Monday, November 25, 2024
HomeHacksWindows Defender Antivirus Bypass Allows Any Malware to Execute on a Windows...

Windows Defender Antivirus Bypass Allows Any Malware to Execute on a Windows Machine

Published on

New Method that Involved With Defender Antivirus scanning process over SMB leads to  Windows Defender Antivirus Bypass and allows any Malware to Run into Windows OS.

This FlowTricks Windows Defender, to Scan other Files or scans no files Instead of Scanning Malicious File when we Execute the Malicious file and Windows Load the Execution Process.

By using Custom-built SMB server, This Flow Bypass the Defender Scanning Process and Evade to Capture the Malicious File and Pass to OS for Execution.

- Advertisement - SIEM as a Service

According to Cyberark, This Attack calls it as an Illusion Gap and also This Attack Vector can Bypass the other Antivirus Products.

Also Read: Bypass an Anti-Virus Detection with Encrypted Payloads using VENOM Tool

Windows Defender Antivirus Bypass

Initially, CyberArk  Build a Custom SMB Server to Achieve this Goal by Serving Two Different files over SMB, one for Windows PE Loader and another for the Windows Defender Antivirus.

In This Case, Attack should Force Victim to execute an exploit hosted on the malicious SMB share.

Two File A and B which are Malicious and Benign that is used here to Process this Bypass  Action against the Windows Defender.

According to Cyberark, When a process creation is made by Windows PE Loader, a request will be made to the SMB server for the executable file, and we will serve file A, which is malicious .
When Windows Defender requests the executed file, we will serve file B, which is benign. This way, file B will be scanned while file A will be executed.
Antivirus Bypass

Malicious File is Replaced by SMB Sever when Windows Defender Request to Scan the file which is Loaded into SMB Server by Windows PE Loader.

But SMB Server Proceed either serve a benign file or blocks the handle creation request Instead of Providing Malicious File Details.

CyberArk cyber research team leader Doron Naim Said, Once an attacker puts the malicious file into the share, the attacker can control which file to notify the Windows Defender that it will run.

So if the Attacker can able to Play by sitting from SMB Server Side, They can Address the Process Request whether the Request has made by OS or Windows Defender.

Once the attacker on the SMB side actually identifies that Windows Defender wants to read his file, they can hand it another benign file instead of the malicious file.

In This way, Defender will Only Scan the Benign File Instead of Malicious One and Finally  Attacker can Bypass the Defender and Achieve the Goal.

Naim said this behavior is just the opposite and that even if Windows Defender is not able to scan a file, it would still allow the process to execute. CyberArk, meanwhile, said it has already privately disclosed similar issues to other security vendors.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts

A newly discovered phishing marketplace, ONNX Store, empowers cybercriminals to launch sophisticated attacks against...

Mobile Device Management Vendor Mobile Guardian Hacked

 Mobile Guardian, a leading Mobile Device Management (MDM) vendor, experienced unauthorized access to its...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...