On The Vulnerability of Anti-Malware Solutions to DNS Attacks

09/23/2021
by   Asaf Nadler, et al.
0

Anti-malware agents typically communicate with their remote services to share information about suspicious files. These remote services use their up-to-date information and global context (view) to help classify the files and instruct their agents to take a predetermined action (e.g., delete or quarantine). In this study, we provide a security analysis of a specific form of communication between anti-malware agents and their services, which takes place entirely over the insecure DNS protocol. These services, which we denote DNS anti-malware list (DNSAML) services, affect the classification of files scanned by anti-malware agents, therefore potentially putting their consumers at risk due to known integrity and confidentiality flaws of the DNS protocol. By analyzing a large-scale DNS traffic dataset made available to the authors by a well-known CDN provider, we identify anti-malware solutions that seem to make use of DNSAML services. We found that these solutions, deployed on almost three million machines worldwide, exchange hundreds of millions of DNS requests daily. These requests are carrying sensitive file scan information, oftentimes - as we demonstrate - without any additional safeguards to compensate for the insecurities of the DNS protocol. As a result, these anti-malware solutions that use DNSAML are made vulnerable to DNS attacks. For instance, an attacker capable of tampering with DNS queries, gains the ability to alter the classification of scanned files, without presence on the scanning machine. We showcase three attacks applicable to at least three anti-malware solutions that could result in the disclosure of sensitive information and improper behavior of the anti-malware agent, such as ignoring detected threats. Finally, we propose and review a set of countermeasures for anti-malware solution providers to prevent the attacks stemming from the use of DNSAML services.

READ FULL TEXT

page 8

page 15

research
08/17/2022

An Efficient Multi-Step Framework for Malware Packing Identification

Malware developers use combinations of techniques such as compression, e...
research
12/16/2017

Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models

Recently researchers have proposed using deep learning-based systems for...
research
01/07/2020

A Prevention and a Traction System for Ransomware Attacks

Over the past three years, especially following WannaCry malware, ransom...
research
05/28/2019

Hydras and IPFS: A Decentralised Playground for Malware

Modern malware can take various forms, and has reached a very high level...
research
09/13/2017

On labeling Android malware signatures using minhashing and further classification with Structural Equation Models

Multi-scanner Antivirus systems provide insightful information on the na...
research
07/19/2018

Emulating malware authors for proactive protection using GANs over a distributed image visualization of the dynamic file behavior

Malware authors have always been at an advantage of being able to advers...
research
07/19/2018

Emulating malware authors for proactive protection using GANs over a distributed image visualization of dynamic file behavior

Malware authors have always been at an advantage of being able to advers...

Please sign up or login with your details

Forgot password? Click here to reset