Researchers Demonstrate How EDR and Antivirus Can Be Weaponized Against Users

0
191
Researchers Demonstrate How EDR and Antivirus Can Be Weaponized Against Users


Dec 12, 2022Ravie LakshmananEndpoint Detection / Data Security

Researchers Demonstrate How EDR and Antivirus Can Be Weaponized Against Users

High-severity safety vulnerabilities have been disclosed in several endpoint detection and response (EDR) and antivirus (AV) merchandise that may very well be exploited to show them into information wipers.

“This wiper runs with the permissions of an unprivileged person but has the power to wipe virtually any file on a system, together with system information, and make a pc utterly unbootable,” SafeBreach Labs researcher Or Yair stated. “It does all that with out implementing code that touches the goal information, making it absolutely undetectable.”

EDR software program, by design, are able to regularly scanning a machine for doubtlessly suspicious and malicious information, and taking acceptable motion, comparable to deleting or quarantining them.

The concept, in a nutshell, is to trick weak safety merchandise into deleting professional information and directories on the system and render the machine inoperable by making use of specifically crafted paths.

CyberSecurity

This is achieved by benefiting from what’s referred to as a junction level (aka comfortable hyperlink), the place a listing serves as an alias to a different listing on the pc.

Put in another way, between the window the EDR software program identifies a file as malicious and makes an attempt to delete the file from the system, the attacker makes use of a junction to level the software program in the direction of a special path, like C: drive.

The method, nevertheless, did not lead to a wipe as EDRs prevented additional entry to a file after it was flagged as malicious. What’s extra, ought to the rogue file be deleted by the person, the software program was intelligent sufficient to detect the deletion and cease itself from performing on it.

The final resolution arrived within the type of a wiper device, dubbed Aikido, that triggers the privileged delete by making a malicious file at a decoy listing and never granting it any permission, inflicting the EDRs to postpone the delete till subsequent reboot.

Given this new assault interval, all an adversary has to do is delete the listing containing the rogue file, create a junction to level to the goal listing to be deleted, and reboot the system.

Successful weaponization of the method may consequence within the deletion of system information like drivers, stopping the working system from booting. It may also be abused to take away all information from administrator person directories.

Out of 11 safety merchandise that have been examined, six have been discovered weak to the zero-day wiper exploit, prompting the distributors to launch updates to handle the shortcoming –

“The wiper executes its malicious actions utilizing probably the most trusted entity on the system — the EDR or AV,” Yair stated. “EDRs and AVs don’t forestall themselves from deleting information.”

Found this text attention-grabbing? Follow us on Twitter and LinkedIn to learn extra unique content material we submit.

LEAVE A REPLY

Please enter your comment!
Please enter your name here