Turning an anti-virus software into spying tool

Turning an anti-virus software into spying tool

Turning an anti-virus software into spying tool

It has been a secret, long known to intelligence agencies but rarely to consumers, that security software can be a powerful spy tool.

Security software runs closest to the bare metal of a computer, with privileged access to nearly every programme, application, web browser, email and file. There is a good reason for this: security products are intended to evaluate everything that touches your machine in search of anything malicious, or even vaguely suspicious.

By downloading security software, consumers also run the risk that an untrustworthy anti-virus maker - or hacker or spy with a foothold in its systems - could abuse that deep access to track customers' every digital movement.

"In the battle against malicious code, anti-virus products are a staple," said Patrick Wardle, chief research officer at Digita Security, a security company. "Ironically, though, these products share many characteristics with the advanced cyberespionage collection implants they seek to detect."

Wardle would know. A former hacker at the National Security Agency, Wardle recently succeeded in subverting anti-virus software sold by Kaspersky Lab, turning it into a powerful search tool for classified documents.

Wardle's curiosity was piqued by recent news that Russian spies had used Kaspersky anti-virus products to siphon classified documents off the home computer of an NSA developer, and may have played a critical role in broader Russian intelligence gathering.

"I wanted to know if this was a feasible attack mechanism," Wardle said. "I didn't want to get into the complex accusations. But from a technical point of view, if an anti-virus maker wanted to, was coerced to, or was hacked or somehow subverted, could it create a signature to flag classified documents?"

For years, intelligence agencies suspected that Kaspersky Lab's security products provided a back door for Russian intelligence. A draft of a top-secret report leaked by Edward J Snowden, the former NSA contractor, described a top-secret, NSA effort in 2008 that concluded that Kaspersky's software collected sensitive information off customers' machines.

The documents showed Kaspersky was not the NSA's only target. Future targets included nearly two dozen other foreign anti-virus makers, including Checkpoint in Israel and Avast in the Czech Republic.

At the NSA, analysts were barred from using Kaspersky anti-virus software because of the risk it would give the Kremlin broad access to their machines and data. But excluding NSA headquarters at Fort Meade, Kaspersky still managed to secure contracts with nearly two dozen US government agencies over the past few years. In September, the Department of Homeland Security ordered all federal agencies to cease using Kaspersky products because of the threat that Kaspersky's products could "provide access to files."

In October, The New York Times reported that the Homeland Security directive was based, in large part, on intelligence shared by Israeli intelligence officials who successfully hacked Kaspersky Lab in 2014. They looked on for months as Russian government hackers scanned computers belonging to Kaspersky customers around the world for top secret US government classified programmes.

In at least one case, US officials claimed Russian intelligence officials were successful in using Kaspersky's software to pull classified documents off a home computer belonging to Nghia H Pho, an NSA developer who had installed Kaspersky's anti-virus software on his home computer. Pho pleaded guilty in 2017 to bringing home classified documents and writings, and has said he brought the files home only in an attempt to expand his résumé.

Kaspersky continues to deny that it knew about the scanning for classified US programmes or allowed its anti-virus products to be used by Russian intelligence. Eugene Kaspersky, the company's chief executive, has said he would allow the US government to inspect his company's source code to allay distrust of its anti-virus and cybersecurity products.

But Wardle discovered, in reverse-engineering Kaspersky anti-virus software, that a simple review of its source code would do nothing to prove its products had not been used as a Russian intelligence-gathering tool.

Wardle found that Kaspersky's anti-virus software is incredibly complex. Unlike traditional anti-virus software, which uses digital "signatures" to look for malicious code and patterns of activity, Kaspersky's signatures are easily updated, can be automatically pushed out to certain clients, and contain code that can be tweaked to do things such as automatically scanning for and siphoning off classified documents.

Breaking it down

In short, Wardle found, "Anti-virus could be the ultimate cyberespionage spying tool." He said it was relatively easy to use a vulnerability in Microsoft's Windows software to manipulate the Kaspersky software. Because officials routinely classify top secret documents with the marking "TS/SCI", which stands for "Top Secret/Sensitive Compartmented Information," Wardle added a rule to Kaspersky's anti-virus programme to flag any documents that contained the "TS/SCI" marker.

He then edited a document on his computer containing text from the Winnie the Pooh children's book series to include the marking "TS/SCI" and waited to see whether Kaspersky's tweaked anti-virus product would catch it.

Sure enough, as soon as the Winnie the Pooh text was saved to his machine, Kaspersky's anti-virus software flagged and quarantined the document. When he added the same TS/SCI marker to another document containing the text, "The quick brown fox jumps over the lazy dog," it too was flagged and quarantined by Kaspersky's tweaked anti-virus programme.

"Not a whole lot of surprise that this worked," Wardle said, "but still neat to confirm that an anti-virus product can be trivially, yet surreptitiously, used to detect classified documents."

The next question was: What happens to these files once they are flagged? Wardle stopped short of hacking into Kaspersky's cloud servers, where suspicious files are routinely uploaded. However, he noted that anti-virus customers, including Kaspersky's, agreed by default to allow security vendors to send anything from their machine back to vendors' servers for further investigation.

There are legitimate reasons for this: by uploading these items to Kaspersky's cloud, security analysts can evaluate whether they pose a threat, and update their signatures as a result.

Kaspersky Lab said Wardle's research did not reflect how the company's software works. "It is impossible for Kaspersky Lab to deliver a specific signature or update to only one user in a secret, targeted way because all signatures are always openly available to all our users; and updates are digitally signed, further making it impossible to fake an update," the company said in a statement.

But, as Wardle's research demonstrated, an untrustworthy vendor, or hacker or spy with access to that vendors' systems, can abuse its deep access to turn anti-virus software into a dynamic search tool, not unlike Google, to scan customers' computers for documents that contain certain keywords. "And no one would ever know," he added. "It's the perfect cybercrime."

DH Newsletter Privacy Policy Get top news in your inbox daily
Comments (+)