Beating Bootkits

I have been thinking of an idea to be able to have Norton beat Bootkits once detected.

 

Once Norton is installed on a computer and that system is clean, Norton can then be able to copy the Boot Sector of the machine it is installed on and hide it away within Norton for safe keeping (future use) if required.  Like a good Quarantine if you like and hidden.

 

Then in the future say that PC gets infected with a Bootkit like Tidserv, Mebroot, Alworo................. So "boot.xxxxxx"  Norton can then take that copy of the Boot Sector and overwrite the Bootkit with the original copy.  Now the MBR is clean. This also works or OEM versions (Dell, H.P., E Machines etc) as remember Norton has taken the copy from the machine it is installed on at a earlier date, so doesn't matter about being a OEM version.

 

It would also work for MBR Ransomware that locks the PC so the user can't get to Windows even loading.   Norton has the original copy stored away  So the user would be able to use the Recovery disc to access the stored copy in Norton on the Hard Drive and overwrite the MBR Ransomware (infected MBR). Restart the PC and Bingo Windows loads, no ransomware bootkit.

 

Quads

 

I have been thinking of an idea to be able to have Norton beat Bootkits once detected.

 

Once Norton is installed on a computer and that system is clean, Norton can then be able to copy the Boot Sector of the machine it is installed on and hide it away within Norton for safe keeping (future use) if required.  Like a good Quarantine if you like and hidden.

 

Then in the future say that PC gets infected with a Bootkit like Tidserv, Mebroot, Alworo................. So "boot.xxxxxx"  Norton can then take that copy of the Boot Sector and overwrite the Bootkit with the original copy.  Now the MBR is clean. This also works or OEM versions (Dell, H.P., E Machines etc) as remember Norton has taken the copy from the machine it is installed on at a earlier date, so doesn't matter about being a OEM version.

 

It would also work for MBR Ransomware that locks the PC so the user can't get to Windows even loading.   Norton has the original copy stored away  So the user would be able to use the Recovery disc to access the stored copy in Norton on the Hard Drive and overwrite the MBR Ransomware (infected MBR). Restart the PC and Bingo Windows loads, no ransomware bootkit.

 

Quads

 

It can be done,  I can copy Boot Sectors with one click, not hard.

 

Quads

There are applications available that can back up the MBR, so it is certainly something that can be done.  It sounds like a very straightforward solution to a problem that is becoming much more common.  I think Quads' idea has a lot of merit.

Hmm, lets for now call it the "Good File Repository" that is a folder within Norton like other parts of Norton (Virus Defs etc.)

 

I had a question / statement saying about users accidently backing up a bad file or Boot Sector (which is a 512 byte file)

 

One way is to once Norton is installed on a system it is clean Norton will backup / Copy the required files and place them in the  "Good File Repository", after which the button (if one) and the copy function is disabled or greyed out, As Norton now has the legit copies it requires from the system in question.

This should stop both Norton and the User from accidently being played with by the click of a mouse and so on, hopefully meaning it's sucure.

 

Secondly, because the "Good File Repository" Folder is within Norton, it could be protected by Norton as part of the "Anti - Tamper Protection", this would be so hopefully  Malicous files or users can not delete the files or the whole Folder.

 

Quads

excellent idea.   along with some type of mbr guard

Great idea!

Great idea. I hope norton includes this.

One reason why Norton needs to find a way with Bootkits/ Rootkits, including OEM PC's

 

http://www.symantec.com/connect/blogs/are-mbr-infections-back-fashion

 

Quads

This is a good idea, even if Bootkits are not common today it is on the rise, so hopefully Norton will include this into product.

The way everything seems to have a Rootkit / Bootkit  ruuning behind what can be seen now, from a FakeAV to Browser Hijacker this is common place, It's just the kit gets updated or it's a Mod or clone.

 

Remove incorrectly this and Windows won't startup.

 

Quads