Antivirus Weaknesses

 

Poor signature-based detection

Antivirus or antimalware software runs on the endpoint and watches for malicious binaries.  The antivirus may include the inability to detect newer malicious binaries because the antivirus needs to be updated once the new malware is discovered.  In this case, some businesses and users’ systems are compromised because the attack is using a newly developed binary, and their antivirus does not know about it.  After the successful attack, the antivirus vendor updates their product, and all their customers are now protected.  Malware writers evaluate the antivirus detection and alter their binary, so it is no longer detected before deploying it again.    

Incomplete Detection

Another possible antivirus weakness is the inability to detect malware that uses certain parts of the operating system.  The attacker entices the user to download software that appears to be an “update”.  The “update” enters a registry key that holds the script for performing the malicious activity along with a shortcut in the user’s startup folder for persistence.  Not all antivirus is able to detect malicious scripts contained in the windows registry. 

Antivirus Self-Protection

Once a malware operator accesses a Windows target, perhaps by brute forcing the RDP server or exploiting a vulnerability, he or she will begin deploying and running tools.  Antivirus tends to block and quarantine hacking tools such as Mimi Katz or Gsecdump frustrating the malware operator’s progress, so he or she will disable the antivirus in some fashion.  Antivirus that does not report and prevent unauthorized changes is subject to being circumvented.    

False Status Report

Antivirus reports that it has cleaned and quarantined the threat, but the threat remains, or the system is re-infected.  The administrator will need to identify the threat and reference online threat intelligence to determine if the antivirus is failing to remove it completely.  Otherwise, the malware is possibly exploiting a vulnerability.  The administrator will need to deploy the patch and clean the malware. 

Computers without antivirus or damaged antivirus installation

The administrator deploys antivirus to all the online and present systems but misses systems that are shutdown or laptops in the field.  The application list shows the antivirus product, and the antivirus icon is present in the system tray, but the service is stopped, or the driver is not installed.  The system in this case becomes an easy target for attackers to run malicious software or launch further attacks into the network.

Network Containment/Isolation

 The antivirus is not able to network contain or isolate a host from the rest of the network.  When a host is infected with malware, the network administrator may not know the extent of the infection or if the antivirus is effective in removing it.  He or she uses the antivirus console to contain or isolate the system to prevent further attacks and incursion to neighboring devices until the system is deemed safe.     

Lack of Monitoring

The antivirus product will produce alerts for what it finds on the network.  The administrator will need to configure the product send an alert, so they can contain the affected system and investigate the activity.   

Comments

Popular posts from this blog

Application Control - AppLocker and Windows Defender Application Control Overview

Software Firewall