Reg duped by crime-busting D.I.R.T Trojan

That rhythmic thud you hear is Tom's forehead hitting his desk....


My recent article on the D.I.R.T. (Data Interception by Remote Transmission) Trojan, with which law-enforcement agents can secretly monitor a suspect's computer and which is marketed by surveillance outfit Codex Data Systems, contained several inaccuracies, all of which can be attributed solely to my own lapse in the skepticism for which The Reg in general, and I personally, are known.

The full story, as it happens, is immensely more twisted than I imagined when I wrote my original item. Clearly, The Register's readers deserve better -- and here it is:

S.C.A.M.
Thanks to several e-mailed hints from readers, I continued doing background research and have now confirmed that the CEO of Codex Data Systems is one Francis Edward "Frank" Jones, a convicted felon currently on probation for illegal possession of surveillance devices. He was charged with trafficking and conspiracy to traffic in them, but in an agreement he pleaded guilty to simple possession, and the US Government dropped the other two charges.

He was sentenced to three-hundred hours' community service and five years' probation with no jail time, on the strength of his argument to the court that he was not responsible for his illegal acts by reason of mental defect. He has also been required to participate in a mental-health program, which, judging by some of his recent behavior, appears to be less than a screaming success.

Jones is widely regarded as a scam artist with a long history of security/surveillance snake-oil sales. He has, for example, sold bug-detection services, which we're told are completely fraudulent, involving detection apparatus easily cobbled together from the inventory of Radio Shack. He's reported to have planted a bug which he subsequently 'found' during one such charade.

A Legend in His Own Mind

He's also a shameless, Boswellian self-promoter with a Web site devoted to himself in his on-line incarnation, "SpyKing."

Here we're told that SpyKing/Jones is "formerly in military and law enforcement service," and "a popular talk show guest with 15 appearances on national & regional programming and news specials."

As for his law-enforcement experience, we've since learned that he managed to get himself fired from the New York City Police Department in 1975, according to a letter by Association of Counter-Intelligence Professionals (ACIP) Executive Director Michael Richardson.

But the PR beat goes on: "Jones has lectured at M.I.T. (Massachussetts [sic] Institute of Technology) on TEMPEST computer eavesdropping techniques," his Web site claims. Indeed, "No other speaker has their thumb on the pulse of changing world trends in immerging [sic] surveillance technologies."

Our illiterate subject has conned such publications as PC World, E-BusinessWorld, TechWeek, the Wall Street Journal, and, thanks to my carelessness, The Register as well.

The D.I.R.T. on the Trojan

The truly inexcusable element of my first story was my failure challenge rigorously Codex's claims regarding the amazing power of its D.I.R.T. Trojan.

Had I taken the time to learn that SpyKing/Jones was behind this, I would have immediately suspected that it's a lot more talk than technology. But I ran with the piece out of eagerness to work my own agenda, motivated by personal outrage that anyone would be so irresponsible as to sell a Trojan to law-enforcement and governments as a surveillance device.

And the reason for that outrage survives even now; D.I.R.T. unquestionably permits police to upload bogus evidence to a suspect's machine and offers no auditing controls by which they might be caught, which was the focus of my original report.

That much hasn't changed; D.I.R.T. is absolutely ripe for abuse without accountability, and Jones is utterly damnable for trying to sell it to governments and police organizations.

But I was on very shaky ground in reporting its true capabilities. My subsequent investigation indicates that Codex's claim that D.I.R.T. can defeat all known PC firewalls is, quite simply, false.

Furthermore, their claim that "the software is completely transparent to the target and cannot be detected by current anti-virus software," is misleading, if not completely false. There is no technology in D.I.R.T. responsible for this sort of stealth; the server isn't detected simply because no anti-virus vendor has as yet added it to their signatures catalog.

Defeating D.I.R.T.
My suggestions in the original article for defeating D.I.R.T. remain basically sound, if perhaps a bit over-cautious due to my mistaken belief that it defeats all known firewalls (though there is reason to believe it may defeat a few).

Because it isn't presently detected by anti-virus software, one does have to look for evidence of it. By default, it installs two files in the C:\WINDOWS directory -- DESKTOP.EXE and DESKTOP.DLL. If you find either of those files, you need to remove them and any associated files (such as .LOG files), or re-format your HDD to be on the safe side.

One can also check their Windows registry under:
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion HKEY_USERS\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion HKEY_USERS\DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion for any references to DESKTOP.EXE or DESKTOP.DLL.

For those not intimately acquainted with the incontinent complexities of the Windows Registry, it would be best simply to search the entirety for references to both files mentioned. (It's also worthwhile to check out some of the suggestions in my previous report.)

Now, because those file names are defaults which can be modified by savvy operators, I'm not saying, 'if you can't find the files, then you're not infected.' The names can be changed; but we can rely on the fact that most operators will be using D.I.R.T. in its default configuration -- after all, its chief selling point is that it can be used successfully by the technically illiterate.

One final point regarding defenses against the Trojan: soon after I posted the first article recommending disk re-formats for those unsure how to combat D.I.R.T., which was mentioned and linked at Cryptome.org, a reader submitted the following warning:

"D.I.R.T. uses 'unused' space in the file system, so high-level reformatting will not destroy it. (This 'unused' space is used by operating systems to handle classified information with data structures similar to that in SE_Linux). Removing D.I.R.T. requires wiping the disk at the device-driver level."

I spoke with Eric Schneider, who wrote the program before leaving Codex on ethical grounds; and he told me that so far as he knows "there is no technology in D.I.R.T. which comes close to surviving a high-level format."

So there you have it. Codex's D.I.R.T. is a remote administration tool that functions in large part just like the free Trojans SubSeven and BO2K, which is being sold by a disgraced former cop, current felon and self-confessed lunatic for thousands of dollars a pop to creepy Feds in countries where the sort of abuse it invites is routine and impossible for a victim to challenge in court.

In all, a loathsome scam run by an equally loathsome con artist. ®


Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021