• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      event logo
      V3 Technology Awards

      2016 V3 Awards

      • Date: 25 Nov 2016
      • London
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Hidden data trick could be malware writer's boon

Researchers demonstrate method for writing data to hard drive where it can't be found

  • Gareth Morgan
  • Gareth Morgan
  • 08 March 2013
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

Big data image

Security researchers have revealed a new technique that could be used to secretly write data onto a hard drive, with no chance that it could be detected by computer forensic or antivirus tools. It could be the malware writers' next big trick.

The system devised by Ariel Berkman, a data specialist at Israeli recovery firm Recover, relies on writing data to a hard disk's service area – the portion of the disk typically reserved for the manufacturer's firmware.

The data in a hard disk's service area – sometimes termed the reserved area or system area – is typically used to store modules that are needed to operate the drives. It's one of the reasons why hard drives' usable space is lower than the theoretical capacity.

But instructions for writing data to these portions of the hard drive are closely guarded secrets – it requires so-called vendor specific commands (VSCs). “These commands are unique to the hard-drive vendor and are not publicly disclosed,” said Berkman.

Nonetheless, Berkman has devised a proof-of-concept program that manipulate these secret VSCs and write a file of up to 94MB on a Western Digital 250GB Hawk hard drive.

“One could use these 'inaccessible" areas to store data - e.g. secret documents - or possibly code such that they would be effectively hidden to current tools,” he told V3.

Other methods of hiding data on hard drives, such as steganography, typically involve trying to bury data deep within other files, making it hard to discover.

But most detection tools, such as those used by antivirus vendors of forensic examiners, do not typically bother to analyse the service area, Berkman said. 

“Antivirus and forensics tools will not be able to access and analyse that data, and sanitation tools will not be able to purge it,” he added.

So far, the trick is purely at the proof-of-concept stage, and the software can in some instances result in data loss or hard drive failure, so it's not ready for prime time just yet.

Nonetheless, it might offer malware writers, or maybe just those with secrets they wish to pass on undetected, with a method of hiding data where it cannot easily be found.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Research
  • malware

More From The Frontline

security-gaps
Government partners with Israel's startup scene to boost cyber security

  • Security
  • 17 Feb 2016
Intel teams up with Daqri to create a smart helmet
CES 2016: Intel shows off wearable 'X-ray vision specs' with augmented reality helmet

  • Hardware
  • 06 Jan 2016
Tim Peake Yuri Malenchenko and Tim Kopra before heading into space
UK astronaut Tim Peake blasts into space on journey to ISS

  • Skills
  • 15 Dec 2015
Lastminute.com co-founder Martha Lane Fox
NHS should offer free WiFi and embrace digital services

  • Public Sector
  • 08 Dec 2015
mark-zuckerberg-facebook
Facebook's Mark Zuckerberg to give away $45bn fortune for daughter Max

  • Social Networking
  • 02 Dec 2015
3D printed Ford steering wheel and wheel alloy
Ford presents a compelling case for 3D printing in business

  • Hardware
  • 23 Nov 2015

V3 Latest

Edward Snowden NSA Prism whistleblower
Snowden points finger at Russia over NSA hack

Tweets offer possible cause for major hack

  • Government
  • 16 August 2016
Cloud computing
IBM beats AWS and Azure in seven-year Workday cloud deal

Deal suggests still market left to play for

  • Cloud Computing
  • 16 August 2016
Hacker
NSA hack sees information up for auction in major security incident

Shadow Brokers hacker group claims responsibility

  • Security
  • 16 August 2016
TechEd 2014 Microsoft logo
Microsoft to issue Windows 7 and 8.1 updates together

Firm claims move will make life easier for admins

  • Operating Systems
  • 16 August 2016
blog comments powered by Disqus
Back to Top

Most read

Surface Book fulcrum hinge
Microsoft Surface Book 2 release date, specs and price rumours
Sage at Accountex
Sage breach exposes personal data of staff at 280 companies
Microsoft Windows 10 on a laptop
Windows 10 Anniversary Update: 8 ways to tackle problems caused by latest release
Cloud computing
IBM beats AWS and Azure in seven-year Workday cloud deal
Galaxy Note 7 render
Samsung Galaxy Note 7 release date, price, specs and features
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016