Analytics
5/13/2008
08:52 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

New Tests Show Rootkits Still Evade AV

AV-Test.org tests rootkit detection and removal on XP, Vista

Rootkits are still a security scanner’s worst nightmare: New rootkit detection tests recently conducted by AV-Test.org found that security suites and online Web scanners detected overall only a little more than half of rootkits.

AV-Test.org, an indie security test organization based in Germany, ran two rootkit tests last month, one on Microsoft’s XP Home Edition and another on Microsoft Vista Ultimate Edition, the results of which have been published in a paper now available on the group’s Website.

The XP test used 30 active rootkits and 30 pieces of malware using rootkit technologies. Not surprisingly, anti-rootkit tools did the best, detecting about 80 percent of the rootkits overall, while the security suites found over 66 percent, and online scanners, only 53 percent. Some tools crashed or hung up after completing the rootkit scans, and those were counted as “not detected.”

Security suites did better detecting inactive rootkits than active ones -- most found all (or nearly all) 30. But detecting and cleaning up active rootkits -- which is the task that AV-Test.org considers the “real rootkit test” -- was another story.

Avira AntiVir Premium Security Suite 7.06.00.168 and BitDefender’s Internet Security Suite 2008 11.0.13 led the pack in overall detection of both inactive and active rootkits: Avira’s tool found 28 inactive rootkits and 29 active ones, and all 30 pieces of the malware hidden by rootkits. BitDefender’s tool found all 30 inactive rootkits, 28 of the active ones, and 29 pieces of malware hidden by rootkits.

But Avira had its struggles in removing active rootkits and malware being hidden by rootkits -- it was only able to clean up seven in each case, while BitDefender got successful cleanups in 23 and 27, respectively. Kaspersky Internet Security Suite 7.0.0.119 fared better than most, detecting 24 active and 28 rootkit-hidden samples, and cleaned up 25 of 30 inactive rootkits, 22 active ones, and 25 rootkit-hidden malware samples.

Web-based security online scanners overall struggled to remove rootkits, with an overall 32 percent success rate. BitDefender’s Online Scanner 1.0 Build 2422, for instance, found all 30 inactive rootkits and cleaned up 27 of them, but didn’t do as well as its host-based cousin in detecting and cleaning up active rootkits: It found only five active rootkits and three pieces of malware hidden by rootkits, and could only clean up two of five active ones and none of the three rootkit-hidden malware samples it found.

F-Secure Online Virus Scanner 3.2 Beta (1.0.64) and Panda Security ActiveScan 5.54.01 fared better than other online scanners overall. F-Secure cleaned up 23 active rootkits and 23 samples of malware hidden by rootkits, and Panda, 15 and 26, respectively.

Specialized anti-rootkit tools for the most part performed well in the XP tests, with only a handful that struggled, including Microsoft’s Rootkit Revealer 1.71.0.0, which found only 15 active rootkits and 14 malware samples hidden by rootkits. Safe'n'Sec Pro 3.0.0.4104 and System Virginity Verifier 2.3 had trouble cleaning up rootkits.

The Vista test, meanwhile, used only antivirus tools that had been updated or frozen as of Oct. 2 of last year. And there were problems. “To our surprise, the detection rate of inactive samples reached just 90% on average, even though most of the rootkits used were released during 2005 and 2006,” AV-Test.org researchers wrote.

On average, four of the six rootkits in the test were detected by the AV tools, and only 54 percent could clean them out of the infected machines. AVG’s AntiMalware 7.5.488 couldn’t detect or clean any active rootkits running on Vista, although AVG’s Anti-Rootkit Free 1.1.0.42 tool detected and removed nearly all rootkits in the XP test.

Microsoft Windows Live OneCare 1.6.2111.32 found five of the six total inactive rootkits on the Vista platform, but only one of the six active ones, which it was able to remove successfully. McAfee VirusScan 2008 11.2.121 found six of the inactive ones, and only two of the active ones, which it was able to remove. Some lesser-known AV tools fared more poorly, including Dr Web Antivirus für Windows 4.44.0.09170 and ClamWin Free Antivirus 0.91.2.

Three AV tools had perfect scores, catching all active and inactive rootkits as well as removing all of them: Norton Antivirus 2008 15.0.0.58; Panda Security Antivirus 2008 3.00.00; and F-Secure Anti-Virus 2008 6.80.2610.0.

But with the exception of a few products, most security tools still fall short when it comes to detecting and removing active rootkit infections, according to AV-Test.org. “Without proper anti-rootkit features a protection program may give the user the wrong impression about the status of his PC,” the researchers wrote.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.