Most Major Antivirus Programs Bypassed By The CIA, Shows WikiLeaks Document

WikiLeaks recently published thousands of documents that the organization said belongs to the CIA. Among them, there was a document that showed a list of antivirus and other security products that have been exploited and bypassed by the CIA.

The list included the following software products:

  • Comodo
  • Avast
  • F-Secure
  • Zemana Antilogger
  • Zone Alarm
  • Trend Micro
  • Symantec
  • Rising
  • Panda Security
  • Norton
  • Malwarebytes Anti-Malware
  • EMET (Enhanced Mitigation Experience Toolkit)
  • Microsoft Security Essentials
  • McAfee
  • Kaspersky
  • GDATA
  • ESET
  • ClamAV
  • Bitdefender
  • Avira
  • AVG

You probably recognize most, if not all, of the products on that list. The list includes Microsoft’s “Security Essentials” antivirus program, which was later converted into the built-in “Windows Defender” program in Windows 8 and later, as well as EMET, Microsoft’s anti-exploit security tool (mainly for enterprise users).

EMET was recently deprecated by Microsoft, because the company said that many of EMET’s anti-exploit features such as DEP, ASLR, Control Flow Guard (CFG), as well as other mitigations to bypass the User Account Control (UAC), were already built into Windows 10.

Microsoft said that because the security features are built-in, they should offer better security than the ad-hoc security that EMET tried to provide. The CIA documents released by WikiLeaks date from 2014, before Windows 10 came out. Therefore, we don't know what new capabilities the CIA may have obtained since then, and whether or not the new Windows 10 security features were also bypassed.

Bypassing Antivirus Programs

The leaked documents pertaining to the list of antivirus programs that have been exploited by the CIA seem to have been redacted, likely by WikiLeaks. The organization said that it made over 70,000 redactions in total, mainly to remove harmful code (WikiLeaks has been accused in the past of “hosting malware” because the emails it released contained malware targeted at the recipients of the leaked emails), as well as personal details and IP addresses. However, it’s not clear why the organization removed the technical information about how most of the antivirus programs in the list were exploited.

Only partial information was left about CIA’s exploit capabilities against three antivirus programs: F-Secure, Avira, and AVG.

On F-Secure

In OSB's experience, F-Secure has generally been a lower tier product that causes us minimal difficulty. The only annoyance we have observed is that F-Secure has an apparent entropy-based heuristic that flags Trojaned applications or other binaries containing encrypted/compressed payloads. Two defeats are known to exist: On involves using RAR file string tables in the resource section, the other involves cloning a RAR file manifest file – the manifest technique also works against Avira's entropy-based heuristics.

On Avira

Avira has historically been a popular product among CT targets, but is typically easy to evade. Similar to F-Secure, Avira has an apparent entropy-based heuristic that flags binaries containing encrypted/compressed payloads, but there are two known defeats.

On AVG

AVG Catches a Payload Dropped to Disk and Launched via Link File Well After Execution (Process Hollowing)

Perhaps the fact that the CIA can bypass most antivirus products should not be that surprising. After all, any sophisticated attacker who wants to develop new malware would also try to find ways to bypass the popular antivirus products. Otherwise, the malware wouldn’t be very effective, and it would be caught too early.

Google’s Project Zero security research team has also shown that antivirus programs can sometimes be some of the most vulnerable programs you may be running on your system. That’s not just because some of the antivirus companies are careless with the code they write, but mainly because the same techniques they use to “make users safer” are what create the vulnerabilities in users’ systems in the first place.

For instance, some of them do man-in-the-middle attacks against users’ browsers in order to analyze the encrypted pages that the users are visiting. However, an attacker could exploit this by taking over the capability and then using it against the users. Therefore, in this case, the antivirus created a vulnerability that perhaps wouldn’t have existed otherwise.

Staying Safe Online

The most common sense ways to stay safe are still to be careful about what you install on your system, use accounts with limited rights by default, and update your operating system and applications on time. This should save you from the vast majority of attacks and malware.

If you want to go the extra mile, you could also browse the web in a Linux virtual machine, or even use a more compartmentalized operating system such as Qubes OS, but these tools may not be for everyone.

Lucian Armasu
Lucian Armasu is a Contributing Writer for Tom's Hardware US. He covers software news and the issues surrounding privacy and security.
  • Dark Lord of Tech
    This has been known for years , if you watched anything but MSM , you would already be up on this subject.
    Reply
  • greens
    Oh snap.

    Who isn't on that list?!
    Reply
  • ahnilated
    My question is why are we letting these companies get away with this. You know for a fact that they won't just use this against foreign governments. They have shown over and over again this will use this against the American people without even bothering to get a warrant.
    Reply
  • ingtar33
    I don't see Vipre on that list.
    Reply
  • I reported a virus to a few companies over 8 months ago, with binaries, that I detected on a system, mostly through luck. Even today, the same binaries aren't detected. I thought it might be incompetence, now I'm not so sure.
    Reply
  • Dark Lord of Tech
    EVERY retail antivirus has a backdoor.
    Reply
  • lun471k
    Here is the AV list ordered alphabetically:
    AVG
    Avast
    Avira
    Bitdefender
    ClamAV
    Comodo
    EMET (Enhanced Mitigation Experience Toolkit)
    ESET
    F-Secure
    GDATA
    Kaspersky
    Malwarebytes Anti-Malware
    McAfee
    Microsoft Security Essentials
    Norton
    Panda Security
    Rising
    Symantec
    Trend Micro
    Zemana Antilogger
    Zone Alarm

    :)
    Reply
  • Everdark81
    I do not see Sophos on the list, which is encouraging.
    Reply
  • Colin_10
    I'm not really concerned that the CIA can hack my computer. With all of the other problems we face in keeping our computers secure, the last people I am worried about keeping my computer safe from is the US government.
    Reply
  • ahnilated
    19398829 said:
    I'm not really concerned that the CIA can hack my computer. With all of the other problems we face in keeping our computers secure, the last people I am worried about keeping my computer safe from is the US government.

    I would be.
    Reply