DoubleAgent zero-day flaw exploits anti-virus tools to inject malware

Posted on Wednesday, March 22 2017 @ 15:11 CET by Thomas De Maesschalck
Israeli security firm Cybellum discovered a 15-year old security hole that affects all versions of Windows starting from Windows XP to the latest, fully patched version of Windows 10. The attack works by abusing "Microsoft Application Verifier", a legitimate tool that is used as a runtime verification tool to discover bugs and to bolster the security of third-party applications.

Ironically, an undocumented feature of this tool enables an attacker to replace the standard verifier with his own custom code, allowing the injection of any dynamic link library into any process.

Cybellum illustrates the "DoubleAgent" attack by showing how they can inject code into Norton's antivirus tool. The firm also confirms security software from AVAST, AVG, Avira, Bitdefender, Trend Micro, Comodo, ESET, F-Secure, Kaspersky, Malwarebytes, McAfee, Panda, and Quick Heal is all vulnerable to the attack.

It doesn't necessarily have to be an AV tool but the company picked these examples because they're high-profile targets as malware typically invests a lot of effort to hide from AV. DoubleAgent on the other hand can take full control over the antivirus tool and do as it pleases.
DoubleAgent exploits a 15 year old vulnerability which works on all versions of Microsoft Windows, starting from Windows XP right up to the latest release of Windows 10. The sad, but plain fact is that the vulnerability is yet to be patched by most of the antivirus vendors and could be used in the wild to attack almost any organization that uses an antivirus. Once the attacker has gained control of the antivirus, he may command it to perform malicious operations on behalf of the attacker. Because the antivirus is considered a trusted entity, any malicious operation done by it would be considered legitimate, giving the attacker the ability to bypass all the security products in the organization.

The attack has been tested and proven on all the major antiviruses as well as of all versions of Microsoft Windows. The attack was reported to all the major vendors which approved the vulnerability and are currently working on finding a solution and releasing a patch.
Full details at Cybellum.



About the Author

Thomas De Maesschalck

Thomas has been messing with computer since early childhood and firmly believes the Internet is the best thing since sliced bread. Enjoys playing with new tech, is fascinated by science, and passionate about financial markets. When not behind a computer, he can be found with running shoes on or lifting heavy weights in the weight room.



Loading Comments