Endpoint
2/13/2014
01:34 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

The Mysterious Appearance Of An Anti-Theft Application

Kaspersky Lab researchers discover on their machines Absolute Software Computrace anti-theft application -- but they had not installed it

KASPERSKY SECURITY ANALYST SUMMIT -- Punta Cana, Dominican Republic -- It started with a Kaspersky Lab researcher noticing unusually slow performance on his home laptop. Vitaly Kamluk, principal security researcher for the firm, did some digging and discovered a commercial software utility on the machine that he had not installed.

Turns out the utility was Absolute Software's Computrace, a legitimate security agent that runs in firmware or the ROM BIOS of desktop and laptop machines for anti-theft purposes and tracking and securing them. But Kamluk, as well as other Kaspersky colleagues who then found the utility running on their personal and corporate machines, had not installed the software, which was running host processes and Internet Explorer on their machines. Kamluk here this week said that somehow the Computrace tool appears to have been hijacked by bad actors using it to monitor victim machines, raising concerns of cyberspying.

Kaspersky researchers estimate that millions of computers worldwide run Computrace, and many of those users may not know it's on their machines. "Usually, we talk about threats to our customers. This is a threat that affected us personally," Kamluk says. "Who had a reason to activate Computrace on all those computers? Are they being monitored by an unknown actor? That is a mystery which needs to be solved."

Kaspersky's findings relate to prior research conducted by Core Security in 2009, where the Core team pinpointed security weaknesses in Computrace and presented those findings at Black Hat 2009. Anibal Sacco, co-founder and researcher at Cubica Labs, who was part of the Core team who conducted the research, describes the Computrace issue as a "latent rootkit."

"In a legitimate installation [of Computrace], a Windows agent is installed and there is no authentication of any kind. There is a big problem with this," Sacco says. He says the software also communicates to the host server via an unencrypted channel and stores information there unencrypted. It flies under the radar because it appears legitimate. So even if you didn't install it, you wouldn't necessarily know it was there. "Every time the machine boots up ... all companies see it as a legitimate product," he says.

Absolute Software yesterday shot down the Kaspersky research as "flawed" and says Computrace uses encryption and authentication to the server, which would prevent the potential attacks that the researchers cite.

"Absolute Software considers Kaspersky's analysis flawed and rejects its conclusions. We've reviewed the report that was published earlier today, and we are unable to determine how Kaspersky was able to reach the conclusions they provide," says Phil Gardner, CTO of Absolute Software. "Most importantly, we want to reassure our customers and partners that the speculation contained within the report has questionable technical merit."

Absolute says any attack would occur only if the endpoint had been compromised. "This must happen before Computrace can be used maliciously. The obstacles to mounting such an attack are considerable and are not achievable via the mechanism outlined in the Kaspersky report," Absolute said in an FAQ.

As for Computrace being installed without the users' knowledge, Absolute says that may be due to "defective implementations ... and/or poor IT practices."

Gardner says the agent won't communicate with a server unless it's authorized, and "will only communicate with mutual authentication of the server and the client."

"Kaspersky has misinterpreted this rebuilding process that -- by design -- will fully resecure the system if the security desired by the legitimate user is disabled or tampered with by a user with access and privilege," he says.

Kaspersky's Kamluk said Computrace could be used to install spyware on the endpoints, noting that millions of users run Computrace, many of which may not know they do. "There is a big mystery in this scene ... why someone installed this on the machines of our colleagues," he says. "And evidence of online messages on the Internet of users claiming they found them [Computrace] on their machines and they had never purchased Absolute."

Kamluk demonstrated a proof-of-concept here showing how an attacker could wage a man-in-the-middle attack against a machine running Computrace. "They would pretend" to be an Absolute server and able to read and change memory in the victim's machine, he says. "Anyone with the power to control your Internet connection could do the same -- a government or an ISP, for example," he says.

The researchers say there is no evidence that the software is being used for attacks, but they believe it could be used by attackers.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
larsamund
50%
50%
larsamund,
User Rank: Apprentice
2/13/2014 | 11:17:11 PM
re: The Mysterious Appearance Of An Anti-Theft Application
How is it possible that any malware researcher or research firm, is not able to find out how a piece of software got installed onto their computers? Is it the plumber with bad plumping?
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0547
Published: 2015-07-04
The D2CenterstageService.getComments service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0548
Published: 2015-07-04
The D2DownloadService.getDownloadUrls service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0551
Published: 2015-07-04
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop 6.7SP1 before P31, 6.7SP2 before P23, and 6.8 before P01; Documentum Administrator 6.7SP1 before P31, 6.7SP2 before P23, 7.0 before P18, 7.1 before P15, and 7.2 before P01; Documentum Digital Assets Manager 6.5SP6 before P2...

CVE-2015-1966
Published: 2015-07-04
Multiple cross-site scripting (XSS) vulnerabilities in IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before FP17, 6.2.1 before FP9, and 6.2.2 before FP15, as used in Security Access Manager for Mobile and other products, allow remote attackers to inject arbitrary web script or HTML via a crafte...

CVE-2015-4196
Published: 2015-07-04
Platform Software before 4.4.5 in Cisco Unified Communications Domain Manager (CDM) 8.x has a hardcoded password for a privileged account, which allows remote attackers to obtain root access by leveraging knowledge of this password and entering it in an SSH session, aka Bug ID CSCuq45546.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report