- Jun 9, 2013
- 6,720
Four researchers from two universities in Germany have devised a method of turning an antivirus engine’s malware scanning engine into an attack weapon.
The attack is centered around malware signatures, an old malware identification technique that relies on filters to look for patterns inside the bytes of a file. These malware signatures are created by malware analysts who study malware samples and create a signature to be used by the antivirus (AV) engine.
When the AV engine scans a new file, it looks at the malware signature, which tells it to look between bytes X and Y for certain content. If a file matches this filter, then the AV marks the file as malware and deletes or quarantines the file.
Using AVs to delete logs and browser cookies
The research team says that by finding a way to extract these signatures from the antivirus engine, or inferring the way they work, an attacker could use the AV engine itself to destroy an organization’s files, in so-called “antivirus-assisted attacks.”
Full Article. Researchers Explore Idea of Sabotage via Antivirus Engines
The attack is centered around malware signatures, an old malware identification technique that relies on filters to look for patterns inside the bytes of a file. These malware signatures are created by malware analysts who study malware samples and create a signature to be used by the antivirus (AV) engine.
When the AV engine scans a new file, it looks at the malware signature, which tells it to look between bytes X and Y for certain content. If a file matches this filter, then the AV marks the file as malware and deletes or quarantines the file.
Using AVs to delete logs and browser cookies
The research team says that by finding a way to extract these signatures from the antivirus engine, or inferring the way they work, an attacker could use the AV engine itself to destroy an organization’s files, in so-called “antivirus-assisted attacks.”
Full Article. Researchers Explore Idea of Sabotage via Antivirus Engines