KHOBE 8.0 attack bypasses top Windows security products

11 May 201029 Views

Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Pin on PinterestShare on RedditEmail this to someone

Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Pin on PinterestShare on RedditEmail this to someone

Security researchers Matousec Labs have discovered a serious problem in Windows desktop security products from all major security software vendors which allows attackers to bypass defences.

Matousec performed tests with today’s most popular Windows desktop security products and found that 100pc of the testbed products were found vulnerable, including top brands like McAfee, CA, AVG, Norton, Sophos, Trend Micro and Kapersky.

Matousec revealed that the protection implemented by kernel mode drivers of today’s security products can be bypassed effectively by a code running on an unprivileged user account.

In a paper presenting an attack technique called the KHOBE (Kernel Hook Bypassing Engine), Matousec has developed a technique that allows malicious code to bypass protection mechanisms in security applications.

Various security apps place their hooks on the beginning of Windows API routines to stop malicious code working.

However, according to Matousec, all dynamic link libraries belonging to Windows API reside in the user mode portion of the process address space, hence the application code might avoid calling them, which effectively bypasses hooks made by most known security software makers.

If the application needs to communicate with the kernel, it can use the system call instruction directly.

And, Matousec claims, this action cannot be caught or prevented by any type of user mode hooking.

By John Kennedy

Editor John Kennedy is an award-winning technology journalist.

editorial@siliconrepublic.com