Security Researchers Uncover Bugs in Antivirus Software Which Helps Hackers Get In

  • By Dawna M. Roberts
  • Published: Oct 06, 2020
  • Last Updated: Mar 18, 2022

According to research firm CyberARK, most popular anti-malware programs include bugs that allow hackers to increase their privileges on the system and take control. 

The Problem

Through a series of articles, CyberARK explains in great detail the bugs in anti-malware software and the methods that hackers could use to elevate their privileges to gain complete control of the system. The issue is that these programs are meant to protect the computer system and keep malware out when, in fact, they are the very thing that can be exploited to allow it in.

Because anti-malware requires elevated privileges on the system is what makes it a perfect target. The good news is that CyberARK also included an explanation of some of these bugs and how to make changes to your system to close the holes.

Windows machines are most affected by these issues as macOS has a different file structure and format that does not handle permissions the same way.

Some of the affected programs which you might be familiar with are:

  • Symantec.
  • Kaspersky.
  • McAfee.
  • Trend Micro.
  • Check Point.
  • Fortinet.
  • Microsoft Defender.
  • Avira.

Each of these vendors has confirmed that the bugs have been addressed and corrected in the latest versions. 

The Scary Stuff

One of the most alarming aspects of these bugs is that they allow hackers to delete files from many areas of your Windows machine. They could potentially delete or corrupt any file anywhere on your system and render it unusable. This exploit could be used in conjunction with ransomware.

A Few Vulnerable Areas

The first area of concern is the ProgramData directory. It’s where programs store data not specific to any user. It’s also a very dangerous place because malware and hackers with the right privileges could install apps and viruses into this folder affecting the entire system. As a default, every user has “write” and “delete” permissions to that folder, which presents a real danger if a user account was hacked and the privileges elevated, the perpetrator could do some real damage in there. 

The problem is twofold: if a non-privileged process creates directories or files that are later used by a privileges process, havoc can ensue. Alternatively, if you create a directory or folder before a privileged process exists, the DACL (Discretionary Access Control List) would not update automatically, exposing that directory for abuse.

Through their research and testing, the firm discovered that privileged and non-privileged users sometimes share the same log files. This danger could allow cybercriminals to delete the file and replace it with malicious code. CyberARK used a combination of NTFS Mount Points and Object Manager symbolic links to abuse the systems to see if they could access these folders to insert malicious code, and they were successful. 

Another area of concern is DLL Hijacking. Some program installers (software that installs programs onto the machine) include a vulnerability that may elevate the privileges through DLL hijacking by relying on an old installation framework that has not been patched. CyberARK recommends updating your installation frameworks to eliminate this possibility. Most installation programs use DLL files, so if the hackers insert a malicious DLL file essentially piggybacking on the installer, they could gain access that way as well. Some of the older frameworks that might be vulnerable were listed as:

  • InstallShield.
  • InnoSetup.
  • Nsis installer.
  • Wix installer.

During testing, all the anti-malware vendors had frameworks that were not updated, leaving them vulnerable. These companies have since updated their installers to patch the holes. 

Other Security Recommendations

In their detailed technical report, they also include a few other tips to keep your system safe from hacking, ransomware, and viruses:

  • Change the DACLs on your system before creating new folders and using existing ones. Close all the holes where a hacker could get a foothold.
  • Use LoadLibraryEx instead of the old LoadLibrary API, which is vulnerable.
  • Use correct impersonating when accessing a file from two separate secure areas.

In their summary, CyberARK summed it up with, “The implications of these bugs are often full privilege escalation of the local system. Due to the high privilege level of security products, an error in them could help malware to sustain its foothold and cause more damage to the organization. The exploits that were presented here are easy to implement, but also easy to patch against. We have seen that blocking symlink attacks or blocking the load of malicious DLLs require only a small touchup in the code. Knowing that, AV vendors should be able to eliminate this widespread bug class.”

Even those programs designed to keep us safe have their flaws, which begs the question, how do we protect our systems from cybercriminals going forward? 

 

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

What is Bait and Switch Scams: How it Works and How to Avoid It

What is Bait and Switch Scams: How it Works and How to Avoid It

Ever follow an ad featuring limited-time products to a company's web page only to find they're selling something else entirely?

What is Intellectual Property Infringement, and How to Avoid It? 

What is Intellectual Property Infringement, and How to Avoid It? 

When we think of "property," the first thing that comes to our mind might be tangible objects—items we've purchased, like cars and homes, or entitlements we've procured, like land, titles, or even honorifics.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close