Sony RootKit und die Sicherheitsexperten

Wired hat wichtige Gedanken darüber, wie Sony es schafft, seit mehr als einem Jahr Software in Umlauf zu bringen, die im wesentlichen wie andere Malware (Viren, Trojaner, Würmer) arbeitet – und bisher kein einziger Virenscanner Alarm geschlagen hat!

Real Story of the Rogue Rootkit

What do you think of your antivirus company, the one that didn’t notice Sony’s rootkit as it infected half a million computers? And this isn’t one of those lightning-fast internet worms; this one has been spreading since mid-2004. Because it spread through infected CDs, not through internet connections, they didn’t notice? This is exactly the kind of thing we’re paying those companies to detect — especially because the rootkit was phoning home.

Who are the security companies really working for? It’s unlikely that this Sony rootkit is the only example of a media company using this technology. Which security company has engineers looking for the others who might be doing it? And what will they do if they find one? What will they do the next time some multinational company decides that owning your computers is a good idea? — Bruce Schneier in Wired News

Dazu auch „Sory seems to be the hardest word“

Das ist übrigens die gleiche Firma, wegen der George Michael in den 1990ern so wenig veröffentlichte und in einem Video einen Kopfhörer mit dem Markennamen „Fony“ trug. (Phony = Schwindler)