Study Targets Windows 'Hooking' in Antivirus Software

Microsoft confirmed last week that it has been working with a security firm investigating a fundamental flaw in antivirus (AV) software for Windows.

Microsoft said it worked directly with security research firm Matousec. Earlier this month, Matousec published a paper describing a Windows "hooking" technique practiced by some AV software makers that may make those products open to attack by hackers. Specifically, the research examined a technique it calls "the argument-switch attack or KHOBE [Kernel HOok Bypassing Engine] attack."

AV software makers can use the Windows hooking technique to modify the Windows kernel and run their security software, but it could also be exploited as an avenue of attack by hackers, according to Matousec. Last week, Matousec listed software security vendors subject to the hooking vulnerability. Those security vendors include Norton (Internet Security 2010), McAfee (Total Protection 2010), Sophos, Trend Micro (Internet Security Pro), Symantec, and BitDefender.

Off the list were Microsoft's software security products, which do not use the hooking technique.

"[Microsoft] has worked with Matousec to confirm that Microsoft Security Essentials and Forefront Client Security products are not affected by their KHOBE research due to the design of our real-time protection," said a Microsoft spokesperson in an e-mail statement.

According to Matousec, an argument-switch attack can patch the Windows kernel to "enable it to intercept certain operations like opening files or killing processes." In such an attack, a hacker switches out benign code on an affected system with malware before third-party security software can detect anything.

The Microsoft spokesperson said that such an attack method requires the hacker to have the ability to execute programs on the client machine as a prerequisite.

"In other words, the client machine is already running undetected programs--and in some cases drivers--making the practical impact of this technique very limited," the spokesperson said.

Microsoft's real-time protection is built using the file system's mini-filter driver model, which properly validates user mode parameters, synchronizes scanning, and "allows us to ensure we are examining the actual content that is being loaded for execution," the Microsoft spokesperson explained.

McAfee and Kaspersky Labs, to name a few software security vendors, are on the defensive this week. Spokespeople from those companies have suggested that administrative access is also needed for any kernel hooking to work. McAfee downplayed the Matousec research, saying that "several mitigating factors" make the research unlikely to lead to a viable, real-world, widespread attack scenario.

Security experts said it's too early to tell what actions software security firms will take in light of the Matousec research findings.

Joe Nardone, president of Expert Data Labs, said that security research can only be truthfully examined and applied when something actually happens and an exploit actually destroys a system or bricks an application.

"This, like all other security issues, is a cause-and-effect relationship," he said. "This is unfortunately the case when you're talking about what malicious software could do and examining risks--most of it is theoretical. When something actually happens, then the market dictates what the standards will be and these firms will adjust their functions accordingly."

Another research analyst predicts that the third-party firms mentioned in the research will look to make adjustments and will likely roll out fail-safe measures in the weeks and months to come.

"Now that Microsoft has said its programs aren't affected, what you're going to hear from other vendors is that they have rules characteristics and parameters that stop such attacks even when disconnected from the kernel," said Jon Oltsik, a principal analyst at Enterprise Strategy Group.

About the Author

Jabulani Leffall is a business consultant and an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others. He consulted for Deloitte & Touche LLP and was a business and world affairs commentator on ABC and CNN.

Featured

  • three silhouetted education technology leaders with thought bubbles containing AI-related icons

    Ed Tech Leaders Rank Generative AI as Top Tech Priority

    In a recent CoSN survey, an overwhelming majority of ed tech leaders (94%) said they see AI as having a positive impact on education. Respondents ranked generative AI as their top tech priority, with 80% reporting their districts have gen AI initiatives underway, or plan to in the current school year.

  • computer monitor with a bold AI search bar on the screen

    Google Rolls Out AI Mode in Search

    About a year after introducing AI Overviews for its flagship search offering, Google has announced broad availability of AI Mode in Search.

  • glowing shield hovers above a digital cloud platform with abstract data streams and cloud icons in the background

    Google to Acquire Cloud Security Firm Wiz in $32 Billion Deal

    Google has announced it will acquire cloud security startup Wiz for $32 billion. If completed, the acquisition — an all-cash deal — would mark the largest in Google's history.

  • students using digital devices, surrounded by abstract AI motifs and soft geometric design

    Ed Tech Startup Kira Launches AI-Native Learning Platform

    A new K-12 learning platform aims to bring personalized education to every student. Kira, one of the latest ed tech ventures from Andrew Ng, former director of Stanford's AI Lab and co-founder of Coursera and DeepLearning.AI, "integrates artificial intelligence directly into every educational workflow — from lesson planning and instruction to grading, intervention, and reporting," according to a news announcement.