iTnews
  • Home
  • News
  • Technology
  • Security

Trojan variants, lawsuits pile on Sony

By Frank Washkuch on Nov 10, 2005 10:05PM

Sony BMG Entertainment’s recent troubles – caused by the inclusion of a spyware-like application on nearly two dozen CD-Roms – continued to snowball this week.

The company released a new patch, less than half the size of the original, on Tuesday in response to the uproar over its installation of a rootkit application that could "phone home" information from a PC to Sony or its business partners.

But Mark Russinovich, who first publicly warned of the inclusion of "digital rights management" technology on CDs, was critical of Sony's efforts to help customers, saying the company had made it nearly impossible for them to find fixes on its website.

"The fact that Sony's announcement was directed at the press, and that they've made no effort to make contact with their customers, makes the patch and uninstall look solely like a public relations gesture to the media," Russinovich said on his weblog.

He also identified the new patch as the culprit in another crash of his Windows operating system, showing a screenshot of the "blue screen of death" following shutdown.

Sony, which calls Service Pack 2a "a maintenance release designed to reduce the file size of Service Pack 2," also defends the rootkit download on its website.

"This service pack removes the cloaking technology component that has been recently discussed in a number of articles published regarding the XCP technology used on Sony BMG content protected CDs," the company states. "This component is not malicious and does not compromise security. However to alleviate any concerns that users may have about the program posing potential security vulnerabilities, this update has been released to enable users to remove this component from their computers."

Sony's woes don't end there. Attorney Alan Himmelfarb recently sued the company in California, claiming it has broken three state laws. He is demanding restitution for damages he claims residents of that state suffered when they bought the CDs.

Computer Associates researches also found on Thursday two variants of what's now being called the "Sony Trojan." The only connection between the trojans and the rootkit is their use of $sys$ in file names, Sam Curry, CA vice president of eTrust Security Management, said on Thursday. Once connected, the trojans can execute or delete files, update, remove or restart themselves and retrieve PC information, said Curry, who called the trojans' threat "very low."

CA had already classified the rootkit as spyware.

Researchers from Sophos found the first trojan to take advantage of the Sony rootkit earlier this week. The Stinx-E trojan appears to have been deliberately spammed out to email addresses, posing as a message from a British business magazine, SC Magazine reported, when run it copies itself to a file called $sys$drv.exe. Any file with $sys$ in its name is automatically cloaked by Sony's copy-protection code, making it invisible on computers which have used CDs carrying Sony's copy protection application.

www.sony.com
www.ca.com
www.sophos.com
www.sysinternals.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
lawsuitsonpilesecuritysonytrojanvariants

Partner Content

Digital signatures propel Australian Unity with rapid time to value
Digital signatures propel Australian Unity with rapid time to value
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Frank Washkuch
Nov 10 2005
10:05PM
0 Comments

Related Articles

  • Twilio phish sees Signal users' numbers at risk of re-registering
  • Digital signatures propel Australian Unity with rapid time to value
  • Realtek SDK exposes systems to SIP bug
  • Palo Alto Networks alerted to DoS vulnerability in routers
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Services Australia sets changeover date for myGov

Services Australia sets changeover date for myGov

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

Australian court finds insurer not liable for ransomware clean-up costs

Australian court finds insurer not liable for ransomware clean-up costs

NBN Co proposes to axe CVC across all plans by mid-2026

NBN Co proposes to axe CVC across all plans by mid-2026

Digital Nation

Australia will lose 11 percent of jobs to automation by 2040: Forrester
Australia will lose 11 percent of jobs to automation by 2040: Forrester
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
Metaverses on the agenda for Dominello, Husic ministerial meeting
Metaverses on the agenda for Dominello, Husic ministerial meeting
Domino’s invests in observability for zero contact delivery
Domino’s invests in observability for zero contact delivery
Criteo to fork out $94.7m for consent breaches
Criteo to fork out $94.7m for consent breaches
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.