Security Researchers Share Crackers' Insider Tips - InformationWeek
03:15 PM
Ransomware: Latest Developments & How to Defend Against Them
Nov 01, 2017
Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly ar ...Read More>>

Security Researchers Share Crackers' Insider Tips

Hackers are increasingly interested in digging up dirt on enterprise antivirus software. A pair of security researchers explains why customers should worry.

A pair of researchers will outline at the Black Hat security conference how they were able to spot vulnerabilities in several anti-virus software packages earlier this year, and why hackers are interested in digging up dirt on enterprise defensive software.

"Our goal is pretty simple," said Neel Mehta, the team lead for Atlanta-based Internet Security Systems' (ISS) X-Force research group, and one of the two who will talk at Black Hat Wednesday about their anti-virus vulnerability research. "We want to state the severity of the threat, and point out that just like every other part of the network, security software is not immune from attack."

Mehta will join Alex Wheeler, an independent security consultant whose name was splashed about last winter when he discovered critical vulnerabilities in major anti-virus vendors' products, including those from F-Secure, Symantec, and Trend Micro.

The pair used binary auditing tools and techniques, said Mehta, to examine anti-virus software and find the vulnerabilities, which ISS announced starting in February.

"When you don't have access to source code, you can either try and black box test [the software] and see what happens, or look under the hood [using binary auditing]," said Mehta.

Although he and Wheeler found numerous vulnerabilities, Mehta was quick to characterize anti-virus software as "better than average" when it comes to security.

"AV vendors are, of course, fairly aware of security, and have a security focus. But the sheer complexity of the operations their software's doing -- decompressing many different file formats, for instance -- means they're bound to make mistakes.

"It comes down to 'secure' versus 'perfect,'" he added. "I think AV products are secure, but they're not perfect."

By some other counts, security software isn't even that secure. According to a recent study by the Yankee Group, vulnerabilities affecting security software are up substantially, in large part because they're virgin territory compared to other vectors, such as operating systems, which have become more secure.

ISS' Mehta was quick to agree. "Hackers are looking to security software as the core operating systems become more secure. They're looking for more targets elsewhere."

Other reasons why security software in general and anti-virus software specifically are being targeted include their wide deployment and, of course, the implications of a breach.

"AV is an important security mechanism," said Mehta, "but it's a potential weak point."

Signature-based anti-virus defenses, Mehta argued, are inherently vulnerable, because they rely on a compromise between performance and security. "There'll always be something a hacker can take advantage of, whether it's a limit on file size for scanning or the recursion level in an archived file."

Mehta mentioned one technique that attackers can use to fool signature-based file scanning AV products. "They can make a file look like two different formats. The AV software will try and recognize the file as a specific type to scan it, but the file actually looks like something else, something benign, for example."

Mehta has a vested interest in pushing non-signature-based defenses, since ISS' security products rely instead on behavior-based examinations of potential threats.

Ironically, however, ISS was the victim of the one major worm outbreak traced to a vulnerability in security software. In early 2004, the Witty worm snuck through ISS firewalls, and reportedly infected tens of thousands of PCs worldwide.

But ISS learned its lesson, an analyst said. “Not coincidentally, ISS tightened up its security processes and decreased its share of vulnerabilities last year relative to 2003,” said Andrew Jaquith, a senior analyst at the Yankee Group, in an earlier interview.

"We haven't seen a virus or worm attack anti-virus software," Mehta said, "but all it takes is one time."

In 2004, in fact, ISS found, but didn't widely publicize, a major vulnerability in McAfee's anti-virus management console that "could have compromised an entire enterprise," said Mehta. "The attacker could force an update to the management software, which would then update all the clients.

"The fact is that security software is under fire," Mehta concluded.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll