Security Researchers Uncover Bugs in Antivirus Software Which Helps Hackers Get In

  • By Dawna M. Roberts
  • Published: Oct 06, 2020
  • Last Updated: Mar 18, 2022

According to research firm CyberARK, most popular anti-malware programs include bugs that allow hackers to increase their privileges on the system and take control. 

The Problem

Through a series of articles, CyberARK explains in great detail the bugs in anti-malware software and the methods that hackers could use to elevate their privileges to gain complete control of the system. The issue is that these programs are meant to protect the computer system and keep malware out when, in fact, they are the very thing that can be exploited to allow it in.

Because anti-malware requires elevated privileges on the system is what makes it a perfect target. The good news is that CyberARK also included an explanation of some of these bugs and how to make changes to your system to close the holes.

Windows machines are most affected by these issues as macOS has a different file structure and format that does not handle permissions the same way.

Some of the affected programs which you might be familiar with are:

  • Symantec.
  • Kaspersky.
  • McAfee.
  • Trend Micro.
  • Check Point.
  • Fortinet.
  • Microsoft Defender.
  • Avira.

Each of these vendors has confirmed that the bugs have been addressed and corrected in the latest versions. 

The Scary Stuff

One of the most alarming aspects of these bugs is that they allow hackers to delete files from many areas of your Windows machine. They could potentially delete or corrupt any file anywhere on your system and render it unusable. This exploit could be used in conjunction with ransomware.

A Few Vulnerable Areas

The first area of concern is the ProgramData directory. It’s where programs store data not specific to any user. It’s also a very dangerous place because malware and hackers with the right privileges could install apps and viruses into this folder affecting the entire system. As a default, every user has “write” and “delete” permissions to that folder, which presents a real danger if a user account was hacked and the privileges elevated, the perpetrator could do some real damage in there. 

The problem is twofold: if a non-privileged process creates directories or files that are later used by a privileges process, havoc can ensue. Alternatively, if you create a directory or folder before a privileged process exists, the DACL (Discretionary Access Control List) would not update automatically, exposing that directory for abuse.

Through their research and testing, the firm discovered that privileged and non-privileged users sometimes share the same log files. This danger could allow cybercriminals to delete the file and replace it with malicious code. CyberARK used a combination of NTFS Mount Points and Object Manager symbolic links to abuse the systems to see if they could access these folders to insert malicious code, and they were successful. 

Another area of concern is DLL Hijacking. Some program installers (software that installs programs onto the machine) include a vulnerability that may elevate the privileges through DLL hijacking by relying on an old installation framework that has not been patched. CyberARK recommends updating your installation frameworks to eliminate this possibility. Most installation programs use DLL files, so if the hackers insert a malicious DLL file essentially piggybacking on the installer, they could gain access that way as well. Some of the older frameworks that might be vulnerable were listed as:

  • InstallShield.
  • InnoSetup.
  • Nsis installer.
  • Wix installer.

During testing, all the anti-malware vendors had frameworks that were not updated, leaving them vulnerable. These companies have since updated their installers to patch the holes. 

Other Security Recommendations

In their detailed technical report, they also include a few other tips to keep your system safe from hacking, ransomware, and viruses:

  • Change the DACLs on your system before creating new folders and using existing ones. Close all the holes where a hacker could get a foothold.
  • Use LoadLibraryEx instead of the old LoadLibrary API, which is vulnerable.
  • Use correct impersonating when accessing a file from two separate secure areas.

In their summary, CyberARK summed it up with, “The implications of these bugs are often full privilege escalation of the local system. Due to the high privilege level of security products, an error in them could help malware to sustain its foothold and cause more damage to the organization. The exploits that were presented here are easy to implement, but also easy to patch against. We have seen that blocking symlink attacks or blocking the load of malicious DLLs require only a small touchup in the code. Knowing that, AV vendors should be able to eliminate this widespread bug class.”

Even those programs designed to keep us safe have their flaws, which begs the question, how do we protect our systems from cybercriminals going forward? 

 

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What You Need to Know about the Delta Dental Data Breach

What You Need to Know about the Delta Dental Data Breach

Delta Dental is a dental insurance provider serving over 90 million Americans. It offers coverage in all 50 states, Puerto Rico, and Washington, D.C. The company was established in 1966 in California as part of the Delta Dental Plans Association.

What You Need to Know about the Hot Topic Data Breach

What You Need to Know about the Hot Topic Data Breach

Hot Topic plays in the fashion, apparel, and shoe industry as a retailer of music-influenced apparel and accessories, such as jeans, tops, belts, dresses, pajamas, sunglasses, jewelry, and tees.

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close