Flying in the face of recent trends, the number of new rootkit samples rose in the first quarter of this year to a level not seen since 2011, a new report said.
The sudden spike in rootkit infections during the first three months of the year came mainly from a single rootkit family that targeted 32-bit Windows systems, said researchers at security provider McAfee. However, new rootkits designed for 64-bit systems will likely lead to a rise in this type of attack in the future, the researchers said in the McAfee Threat Report.
Rootkits are malware programs designed to hide other malicious applications and activities from users. They typically run inside the OS kernel with the highest possible system privileges, making their removal and detection hard for security products.
The McAfee researchers said the decrease in the number of new rootkit samples observed during 2012 and 2013 were the result of the growing adoption of 64-bit versions of Windows, which provides some defenses against such threats, like the PatchGuard kernel patching protection and the digital signature enforcement for drivers.
“These protections have certainly increased the cost to build and deploy rootkits on 64-bit platforms,” the McAfee researchers said.
However, with the number of 64-bit systems growing, there is an incentive for attackers to invest in methods of bypassing those defenses.
“The roadblocks set in place by 64-bit systems now appear to be mere speed bumps for well-organized attackers, who have already found ways to gain entry at the kernel level,” the McAfee researchers said.
One technique seen involves first installing a digitally signed driver from a legitimate hardware or software developer and then exploiting a known vulnerability in that driver to gain kernel access.
Uroburos, a sophisticated rootkit discovered in February and used in cyber espionage attacks installs an old version of the VirtualBox kernel driver, which ends up digitally signed, and then exploits a privilege escalation vulnerability discovered in that driver version in 2008. VirtualBox is a virtualization software product owned and developed by Oracle since its acquisition of Sun Microsystems in 2010.
Another more commonly used technique involves stealing digital signing certificates from legitimate companies and using them to sign malicious code.
“Since January 2012 at least 21 unique 64-bit rootkit samples have used stolen certificates,” the McAfee researchers said in the report. “The malware W64/Winnti stole at least five private keys of legitimate vendors to install its rootkit on 64-bit systems since 2012. Of these five, at least two have not been revoked and may still be in use for both legitimate and malicious purposes.”
The number of digitally signed malware programs in general has been on the rise since the beginning of 2012, according McAfee. There are now more than 25 million known samples of digitally signed malware, with more than 2.5 million of those discovered during the first quarter of this year.
Another way to bypass the rootkit defenses of 64-bit systems is to exploit privilege escalation vulnerabilities discovered in the Windows kernel itself and the number of such flaws has been on the rise in the past few years, according to data in the McAfee report.
“Researchers are developing targeted tools such as ‘double fetch’ race conditions to find flaws in kernel code,” the McAfee researchers said. “History tells us that once such work happens in the research community, we will soon see its impact in the threat landscape as well.”
A new wave of rootkit attacks against 64-bit systems will rely on exploiting the growing number of vulnerabilities in both Microsoft and third-party kernel components, they said.
One class of rootkits called bootkits install malicious code in the system’s Master Boot Record, the first 512-byte sector of the hard drive that typically contains the OS boot loader. The MBR code executes before the OS kernel initializes, so malicious code stored there can give malware a head start on any security application installed in the OS.
During the first quarter of this year, McAfee identified the highest number of new malware variants with known MBR payloads than in any quarter of the previous two years—almost 900,000. This puts the number of known MBR-infecting malware samples at over 6 million, according to the company’s data.
The Secure Boot feature of the Unified Extensible Firmware Interface (UEFI) — the BIOS replacement in newer computers — was specifically to prevent the installation of bootkits. It works by checking the boot code inside the MBR is on a pre-approved whitelist and ends up digitally signed before executing it.
However, over the past year security researchers have found several vulnerabilities in UEFI implementations used by many computer manufacturers that can end up exploited from inside the OS to disable Secure Boot.