, such as MagicGate, the OpenMG Jukebox and OpenMG Light, in its products. MagicGate, developed in 1999, prevents illegal copies being made when digital content is transferred from a PC to an audio player using a Sony Memory Stick flash memory card.

What does rootkit mean?

A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. Today rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes.

What are some legitimate examples of rootkits?

Some of these rootkits resemble device drivers or loadable modules, giving them unrestricted access to the target computer. These rootkits avoid detection by operating at the same security level as the OS. Examples include FU, Knark, Adore, Rkit and Da IOS.

How does rootkit get installed?

User-mode rootkits remain installed on the infected computer by copying required files to the computer’s hard drive, automatically launching with every system boot. Sadly, user-mode rootkits are the only type that antivirus or anti-spyware applications even have a chance of detecting.

What are rootkit attacks?

Rootkit is a term applied to a type of malware that is designed to infect a target PC and allow an attacker to install a set of tools that grant him persistent remote access to the computer. In recent years, a new class of mobile rootkits have emerged to attack smartphones, specifically Android devices.

What did the Sony rootkit do to your computer?

It also slows down their computer and opens security holes which can be used by others to attack their own computer. That is what happened 10 years ago if you bought one of 25 million music CDs from Sony. This attack by Sony on people’s computers was discovered on 31 October 2005 and was later referred as the “Sony rootkit”.

When did Sony BMG remove the rootkit from Windows?

On November 18, 2005, Sony BMG provided a “new and improved” removal tool to remove the rootkit component of XCP from affected Microsoft Windows computers. This section needs expansion. You can help by adding to it. (April 2013)

How did Sony BMG get into the spyware scandal?

The suit was also the first filed under the state’s 2005 spyware law. It alleged that the company surreptitiously installed the spyware on millions of compact music discs (CDs) that compromised computers when consumers inserted them into their computers in order to play.

Are there any security risks with Sony BMG?

Sony BMG was quoted as maintaining that “there were no security risks associated with the anti-piracy technology”, despite numerous virus and malware reports. On November 16, 2005, US-CERT, part of the United States Department of Homeland Security, issued an advisory on XCP DRM.

Categories: Blog