You Would Think Sony Knew Better Than To Install A Rootkit In The PS3 [Updated]

from the haven't-we-done-this-before? dept

As you probably remember, a few years back there was a huge mess when Sony Music (at the time, Sony BMG) was caught installing a rootkit via the DRM it used on CDs. That created a huge legal headache for Sony, with the company eventually agreeing to replace all those CDs. You would think that Sony, as a whole, would now be a lot more careful about such things. Yet, as TorrentFreak points out, an analysis of the new PS3 firmware suggests that there’s a rootkit in there, which will allow Sony to control the PS3 device that you thought (incorrectly) that you bought. It’s almost as if Sony is telling people to stop buying PS3s. Update: A lot of folks are claiming this isn’t really a rootkit, and that the story has been blown out of proportion. Reading through the details suggest this is absolutely a possibility.

Filed Under: ,
Companies: sony

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “You Would Think Sony Knew Better Than To Install A Rootkit In The PS3 [Updated]”

Subscribe: RSS Leave a comment
89 Comments
Richard (profile) says:

Re:

One day you will learn, when you buy a gaming system, you purchase the hardware and get a license for the software. Until you learn that basic idea, you will always fail.

This goes way beyond that concept. If you own the hardware then you you are free to delete any of their s/w and replace it with your own. This allows them to delete your software and data.

Until you make the effort to understand that distinction your comments will continue to be irrelevant.

Justin Olbrantz (Quantam) (user link) says:

Back Door

“Rootkit” has a much more specific meaning than it’s used for here. Rootkits hide things from or screw with the operating system in ways not intended by design, e.g. what Sony did in the past with music CDs. It’s impossible by definition for the operating system or firmware itself to contain a rootkit, as all intended behavior is intended.

The term people are looking for is “back door”, which can be applied to makers of something giving themselves greater access to the thing than users are aware of or wish to permit.

Anonymous Coward says:

Re:

As long as you are using their software,their firmware, and operating with it, you operate inside their license (not ownership). You do not own the code.

What is being called a “rootkit” probably isn’t anything like that, but it’s a great buzzword that gets TD a few more views and a few most posts from the freetard children.

blah says:

Not exactly a "rootkit"

Seems like someone assigned the term “rootkit” arbitrarily here.

What this code update appears to do (based on clicking a couple links and *reading*) is add the ability for PSN to execute some code on the PS3 at login time using this new fucntionality.

I seems the idea is: if the code fails to run, an invalid response is returned to the server, and PSN fails the connection.

In theory, something like that would prevent CFW circumvention of the new firmware while still allowing access to PSN, and Sony can change their payload regularly to prevent CFW from mimic’ing the response.

This would also give them the ability to brick or blacklist hacked consoles in the future (which I would think anyone hacking their machine and trying to connect to PSN would expect to happen…)

If you don’t use PSN, I don’t see the problem.

Hephaestus (profile) says:

Re:

I was wondering wouldn’t that be computer trespass if the executed code on your system without telling you? (fig 2)

NY CLS Penal ? 156.10 Computer trespass

A person is guilty of computer trespass when he or she knowingly uses [fig 1] , causes to be used, or accesses a computer [fig 2] , computer service, or computer network without authorization and:

1. he or she does so with an intent to commit or attempt to commit or further the commission of any felony; or

2. he or she thereby knowingly gains access to computer material.

r (profile) says:

Back Door

Justin, I do believe that a root kit provides a method of access (typically a suite of tools and programs) to acquire elevated privileges regardless of where or where it may not presently reside in ‘kit’ form. A back door can be used to either directly access those privileges via a method prepared and lodged in code present on any given running system or otherwise accessed via less intrusive means as a kit in waiting in order to (attempt to) acquire said elevated privileges (side door) as such it is far from impossible for an OS or FW to contain (house) a (root) kits in waiting. Once you breach a system you’ll often carry your kit in with you. Semantics do not always warrant evaluation but don’t get it wrong when you do.r

DJ (profile) says:

Re:

The problem we, the users, run into is that few of us ever actually read the user agreement. As such, and according to many local laws, if it’s in the user agreement that we “knowingly grant authorization….” — or however it might be worded — then we’re kinda SOL in the legal world.

So how do we fight back? Simple, stop buying PS3; you could even go so far as to boycott Sony altogether. I’m not calling for a Sony boycott (I own many of their products), but if PS3 is potentially compromised, don’t use it. Simple.

Richard (profile) says:

Re:

As long as you are using their software,their firmware, and operating with it, you operate inside their license (not ownership). You do not own the code.
The license gives you the right to run their code on your hardware.

It doesn’t give them the right to run other code on your hardware when you don’t want them to.

Code that runs when the owner of the hardware doesn’t want it to has a name – it is called malware and it is not legal.

sonyyoco says:

Suggestions that Sony has added a rootkit with the latest firmware update to its PS3 console have been denounced as bunkum by a leading gaming security expert.

Rumours began flying on the interwebs earlier this week that the official 3.56 firmware upgrade for Sony’s consoles gave the consumer electronics giant the ability to execute code on the PS3 as soon as a user goes online.

Sony can use the technology to verify system files or to look for home-brewed games, it was suggested. More sinister still, it was warned, the code can be updated without further firmware updates.

The more excitable elements of the gamer community as well as tech blogs and gaming sites cried foul over the move, with many describing it as the introduction of hidden “rootkit-style” functionality.

But Chris Boyd, a security researcher at GFI Security who has studied the security of online games for several years, points out the development is not new since Sony wrote the ability for it to do remote updates into its terms and conditions since at least 2006.

“It’s been known for a while that a networked PS3 will contact Sony servers at start up (whether it has an active PlayStation network account on it or not), which performs various tasks related to error logs, updates and other activities,” Boyd (aka Paperghost) told El Reg.

Anyone using a PS3 agrees in the terms of service to allow their console to perform these tasks.

Mark Russinovich found a rootkit in Sony CDs back in 2005, provoking a huge privacy outcry. This has led some enthusiasts and bloggers to suggest that history is repeating itself with the PS3 firmware upgrade.

The PS3 firmware upgrade is nothing like as malign, argues Boyd, who has spoken on X-Box and online gaming security at several security conferences. “Comparing a last ditch attempt at blocking hacks and custom firmware to the truly dreadful CD rootkit is mind boggling.”

Sony bundled ill-conceived copy-protection on its music CDs that meant a rootkit was installed if they were played on Windows PCs. This created a vulnerability on affected machines later latched onto by malware writers. Sony withdrew the technology following an outcry.

Comparing this to the PS3 firmware update misunderstands what has actually been done or the practical risks of the move, according to Boyd.

“This is only really a concern if you’re interested in modding – otherwise I’m not convinced there’s a ‘threat’ as such,” Boyd told El Reg. “I’m still waiting for someone to explain how this ‘PS3 rootkit’ could be used to run unsigned malicious code on a non-jailbroken box,” he added.

Sony recently earned the enmity of the gamer and security communities by suing hackers who figured out a way to run unsigned code on PlayStation 3 consoles without the use of a dongle. The blogiverse has been inclined to ascribe the worst possible motives to anything Sony has done with a console since, regardless of whether it’s actually new or how what it’s doing sits against other potential threats.

Boyd, who has been vocal in criticising the lawsuits against the PS3 hackers such as geohot, nonetheless argues that gamers need to get a grip. “People will happily download homebrew from Basement Bob which could steal logins/credit card details, but code from the console maker is evil?”

sonyyoco says:

Suggestions that Sony has added a rootkit with the latest firmware update to its PS3 console have been denounced as bunkum by a leading gaming security expert.

Rumours began flying on the interwebs earlier this week that the official 3.56 firmware upgrade for Sony’s consoles gave the consumer electronics giant the ability to execute code on the PS3 as soon as a user goes online.

Sony can use the technology to verify system files or to look for home-brewed games, it was suggested. More sinister still, it was warned, the code can be updated without further firmware updates.

The more excitable elements of the gamer community as well as tech blogs and gaming sites cried foul over the move, with many describing it as the introduction of hidden “rootkit-style” functionality.

But Chris Boyd, a security researcher at GFI Security who has studied the security of online games for several years, points out the development is not new since Sony wrote the ability for it to do remote updates into its terms and conditions since at least 2006.

“It’s been known for a while that a networked PS3 will contact Sony servers at start up (whether it has an active PlayStation network account on it or not), which performs various tasks related to error logs, updates and other activities,” Boyd (aka Paperghost) told El Reg.

Anyone using a PS3 agrees in the terms of service to allow their console to perform these tasks.

Mark Russinovich found a rootkit in Sony CDs back in 2005, provoking a huge privacy outcry. This has led some enthusiasts and bloggers to suggest that history is repeating itself with the PS3 firmware upgrade.

The PS3 firmware upgrade is nothing like as malign, argues Boyd, who has spoken on X-Box and online gaming security at several security conferences. “Comparing a last ditch attempt at blocking hacks and custom firmware to the truly dreadful CD rootkit is mind boggling.”

Sony bundled ill-conceived copy-protection on its music CDs that meant a rootkit was installed if they were played on Windows PCs. This created a vulnerability on affected machines later latched onto by malware writers. Sony withdrew the technology following an outcry.

Comparing this to the PS3 firmware update misunderstands what has actually been done or the practical risks of the move, according to Boyd.

“This is only really a concern if you’re interested in modding – otherwise I’m not convinced there’s a ‘threat’ as such,” Boyd told El Reg. “I’m still waiting for someone to explain how this ‘PS3 rootkit’ could be used to run unsigned malicious code on a non-jailbroken box,” he added.

Sony recently earned the enmity of the gamer and security communities by suing hackers who figured out a way to run unsigned code on PlayStation 3 consoles without the use of a dongle. The blogiverse has been inclined to ascribe the worst possible motives to anything Sony has done with a console since, regardless of whether it’s actually new or how what it’s doing sits against other potential threats.

Boyd, who has been vocal in criticising the lawsuits against the PS3 hackers such as geohot, nonetheless argues that gamers need to get a grip. “People will happily download homebrew from Basement Bob which could steal logins/credit card details, but code from the console maker is evil?”

Anonymous Coward says:

Updated the post

Good points by folks here and elsewhere about how calling this a “rootkit” might be a bit extreme. I’ve added an update to the post.

The argument that it isn’t a rootkit basically boils down to saying it isn’t because Sony buried permission for themselves to do this in their terms and conditions. In all other ways it’s a rootkit.

Rekrul says:

Re:

The hacking community’s rational that their work is purely for homebrew purposes. “I mean, okay, that’s their argument but they know the larger implication to the players who don’t want that and the people who can now modify their game data.”

Yeah, you can’t have just anyone writing games for your system or modifying existing games. Look at what a disaster that’s been for computers. Oh wait…

Mikael (profile) says:

Did anyone actually read the source?

I’m curious if anyone here actually read the source article (including Mike). From what I got out of reading it, this “rootkit” as it was put, it to enable Sony to be able to check your system to see if you’re running custom firmware prior to connecting to the PSN. They even point out in the article that it’s the same method Microsoft uses to id modded consoles so they can ban their MAC address.

I’m all for hacking and modding, but you have to understand there are consequences to doing so with a console like this. I modded my original xbox so I could install emulators on it and copy my games to the hard drive for faster loading. I never got online with it so it didn’t matter to me. Now, I don’t see a need to mod my PS3 since the benefit to me outweighs the consequence. I don’t like that Sony is able to execute this code each time I connect, but if all it’s doing is making sure I don’t have a modded console I’m fine with it. The first time I notice stuff missing from my system (including files stored on the drive), THAT’s when I’ll have a problem with it.

Christopher (profile) says:

Did anyone actually read the source?

There is no reason to just banned all modified consoles. They should look to see if someone’s console is sending data that is ‘strange’ back to the servers (like they are being hit and it is not coming up as damage) in order to ban people.

Not when they could be using custom firmware to do anything from backup up their legally bought games to enabling running from the hard drive without a disc in the drive to running homebrew software to various other things.

Kurata says:

Re:

Considering you accepted the ToS, and other stuff, which apparently states that Sony has a right to access your system, this wouldn’t apply as you implicitly agree to their accesses, thus giving them authorization.

As such, the NY CLS Penal ? 156.10 Computer trespass is void in this case.
Then again, I do not know the value of silence in USA, but I know in France, this would mean agreeing to that line.

Anonymous Coward says:

Did anyone actually read the source?

Your idea is nice, but not workable. It would mean that the Sony staff would have to spend their life looking at every possible “abuse” and write code to try to block it. Talk about whack a mole.

Instead, they do the wise thing: if you mod your console, if you are running odd programming, or if the version of the software doesn’t match the real file size and requirements, then you are turfed. End of discussion. You can use your console as you want, you just can’t use it on the PSN. You opted out.

Aerilus says:

Re:

I would imagine that if its a criminal act that it is prosecuted by the government and you can’t waive your right now if its civil (i see penal code so guessing criminal) then it might hold up.you cant let some one murder you when you have a painful terminal condition. so who has more connections in the government than sony to make them get off their butt and prosecute probably not many people.

G Thompson (profile) says:

Not exactly a "rootkit"

Not so sure about The USA (Strange and basically non existant consumer laws) but for a company to knowingly “brick” a console that stops the console from working at all is both a criminal offence and tortous behaviour (civil wrong) in Europe and Australia/NZ

Also the remote execution of code that suggests they are looking what is on the machine, which in the case of the PS3 has also the ability to store photos, audio, videos of ANYTHING the user creates or has rights to would in all likely come under scrutiny of high privacy laws, quiet enjoyment, and unauthorised access statutes (criminal and civil) especially in the EU.

The EULA has no legal basis what so ever since you can not sign away your statutory rights in any contract, especially one that is highly unilateral.

Sony have the ability to deny anyone access to their online network (PSN) for any legal reason since it is classified as their property space, though they do not have the right to deny anyone the use of their system in any other way that that user sees fit.

crade (profile) says:

“this isn’t really a rootkit, and that the story has been blown out of proportion. Reading through the details suggest this is absolutely a possibility.”

Basically what they seem to say is there is no (known) security vulnerability such that people other than Sony can take over your machine, and Sony taking over your machine is “fine” since Sony forced everyone to agree to giving Sony control over their machine in their Terms of whatever agreement. I still don’t get how anyone takes those “agreements” that are done under duress after money changed hands and without any form of understanding or consent seriously. I sure as hell don’t. So my baby cousin pushed the X button on the stupid controller while some moronic demands were up there. Big whoop.

harbingerofdoom (profile) says:

Did anyone actually read the source?

completely unworkable. even with the current checks they do there are still plenty of people running modded code in order to enable cheats during online play.
as someone that enjoys the multiplayer aspect of some games its pretty frustrating when you empty an entire clip into someone, get 8 to 10 registered hits and they just saunter up to you and knife you while you are stuck reloading. and this happens with all the current checks in place.

im all for the idea that you own the hardware you bought, but im also all for the idea that if you mod it, you are willingly withdrawing yourself from online multi-player via official servers.

and while i have a huge problem with sony, microsoft and nintendo going all legal on those who have modded their hardware, i have no issue at all with any of them banning consoles. especially since its in the TOS that modded equipment is not allowed to connect.

Anonymous Coward says:

Did anyone actually read the source?

No, they have realizes that allowing other operating systems creates a giant security hole, one that has to be fixed.

If you want to use your PS3 with other operating systems, you cannot play online (because you must be upgraded). You have a choice.

Sony is obliged to address security concerns, otherwise you would be reading on TD how Sony allowed hackers to take over your PS3.

velox says:

Not exactly a "rootkit"

“The wikipedia entry is valid”

You obviously don’t know anything about Wikipedia. It’s very unlikely that anyone from TD removed your opinion from Mike Masnik’s page. Unlike this place, you can’t just say whatever you want on Wikipedia, because if it looks like you used unreferenced material, somebody will be around in about 15 minutes to clean out your trash.

Every single bit of Wikipedia is supposed to be referenced from externally verifiable published material.
You can’t put in things you think are true.
You can’t put in the results of your own unpublished research, even if it is true.
You can’t put in opinions or personal attacks against living persons — even if you really, really hate them, and even if they really, really are bad guys.

And no, a link to a pseudonymous comment in a blog does not constitute a reputable source.

Anonymous Coward says:

SONY : Once a corrupt company always a corrupt company.

STOP BUYING SONY PRODUCTS OR THEY WILL NEVER GO AWAY AND GET THE HELL OUT OF MY PURCHASED PRODUCTS.

ROOTKITS ON AUDIO CDS
ROOTKITS ON DRM – SECUROM

THIS COMPANY IS SHADY, ANYONE DOING BIZ WITH THEM DESERVERS WHAT THEY GET SINCE IT HAS BEEN KNOWN SINCE 85 THAT THEY HAVE NO RESPECT FOR THEIR CUSTOMERS.

BOYCOTT SONY!
BOYCOTT SONY!
BOYCOTT SONY!
BOYCOTT SONY!

Gwiz (profile) says:

Re:

As long as you are using their software,their firmware, and operating with it, you operate inside their license (not ownership). You do not own the code.

This is something I find fascinating with the Pro-IP crowd.

They want Intellectual Property to be considered property when they own it, but want it to be considered something else when they sell it to an end user.

When I buy real property, say a car, I am free to modify it, tear it apart to see how they built it, or whatever.

When I purchase Intellectual property, then all of a sudden there all these restrictions placed on me about what I can or cannot do.

It’s like saying “We want Intellectual Property to be considered property ONLY when it benefits us.”

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...