www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7863
Public Scan
Submitted URL: https://pages.safebreach.com/NTM1LUlYWi05MzQAAAGIl4HOtW74awpPtpnTuF9X7E4EU4xksE-sAJ1BEEWXZUe-3JEkpKqv5QFJBm_eN1LHr9lcakI=
Effective URL: https://www.darkreading.com/vulnerabilities-threats/cyberattackers-popular-edr-tools-destructive-data-wipers?mkt_tok=NTM1LUl...
Submission: On December 09 via api from US — Scanned from DE
Effective URL: https://www.darkreading.com/vulnerabilities-threats/cyberattackers-popular-edr-tools-destructive-data-wipers?mkt_tok=NTM1LUl...
Submission: On December 09 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud ICS/OT Remote Workforce Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Physical Security IoT Black Hat news Omdia Research Security Now Events Close Back Events Events * Cybersecurity Outlook 2023 - December 13 Event * [FREE Virtual Event] The Identity Crisis Webinars * Security Considerations for Working with Cloud Services Providers Dec 14, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Microsoft Partner Perspectives: Zscaler Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud ICS/OT Remote Workforce Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Physical Security IoT Black Hat news Omdia Research Security Now Events Close Back Events Events * Cybersecurity Outlook 2023 - December 13 Event * [FREE Virtual Event] The Identity Crisis Webinars * Security Considerations for Working with Cloud Services Providers Dec 14, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Microsoft Partner Perspectives: Zscaler The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud ICS/OT Remote Workforce Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Physical Security IoT Black Hat news Omdia Research Security Now Events Close Back Events Events * Cybersecurity Outlook 2023 - December 13 Event * [FREE Virtual Event] The Identity Crisis Webinars * Security Considerations for Working with Cloud Services Providers Dec 14, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Microsoft Partner Perspectives: Zscaler -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. Event Cybersecurity Outlook 2023 - A Dark Reading, Black Hat, Omdia December 13 Virtual Event | <GET YOUR PASS> Report Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW> PreviousNext Vulnerabilities/Threats 4 MIN READ News FOR CYBERATTACKERS, POPULAR EDR TOOLS CAN TURN INTO DESTRUCTIVE DATA WIPERS Microsoft, three others release patches to fix a vulnerability in their respective products that enables such manipulation. Other EDR products potentially are affected as well. Jai Vijayan Contributing Writer, Dark Reading December 07, 2022 Source: ArtemisDiana via Shutterstock PDF Many trusted endpoint detection and response (EDR) technologies may have a vulnerability in them that gives attackers a way to manipulate the products into erasing virtually any data on installed systems. Or Yair, a security researcher at SafeBreach who discovered the issue, tested 11 EDR tools from different vendors and found six — from a total of four vendors — were vulnerable. The vulnerable products were Microsoft Windows Defender, Windows Defender for Endpoint, TrendMicro ApexOne, Avast Antivirus, AVG Antivirus, and SentinelOne. FORMAL CVES AND PATCHES Three of the vendors have assigned formal CVE numbers for the bugs and issued patches for them prior to Yair disclosing the issue at the Black Hat Europe conference on Wednesday, Dec 7. At Black Hat, Yair released proof-of-concept code dubbed Aikido that he developed to demonstrate how a wiper, with just the permissions of an unprivileged user, could manipulate a vulnerable EDR into wiping almost any file on the system, including system files. "We were able to exploit these vulnerabilities in more than 50% of the EDR and AV products we tested, including the default endpoint protection product on Windows," Yair said in a description of his Black Hat talk. "We are lucky to have this discovered prior to real attackers, as these tools and vulnerabilities could have done a lot of damage falling in the wrong hands." He described the wiper as likely being effective against hundreds of millions of endpoints running EDR versions vulnerable to the exploit. In comments to Dark Reading, Yair says he reported the vulnerability to the affected vendors between July and August. "We then worked closely with them over the next several months on the creation of a fix prior to this publication," he says. "Three of the vendors released new versions of their software or patches to address this vulnerability." He identifies the three vendors as Microsoft, TrendMicro and Gen, the maker of the Avast and AVG products. "As of today, we have not yet received confirmation from SentinelOne about whether they have officially released a fix," he says. Yair describes the vulnerability as having to do with how some EDR tools delete malicious files. "There are two crucial events in this process of deletion," he says. "There is the time the EDR detects a file as malicious and the time when the file is actually deleted," which sometimes can require a system reboot. Yair says he discovered that between these two events an attacker has the opportunity to use what are known as NTFS junction points to direct the EDR to delete a different file than the one that it identified as malicious. NTFS junctions points are similar to so-called symbolic links, which are shortcut files to folders and files located elsewhere on a system, except that junctions are used to link directories on different local volumes on a system. TRIGGERING THE ISSUE Yair says that to trigger the issue on vulnerable systems he first created a malicious file — using the permissions of an unprivileged user — so the EDR would detect and attempt to delete the file. He then found a way to force the EDR to postpone deletion until after reboot, by keeping the malicious file open. His next step was to create a C:\TEMP\ directory on the system, make it a junction to a different directory, and rig things so that when the EDR product attempted to delete the malicious file — after reboot — it followed a path to a different file altogether. Yair found he could use the same trick to delete multiple files in different places on a computer by creating one directory shortcut and putting specially crafted paths to targeted files within it, for the EDR product to follow. Yair says that with some of the tested EDR products, he was not able to do arbitrary file deletion but was able to delete entire folders instead. The vulnerability affects EDR tools that postpone deletion of malicious files till after a system reboots. In these instances, the EDR product stores the path to the malicious file in some location — that varies by vendor — and uses the path to delete the file after rebooting. Yair says some EDR products don't check if the path to the malicious file leads to the same place after reboot, giving attackers a way to stick a sudden shortcut in the middle of the path. Such vulnerabilities fall into a class known as Time of Check Time of Use (TOCTOU) vulnerabilities, he notes. Yair says that in most cases, organizations can recover deleted files. So, getting an EDR to delete files on a system by itself, while bad, isn't the worst case. "A deletion is not exactly a wipe," Yair says. To achieve that, Yair designed Aikido so it would overwrite files it had deleted, making them unrecoverable as well. He says the exploit he developed is an example of an adversary using an opponent's strength against them — just as with the Aikido martial art. Security products, such as EDR tools have super-user rights on systems, and an adversary that is able to abuse them can execute attacks in a virtually undetectable manner. He likens the approach to an adversary turning Israel's famed Iron Dome missile defense system into an attack vector instead. Black HatBlack Hat News Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe More Insights White Papers * How Machine Learning, AI & Deep Learning Improve Cybersecurity * Ransomware Is On The Rise More White Papers Webinars * Security Considerations for Working with Cloud Services Providers More Webinars Reports * How Machine Learning, AI & Deep Learning Improve Cybersecurity * Implementing Zero Trust In Your Enterprise: How to Get Started More Reports Editors' Choice SOC Turns to Homegrown Machine Learning to Catch Cyber Intruders Robert Lemos, Contributing Writer, Dark Reading Where Advanced Cyberattackers Are Heading Next: Disruptive Hits, New Tech Robert Lemos, Contributing Writer, Dark Reading One Year After Log4Shell, Most Firms Are Still Exposed to Attack Jai Vijayan, Contributing Writer, Dark Reading Is MFA the Vegetable of Cybersecurity? Andrea Fisher, Security Specialist, Microsoft Webinars * Security Considerations for Working with Cloud Services Providers More Webinars Reports * How Machine Learning, AI & Deep Learning Improve Cybersecurity * Implementing Zero Trust In Your Enterprise: How to Get Started * The Rise of the No-Code Economy * 2021 Digital Transformation Report * Increased Cooperation Between Access Brokers, Ransomware Operators Reviewed More Reports White Papers * How Machine Learning, AI & Deep Learning Improve Cybersecurity * Ransomware Is On The Rise * State of Ransomware Readiness: Facing the Reality Gap * How Hybrid Work Fuels Ransomware Attacks * Implementing Zero Trust In Your Enterprise: How to Get Started More White Papers Events * Cybersecurity Outlook 2023 - December 13 Event * [FREE Virtual Event] The Identity Crisis More Events More Insights White Papers * How Machine Learning, AI & Deep Learning Improve Cybersecurity * Ransomware Is On The Rise More White Papers Webinars * Security Considerations for Working with Cloud Services Providers More Webinars Reports * How Machine Learning, AI & Deep Learning Improve Cybersecurity * Implementing Zero Trust In Your Enterprise: How to Get Started More Reports DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * * Home * Cookies * Privacy * Terms Copyright © 2022 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept