Security News Antivirus Engines Affected by Code Hooking Vulnerability

BoraMurdar

Super Moderator
Thread author
Verified
Staff Member
Well-known
Aug 30, 2012
6,598
Hooking is a coding technique that allows an application to tap into the process of another application. Many types of desktop applications enable and use this technique, and especially security products that need to monitor other applications for malicious activity.

Security firm enSilo discovered a problem with how a large number of software applications utilize the hooking technique, which leaves the door open for exploitation from malicious actors.

Vulnerabilities identified in 2015
Their research stems from a previous investigation which has identified problems in how AVG, McAfee, and Kaspersky handle the computer's memory space.

It is during that investigation when enSilo's team has noticed the problematic way in which antivirus engines hook into other applications and system APIs to monitor and scan for malicious activity.

Later on, they discovered that other kind of applications, such as virtualization and performance monitoring software are vulnerable to the same issue, and can be leveraged by malware in attacks meant to bypass security software and OS-level malware mitigation techniques.

Hundreds of applications affected, millions of users exposed
According to enSilo, the following products have been notified and have started patching their products: AVG, Kaspersky, McAfee, Symantec, BitDefender, Citrix XenDesktop, WebRoot, Emsisoft, Vera, and Avast.

Additionally, any application that uses the Microsoft Detours hooking engine is also affected. This includes a huge list of products from over 100 ISVs (independent software vendors), along with almost all of Microsoft own products, such as the Office suite.

Patching all applications implies a recompilation of all affected products and distributing new versions, which explains why enSilo waited for so much to publicly disclose the issues.

Microsoft said it will update its apps and the Detours engine in its August Patch Tuesday.

In the meantime, the researchers are set to present their findings at this year's Black Hat security conference, scheduled to take place in Las Vegas at the start of August. A more technical explanation can be read here, written by Udi Yavo and Tomer Bitton of enSilo.
 

_CyberGhosT_

Level 53
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Aug 2, 2015
4,286
Darid I was about to thank Bora for giving me more to worry about as well lol :)
The up side is that Emsisoft will take this seriously, as will some of the others on the list.
A few years ago I had an attempt made on a tool I loved using that was published by EVGA
I had MBAE protecting it and noticed the threat blocked count go up, I sent the log to EVGA
but I lost interest in the tool after that, it was PrecisionX. It sure makes you careful what you install.
Thanks for the share Bora.
PeAcE
 

shmu26

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
interesting that webroot is on the list. maybe that sheds some light on how it works.

which security softs do not use hooks, aside from windows defender and rehips?
 
Last edited:
L

LabZero

This remember me SSDT (System Service Descriptor Table) hooking : the redirection of pointers from the functions exported by the kernel. Functions written specifically for the purpose of altering the results. This technique is relatively easy to write, powerful, but above all, there are on the Internet lots of sources that illustrate the programming.
This means that anyone can violate a software or an antivirus if he has the know-how.

IMO, it is necessary to make extremely complex the code implementation in security applications.
More advanced is the security technology, more difficult they will be exploited It due to programming difficulties.
 
N

NullByte

It's funny how day by day you find that your security software is useless and it's make your PC less secure.
I'm amazed how for 1 year nobody did anything (PS: Security updates are a joke) :D
 

shmu26

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
I don't think hooks are going to go away.
It's like any power tool. It can hurt you if you aren't careful.
But if your system is well protected in the first place, it won't have malware running on it and trying to exploit weaknesses.
 

_CyberGhosT_

Level 53
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Aug 2, 2015
4,286
Agreed shmu26, it does not need to "go away" the attack vector just needs to be minimized.
As it stands now it needs improved and maybe better written code-wise. They need a way to impliment it where the hooks are not increasing
the attack surface, and therein lies their delima.
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
I think vulnerabilities for AV should be regularly attack.

Why? Well many AV's tends to take for granted until a rare situation will bring risk to their products.

------------------------

It is like you are well prepare for an attack but you did not check your defense capabilities.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top