SONY installing RootKits on Computers for Digital Rights Management

Status
Not open for further replies.

exclamation55

Posts: 76   +0
Not only had Sony put software on my system that uses techniques commonly used by malware to mask its presence, the software is poorly written and provides no means for uninstall. Worse, most users that stumble across the cloaked files with a *RKR scan will cripple their computer if they attempt the obvious step of deleting the cloaked files.

*Rootkits are cloaking technologies that hide files, Registry keys, and other system objects from diagnostic and security software


http://www.sysinternals.com/blog/2005/10/sony-rootkits-and-digital-rights.html :unch:
 
Had this piece of news (along with its interesting link) been posted or crossposted to the correct forum, it would have saved me the effort of posting it there myself only to find that someone has already written a thread with the story.
 
All you have to do is to not accept the EULA for the "player" and use a cd-player software of your choice... But I agree that it's horrible what they're doing!
 
review

Ouch! Look at this review!
"These DRM files are almost impossible to remove without fouling Windows systems"​

"Users like Russinovich who are sophisticated enough to find the files and try to delete them will find that Windows can no longer detect the CD drive attached to their systems, Russinovich found, and it requires other subtle manipulations of Windows to restore."​

see the removal tool
 
SONY issues DRM patch

Talk about the POWER OF FORUMS :knock:


After a chorus of criticism, Sony Corp.'s music division said Wednesday it is distributing a free software patch to reveal hidden files that automatically installed to hard drives when some of its music CDs were played on personal computers.

The offending technology was designed to thwart music piracy.

Sony BMG Music Entertainment and its partner, UK-based First 4 Internet, said they decided to offer the patch as a precaution, not because of any security vulnerability, which some critics had alleged.

"What we decided to do is take extra precautionary steps to allay any fears," said Mathew Gilliat-Smith, First 4 Internet's CEO. "There should be no concern here."

http://seattlepi.nwsource.com/business/1700AP_Sony_Copy_Protection.html
 
Unfortunately, it only shows the rootkit, it doesn't remove it. So you've still got a little program sending a message to sony telling them what cd (if not what track) you're listening to....
 
These are the SONY CDs concerned (sofar...):

According to the EFF, the following CDs contain the DRM in question:

• Trey Anastasio, Shine (Columbia)
• Celine Dion, On ne Change Pas (Epic)
• Neil Diamond, 12 Songs (Columbia)
• Our Lady Peace, Healthy in Paranoid Times (Columbia)
• Chris Botti, To Love Again (Columbia)
• Van Zant, Get Right with the Man (Columbia)
• Switchfoot, Nothing is Sound (Columbia)
• The Coral, The Invisible Invasion (Columbia)
• Acceptance, Phantoms (Columbia)
• Susie Suh, Susie Suh (Epic)
• Amerie, Touch (Columbia)
• Life of Agony, Broken Valley (Epic)
• Horace Silver Quintet, Silver's Blue (Epic Legacy)
• Gerry Mulligan, Jeru (Columbia Legacy)
• Dexter Gordon, Manhattan Symphonie (Columbia Legacy)
• The Bad Plus, Suspicious Activity (Columbia)
• The Dead 60s, The Dead 60s (Epic)
• Dion, The Essential Dion (Columbia Legacy)
• Natasha Bedingfield, Unwritten (Epic)
 
Sony DRM -> Copyright infringement

excerpt from
eWEEK.com Special Report: Digital Rights Management
......
The DRM files remain installed on the hard disk even if the EULA is
declined.

Like a virus, there is no meaningful uninstaller available. Now, some of
the DRM protected CDs will indeed add an entry for SunnComm to the
Add/Remove control panel.

When activated, it removes most of the files in the shared folder, but
leaves the core copy protection module (sbcphid.sys) active and resident.

That means other programs (like iTunes) can't access other SunnComm
protected CDs.But wait, there's more. MediaMax "phones home" without
your consent every time you play the CD. When a CD is played, a request
is sent to a SunnComm server that includes an ID along with the request
that identifies the CD.

Of course, the request by itself identifies the OS you are running as
well as your IP address.

The request seems to be for SunnComm's "Perfect Placement" feature,
which can insert ad content while viewing the CD.

So, Windows users have to deal with a triple threat. Without user
consent, the DRM installs software on the target computer, provides no
way to uninstall its core, and lets SunnComm know every time the CD is
played.

But wait, there's even more.

Someone in the Netherlands did a decompile on the XCP rootkit that has
gotten most of the attention lately. It seems that parts of the rootkit
use the LAME mp3 encoder, which is licensed under the Lesser GPL. That
means by delivering only an executable (the rootkit) without source or
crediting, XCP violates the GPL Violating the GPL puts Sony at massive
legal risk for—wait for it—copyright infringement. :blackeye:
 
Microsoft to fight Sony's DRM

In an upcoming weekly software update, Microsoft will add the new electronic signature so that Windows AntiSpyware can spot and automatically remove the software, Garms wrote. Windows AntiSpyware is a beta product that Microsoft eventually plans to rename Windows Defender.

Microsoft will also include the XCP signature in the next update to its Malicious Software Removal tool, and with its Web-based security service called Windows Live Safety Center, according to Garms.
 
Now - TEXAS sues SONY but TAPE can Stop DRM

Sony BMG Music's controversial copy-protection scheme can be defeated with a small piece of tape, ...Sony's XCP technology is stymied by sticking a fingernail-size piece of opaque tape on the outer edge of the CD.
That, the pair said in a brief posted online, renders "session 2 -- which contains the self-loading DRM software — unreadable. The PC then treats the CD as an ordinary single-session music CD, and the commonly used CD 'rip' programs continue to work as usual
:eek:
http://www.techweb.com/wire/security/174400646;jsessionid=0OAAQF1MCNZKGQSNDBCSKH0CJUMEKJVN







Attorney General Greg Abbott accused Sony BMG of surreptitiously installing "spyware" in the form of files that mask other files Sony installed as part of XCP.

This "cloaking" component can leave computers vulnerable to viruses and other security problems, Abbott said, echoing the findings of computer security researchers.

http://news.yahoo.com/s/ap/20051121...9QQka6s0NUE;_ylu=X3oDMTA3cjE0b2MwBHNlYwM3Mzg-
 
this looks like the right place. I installed a sony dvd/cdrw that came with its own software and a newer version of nero. It also came with the rootkit. I didn't even know it was there, don't use ie very much, but the first time I ran ie because that paticular site wouldn't work with firefox, my security software picked up the rootkit and zapped it. But I understand that there are files left behind. So I can't use this burner to back up anything on my computer because I don't know that its not going to place a rootkit on each cd I burn. So I'm going to get another burner from a different compnay, hp maybe. What I'm worried about is those left over files being able to corrupt the software for the new burner. How do I not end up just reinstalling the rootkit when I set up the computer again?
 
Sony's uninstaller is worse than the XCP software!

In response to the firestorm over its DRM on CDs, Sony made available last week a
Web-based "uninstaller" to remove it. It appears this cure is worse than the disease.

see the Eweek.com article for details :-(
 
Status
Not open for further replies.
Back