Malware researcher developing stronger Blue Pill
Hijack software takes better advantage of Vista virtualization
IDG News Service - The researcher who developed Blue Pill, an attempt at developing undetectable malware for computers running Microsoft Corp.'s Windows Vista operating system, is working on a stealthier version that could be finished within the next few months.
Polish malware specialist Joanna Rutkowska, who works as a senior researcher at Singapore's Computer Security Initiative Consultancy Pte. Ltd. (COSEINC), unveiled a prototype of Blue Pill earlier this year. "Blue Pill is about hijacking an operating system, moving into a virtual machine and taking control of it," she said during an interview at the Hack in the Box Security Conference (HITB) in Kuala Lumpur, Malaysia.
Blue Pill works by taking advantage of hardware virtualization technology in processors from Advanced Micro Devices Inc. and Intel Corp. Virtualization allows computers to simultaneously run multiple operating systems and applications in separate partitions. "Using this virtualization technology should allow us to develop malware that is 100% undetectable," Rutkowska said.
The Blue Pill prototype demonstrated earlier this year came close to achieving this goal, but timing how long a computer takes to complete a given operation can theoretically be used to detect whether or not Blue Pill is running on a computer, Rutkowska said. She is now working on a new version of Blue Pill that is not detectable using this method.
Whether or not timing analysis is a purely theoretical means of detecting Blue Pill has been debated within the security community, with some arguing that this method of detection is easy to implement. Rutkowska is not so sure. "You have to have a trusted time source. But you cannot rely on your internal clock because that can be subverted by Blue Pill," she said, adding that other timing methods are also vulnerable to manipulation.
One way to defend against Blue Pill is to disable the virtualization capability in the processors, but that makes no sense. "People spent years developing those new processors with virtualization, and now you buy those new processors just to disable the virtualization, right? Where's the logic?" she asked.
A more practical defense is for Microsoft to disable the paging of kernel memory in Vista, which means loading the kernel code and drivers, approximately 80MB of data, into main memory. This would prevent Blue Bill from accessing the kernel and executing code. "Who cares about 80MB? That's why I'm so surprised that even though I showed this attack at the end of July at the SysCan conference, it still hasn't been fixed in RC1," Rutkowska said, referring to the latest preproduction version of Vista.
In response, a Microsoft security specialist said the company is continuing to work on improving the security of Vista RC1 before the production version is shipped to customers. "There's still a few months before the final [version] does get released," said Mike Reavey, the operations manager at Microsoft's Security Response Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts