Vulnerabilities / Threats
7/19/2017
08:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

'AVPass' Sneaks Malware Past Android Antivirus Apps

Researchers at Black Hat USA will release a toolset that studies and then cheats specific Android AV apps.

A team of researchers from Georgia Tech built an Android hacking tool that snuck past nearly all of 58 Android AV antivirus programs in tests conducted via VirusTotal.

Their AVPass toolkit includes a query function that vets and probes an Android AV program's detection capabilities, a malware variant generator that generates multiple variations of a sample, and a data analyzer that analyzes the findings and uses that information to ultimately bypass AV apps on a mobile device.

The researchers plan to release the toolkit at Black Hat USA in Las Vegas next week during their AVPass: Leaking and Bypassing Antivirus Detection Model Automatically session there.

"AVPass is meant to make sure whatever malware you're sending cannot be screened by antivirus," says Max Wolotsky, a PhD student and researcher with Georgia Tech. "The entire goal of AVPass is if you scan malware on either VirusTotal or another AV program" it can't be identified, he says.

Wolotsky and his fellow researchers from Georgia Tech - Chanil Jeon, research associate; Insu Yun, PhD student; Jinho Jung; PhD student; and Taesoo Kim, and assistant professor - say their technique also could work on other platforms, and they plan to test it against Windows desktop machines.

The Python-based AVPass roots out the internal detection methods and code logic of the AV systems information it then uses to cheat the AV system.

Of the dozens of popular and lesser-known AV programs on the free VirusTotal online scanning site, only AhnLab and WhiteArmour's AV programs stopped AVPass in its tracks most of the time, the researchers say.

"We can't say for sure that we can bypass the other 56 AVs 100% of the time; however, in our tests we were almost always able to do so," Wolotsky says. On average, AVPass-generated apps were detected by AV only six percent of the time, he says.

The researchers also learned a few things about Android AV programs in their project: for one thing, the more complex an AV program's detection rules, the stronger its ability to catch malware.

Wolotsky says AV apps can defend against an AVPass-type attack by classifying AVPass as malicious. Android AV app vendors, meanwhile, can rate-limit their AV tools and generate "null" responses so the attack can't glean any intel about the AV program's capabilities.

AVPass sends a series of phony malware variants to test the AV's functions in snippets so as not to release the entire malware sample during the recon phase. With the intel in hand, it then alters the malware. "We found that most AVs commonly use a fixed number of detection rules," Wolotsky says. "For instance, a weak AV can be bypassed only after one feature obfuscation."

The Bigger Picture
The AVPass project is actually just one of multiple research initiatives at Georgia Tech on vulnerabilities in machine learning algorithms. These projects are studying how malicious attackers could manipulate machine learning algorithms and compromise or disrupt security analytics, search engines, customized news feeds, facial and voice recognition, and fraud detection, for example.

Wolotsky and his team's work on AVPass began with exploring how antivirus tools classify malware, and they used VirusTotal to determine what machine-learning techniques the AV programs employ. Their ultimate goal with the project is to find ways for these AV programs to stop malware in its tracks.

AVPass is basically a proof-of-concept tool mainly aimed at developers, both app and AV, that can be used to study ways to detect variations of malware. The Georgia Tech researchers plan to conduct a live demonstration during their Black Hat talk, in which they will submit a piece of their malware to VirusTotal to show how AVPass can be used to determine how to bypass AV systems.

Related Content:

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada, July 22-27, 2017. Click for information on the conference schedule and to register.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The Impact of a Security Breach 2017
The Impact of a Security Breach 2017
Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.