networking ,security, Varna

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC
The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself.

Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatched by most antivirus vendors. Cybellum has also tested the attack and reported it to all major antivirus vendors. But, so far only Malwarebytes and AVG have issued a patch. Trend Micro is planning to push a release in upcoming weeks.
 

The list of affected vendors are:

  • Avast
  • AVG
  • Avira
  • Bitdefender
  • Trend Micro
  • Comodo
  • ESET
  • F-Secure
  • Kaspersky
  • Malwarebytes
  • McAfee
  • Panda
  • Quick Heal
  • Norton

In an email sent to Fossbytes, an Avast representative claimed that Avast and AVG 2017 aren’t vulnerable. Here’s the complete statement:

“We were alerted by Cybellum last year through our Bug Bounty program to a potential self-defense bypass exploit. We implemented the fix at the time of reporting and therefore can confirm that both the Avast and AVG 2017 products, launched earlier this year, are not vulnerable. It is important to note that the exploit requires administrator privileges to conduct the attack which is difficult for hackers to achieve. Therefore, in this context, we consider the likelihood of such an attack to be low and Cybellum’s emphasis on the risk of this exploit to be overstated.”

 

How does DoubleAgent attack work?

Some of you might be knowing about Microsoft Application Verifier. It’s a Windows tool that comes loaded with all the versions of Microsoft Windows. Whenever an application tries to run, Application Verifier verifies it.

Cybellum researchers discovered an undocumented ability that can allow an attacker to inject a custom verifier into any application. By doing so, the attacker can gain complete control over the computer. This attack gives an attacker the ability to inject any DLL into any process. This ad injection takes place extremely early during the victim’s boot process.

DoubleAgent can even continue injecting code after reboots. This makes it a perfect persistency technique. Even if the victim would completely uninstall and reinstall the program, the attacker’s DLL would still be injected when the process executes.

If we talk about the attack vector that targets antivirus software, DoubleAgent has the ability to turn an antivirus into malware, modify the internal behavior of an antivirus, modify the trusted nature of an antivirus, destroy the system, or denial of service.

(via Fossbytes)







Мenu

Home
About us
Support plans
Contacts
Information

Why N.K. Networks?
Our expertise
News
Vendors
Contact us

N.K. Networks, Ltd.
9000, Varna, Bulgaria,
Makedonia 126str, entr.4, fl.4


Phone: +359 (0) 895 426222
Email: office@nk-networks.net

All rights reserved N.K. Networks. Privacy policy