Home > Cyber News > Kaspersky, AVG, Symantec, Microsoft Affected by Code Hooking Bug

Kaspersky, AVG, Symantec, Microsoft Affected by Code Hooking Bug

It’s 2016! Let’s Look Beyond Antivirus for Protection Against Advanced Malware

Security researchers at enSilo have come to some shocking conclusions in terms of the hooking and injection methods employed by various vendors. Their research started in 2015 when they noticed an injection issue in AVG. Later, they found similar problems in McAfee and Kaspersky products.

The further the research went, the more troublesome the results were getting. The bottom line is that six vulnerabilities have been exposed in the way that some quite big vendors handle the code hooking technique. These vulnerabilities make the software prone to malware and eventually to the exploit of the targeted device.

First, What Is Code Hooking?

Hooking is a technique used by software, such as products that do virtualization, sandboxing and performance monitoring, to monitor and/or change the behavior of operating system functions in order to operate effectively.

Code hooking is very critical for the establishment of security products and antivirus software.

It’s particularly critical for security products. AV programs typically employ hooking to allow it to monitor for malicious activity on a system. The average anti-exploitation tool monitors memory allocation functions in order to detect vulnerability exploitation. A security bug in the hooking function makes the system vulnerable to compromise.

Related: Symantec Products Guilty of Charge of Multiple Severe Flaws

Such vulnerability gives the attacker a way to bypass the OS and third-party exploit mitigations, enSilo experts explain. Thanks to this, the attacker can easily leverage the flaw which would otherwise be much more difficult, and exploit it successfully. The worst of these vulnerabilities would allow the attacker to endure on the victim’s machine and stay undetected. He would also be able to inject code into any system process.

Which Anti-Virus Products and Software Vendors Are Exposed to Code Hooking Vulnerabilities?

  • Microsoft’s hooking engine, Detours. From Microsoft.com: “Under commercial release for over 10 years, Detours is licensed by over 100 ISVs [independent software vendors] and used within nearly every product team at Microsoft.”
  • AVG
  • Kaspersky
  • McAfee
  • Symantec
  • A major AV vendor
  • BitDefender
  • Citrix XenDesktop
  • WebRoot
  • Emsisoft
  • Vera

Expectedly, Microsoft is the most popular hooking engine in the world which is used by more than 100 ISVs. This means that millions of users could be affected. In most of the cases, fixing this issue will require recompilation of each product individually which makes patching extremely hard.

The enSilo team has been notifying all of the above-mentioned vendors throughout the past 8 months. It’s crucial to note that companies running affected software should get patches directly from the vendors, if available. If patches are not available yet, the company should demand them immediately.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree