X
Tech

Rootkit-like behavior found on Sony fingerprint reader

Finnish anti-virus vendor F-Secure has found rootkit-like features in a plug-and-play fingerprint reader marketed by Sony.
Written by Ryan Naraine, Contributor
Rootkit-like behavior found on Sony fingerprint reader
Finnish anti-virus vendor F-Secure has found rootkit-like features in a plug-and-play fingerprint reader marketed by Sony.

The discovery was made when F-Secure's BlackLight scanner picked up hidden files on a system with the Sony Microvault USM-F fingerprint reader software.

F-Secure Mika Stahlberg explains:

The Sony MicroVault USM-F fingerprint reader software that comes with the USB stick installs a driver that is hiding a directory under "c:\windows\". So, when enumerating files and subdirectories in the Windows directory, the directory and files inside it are not visible through Windows API. If you know the name of the directory, it is e.g. possible to enter the hidden directory using Command Prompt and it is possible to create new hidden files. There are also ways to run files from this directory. Files in this directory are also hidden from some antivirus scanners (as with the Sony BMG DRM case) — depending on the techniques employed by the antivirus software. It is therefore technically possible for malware to use the hidden directory as a hiding place.

In addition to the software that was packaged with the USB stick, F-Secure also tested the latest software version available from Sony and found the same hiding functionality. "[We] feel that rootkit-like cloaking techniques are not the right way to go here," Pehkonen said.

He said Sony did not respond to F-Secure's attempt at notification.

This comes almost two years after the Sony BMG copy protection scandal, where rootkit techniques were used in a DRM (digital rights management) scheme.

Editorial standards