查看: 3101|回复: 10
收起左侧

[讨论] DoubleAgent: Taking Full Control Over Your Antivirus

[复制链接]
petr0vic
发表于 2017-3-23 00:45:06 | 显示全部楼层 |阅读模式
本帖最后由 petr0vic 于 2017-3-23 00:46 编辑

Vulnerable Antiviruses
The list of vendors that have been tested and found to be vulnerable to DoubleAgent.
The tests were done on the latest version of the vendor on Windows 10 x64 using our POC code.
  • Avast (CVE-2017-5567)
  • AVG (CVE-2017-5566)
  • Avira (CVE-2017-6417)
  • Bitdefender (CVE-2017-6186)
  • Trend Micro (CVE-2017-5565)
  • Comodo
  • ESET
  • F-Secure
  • Kaspersky
  • Malwarebytes
  • McAfee
  • Panda
  • Quick Heal
  • Norton




Video: https://www.youtube.com/watch?v=-ZL9WSuDAqk

More info: https://cybellum.com/doubleagent-taking-full-control-antivirus/

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x

评分

参与人数 1人气 +1 收起 理由
230f4 + 1 版区有你更精彩: )

查看全部评分

KevinYu0504
发表于 2017-3-23 01:13:26 | 显示全部楼层
本帖最后由 KevinYu0504 于 2017-3-23 01:36 编辑

没记错了话,这篇文章原稿所提到的 零时漏洞,
在新闻出来的时候只有两家厂商已经推出了修正补丁,
一个是 Avast,另一个是 Malwarebytes。
这两家反应最快,其他软件商也火速跟上了 ~

话说这示范影片跟图片,不知赛门铁克、诺顿做何感想

============

更正一下,是 AVG 跟 Malwarebytes 先推出修正补丁

漏洞允许黑客在任何Windows版本上劫持防病毒软件


目前(2017-03-22)已经释出漏洞补丁的有 : (可参考下方新闻连结)

微软Application Verifier曝0day漏洞,影响趋势科技、卡巴斯基、赛门铁克在内的大量安全产品

评分

参与人数 1人气 +1 收起 理由
屁颠屁颠 + 1 版区有你更精彩: )

查看全部评分

驭龙
发表于 2017-3-23 09:23:44 | 显示全部楼层
大批第三方安软被毙了,不知WD是啥情况?哈哈
Dolby123
发表于 2017-3-23 11:14:58 | 显示全部楼层
Comodo 某个官员的解释

Hello Guys,

No we are not vulnerable to this AppVerifier injection. Michael [from Cybellum] contacted us on this issue at our security response email, and we had a long discussion on the topic.

The claim was: Malware can use this registry key to inject arbitrary code into COMODO processes and hence disable the protection. DLL injection through AppVerifier registry keys has been around since Windows XP i.e. the last 10 years, and CIS [Comodo Internet Security], by default, protects these keys against malicious modifications already. Check the attachment CIS_protected.png. In order for the attack to be successful, malware has to write to this registry key, and CIS already protects against this by default. There are actually hundreds of similar ways of injecting into other processes, and I am not sure other AVs are even aware of them.

Most of the disagreement comes from not understanding how CIS layered defense works and assuming CIS is like the classical antivirus products mentioned in the original article. Nevermind protecting itself against such attacks, CIS protects EVERY other application against such attacks too.

For this attack to be successful, the malware author should be able to bypass CIS protection. CIS, by default, allows only whitelisted applications to modify such critical keys. Non-whitelisted applications will be either blocked or sandboxed, rendering the attack ineffective.

To his credit however, during our discussions with Michael[from Cybellum], another attack vector was disclosed to us. This can cause problems with default configuration so we will be addressing it with an update in April. We will be giving more details on it with the release.
Sailer.X 该用户已被删除
发表于 2017-3-23 11:23:45 | 显示全部楼层
驭龙 发表于 2017-3-23 09:23
大批第三方安软被毙了,不知WD是啥情况?哈哈

http://bbs.kafan.cn/thread-2082102-1-1.html
按这个帖子的说法,WD因为采用了安全机制,似乎可以挡住
我就是XXX
发表于 2017-3-23 11:36:12 | 显示全部楼层
霄栋 发表于 2017-3-23 11:23
http://bbs.kafan.cn/thread-2082102-1-1.html
按这个帖子的说法,WD因为采用了安全机制,似乎可以挡住

难道是因为亲儿子缘故?
驭龙
发表于 2017-3-23 11:52:32 | 显示全部楼层
本帖最后由 驭龙 于 2017-3-23 14:36 编辑

来自赛门铁克官方的回复:
After investigating this issue we confirmed that this PoC does not exploit a product vulnerability within Norton Security. It is an attempt to bypass an installed security product and would require physical access to the machine and admin privileges to be successful. We remain committed to protecting our customers and have developed and deployed additional detection and blocking protections to users in the unlikely event they are targeted.

https://community.norton.com/en/ ... over-your-antivirus

这个好像不能直接被利用,需要物理访问本机和获得管理员权限才能攻破NS
pal家族
发表于 2017-3-23 12:04:53 | 显示全部楼层
本帖最后由 pal家族 于 2017-3-23 15:08 编辑

老司机的官方回复:

Hello,

Kaspersky Lab issued this statement: "Kaspersky Lab would like to thank Cybellum Technologies LTD for discovering and reporting the vulnerability which made a DLL Hijacking attack possible via an undocumented feature of Microsoft Application Verifier.

The detection and blocking of this malicious scenario has been added to all Kaspersky Lab products from March 22, 2017."


https://forum.kaspersky.com/inde ... dpost&p=2683887
houtiancheng
发表于 2017-3-23 13:30:25 | 显示全部楼层
搞得我又想装回COMODO了……
HEMM
发表于 2017-3-23 14:27:33 | 显示全部楼层
BUG豆儿好傲娇~
可爱的咧............
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-11-25 01:29 , Processed in 0.122825 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表