Mark Russinovich, who is well known as an IT security expert, and who was a major player in the Sony rootkit scandal, is now suggesting that we use 'rootkit' technology in our products. His comments have been picked up in a PCWorld article (http://www.pcworld.com/news/article/0,aid,124365,00.asp). He said that "the techniques used by ... Kaspersky's Anti-Virus products are rootkits, a term usually reserved for the techniques that malicious software uses to avoid detection on an infected PC".
Our products do use a technology called iStreams, which is what Russinovich seems to be worried about. But this isn't a rootkit.
We started using iStreams technology a couple of years ago to improve scanning performance. Basically, this means that our products use NTFS Alternate Data Streams to hold checksum data about files on the user's system. If a checksum remains unchanged from one scan to another, KAV products know the file has not been tampered with and do not, therefore, require a repeat scan.
To view NTFS Alternate Data Streams you need special tools. When KAV is active it hides its streams because they are its internal data only. Just because you can't see them either automatically or with a special tool, it doesn't mean that they're malicious. It also doesn't mean that a product which uses and hides these streams is using rootkit technology.
We believe that this technology is not a rootkit and we do not believe hackers and/or malware can exploit it because:
The PCWorld article goes on to say: "While Russinovich agreed that the Symantec and Kaspersky cloaking techniques are not as dangerous as Sony's, which was ultimately exploited by virus writers, he said that all three vendors were engaging in a practice that was bad for users and IT professionals"
In short, there is no danger for KAV users at all because there is no way to misuse KAV streams. I think that when we talk about security we need to be clearer about the difference between malicious (or dangerous) rootkits and cloaking technologies, which can't be exploited by malware.
Our products use iStreams technology to speed up performance. The only downside is that it increases the time it takes to de-install the product, as it has to remove data from the streams. Because of this, and for no other reason, the next version of our product will use a different technology to offer the same benefits.
Russinovich is further quoted as saying "You don't want IT not knowing what's on the systems," he said. "Not being able to go to the system to do software inventory and disk space inventory, that's just not a good idea."
I say that there's no way to know everything that's on the system. The only way to do that is to format the disk. In this case you know for sure that there is nothing on the disk except boot sectors.
Different software products use different formats to store their data, including data compression and encryption. Thus the IT guys don't really know what's inside. I don't know what's in every single data file on my own computer, just I don't know all the facts in every single book in my home library.
To sum up: I think that the ”rootkit” problem is being over hyped. It is up to all of us in the security industry and press to be careful about how we use terms. Ordinary users, who can't analyze the situation themselves, shouldn't be misinformed.
2011 Apr 16, 07:43