CD emulators may utilize rootkit-like stealth to circumvent DRM

Austin (TX) - The security software engineer who discovered the presence of stealth technology derived from rootkits to hide the presence of digital rights management drivers in Sony BMG audio CDs, has announced on his Web log this morning that he has discovered similar stealth mechanisms being used by two popular programs - one freeware, the other commercial. The stated purpose of these programs is, ironically, to serve as CD emulators that help individuals copy data CDs, such as games, to their hard drives for faster execution.

In this morning's post to the Sysinternals blog, Mark Russinovich shows and describes screen shots from Alcohol, a leading commercial CD emulator program, and Daemon Tools, a freeware alternative, which appear to clearly indicate the use of stealth techniques.

In one test, Russinovich demonstrated that a reference to one of the program elements installed by Alcohol, in the Windows System Registry, actually points to a different location than where the program appears to reside. When using Windows' Registry Editor (regedit) to scout the entry for the element's actual location, Russinovich turned up a blank product name. In other words, the Registry entries that point to Alcohol's central location are inaccurate, and the identifying information for that central location is blank.

Such a split should normally disable an installed program from appearing in the "Add/Remove Programs" list of the Windows Control Panel. However, Russinovich noted, Alcohol does appear there; so whatever stealth Alcohol is employing does not appear to be intended, he believes, to hide any part of the application from the user. Instead, he theorizes, the stealth technique may be intended to mask Alcohol's presence from other programs, especially games, whose own DRM routines scout for the presence of CD emulators in order to bypass them. Publishers' DRM schemes, he reasons, may be searching for CD emulators such as Alcohol and Daemon Tools by name, through the "Add/Remove Programs" list, using an API call which, Russinovich's test shows, Alcohol clearly circumvents.

Alcohol Software, incidentally, received a "100% Clean" seal of certification from Softpedia, which the company posts on its Web site.

Writes Russinovich in his post this morning, "There's no proof that Alcohol and Daemon Tools use rootkits to evade DRM, but the evidence is compelling. If they do their usage is clearly unethical and even potentially runs afoul of the US Digital Millennium Copyright Act (DMCA). In any case, there's no reason for these products, or any product as I've stated previously, to employ rootkit techniques."