Backstory on the SONY Rootkit Fiasco of 2005

  • Thread starter jedishrfu
  • Start date
In summary, the SONY Rootkit Fiasco of 2005 arose when SONY BMG Music Entertainment included a controversial digital rights management (DRM) software in their music CDs, designed to prevent unauthorized copying. This rootkit, installed without users' consent, created significant security vulnerabilities on computers, allowing potential malware exploitation. The backlash from consumers and security experts led to lawsuits, public outcry, and SONY's eventual recall of the affected CDs, highlighting the tensions between copyright protection and user privacy and security.
  • #1
15,092
9,621
Dave's Garage gets into the infamous SONY Rootkit fiasco of 2005 where SONY tried to stem music piracy by installing rootkits on all windows machines who played SONY music disks exposing those machones to other vulnerabilities due to mistakes in the code:



and from wikipedia:

https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal
 
Last edited:
  • Like
Likes WWGD and DrClaude
Computer science news on Phys.org
  • #2
I think Sony still owes me a free CD. I did get the $7.50 I think.
 
  • #3
What do you think of Mark Russinovich's Rootkit Revealer? Do you think Norton's basic would provide similar ? I searched on YouTube only to get a suspicious link asking me to click.
 
Last edited:
  • #4
WWGD said:
What do you think of Mark Russinovich's Rootkit Revealer?
I think it worked fine 15 years ago, but it dosn't work on any current version of Windows.

WWGD said:
Do you think Norton's basic would provide similar ?
I think Norton, McAfee and other commercial protection software have become as obnoxious as some of the malware they are supposed to protect against. You don't need them...

WWGD said:
I searched on YouTube only to get a suspicious link asking me to click.
...unless you are the kind of person who clicks on suspicious links.

Windows Defender and the knowledge of how to change permissions for pop-ups in whatever browser(s) you use are all you should need. If you don't trust yourself when browsing then install VirtualBox or VMWare and browse in a virtual machine.
 
  • Like
Likes WWGD
  • #5
pbuk said:
I think it worked fine 15 years ago, but it dosn't work on any current version of Windows.


I think Norton, McAfee and other commercial protection software have become as obnoxious as some of the malware they are supposed to protect against. You don't need them...


...unless you are the kind of person who clicks on suspicious links.

Windows Defender and the knowledge of how to change permissions for pop-ups in whatever browser(s) you use are all you should need. If you don't trust yourself when browsing then install VirtualBox or VMWare and browse in a virtual machine.
I obviously didn't click on the link. Not quite that gullible.
Edit: I bet security patches and periodic updates to Windows help too.
 
Last edited:

FAQ: Backstory on the SONY Rootkit Fiasco of 2005

What was the SONY Rootkit Fiasco of 2005?

The SONY Rootkit Fiasco of 2005 refers to a major controversy where Sony BMG Music Entertainment included a form of Digital Rights Management (DRM) software on some of its music CDs. This software, known as a rootkit, was designed to prevent illegal copying of the CDs but was installed on users' computers without their knowledge and consent. It also created significant security vulnerabilities and was difficult to detect and remove.

How did the rootkit affect users' computers?

The rootkit installed itself deeply into the operating system, hiding its presence and making it difficult to detect. It consumed system resources and created security vulnerabilities that could be exploited by malicious software. Additionally, it often caused system instability and interfered with other legitimate software.

How was the rootkit discovered?

The rootkit was discovered by Mark Russinovich, a computer security expert, who was conducting routine tests on his system. He noticed unusual behavior and traced it back to the software installed by a Sony BMG CD. Russinovich publicly documented his findings in a blog post, which quickly drew widespread attention and outrage.

What was the public and legal response to the rootkit revelation?

The public response was overwhelmingly negative, with widespread criticism of Sony BMG for compromising users' security and privacy. Several class-action lawsuits were filed against the company, and various state and federal agencies in the United States, as well as international authorities, launched investigations. Sony BMG eventually recalled the affected CDs and offered a program to remove the rootkit from users' computers.

What were the long-term impacts of the SONY Rootkit Fiasco?

The fiasco had several long-term impacts, including significant damage to Sony BMG's reputation and increased scrutiny of DRM practices across the industry. It also led to greater awareness of the potential risks associated with DRM technologies and contributed to a broader debate about consumer rights and digital privacy. The incident is often cited as a cautionary tale about the unintended consequences of invasive DRM measures.

Back
Top