You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
Science & Technology
Proof of Concept Exploit Bypasses AV Programs
2010-05-09
This "virus" has not yet been released into the wild and it appears it is based on a very old general vulnerability.

The difference is that this new exploit uses the a multiprocessor scheduler to switch good software with malware between running threads. IIUC, virus programs do not check for these kinds of swaps in pagable memory before allowing code to execute. The kernal does, but then it does it to regulate which memory space gets written to and it does not distinguish between the two types of software.

So what are we end-users to do about it?
Researchers say they've devised a way to bypass protections built in to dozens of the most popular desktop anti-virus products, including those offered by McAfee, Trend Micro, AVG, and BitDefender.

The method, developed by software security researchers at matousec.com, works by exploiting the driver hooks the anti-virus programs bury deep inside the Windows operating system. In essence, it works by sending them a sample of benign code that passes their security checks and then, before it's executed, swaps it out with a malicious payload.
Posted by:badanov

#6  All that stuff is easy for ya'll who know stuff about computers.

For the rest of us.... :-(
Posted by: Barbara Skolaut   2010-05-09 17:41  

#5  I use a Mac :-)

Though I'm thinking of firing up Ubuntu inside VirtualBox inside the Mac, and then using Firefox from inside that. Kill it when I'm done, as you say.
Posted by: Steve White   2010-05-09 15:26  

#4  eYep.
A VM allowed no physical resources.
Start it up, start the browser.
Shut down the browser, destroy the VM.
Posted by: Skidmark   2010-05-09 13:30  

#3  Vista on a 64 bit VM, running on my Linux workstation. I have no worries at all, I simply restore the last saved VM session and any damage is gone. Even then, I use Firefox with NoScript & Ghostery (2 must-haves for security) and MSLive for AV+malware blocking.

If you want to be safe, simple: run Firefox with the 2 addons I mentioned (plus AdBlockPlus), keep the OS up to date with patches from MS, and use MSLive AV+firewall (free and works well enough - scan & update the AV daily, deep scan weekly via automated scheduler), and don't run binaries or click on links given by someone you don't personally know, and scan EVERYTHING.

IF you aren't stupid, its not easy to be compromised.
Posted by: OldSpook   2010-05-09 11:36  

#2  So what are we end-users to do about it?

Short answer: Nothing.

Long answer:

It's just a concept right now, and as it was demonstrated, the malware is a one-two punch. The concept as it is now requires the machine to already be vulnerable to malware in order to use this method.
Posted by: badanov   2010-05-09 11:08  

#1  Just tie the AV software to a single processor.

BTW. I don't run ANY AV software.

1/ I use Firefox.
2/ I use a hardware firewall.
3/ I use adblock.

Nasties count = 0.
Posted by: Bright Pebbles   2010-05-09 07:40  

00:00