Kaspersky Lab denies tricking AV rivals into nuking harmless files

Status
Not open for further replies.

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
Kaspersky Lab deliberately fed bogus malware to its rivals to sabotage their antivirus products, two anonymous former employees allege. Kaspersky says the accusations are false.

Reuters reported today that two ex-Kaspersky engineers claim they were tasked with tricking competing antivirus into classifying benign executables and other files as malicious. Anti-malware tools from Microsoft, AVG and Avast were targeted, apparently.

It's irritating for computer users if an antivirus package starts marking harmless files as malign – known as a false positive – and deletes them or shoves them into a quarantine. It's bad news if those files turn out to be operating system resources, as it will leave machines unstable, unusable or even unbootable. Such incidents are by no means uncommon across the security industry, and when they happen people and enterprises alike suffer all sorts of inconvenience.

The accusation goes that Kaspersky Lab fed false positives into rival products via VirusTotal. Anyone can upload files to VirusTotal, which runs the data through a collection of antivirus packages and reports which products were able to detect any malware, if present. According to VirusTotal, it "helps antivirus labs by forwarding them the malware they fail to detect."

"Files and URLs sent to VirusTotal will be shared with antivirus vendors and security companies so as to help them in improving their services and products," the website, which is owned by Google, adds. "We do this because we believe it will eventually lead to a safer Internet and better end-user protection."

Read more: http://www.theregister.co.uk/2015/08/14/kasperskygate/
 

Av Gurus

Level 29
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
Sep 22, 2014
1,767
They just want to protect their work :D
 
Last edited:
  • Like
Reactions: frogboy

Secondmineboy

Level 26
Verified
May 25, 2014
1,559
I send the Reuters link from another post to Emsisoft and heres their answer:

Hello, and thank you for contacting Emsisoft Support.

Our malware analysts usually only add things to our own database when they have been able to verify some sort of malicious activity, and we have special protection mechanisms built into our software to prevent removal of Windows System Files in order to avoid damage to the computer when removing threats.

Best regards,

Arthur Wilkinson
Customer Support
 

Kardo Kristal

From Crystal Security
Verified
Top Poster
Developer
Well-known
Jul 12, 2014
1,143
@Fabian Wosar from Emsisoft gave very useful and informative reply about the same topic on Wilders Security Forums.

"There is no company out there that creates all of their signatures by hand. With 300k+ new malware samples per day, it is simply not feasible for every sample to be analyzed by a human. That is why pretty much every AV company automates the signature creation process at least to some degree.

Every vendor has their own recipe for automated signatures. Some of them are rather primitive. Others are quite complex. In general though, by reverse engineering what the engine does and reverse engineering the content of the signature database, chances are you can figure out how the automated algorithm that picked these signatures operates and what parts of a malicious file it tends to select to create the signature from.

Once you know how the signature is selected by the AV company's signature generation algorithm, you can craft a file that is malicious (which is required so it is even considered for signature creation in most cases), but has code that can be found in non-malicious files in those areas that the algorithm will pick to create the signature from. Now all you need to do is to get this manipulated malware file to the AV company by uploading it to VirusTotal for example. Then you just wait until it eventually ends up through the various sample exchanges at the AV company you targeted.

Obviously it will be rather difficult to get an AV vendor to detect extremely common files like Windows components that way, as that will likely be prevented by the QA processes put in place after the actual signature generation. But for less common files, like the printer driver that was mentioned in the article, that is completely feasible.

Are AV companies to blame here? I don't think so to be honest. It is not like someone uploaded a non-malicious file to VT that an evil AV "fake detected" and that detection was just copied by everyone. The file that was uploaded was indeed malicious. It was just crafted in a way to trick the proprietary signature selection algorithms used by the targeted AV company to select a bad signature. A similar attack is possible on human analysts by the way. Back in the day when automated sample processing wasn't a thing yet, you could look at signatures of an AV and recognize which of the analyst in the company did specific signatures if you looked at enough of them. The reason for that is that humans have habits and biases just like these automated systems have and knowing those, you can tempt a human into picking a bad signature as well."


Source

Regards,
Kardo
 

vivid

Level 5
Verified
Dec 8, 2014
206
They're just defending the principles to me. Emsisoft is not a good example anyway due to multi-engine approach. Tsk, tsk.
 
  • Like
Reactions: Secondmineboy
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top