Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Researcher Bypasses Antivirus Code Emulation

    Written by

    Sean Michael Kerner
    Published August 6, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      LAS VEGAS—Antivirus tools have grown in sophistication and capabilities over the years, but there are still areas where they can potentially be bypassed. That’s one of the key messages coming from Kyle Adams, chief software architect for Junos WebApp Secure at Juniper Networks. Adams is speaking at the BSides event here today in a session titled ” Evading code emulation: Writing ridiculously obvious malware that bypasses AV.”

      In an interview with eWEEK, Adams explained the bypass mechanism he found and what it means for end-user security. AV vendors no longer rely simply on virus signatures to protect users. Many tools now include heuristics capabilities to try to detect malware that doesn’t yet have a signature. One of the heuristics techniques used by AV vendors is code emulation, to run code and see what happens.

      “Code emulation is when the AV client tries to emulate the execution of a file before the user has an opportunity to run it,” Adams said. “The code emulator will profile all the actions the file takes.”

      Specifically, Adams looked at the code emulation technology in the AVG platform and found that he was able to exploit it. Adams told eWEEK that he contacted AVG and did not receive a response. eWEEK received an email from an AVG spokesperson that indicated that they were not aware of the talk.

      Overall, Adams gives AVG high marks. Adams said that multiple AV vendors also have code emulation, though in his analysis AVG has the best implementation.

      “This is not necessarily a vulnerability in the AVG product,” Adams said. “This is just how their code emulator works.”

      From a technical perspective, Adams wrote his own malware from scratch to bypass the AVG code emulator. The reason why he wrote his own malware is because he didn’t want it to look like an existing malware family, which might possibly trigger an existing AV signature.

      With his own custom malware, the source code of the malware is effectively hidden from the AVG scanner, and Adams said he could do whatever he wanted. Since the scanner didn’t know about the malware, it couldn’t log it either.

      “Pretty much the way any AV works is it looks at the file before you run it,” Adams said. “They are trying to judge whether the file itself is going to be malicious.”

      Adams added that by getting AVG to not classify a file as malware when it is first downloaded, the malware can do what it wants once it is run. That said, Adams noted that if the malware rewrites system registry keys and does other malicious system actions, it could get logged inside of Windows.

      Although Adams is showing the techniques he used to bypass AVG, he stressed that he is not actually releasing any malware source code. He explained that he didn’t use any exotic tools to build his malware either, and only used the free Microsoft utilities that come with Windows. The actual malware itself is written in JavaScript.

      “Writing a virus in JavaScript is pretty trivial. It’s a powerful technique and it can get through AV,” he said. “I don’t anticipate that there will be a new rush of JavaScript worms, but it’s important for AV vendors to bolster up their technology.”

      Adams said that the main goal that he wants to achieve is to make security researchers and vendors aware of the risks and possible techniques of code emulation evasion.

      “It’s better that we all know how this is happening so we can start to think of new ways to address the problem,” he said.

      For end users, Adams suggests that regular Internet best practices are a solid defense. Those best practices include not clicking on suspicious or unknown links, particularly those in email attachments.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×