- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
Network World - ORLANDO - If your system gets infiltrated by a rootkit, you might as well just "waste the system entirely," a Microsoft official told fellow security professionals last week at the annual InfoSec Conference here.
Microsoft's Mike Danseglio, program manager in the company's security solutions group, was among a host of security experts from big-name companies who swapped advice about protecting networks with 1,700 showgoers.
According to Danseglio, the hacker rootkit is "probably the nastiest piece of malware you'll get," because it is designed to hide unwanted files - or any sign a computer has been compromised - stealthily.
Microsoft dedicates four staffers to analyze rootkit samples found in customer computers or on the Internet. In his presentation, Danseglio offered a list of the most-wanted rootkits (see graphic), adding that 90% of what Microsoft finds relates to Hacker Defender, a rootkit from the Czech Republic-based programmer who calls himself Holy Father. The programmer charges several hundred dollars to make Gold versions of his basic rootkit.
Writing rootkits isn't a crime, but using them to hide code in a computer that's been hacked by other means is, Danseglio said. Holy Father last month indicated he's retiring from his Web site business, leading some to speculate that he's been hired for some purpose somewhere.
According to Danseglio, rootkits have been embedded in many networks, with college campuses especially hard-hit. The University of Washington has become notorious for its students using rootkits to hide pornography and music on the university's servers, he said.
Danseglio offered a list of tools, including a few from Microsoft, that can detect rootkits. But he said there are no simple ways to address the menace. "There are no rootkit-resistant operating systems," Danseglio said.
Kerry Anderson, a Fidelity Investment Brokerage vice president in the information security group, spoke on the topic of setting up a computer forensics program to tackle crime, including child pornography, terrorism and financial fraud.
|Microsoft's most-wanted list
Rootkits that hide in Windows:
A company's first priority should be establishing a policy and internal training for auditing and investigating suspected computer crime, coordinating among the legal, human resources and IT departments, she said.
She advised extending that policy to include working with outsourcing providers, vendors and business partners to ascertain their computer-investigation procedures and get the right to audit and monitor their computers if necessary. "Our contracts today are requiring the right to do risk assessment and visitation audits," she pointed out.