Backstory on the SONY Rootkit Fiasco of 2005

  • Thread starter Thread starter jedishrfu
  • Start date Start date
Click For Summary

Discussion Overview

The discussion revolves around the SONY Rootkit fiasco of 2005, focusing on the implications of SONY's attempt to prevent music piracy through the installation of rootkits on Windows machines. Participants explore the effectiveness of various rootkit detection tools and the current state of antivirus software in relation to user security.

Discussion Character

  • Exploratory
  • Technical explanation
  • Debate/contested

Main Points Raised

  • Some participants reference the SONY Rootkit incident as a significant event in digital rights management and security vulnerabilities.
  • One participant expresses dissatisfaction with SONY, mentioning they received a small compensation but feel owed more.
  • There are inquiries about the effectiveness of Mark Russinovich's Rootkit Revealer, with mixed opinions on its current applicability to modern Windows versions.
  • Some participants argue that commercial antivirus software like Norton and McAfee have become overly intrusive and may not be necessary for all users.
  • Suggestions are made that Windows Defender and user knowledge about browser permissions may suffice for security, alongside the use of virtual machines for safer browsing.
  • One participant emphasizes that security patches and updates to Windows likely contribute to overall system security.

Areas of Agreement / Disagreement

Participants express a range of views on the effectiveness of rootkit detection tools and antivirus software, indicating that there is no consensus on the best approach to security in light of the SONY incident.

Contextual Notes

Some participants highlight the limitations of current rootkit detection tools and the evolving nature of malware, suggesting that earlier solutions may not be effective today.

Who May Find This Useful

Readers interested in digital security, software vulnerabilities, and the history of digital rights management may find this discussion relevant.

Messages
15,643
Reaction score
10,441
Dave's Garage gets into the infamous SONY Rootkit fiasco of 2005 where SONY tried to stem music piracy by installing rootkits on all windows machines who played SONY music disks exposing those machones to other vulnerabilities due to mistakes in the code:



and from wikipedia:

https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal
 
Last edited:
  • Like
Likes   Reactions: WWGD and DrClaude
Computer science news on Phys.org
I think Sony still owes me a free CD. I did get the $7.50 I think.
 
What do you think of Mark Russinovich's Rootkit Revealer? Do you think Norton's basic would provide similar ? I searched on YouTube only to get a suspicious link asking me to click.
 
Last edited:
WWGD said:
What do you think of Mark Russinovich's Rootkit Revealer?
I think it worked fine 15 years ago, but it dosn't work on any current version of Windows.

WWGD said:
Do you think Norton's basic would provide similar ?
I think Norton, McAfee and other commercial protection software have become as obnoxious as some of the malware they are supposed to protect against. You don't need them...

WWGD said:
I searched on YouTube only to get a suspicious link asking me to click.
...unless you are the kind of person who clicks on suspicious links.

Windows Defender and the knowledge of how to change permissions for pop-ups in whatever browser(s) you use are all you should need. If you don't trust yourself when browsing then install VirtualBox or VMWare and browse in a virtual machine.
 
  • Like
Likes   Reactions: WWGD
pbuk said:
I think it worked fine 15 years ago, but it dosn't work on any current version of Windows.


I think Norton, McAfee and other commercial protection software have become as obnoxious as some of the malware they are supposed to protect against. You don't need them...


...unless you are the kind of person who clicks on suspicious links.

Windows Defender and the knowledge of how to change permissions for pop-ups in whatever browser(s) you use are all you should need. If you don't trust yourself when browsing then install VirtualBox or VMWare and browse in a virtual machine.
I obviously didn't click on the link. Not quite that gullible.
Edit: I bet security patches and periodic updates to Windows help too.
 
Last edited: