Sony at it again?
Thrax
🐌Austin, TX Icrontian
In a blog for the well-known security and anti-malware firm, F-Secure, it has been revealed that a certain model of Sony flash drive installs a rootkit similar to the Sony/BMG Music fiasco of 2005. The flash drive's software masks the folder from the Windows API, so it cannot be discovered without a program that reads NTFS alternate data streams (i.e. it cannot be seen by Windows Explorer). Once the folder is known, it can be accessed via command prompt, but none of the files inside can be altered or modified.
This is the exact same procedure used for the SonyBMG software, which means enterprising malware authors could deposit their junk in this hidden folder, and most anti-virus programs would never know.
Good job, Sony!
This is the exact same procedure used for the SonyBMG software, which means enterprising malware authors could deposit their junk in this hidden folder, and most anti-virus programs would never know.
Good job, Sony!
0
Comments