Comments on: Absolute Computrance Rootkit http://www.terminally-incoherent.com/blog/2012/06/05/absolute-computrance-rootkit/ I will not fix your computer. Tue, 04 Aug 2020 22:34:33 +0000 hourly 1 https://wordpress.org/?v=4.7.26 By: Mike Welsh http://www.terminally-incoherent.com/blog/2012/06/05/absolute-computrance-rootkit/#comment-26764 Thu, 07 Feb 2013 22:02:36 +0000 http://www.terminally-incoherent.com/blog/?p=12176#comment-26764

I don’t run a Windows system on my ASUS netbook. I run Linux/Ubuntu. Does that mean that my netbook will not be affected?

Reply  |  Quote
]]>
By: Dan http://www.terminally-incoherent.com/blog/2012/06/05/absolute-computrance-rootkit/#comment-22445 Mon, 18 Jun 2012 19:03:33 +0000 http://www.terminally-incoherent.com/blog/?p=12176#comment-22445

http://it.slashdot.org/story/09/07/31/1337202/bios-rootkit-preloaded-i n-60-of-new-laptops

Well this is old news but it is still happening now with many new variants and I am still stunned by the lack of people who know about this threat and some of the hardware rootkits.

Hopefully this gets more attention. Maybe the nature of the threat makes people feel overwhelmed. I am not sure. I wish there was more discussion.

Reply  |  Quote
]]>
By: dan http://www.terminally-incoherent.com/blog/2012/06/05/absolute-computrance-rootkit/#comment-22367 Thu, 07 Jun 2012 19:12:39 +0000 http://www.terminally-incoherent.com/blog/?p=12176#comment-22367

@ Morghan:

It is really hard to believe. The vPro chip also has a hardware rootkit built into it. If you guys could look into the patents and such on that technology maybe we can shed light on exactly what all these new technologies are meant to do. Anti-theft tech should be a legimate consumer option, not a baked in FORCED “feature.” This is a huge privacy issue. I found no response from the ACLU and EFF and I think there should have been. My two cents.

Reply  |  Quote
]]>
By: dan http://www.terminally-incoherent.com/blog/2012/06/05/absolute-computrance-rootkit/#comment-22366 Thu, 07 Jun 2012 19:10:17 +0000 http://www.terminally-incoherent.com/blog/?p=12176#comment-22366

@ Alphast:

You got that information from the patent? Please post that here?

Reply  |  Quote
]]>
By: Luke Maciak http://www.terminally-incoherent.com/blog/2012/06/05/absolute-computrance-rootkit/#comment-22362 Wed, 06 Jun 2012 14:47:58 +0000 http://www.terminally-incoherent.com/blog/?p=12176#comment-22362

@ Dan:

Thanks. I’ll see if I can contribute some stuff to it if I get a chance.

@ Morghan:

Well, yes and no. There should be a legit way to disable it so that the owners could prevent tracking/spying if they wanted to. A criminal could use that feature too, but the logic is that a dude who burglarizes your house or your car is probably not going to bother to do that. But yeah… It could be that they don’t provide an actual off switch for legit customers.

@ Mike:

Good point. Maybe we could link up actual products and/or rulesets that do this on the wiki.

@ Alphast:

Well, we’re getting into spy movie territory here but this is technically a possibility. I bet that’s not what they are doing though. It’s probably wiser to instead develop a state sponsored malware that exploits the computrace rootkit and uses it to mask it’s activity. The Stuxnet hoopla proved that this is perfectly doable, and deniable because it’s indirect.

Reply  |  Quote
]]>
By: Alphast http://www.terminally-incoherent.com/blog/2012/06/05/absolute-computrance-rootkit/#comment-22360 Wed, 06 Jun 2012 13:13:12 +0000 http://www.terminally-incoherent.com/blog/?p=12176#comment-22360

I am also interested about one issue there: Lenovo is a Chinese company and most PC’s are made in China. Software companies are usually US based. Does that mean that this rootkit (which has been specifically designed to allow gov agencies to look into PC’s, according to the patent) allows the US or the Chinese government to control our laptops? I know it sounds paranoid, but we are talking about cameras, keyboard recording and so on…

Reply  |  Quote
]]>
By: Mike http://www.terminally-incoherent.com/blog/2012/06/05/absolute-computrance-rootkit/#comment-22358 Tue, 05 Jun 2012 21:50:48 +0000 http://www.terminally-incoherent.com/blog/?p=12176#comment-22358

Note that while certainly not a panacea, open rulesets (VRT, ET) for IDS like Snort and Surricata have matchers to detect this (among gozillion of others) crapware since 2011 in exactly the same way Dan did, by looking at the traffic.
Could be a better general suggestion than digging pcap dumps with your own eyeballs.

Reply  |  Quote
]]>
By: Dan http://www.terminally-incoherent.com/blog/2012/06/05/absolute-computrance-rootkit/#comment-22356 Tue, 05 Jun 2012 16:49:05 +0000 http://www.terminally-incoherent.com/blog/?p=12176#comment-22356

http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&typ e=publication&name=Deactivate_the_Rootkit

Another interesting link on this issue.

Reply  |  Quote
]]>
By: Morghan http://www.terminally-incoherent.com/blog/2012/06/05/absolute-computrance-rootkit/#comment-22354 Tue, 05 Jun 2012 15:51:42 +0000 http://www.terminally-incoherent.com/blog/?p=12176#comment-22354

I have an HP DV6 and was looking in to a Panasonic CF31, both are on the list. I’m sure that killing it in the BIOS, which I did on day one with the HP, won’t keep it from being triggered. If that would work it wouldn’t do you much good for the official purpose.

Reply  |  Quote
]]>
By: Dan http://www.terminally-incoherent.com/blog/2012/06/05/absolute-computrance-rootkit/#comment-22353 Tue, 05 Jun 2012 15:45:48 +0000 http://www.terminally-incoherent.com/blog/?p=12176#comment-22353

Looks like it is already exploitable.

Please see my wiki , I added some of the many links that explain how the security group CORE exploited it already.

http://computracerootkit.wikia.com

Look under the “links” page for more info.

It might be old news but many machines are still affected.

Beyond this if you are using Intel® vPro™ Technology at all you have what is known as a hardware rootkit, which is impossible to uninstall without damaging the machine.

Spread the word!

Reply  |  Quote
]]>