Symantec, Kaspersky Criticized for Cloaking Software
The Windows operating system expert who exposed Sony BMG Music Entertainment's use of "rootkit" cloaking techniques last year is now criticizing security vendors Symantec and Kaspersky Lab for shipping software that works in a similar manner.
Mark Russinovich, chief software architect with systems software company Winternals Software, says that the techniques used by Symantec's Norton SystemWorks and Kaspersky's Anti-Virus products are rootkits, a term usually reserved for the techniques that malicious software uses to avoid detection on an infected PC.
There is "no good justification" for the use of such techniques, Russinovich says. "If the vendor believes that the implementation of their software requires a rootkit, then I think they need to go back and re-architect it."
Both Symantec and Kaspersky concede that they have shipped software that hides information from system tools, but tell IDG News Service they disagree with Russinovich's use of the term rootkit, saying that because their software was not designed with malicious intent, it should not be lumped into the same category.
Still, both companies appear sensitive to Russinovich's criticism.
Symantec on Tuesday issued a patch to Norton SystemWorks that disables the cloaking feature.
And on Thursday, a representative from Kaspersky said that it was possible that his company could take similar action. "I don't know whether we've got a plan to do that, but that's obviously one thing that we could do here," says David Emm, a senior technology consultant with Kaspersky.
Unlike Sony's XCP (Extended Copy Protection) software, the Symantec and Kaspersky products do not cloak the fact that certain pieces of software are running on the computer. Instead, they hide data.
Symantec's Norton SystemWorks PC-tuning software uses cloaking techniques to hide a directory of backup files. This technique has been employed by SystemWorks since the 1990s in order to prevent users from accidentally deleting these files, according to Vincent Weafer, senior director for development for Symantec Security Response.
Symantec issued the patch because hackers could conceivably use the SystemWorks cloaking capability to hide other files on the system. Weafer described this possibility as a "low-risk" threat, saying that most security software would be able to detect these cloaked files. "The intent of this feature was for good," he says. "But we need to look at these technologies and say, 'What is the potential for harm?' Even if it's a low risk, the right thing to do is remove them."
Kaspersky's use of cloaking software is more recent. With version 5 of its Kaspersky Anti-Virus software, first released about a year ago, the company began to employ cloaking techniques to hide "checksum" information that the software used to determine which files on the computer it had or had not scanned.
The Moscow-based security vendor uses the technique to improve the performance of its software, says Emm, who does not believe that Kaspersky's software poses a security risk. "There's no vulnerability," he says. "There's no way in which the technology that we're implementing can be used by an attacker to actually abuse what we're doing and cause harm on the user's system."
While Russinovich agrees that the Symantec and Kaspersky cloaking techniques are not as dangerous as Sony's, which virus writers ultimately exploited, he says that all three vendors were engaging in a practice that is bad for users and IT professionals. "You don't want IT not knowing what's on the systems," he says. "Not being able to go to the system to do software inventory and disk-space inventory, that's just not a good idea."