Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV
Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Windows OS is facing a huge rise in kernel attacks. An overview of popular
techniques that result in loading kernel drivers will be presented. One of the
key targets of modern threats is disabling and blinding Microsoft Defender, a
default Windows AV. The analysis of recent driver-based attacks will be given,
the challenge is to block them. The survey of user- and kernel-level attacks on
Microsoft Defender will be given. One of the recently published attackers
techniques abuses Mandatory Integrity Control (MIC) and Security Reference
Monitor (SRM) by modifying Integrity Level and Debug Privileges for the
Microsoft Defender via syscalls. However, this user-mode attack can be blocked
via the Windows 'trust labels' mechanism. The presented paper discovered the
internals of MIC and SRM, including the analysis of Microsoft Defender during
malware detection. We show how attackers can attack Microsoft Defender using a
kernel-mode driver. This driver modifies the fields of the Token structure
allocated for the Microsoft Defender application. The presented attack resulted
in disabling Microsoft Defender, without terminating any of its processes and
without triggering any Windows security features, such as PatchGuard. The
customized hypervisor-based solution named MemoryRanger was used to protect the
Windows Defender kernel structures. The experiments show that MemoryRanger
successfully restricts access to the sensitive kernel data from illegal access
attempts with affordable performance degradation. |
---|---|
DOI: | 10.48550/arxiv.2210.02821 |