Andy Ful
From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
- Dec 23, 2014
- 8,591
- Content source
- https://youtu.be/wU-BcQOPSkA
Bring Your Own Vulnerable Driver attack - CIS case.
Most readers can skip the part of the video from 1:34 to 7:18, which is about the CIS settings.
This video is an example of targeted attack on the AV via vulnerable driver + external LOLBin + UAC bypass.
That attack silently compromises the system and will dismantle the AV protection after Windows restart.
The method used is well known and I used Comodo Internet Security 2025 (CIS) as an AV example.
The information needed to perform such attacks is publicly available on the web.
Attack flow:
ISO file ---> user opens it and runs the content ---> system silently compromised
No UAC prompt, no Comodo alerts.
The user can see that something is wrong only after restarting Windows.
A similar type of attack can be done against any AV. It is different from "AV challenge" POCs used by me in the
series of videos on the MalwareTips forum to dismantle the AVs protection.
Edit.
The attack is different from Kill-floor malware (different execution method and driver):
The Kill-floor malware can be easily contained by Comodo, so no Comodo products are on the target list of that malware. Bypassing Comodo requires non-standard execution methods to bypass auto-containment and Script Analysis.
Most readers can skip the part of the video from 1:34 to 7:18, which is about the CIS settings.
This video is an example of targeted attack on the AV via vulnerable driver + external LOLBin + UAC bypass.
That attack silently compromises the system and will dismantle the AV protection after Windows restart.
The method used is well known and I used Comodo Internet Security 2025 (CIS) as an AV example.
The information needed to perform such attacks is publicly available on the web.
Attack flow:
ISO file ---> user opens it and runs the content ---> system silently compromised
No UAC prompt, no Comodo alerts.
The user can see that something is wrong only after restarting Windows.
A similar type of attack can be done against any AV. It is different from "AV challenge" POCs used by me in the
series of videos on the MalwareTips forum to dismantle the AVs protection.
Edit.
The attack is different from Kill-floor malware (different execution method and driver):
Hackers abuse Avast anti-rootkit driver to disable defenses
A new malicious campaign is using a legitimate but old and vulnerable Avast Anti-Rootkit driver to evade detection and take control of the target system by disabling security components.
www.bleepingcomputer.com
Last edited: