Antivirus Weaknesses
Poor signature-based detection
Antivirus or antimalware software runs on the endpoint and
watches for malicious binaries. The antivirus
may include the inability to detect newer malicious binaries because the
antivirus needs to be updated once the new malware is discovered. In this case, some businesses and users’
systems are compromised because the attack is using a newly developed binary, and
their antivirus does not know about it.
After the successful attack, the antivirus vendor updates their product,
and all their customers are now protected.
Malware writers evaluate the antivirus detection and alter their binary,
so it is no longer detected before deploying it again.
Incomplete Detection
Another possible antivirus weakness is the inability to
detect malware that uses certain parts of the operating system. The attacker entices the user to download
software that appears to be an “update”.
The “update” enters a registry key that holds the script for performing
the malicious activity along with a shortcut in the user’s startup folder for
persistence. Not all antivirus is able
to detect malicious scripts contained in the windows registry.
Antivirus Self-Protection
Once a malware operator accesses a Windows target, perhaps
by brute forcing the RDP server or exploiting a vulnerability, he or she will
begin deploying and running tools.
Antivirus tends to block and quarantine hacking tools such as Mimi Katz
or Gsecdump frustrating the malware operator’s progress, so he or she will
disable the antivirus in some fashion.
Antivirus that does not report and prevent unauthorized changes is
subject to being circumvented.
False Status Report
Antivirus reports that it has cleaned and quarantined the
threat, but the threat remains, or the system is re-infected. The administrator will need to identify the
threat and reference online threat intelligence to determine if the antivirus
is failing to remove it completely.
Otherwise, the malware is possibly exploiting a vulnerability. The administrator will need to deploy the
patch and clean the malware.
Computers without antivirus or damaged antivirus installation
The administrator deploys antivirus to all the online and
present systems but misses systems that are shutdown or laptops in the
field. The application list shows the
antivirus product, and the antivirus icon is present in the system tray, but the
service is stopped, or the driver is not installed. The system in this case becomes an easy target
for attackers to run malicious software or launch further attacks into the
network.
Network Containment/Isolation
The antivirus is not
able to network contain or isolate a host from the rest of the network. When a host is infected with malware, the
network administrator may not know the extent of the infection or if the
antivirus is effective in removing it.
He or she uses the antivirus console to contain or isolate the system to
prevent further attacks and incursion to neighboring devices until the system
is deemed safe.
Lack of Monitoring
The antivirus product will produce alerts for what it finds
on the network. The administrator will
need to configure the product send an alert, so they can contain the affected
system and investigate the activity.
Comments
Post a Comment