Despite pledge, researchers release VBootkit 2.0 code

Microsoft says Windows 7 doesn't have a security vulnerability that VBootkit 2.0 can exploit

Indian security researchers have released proof-of-concept code that can be used to take over a computer running Microsoft's upcoming Windows 7 operating system, despite earlier promising not to make the code public for fear it could be misused.

VBootkit 2.0 was developed by researchers Vipin Kumar and Nitin Kumar and is now available for download under an open-source license.

They unveiled the proof-of-concept code at the Hack In The Box (HITB) security conference in Dubai last month, where they showed how it could be used to give an attacker complete control over a Windows 7 computer, including the ability to remove and restore user passwords without a trace and strip DRM (digital rights management) protections from media files.

"We don't have any plans to make it open source, due to chances of misuse," Nitin Kumar wrote in an April 27 e-mail.

In an e-mail announcing the release of the VBootkit 2.0, Vipin Kumar did not offer a reason for their apparent change of heart.

But in a follow-up message, he said they wanted to help spur other researchers to develop new defenses against these types of attacks.

"All we are trying to do is help more people understand the real enemy, malware, so new innovations can occur," Vipin Kumar wrote.

Microsoft doesn't consider VBootkit 2.0 a serious threat. "Any claims made at the event relating to Windows 7 having a security vulnerability are not true," the software maker said in an e-mail statement.

Microsoft's assertion is technically true. VBootkit 2.0 does not exploit a security vulnerability.

Instead, it exploits a design flaw in the operating system, which assumes that the boot process can be trusted and is safe from attack. VBootkit 2.0 works by modifying files as they are loaded into the main memory of a computer, a type of attack that Windows 7 is not designed to stop on its own.

This type of attack can be blocked by using BitLocker Drive Encryption (BDE) and a Trusted Platform Module, but these features will not be available on many Windows 7 computers.

Microsoft also cited the nature of the VBootkit 2.0 demonstration as further evidence that it doesn't present a threat.

"With the scenario we have seen reported there is no question of Windows 7 being broken into or comprised remotely - by an attacker using a malicious exploit over the Internet for example," Microsoft said.

However, VBootkit 2.0 is only a proof of concept, meant to illustrate that an attack can work.

The code can be modified by an attacker and used for a remote attack, as has been done with other bootkit attacks, Nitin Kumar said.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwareVBootkit

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Sumner Lemon

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?