Thursday, January 30, 2025
HomeHacksWindows Defender Antivirus Bypass Allows Any Malware to Execute on a Windows...

Windows Defender Antivirus Bypass Allows Any Malware to Execute on a Windows Machine

Published on

SIEM as a Service

Follow Us on Google News

New Method that Involved With Defender Antivirus scanning process over SMB leads to  Windows Defender Antivirus Bypass and allows any Malware to Run into Windows OS.

This FlowTricks Windows Defender, to Scan other Files or scans no files Instead of Scanning Malicious File when we Execute the Malicious file and Windows Load the Execution Process.

By using Custom-built SMB server, This Flow Bypass the Defender Scanning Process and Evade to Capture the Malicious File and Pass to OS for Execution.

According to Cyberark, This Attack calls it as an Illusion Gap and also This Attack Vector can Bypass the other Antivirus Products.

Also Read: Bypass an Anti-Virus Detection with Encrypted Payloads using VENOM Tool

Windows Defender Antivirus Bypass

Initially, CyberArk  Build a Custom SMB Server to Achieve this Goal by Serving Two Different files over SMB, one for Windows PE Loader and another for the Windows Defender Antivirus.

In This Case, Attack should Force Victim to execute an exploit hosted on the malicious SMB share.

Two File A and B which are Malicious and Benign that is used here to Process this Bypass  Action against the Windows Defender.

According to Cyberark, When a process creation is made by Windows PE Loader, a request will be made to the SMB server for the executable file, and we will serve file A, which is malicious .
When Windows Defender requests the executed file, we will serve file B, which is benign. This way, file B will be scanned while file A will be executed.
Antivirus Bypass

Malicious File is Replaced by SMB Sever when Windows Defender Request to Scan the file which is Loaded into SMB Server by Windows PE Loader.

But SMB Server Proceed either serve a benign file or blocks the handle creation request Instead of Providing Malicious File Details.

CyberArk cyber research team leader Doron Naim Said, Once an attacker puts the malicious file into the share, the attacker can control which file to notify the Windows Defender that it will run.

So if the Attacker can able to Play by sitting from SMB Server Side, They can Address the Process Request whether the Request has made by OS or Windows Defender.

Once the attacker on the SMB side actually identifies that Windows Defender wants to read his file, they can hand it another benign file instead of the malicious file.

In This way, Defender will Only Scan the Benign File Instead of Malicious One and Finally  Attacker can Bypass the Defender and Achieve the Goal.

Naim said this behavior is just the opposite and that even if Windows Defender is not able to scan a file, it would still allow the process to execute. CyberArk, meanwhile, said it has already privately disclosed similar issues to other security vendors.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Salt Typhoon Hacked Nine U.S. Telecoms, Tactics and Techniques Revealed

Salt Typhoon, a state-sponsored Advanced Persistent Threat (APT) group linked to the People's Republic...

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...

Casio Hacked – Servers Compromised by a Ransomware Attack

Casio Computer Co., Ltd. has confirmed a significant cybersecurity breach after its servers were...