I have read article about TDL/Alureon Rootkit:
According to research published on Monday by GFI Software, the latest TDL4 installation penetrates 64-bit versions of Windows by bypassing the OS’s kernel mode code signing policy, which is designed to allow drivers to be installed only when they have been digitally signed by a trusted source. The rootkit achieves this feat by attaching itself to the master boot record in a hard drive’s bowels and changing the machine’s boot options.
Does this mean that Windows doesn't protect MBR from being overwritten? Can then any program, including malware/rootkit, running with administrator privileges just overwrite MBR and simply bypass driver signing enforcement?
Thanks for any explanation.
