[en] To protect their digital assets from malware attacks, most users and companies rely on antivirus (AV) software. AVs' protection is a full-time task against malware: This is similar to a game where malware, e.g., through obfuscation and polymorphism, denial of service attacks, and malformed packets and parameters, tries to circumvent AV defences or make them crash. However, AVs react by complementing signature-based detection with anomaly or behavioral analysis, and by using OS protection, standard code, and binary protection techniques. Further, malware counter-acts, for instance, by using adversarial inputs to avoid detection, and so on. In this cat-and-mouse game, a winning strategy is trying to anticipate the move of the adversary by looking into one's own weaknesses, seeing how the adversary can penetrate them, and building up appropriate defences or attacks. In this article, we play the role of malware developers and anticipate two novel moves for the malware side to demonstrate the weakness in the AVs and to improve the defences in AVs' side. The first one consists in simulating mouse events to control AVs, namely, to send them mouse "clicks" to deactivate their protection. We prove that many AVs can be disabled in this way, and we call this class of attacks Ghost Control. The second one consists in controlling whitelisted applications, such as Notepad, by sending them keyboard events (such as "copy-and-paste") to perform malicious operations on behalf of the malware. We prove that the anti-ransomware protection feature of AVs can be bypassed if we use Notepad as a "puppet" to rewrite the content of protected files as a ransomware would do. Playing with the words, and recalling the cat-and-mouse game, we call this class of attacks Cut-and-Mouse. We tested these two attacks on 29 AVs, and the results show that 14 AVs are vulnerable to Ghost Control attack while all 29 AV programs tested are found vulnerable to Cut-and-Mouse. Furthermore, we also show some weaknesses in additional protection mechanisms of AVs, such as sandboxing and CAPTCHA verification. We have engaged with the affected AV companies, and we reported the disclosure communication with them and their responses.
Research center :
- Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Other
Disciplines :
Computer science
Author, co-author :
GENÇ, Ziya Alper ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > IRiSC
LENZINI, Gabriele ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > IRiSC
Sgandurra, Daniele; RoyalHolloway, University of London
External co-authors :
yes
Language :
English
Title :
Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs
Publication date :
February 2021
Journal title :
Digital Threats: Research and Practice
ISSN :
2692-1626
eISSN :
2576-5337
Publisher :
Association for Computing Machinery, New York, NY, United States
Mohsen Ahmadvand, Alexander Pretschner, and Florian Kelbert. 2019. A taxonomy of software integrity protection techniques. In Advances in Computers. Vol. 112. Elsevier, Cambridge, MA, 413-486.
Mohammed I. Al-Saleh and Jedidiah R. Crandall. 2011. Application-level reconnaissance: Timing channel attacks against antivirus software. In Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats (LEET'11). USENIX Association, Berkeley, CA, 9.
Hyrum S.,erson, Anant Kharkar, Bobby Filar, David Evans, and Phil Roth. 2018. Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning. Retrieved from https://arxiv:cs.CR/1801.08917.
AV-Comparatives. 2020. Malware Protection Test March 2020. Retrieved from https://www.av-comparatives.org/tests/malwareprotection-test-march-2020/.
AV-TEST. 2020. The best antivirus software for Windows Home User. Retrieved from https://www.av-test.org/en/antivirus/homewindows/windows-10/february-2020/.
D. E. Bell and L. J. La Padula. 1976. Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report ESD-TR-75-306. Mitre Corporation.
Battista Biggio and Fabio Roli. 2018. Wild patterns: Ten years after the rise of adversarial machine learning. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS'18). ACM, New York, NY, 2154-2156.
Iker Burguera, Urko Zurutuza, and Simin Nadjm-Tehrani. 2011. Crowdroid: Behavior-based malware detection system for Android. In Proceedings of the 1st ACMWorkshop on Security and Privacy in Smartphones and Mobile Devices (SPSM'11). ACM, New York, NY, 15-26.
Mihai Christodorescu and Somesh Jha. 2004. Testing malware detectors. ACM SIGSOFT Softw. Eng. Notes 29, 4 (2004), 34-44.
Ziya Alper Genc, Gabriele Lenzini, and Daniele Sgandurra. 2019. A game of "Cut and Mouse": Bypassing antivirus by simulating user inputs. In Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC'19). Association for Computing Machinery, New York, NY, 456-465.
Ian Goodfellow, Patrick McDaniel, and Nicolas Papernot. 2018. Making machine learning robust against adversarial inputs. Commun. ACM 61, 7 (June 2018), 56-66.
Andy Greenberg. 2019. Another Mac Bug Lets Hackers Invisibly Click Security Prompts. Retrieved fromhttps://www.wired.com/story/apple-macos-bug-synthetic-clicks/.
IT Services of Mitchell Hamline School of Law. 2017. Technology Notice-Disable Antivirus before using Examplify. Retrieved from https://mitchellhamline.edu/technology/2017/12/03/technology-notice-disable-antivirus-before-using-examplify/.
S. Josefsson. 2006. The Base16, Base32, and Base64 Data Encodings. RFC 4648. RFC Editor. Retrieved from http://www.rfc-editor.org/rfc/rfc4648.txt http://www.rfc-editor.org/rfc/rfc4648.txt.
Dhilung Kirat and Giovanni Vigna. 2015. MalGene: Automatic extraction of malware analysis evasion signature. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS'15). ACM, New York, NY, 769-780.
Joxean Koret. 2014. Breaking Antivirus Software. Retrieved from http://joxeankoret.com/download/breaking_av_software_44con.pdf.
Joxean Koret. 2016. AV: Additional Vulnerabilities. Retrieved from https://www.hoystreaming.com/wp-content/uploads/2016/03/hb_bilbo.pdf.
Joxean Koret and Elias Bachaalany. 2015. The Antivirus Hacker's Handbook. John Wiley & Sons, Indianapolis, IN.
S. Maruyama, S. Wakabayashi, and T. Mori. 2019. Tap 'n ghost: A compilation of novel attack techniques against smartphone touchscreens. In Proceedings of the IEEE Symposium on Security and Privacy (SP'19). IEEE Computer Society, Los Alamitos, CA, 628-645.
Alana Maurushat. 2013. Disclosure of Security Vulnerabilities: Legal and Ethical Issues. Springer-Verlag, London.
Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. 2010. Re: CAPTCHAs: Understanding CAPTCHA-solving services in an economic context. In Proceedings of the 19th USENIX Conference on Security (USENIX Security'10). USENIX Association, 28.
NIST. 2017. NVD-CVE-2017-7150. Retrieved from https://nvd.nist.gov/vuln/detail/CVE-2017-7150.
Karsten Nohl, Sascha Krisler, and Jakob Lell. 2014. BadUSB-On accessories that turn evil. Retrieved fromhttps://srlabs.de/wp-content/uploads/2014/07/SRLabs-BadUSB-BlackHat-v1.pdf.
Working Group Dual Use of the Flemish Interuniversity Council. 2017. Guidelines for researchers on dual use and misuse of research.
OPSWAT. 2020. Windows Anti-Malware Market Share Report. Retrieved from https://www.opswat.com/blog/windows-anti-malwaremarket-share-report-april-2020.
Tavis Ormandy. 2015. Analysis and Exploitation of an ESET Vulnerability. Retrieved from https://googleprojectzero.blogspot.com/2015/06/analysis-and-exploitation-of-eset.html.
Tavis Ormandy. 2016. How to Compromise the Enterprise Endpoint. Retrieved from https://googleprojectzero.blogspot.com/2016/06/how-to-compromise-enterprise-endpoint.html.
Chris Paget. 2002. Exploiting design flaws in the Win32 API for privilege escalation. Retrieved from https://web.archive.org/web/20060904080018http://security.tombom.co.uk/shatter.html.
TaxSlayer Pro. 2017. Quick Start Manual. Retrieved from http://downloads.taxslayer.com/online/2017-Quick-Start-Manual.pdf.
Marcus Ranum and Bruce Schneier. 2011. Schneier-Ranum Face-Off on whitelisting and blacklisting. Retrieved from https://searchsecurity.techtarget.com/magazineContent/Schneier-Ranum-Face-Off-on-whitelisting-and-blacklisting.
John Rushby. 1986. The Bell and La Padula Security Model. Computer Science Laboratory, SRI International, Menlo Park, CA. Draft Technical Note.
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, and Wenke Lee. 2008. Impeding Malware Analysis Using Conditional Code Obfuscation. In Proceedings of the Network and Distributed System Security Symposium (NDSS'08). The Internet Society. https://www. ndss-symposium.org/ndss2008/impeding-malware-analysis-using-conditional-code-obfuscation/.
Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine, and J. Alex Halderman. 2014. Security analysis of the estonian internet voting system. In Proceedings of the ACMSIGSAC Conference on Computer and Communications Security (CCS'14). ACM, New York, NY, 703-715.
Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford. 2003. CAPTCHA: Using hard AI problems for security. In Proceedings of the Conference on Advances in Cryptology (EUROCRYPT'03). Springer, Berlin, 294-311.
Kenneth C. Wilbur and Yi Zhu. 2009. Click fraud. Market. Sci. 28, 2 (2009), 293-308.
Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Jungong Han, and Zheng Wang. 2020. Using generative adversarial networks to break and protect text captchas. ACM Trans. Priv. Secur. 23, 2, Article 7 (Apr. 2020), 29 pages.
Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, and Engin Kirda. 2007. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07). ACM, New York, NY, 116-127.
Ilsun You and Kangbin Yim. 2010. Malware obfuscation techniques: A brief survey. In Proceedings of the International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA'10). IEEE, Piscataway, New Jersey, 4.