Sony at it again?

ThraxThrax 🐌Austin, TX Icrontian
edited August 2007 in Science & Tech
In a blog for the well-known security and anti-malware firm, F-Secure, it has been revealed that a certain model of Sony flash drive installs a rootkit similar to the Sony/BMG Music fiasco of 2005. The flash drive's software masks the folder from the Windows API, so it cannot be discovered without a program that reads NTFS alternate data streams (i.e. it cannot be seen by Windows Explorer). Once the folder is known, it can be accessed via command prompt, but none of the files inside can be altered or modified.

This is the exact same procedure used for the SonyBMG software, which means enterprising malware authors could deposit their junk in this hidden folder, and most anti-virus programs would never know.

Good job, Sony!

Comments

  • JengoJengo Pasco, WA | USA
    edited August 2007
    Wow... i cant believe they are actually trying this crap again. I hope they get in some trouble over this. Better yet, i hope people become smart enought to buy their crap and teach them a lesson.
  • Sledgehammer70Sledgehammer70 California Icrontian
    edited August 2007
    Jengo it is more like tried that crap :) they stopped making these flash drives awhile ago.
Sign In or Register to comment.