Major Antivirus Flaw Deletes Files, Corrupts Windows
A security company says it found a simple way to turn antivirus software into a weapon for attackers. Most major manufacturers have now fixed the problem, but it's a reminder to keep such software updated.
The discovery by Rack911 Labs effectively meant that a hacker could force the antivirus software to delete files on a computer. That would mean the hacker would need to have gained access to a computer first - whether internally on a network, or remotely using malware.
The exploit is based on one of the most fundamental actions of any antivirus software: they scan files, check if they are a threat, and then either move them to a "quarantine" location or outright delete them. For this to work, the antivirus software needs administrator access, the highest level of access to a computer.
Deletion Instructions Corrupted
The problem comes in the split second between antivirus software issuing the decision to delete or move a file and the computer doing so.
The exploit involves what's effectively a race by the attacker to jump in during this split second and use one of two methods to force the computer to mix up a legitimate instruction with a bogus one. (Source: engadget.com)
One option is using a directory junction, where Windows creates a link between two directories. This doesn't require administrator privileges.
The other option works on any PC operating system, but normally requires privileged access. It's called a symlink (short for symbolic link) and involves creating a new file which simply acts as a shortcut to an existing file. With both options, an attacker could effectively alter the instruction of which files to delete.
Rack911 Labs staff were able to use these methods to trick the computer into deleting key files in either the antivirus software or Windows itself. The former would stop the antivirus software from working while the latter could corrupt Windows to the point a fresh installation was needed.
Major Manufacturers Affected
The researchers say they were able to exploit the problem in more than 20 leading antivirus packages including those from major names like AVG, Kaspersy, Malwarebytes and Sophos. They say the process itself was "trivial" to carry out and the only real challenge was in getting the timing right. (Source: rack911labs.com)
The good news is that the researchers kept their findings secret for a long time, other than telling antivirus manufacturers starting in late 2018. They say the are going public now as every antivirus vendor they've spoken to has had at least six months to fix the problem.
Most have now issued updates to fix the problem or are expected to do so imminently. However, it's possible some lesser-known security software could still be vulnerable.
What's Your Opinion?
Were the researchers right to keep this from the public for well over a year? Are you surprised that almost all leading software could suffer the same vulnerability? Is it worth worrying about such threats or is there only so much a user can do?
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.
Comments
PC matic or SentinelOne?
Curious if PC Matic or SentinelOne were vulnerable. We are using those two (widespread use of SentinelOne, only experimenting with PC matic on a few lab test machines.
it was thought that programability was the biggest advantage
of computers!
Now we know it is the biggest weakness of computers!
Software security is an oxymoron!