Intrusive Applications: 6 Security Issues to Watch Out for in Hooking

Av Gurus

Level 29
Thread author
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
Sep 22, 2014
1,767
For over a year our enSilo researchers have been looking into hooking engines and injection methods used by different vendors. It all started back in 2015 when we noticed injection issue in AVG but this was only the tip of the iceberg. A few months after that we noticed similar issues in McAfee and Kaspersky Anti-Virus. At that point we decided to extend our research and look into the security implications of hooking engines and injection techniques. The results were depressing.

The problem was not just security products. Our research started by simply installing different Anti-Virus (AV) products and testing how their hooking engines and injection techniques worked. Once we discovered that such problems are prominent in the AV domain, we extended the research to include more security products such as Data Leak Prevention (DLP), Anti-Exploitation and Host Intrusion Prevention Systems (HIPS). However, since the usage of hooking is not limited to security products we also analyzed other types of products such as virtualization applications, performance monitoring and more.

Overall, at enSilo we found 6(!) different common security issues that stem from incorrect implementation of code hooking and injections techniques. These issues were found in more than 15 different products. However, the most impactful discovery was that 3 different hooking engines also suffer from these kind problems, including the most popular commercial hooking engine in the world - Microsoft Detours (scheduled to patch in August). Practically it means that probably thousands of products are affected, incl. Office, meaning that millions of devices are affected by their vulnerability.

In Black Hat 2016 the enSilo team will reveal the full research results in their talk: "Captain Hook: Pirating AVs to Bypass Exploit Mitigations" , taking place on Wednesday August 3rd, 4:20pm-5:10pm at the Jasmine Ballroom (details appear at the end of this post).

In the meanwhile, here’s a short Q&A for some background info on our findings.

Q: Which software is affected?
  • Microsoft’s hooking engine, Detours. Quoting Microsoft.com: “Under commercial release for over 10 years, Detours is licensed by over 100 ISVs [independent software vendors] and used within nearly every product team at Microsoft.”
  • AVG
  • Kaspersky
  • McAfee
  • Symantec
  • Trend Micro
  • BitDefender
  • Citrix XenDesktop
  • WebRoot
  • AVAST
  • Emsisoft
  • Vera
We have notified all these vendors throughout the past 8 months. Some of them fixed immediately, such as WebRoot, AVG and BitDefender, while others were slower to patch with a few releasing a fix only in the past month.

Q: How widespread is it? How many users/systems/companies are infected or potentially affected?
Microsoft is the most popular hooking engine in the world, used by more than 100 ISVs, so this could affect potentially millions of users.

Any customer of the above products that is still vulnerable is affected by these flaws. Moreover, in most cases fixing this issue will require recompilation of each product individually which makes patching extremely hard.

Q: What is “hooking”?
Hooking is a technique used by software, such as products that do virtualization, sandboxing and performance monitoring, to monitor and/or change the behavior of operating system functions in order to operate effectively. It’s particularly critical for security products. For example, antivirus software typically uses hooking to allow it to monitor for malicious activity on a system. Most anti-exploitation solutions monitor memory allocation functions in order to detect vulnerability exploitation. A security bug in the hooking function exposes the system to compromise.



Q: What is the potential damage? How might an attacker exploit this?
Most of these vulnerabilities allow an attacker to easily bypass the operating system and third-party exploit mitigations. This means an attacker may be able to easily leverage and exploit these vulnerabilities that would otherwise be very difficult, or even impossible, to weaponize. The worst vulnerabilities would allow the attacker to stay undetected on the victim’s machine or to inject code into any process in the system.



Q: How does one mitigate against it?
Companies using affected software should get patches from the vendors, if available, and demand patches if they aren’t yet available. Customers using software from the affected vendors should contact their vendors and demand that the software be patched.

That said, we are fully aware of the complexity of patching. For this, what's needed is an approach that takes into consideration that the environment is already compromised and instead of trying to keep threat actors from entering the environment, dealing with the fact that they're already within and working towards preventing the consequences (let it be theft, ransoming, or tampering of data).



Q: How long have the vulnerabilities been around?
It’s unclear and depends on the product. We believe that the vulnerability existed already in Detours version 3 which was released about a decade ago so we suspect it’s been there for at least 8 years.



Update (July 20): Clarified that some vendors have fixed this issue immediately, as well as recognizing the patching complexity.

Update (July 24): Updated with Trend Micro.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top