Sony DRM rootkit code (#18) Hacking Sony DRM rootkit code (#18) Hacking
At The Register is an article titled "World of Warcraft hackers using Sony BMG rootkit" by SecurityFocus. It starts out by asking: "Want to cheat in your online game and not get caught? Just buy a Sony BMG copy protected CD."
Apparently, World of Warcraft hackers are starting to use the Sony DRM rootkit to subvert the game's "Warden" security monitor. They just insert a Sony CD, let the software automatically install, and rename their favorite hacking tools to have names starting with "$sys$". Warden is then unable to detect them.
It sure didn't take long for the hackers to start exploiting the Sony DRM rootkit.
Apparently, World of Warcraft hackers are starting to use the Sony DRM rootkit to subvert the game's "Warden" security monitor. They just insert a Sony CD, let the software automatically install, and rename their favorite hacking tools to have names starting with "$sys$". Warden is then unable to detect them.
It sure didn't take long for the hackers to start exploiting the Sony DRM rootkit.
Labels: Cyber/IP Law
12:28 PM Display: Full / Chopped / Footer
2 Comments:
Then this leads to then next question. If a company finds that their software / product was compromised by this "tool" then can that company hold the distributor or maker of the "tool" liable?
Interesting question. Essentially, you are asking about third party liability. Obviosly, Sony would try to shield itself from liability through the EULA, as would the company writing the software originally. The question is whether that would work, given that this third party is not a party to the EULA. That is going to take a bit of reasearch on my part.
Post a Comment
<< Home >>