Anti-theft software could create security hole

July 31, 2009 By JORDAN ROBERTSON , AP Technology Writer

(AP) -- A piece of anti-theft software built into many laptops at the factory opens a serious security hole, according to research presented Thursday.

The "Computrace" software, made by Vancouver-based Absolute Software Corp., is part of a subscription service that's used to find lost or stolen computers. Many people don't know it's on their machines, but it's included in computers from the biggest PC makers.

The software is built into computers at the factory because that embeds it so deeply that even the extreme act of uninstalling the operating software won't delete it. The software is included in a part of the computer known as the BIOS, which refers to programs used to boot the computer.

The service Absolute sells can be valuable because sensitive data can be purged remotely from a stolen machine. The computer is still able to reach out to a specially designated Web site for instructions even if a criminal is tampering with the machine.

But research by Alfredo Ortega and Anibal Sacco with Boston-based Core Security Technologies, and presented Thursday at the Black Hat security conference here, shows it can cut two ways.

If a criminal has infected a computer that has the Computrace technology, he can take deep control of a machine.

That's because he's able to modify the computer's settings to maintain a connection with that machine even if the is uninstalled then reinstalled - an extreme way, but sometimes the only way, to make sure a computer is cleaned of viruses.

"You have something that's pre-installed, and considered non-malicious, that you can manipulate and turn into a - that's pretty unique," said Ivan Arce, Core Security's chief technology officer.

Arce said Absolute can fix the problem with an update to the software that is then pushed out to affected computers. He added that users can disable the software's ability to be a problem on their own, too. It takes some technical know-how, though.

"It's not hard to block once you know what to look for," Arce said.

Absolute spokesman Craig Clark said the company would comment after Core's presentation Thursday, but then did not make anyone available. He said Absolute's technical team "needs to understand the concerns Core has raised before they can speak to it accurately."

Roel Schouwenberg, a senior antivirus researcher with Kaspersky Lab, said the vulnerabilities Core Security found could be a "pretty big challenge for the security community" if they're exploited. But he added that the special access a hacker can get is undermined somewhat by the fact malicious programs they try to download still have to come into the the same way they always do, and can be protected against.

Any files that download "will not be stealth, they will not be hiding, they will be visible on the system," Schouwenberg said. "Anti-malware () will be able to scan them. It could have been a whole lot worse."


On the Net:

View Core Security's research paper at:

©2009 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Explore further: Microsoft warns of serious computer security hole

Related Stories

Grisoft Offers Free Rootkit Removal

April 11, 2007

Grisoft, makers of the popular AVG Antivirus, today released a free tool specifically aimed at eliminating malicious software that hides itself using rootkit techniques.

Glitch in antivirus software troubles PC users

July 10, 2009

(AP) -- Antivirus software cuts two ways. It's great at blocking known viruses, but it can sometimes misfire, mistakenly flagging clean files as malicious. That sends a computer into a tailspin trying to clean up stuff that's ...

$100 Laptop May Be at Security Forefront

October 9, 2006

(AP) -- The $100 laptops planned for children around the world might turn out to be as revolutionary for their security measures as for their low-cost economics.

Recommended for you

When words, structured data are placed on single canvas

October 22, 2017

If "ugh" is your favorite word to describe entering, amending and correcting data on the rows and columns on spreadsheets you are not alone. Coda, a new name in the document business, feels it's time for a change. This is ...

Enhancing solar power with diatoms

October 20, 2017

Diatoms, a kind of algae that reproduces prodigiously, have been called "the jewels of the sea" for their ability to manipulate light. Now, researchers hope to harness that property to boost solar technology.

1 comment

Adjust slider to filter visible comments by rank

Display comments: newest first

not rated yet Aug 02, 2009
I work for Absolute Software. The claims that there's a vulnerability in Computrace are without merit and systems are secure:

- The Computrace BIOS module does not allow a special undetected path into the operating system.
- In order for the Computrace BIOS module to work, it is activated by the end-user customer, not the computer manufacturer, upon receipt of the computer and activation of Absolute Software's products.

- The Computrace BIOS code alleged in the article to have this vulnerability is old code that was not officially released into a BIOS and, to Absolute's knowledge, has never been active in the BIOS of any computer.

- If a malicious attacker were able to alter the BIOS code, any popular anti-virus software would alert the customer.

- The Computrace BIOS module currently on the market is not susceptible to the risks claimed in the article and therefore none of our customers are at risk for this specific type of attack

For more detailed info:

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.