Anti-Virus Vendors Scramble To Patch Hijacking Exploit Involving Microsoft Tool (securityweek.com) 48
"A zero-day attack called Double Agent can take over antivirus software on Windows machines," Network World reported Wednesday. wiredmikey writes:
The attack involves the Microsoft Application Verifier, a runtime verification tool for unmanaged code that helps developers find subtle programming errors in their applications... [The exploit] allows a piece of malware executed by a privileged user to register a malicious DLL for a process associated with an antivirus or other endpoint security product, and hijack its agent.
Patches were released by Malwarebytes, AVG, and Trend Micro, the security researchers told BleepingComputer earlier this week. Kaspersky Lab told ZDNet "that measures to detect and block the malicious scenario have now been added to all its products," while Norton downplayed the exploit, saying the attack "would require physical access to the machine and admin privileges to be successful," with their spokesperson "adding that it has deployed additional detection and blocking protections in the unlikely event users are targeted."
BetaNews reports that the researchers "say that it is very easy for antivirus producers to implement a method of protection against this zero-day, but it is simply not being done. 'Microsoft has provided a new design concept for antivirus vendors called Protected Processes...specially designed for antivirus services...the protected process infrastructure only allows trusted, signed code to load and has built-in defense against code injection attacks.'"
Patches were released by Malwarebytes, AVG, and Trend Micro, the security researchers told BleepingComputer earlier this week. Kaspersky Lab told ZDNet "that measures to detect and block the malicious scenario have now been added to all its products," while Norton downplayed the exploit, saying the attack "would require physical access to the machine and admin privileges to be successful," with their spokesperson "adding that it has deployed additional detection and blocking protections in the unlikely event users are targeted."
BetaNews reports that the researchers "say that it is very easy for antivirus producers to implement a method of protection against this zero-day, but it is simply not being done. 'Microsoft has provided a new design concept for antivirus vendors called Protected Processes...specially designed for antivirus services...the protected process infrastructure only allows trusted, signed code to load and has built-in defense against code injection attacks.'"
Oh, Norton! (Score:2)
Re: (Score:2)
Ah McAfee. I used to go a lot of gaming with a group of ladies. Actual biological females. Being way too old for any of them to worry about, and being old enough to be polite, it was good place to hang out and game. We got along fine. Still do.
They had a clan thing going and used voice chat to talk as they hopped from game to game to game. It was a lot of fun.
Anyway, I knew a lot more about PCs than any of them, which is fine. Nobody really needs too know much. Several of the ladies had ongoing
Re: (Score:1)
Re: This doesn't let you be infected... apk (Score:1)
Re: (Score:1)
Privileged User (Score:2, Insightful)
Something executed by a "privileged user" can and should be able to remove anti-virus by design, how else could AV get installed and uninstalled if not by a privileged user?
This is why you protect your admin/root accounts.
Complete marketing wank (Score:4, Interesting)
Re: (Score:2)
Maybe it's not a 0-day, but how is this not another vulnerability? Maybe it's not a vulnerability in Windows, but it appears to be a legitimate vulnerability in several AV tools.
While the severity is vastly oversold (Score:3)
It is a story not so much because this can be done, but because there is a solution to it and has been for 3 years, AV vendors just aren't implementing it. There's additional hardening they could take to mitigate this, they just aren't.
Re: (Score:1)
Do you have a link to this three year old solution for the Double Agent zero-day attack, that the vendors aren't implementing, that the vendors are still working on a solution [networkworld.com] to?
Re: (Score:2)
https://msdn.microsoft.com/en-... [microsoft.com]
Backdoor (Score:2)
Windows lets unprivilegied user inject a DLL in trusted code. That looks like a backdoor.
I wonder if it has been intentionally added lie Juniper's unauthorized VPN backdoor [slashdot.org].
Installed by default? (Score:2)
Since when was Application Verifier installed by default? It was apparently included on Windows XP's CD in /Support/Tools, but wasn't part of the standard installation. I don't recall it being installed on any