Jump to content

Vista's UAC protects against rootkits


Tarun
 Share

Recommended Posts

  • Administrator

Love or hate its nagging prompts, Vista's Account Control feature (UAC) has a security feature that marks it out from any other type of Windows security programme -- it can spot rootkits before they install. This is one finding buried in a report published in two German computer magazines some months ago after testing by the respected AV-Test.org, which set out to find out how well antivirus programs fared against known rootkits.

The answer was not particularly well at all, either for Windows XP, or Vista-oriented products. Of 30 rootkits thrown at XP anti-malware scanners, none of the seven AV suites found all 30, a similar story to the six web-based scanners assessed. Only four of the 14 specialized anti-rootkit tools managed a perfect score.

Best Protection

The best of the all-purpose suites was Avira AntiVir Premium Security Suite, which found 29 active rootkits, with Norton finding as few as 18. The anti-rootkit tools fared better, with AVG Anti-Rootkit Free, GMER, Rootkit Unhooker LE, and Trend Micro Rootkit Buster achieving perfect scores. The scores for removal were patchy, however, with all failing to remove any of the rootkits they had found.

The results for Vista products were harder to assess because only six rootkits could run on the OS, but the testers had to turn off UAC to get even this far. Vista's UAC itself spotted everything thrown in front of it.

Only three of the 17 AV tools for Vista managed to both detect and successfully remove them, F-Secure Anti-Virus 2008, Panda Security Antivirus 2008, and Norton Antivirus 2008.

Once on a PC, rootkits can bury themselves quietly, but they have to get to that point first. As long as users interpret prompts from the UAC system attentively, or those messages haven't in some way been spoofed, rootkits struggle to jump to the PC without drawing attention to themselves.

That UAC can tell a user when a rootkit is trying to install itself is not in itself surprising, as Vista is supposedly engineered from the ground up to intercept all applications requests of any significance.

Danger of Rootkits

Rootkits matter. By their nature, they set out to bypass the operating system. Once installed, they can do whatever they like, including loading other malware from a position of privilege. The question is, how can one be sure that a scanner is spotting a type of program built on the principle of extreme stealth?

An interesting footnote to the XP rootkit testing was that the samples chosen included three 'professsional' rootkits, apparently legitimate programs designed to enforce things such as copy protection. The most infamous example of this category included is the Sony XCP/First4Internet rootkit, which caused the company so much embarrassment when it was discovered in 2005.

But in a period of weeks when Vista has received criticism for its rate of vulnerabilities, Microsoft's programmers can at least point to evidence that UAC is efficient at stopping those infections from happening automatically.

Source: PCWorld

Link: Lunarsoft

Link to comment
Share on other sites

What I found really disappointing, in the tests none of the specialized rootkit scanners was successful in removing the rootkits it found. Oh, well; at least they found one I'm using (GMER) is good at detection.

Link to comment
Share on other sites

...And something similar is in Linux.

Yeah, Linux have had the same feature with sudo since at least around 1980.

I read somewhere that Microsoft claim UAC is some kind of innovation of theirs. :)

The Linux implementation is much better though, it doesn't nag you all the time.

You can change wallpaper and do most stuff without it ask your for a password.

It is good that Windows finally gets something this feature. I just wished they had it earlier - it would have saved a lot of people a lot of trouble, since so many people have administrator privileges on their accounts.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...