The Sony XCP Rootkit

In March 2005, Sony’s BMG music division began shipping music CDs that included a particularly strong form of digital rights management (DRM) software called XCP. These CDs play normally in a standard CD player, but when inserted into a PC they will attempt to install the DRM software onto the PC. The software limits the number of copies you can make and prevents transfer of the music to some music players such as the Apple iPod.

Sony’s Dangerous Hide and Seek

In October 2005, Mark Russinovich was doing research into rootkits, a form of malicious software that attempts to hide itself on a computer by modifying operating system functions.

For example, a rootkit may change the system file functions so that the rootkit’s own files do not display in a directory. Russinovich was stunned to find that his own computer had a rootkit, and even more surprised when he found out the source was a Sony BMG music CD. Although Russinovich was the first to publicize the problem, security firm F-Secure was also investigating the issue and had been talking with Sony behind the scenes for about a month. A timeline of other important events is shown below.

Are You Affected … Infected?

If you played any of the more than fifty CDs that Sony shipped with XCP software, and you accepted the license screen that appeared on your PC after you inserted it in your drive, the rootkit was installed. Several of PC Pitstop’s diagnostic tests detect the rootkit, including PC Pitstop Exterminate and our full tests.

Removal and Beyond

If you have the Sony rootkit on your system, the first priority should be to remove it. However, Sony’s own uninstall procedure was withdrawn due to several security problems of its own.

Russinovich has described how difficult it was for him to safely remove the rootkit manually, so manual removal may not be a good idea until more detailed and well-tested procedures become available. Several antispyware products including PC Pitstop Exterminate can disable and remove the rootkit.

Once you’re rid of the rootkit, you may want to send Sony a message that they have done something very wrong here. Several different groups are considering legal action against Sony based on its reaction to the rootkit episode. The State of Texas has said it will file suit against Sony. Several other groups are working on class action lawsuits.

Was This an “Accident”?

In 2000, facing the threat of Internet-based music downloading through Napster, Sony VP Steve Heckler laid out Sony’s strategy:

“Sony is going to take aggressive steps to stop this. We will develop technology that transcends the individual user. We will firewall Napster at source – we will block it at your cable company, we will block it at your phone company, we will block it at our [ISP]. We will firewall it at your PC. These strategies are being aggressively pursued because there is simply too much at stake. The [music] industry will take whatever steps it needs to protect itself and protect its revenue streams.”

But that was five years ago, perhaps Sony’s view has changed? If so, it would only be because Heckler’s own views have changed. In 2005, Heckler is now Chief Information Officer at Sony Pictures Entertainment and no doubt continues to be influential in Sony’s views on this topic.

The XCP rootkit is one way for Sony to reach its goal to control the ripping and distribution of music. Using the software they can simply “firewall it at your PC”. Sony seems to believe the click-wrap license on the XCP CD trumps a user’s fair-use rights to the CD they purchased. Fair use may allow you to copy music tracks to an iPod, for example, but the XCP rootkit does not.

Rootkit Chronology

Early November was filled with daily revelations about Sony’s XCP rootkit:

October 31
Russinovich posts his first blog entry
about the Sony rootkit.
November 1
Security firm F-Secure posts their research
regarding the rootkit.
November 2
Sony issues a statement on its web site, later removed, that plays down the danger of the XCP rootkit:“The protection software simply acts to prevent unlimited copying and ripping … it is otherwise inactive. The software does not collect any personal information nor is it designed to be intrusive to your computer system.” The company that wrote the software for Sony, First4Internet, says: “This is a legitimate technology that we’ve been charged to produce. People who aren’t comfortable with the technology can apply to have the software removed.”(“Apply” because there is no uninstaller provided with the CD.)
November 3
Sony releases a patch to remove the rootkit aspects of XCP DRM that allow files to be concealed, but it does not remove the DRM software. They make available an uninstall procedure (now withdrawn) that requires the user to fill out two web forms, provide an email address, and install an ActiveX control. On the same day, a program appears that uses the rootkit to conceal a cheat program in the online World of Warcraft game.
November 4
Thomas Hesse of Sony BMG provides a memorable quote on National Public Radio:
“Most people, I think, don’t even know what a rootkit is, so why should they care about it?”
November 6
Mark Russinovich demonstrates that the Sony rootkit does indeed send information to Sony, contradicting a claim that Sony made several times in the previous week.
November 9
Security firm BitDefender announces it has found the first trojan horse program to exploit the Sony rootkit’s ability to hide files.
November 10
An official at the US Department of Homeland Security addresses the Sony rootkit: “It’s your intellectual property, it’s not your computer. In the pursuit of protection of intellectual property, it’s important not to defeat or undermine the security measures that people need to adopt in these days.” Also, several programs used in XCP are found to contain open source code. Ironically, the makers of XCP appear to have infringed on software intellectual property to build a product that enforces musical intellectual property.
November 11
Sony announces it will stop shipping the CDs that have XCP rootkit software. However, Sony still does not provide a comprehensive list of CDs that include the rootkit.
November 13
A researcher finds that Sony’s uninstaller program has several serious security holes.
It is left installed on the PC and lets any web page on the Internet reboot your PC or download and execute code.
November 16
The US Computer Emergency Response Team (CERT) issues an advisory that users
never install DRM software “Do not install software from sources that you do not expect to contain software, such as an audio CD.”
November 17
In a demonstration of how these incidents should be handled, Amazon.com announces that it will offer refunds to customers that purchased CDs with Sony’s XCP DRM.
November 18
Sony finally capitulates. They provide a complete list of titles that have XCP DRM, offer users an exchange of uninfected CDs or MP3s for the infected ones, and announce that existing CDs will be removed from store shelves as soon as possible.

Although Sony announced a recall of CDs on the 18th they appeared to be in no hurry to get CDs off store shelves. On November 25, we were still able to find several nearby Target and Best Buy stores that were selling CDs with the rootkit.

Stop Responding to Threats.
Prevent Them.

Want to get monthly tips & tricks?

Subscribe to our newsletter to get cybersecurity tips & tricks and stay up to date with the constantly evolving world of cybersecurity.

Related Articles

Botnets, Now What?

Just when I was becoming accustomed to using spyware removal tools and running the occasional Pitstop virus scan (few people keep their antivirus current these days), something new comes along.

Have you ever wondered why your machine seems like it’s operating in mud or is just ignoring you? Well that’s probably because it’s operating just fine for someone else. Yep, we’re talking Botnets. Botnets are using your CPU, draining your memory, just waiting to be told what to do by someone making money from your investment. You don’t mind do you?

Read More

PC Pitstop Top 25 Spyware and Adware

PC Pitstop has long been a source of information about unwanted software and how it spreads. Now we’re using our test results database to give you weekly updates about which programs are the most prolific. The prevalence numbers indicate the percent of PCs tested at PC Pitstop where we detected that file running. Our detection works by file name, so some products may be listed multiple times if they consist of two or more files. To check for spyware, adware, unneeded programs, and many other common PC problems, try PC Pitstop Exterminate or our full system scan.

Read More