Malware researcher developing stronger Blue Pill
Hijack software takes better advantage of Vista virtualization
IDG News Service - The researcher who developed Blue Pill, an attempt at developing undetectable malware for computers running Microsoft Corp.'s Windows Vista operating system, is working on a stealthier version that could be finished within the next few months.
Polish malware specialist Joanna Rutkowska, who works as a senior researcher at Singapore's Computer Security Initiative Consultancy Pte. Ltd. (COSEINC), unveiled a prototype of Blue Pill earlier this year. "Blue Pill is about hijacking an operating system, moving into a virtual machine and taking control of it," she said during an interview at the Hack in the Box Security Conference (HITB) in Kuala Lumpur, Malaysia.
Blue Pill works by taking advantage of hardware virtualization technology in processors from Advanced Micro Devices Inc. and Intel Corp. Virtualization allows computers to simultaneously run multiple operating systems and applications in separate partitions. "Using this virtualization technology should allow us to develop malware that is 100% undetectable," Rutkowska said.
The Blue Pill prototype demonstrated earlier this year came close to achieving this goal, but timing how long a computer takes to complete a given operation can theoretically be used to detect whether or not Blue Pill is running on a computer, Rutkowska said. She is now working on a new version of Blue Pill that is not detectable using this method.
Whether or not timing analysis is a purely theoretical means of detecting Blue Pill has been debated within the security community, with some arguing that this method of detection is easy to implement. Rutkowska is not so sure. "You have to have a trusted time source. But you cannot rely on your internal clock because that can be subverted by Blue Pill," she said, adding that other timing methods are also vulnerable to manipulation.
One way to defend against Blue Pill is to disable the virtualization capability in the processors, but that makes no sense. "People spent years developing those new processors with virtualization, and now you buy those new processors just to disable the virtualization, right? Where's the logic?" she asked.
A more practical defense is for Microsoft to disable the paging of kernel memory in Vista, which means loading the kernel code and drivers, approximately 80MB of data, into main memory. This would prevent Blue Bill from accessing the kernel and executing code. "Who cares about 80MB? That's why I'm so surprised that even though I showed this attack at the end of July at the SysCan conference, it still hasn't been fixed in RC1," Rutkowska said, referring to the latest preproduction version of Vista.
In response, a Microsoft security specialist said the company is continuing to work on improving the security of Vista RC1 before the production version is shipped to customers. "There's still a few months before the final [version] does get released," said Mike Reavey, the operations manager at Microsoft's Security Response Center.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts