<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Kaspersky Internet Security — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/kaspersky-internet-security/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 26 Jan 2024 18:23:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/kaspersky-internet-security/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kaspersky Anti-Virus Reverse Engineering for Document Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-kaspersky-av-signature-analysis/</link><pubDate>Fri, 26 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kaspersky-av-signature-analysis/</guid><description>A blog post details the reverse engineering of the Kaspersky anti-virus engine on macOS to demonstrate the potential for crafting signatures capable of detecting and flagging classified documents, leveraging the product's scanning capabilities and dynamic signature updates, without implying any malicious activity by Kaspersky.</description><content:encoded><![CDATA[<p>The blog post examines the inner workings of Kaspersky Internet Security for macOS, specifically focusing on its signature update mechanism and the architecture of its scanning engine. It highlights how anti-virus products, due to their inherent need to scan all files, including documents, for malicious patterns, could theoretically be repurposed to identify and flag documents containing specific classification markers. The author reverses the Kaspersky product to understand how to craft a signature that could detect classified documents. The analysis focuses on the <code>kav</code> daemon, responsible for the core anti-virus scanning and detection logic. The blog post emphasizes that the analysis is purely for research purposes and does not suggest any actual subversion or misuse by Kaspersky. The target version was the latest version of Kaspersky Internet Security for macOS at the time of the blog post (January 1, 2018).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker downloads and installs Kaspersky Internet Security for macOS.</li>
<li>Attacker identifies the <code>kav</code> daemon as the core component for scanning and detection logic.</li>
<li>Attacker reverse engineers the <code>kav</code> daemon to understand its signature format and scanning logic.</li>
<li>Attacker observes the signature update process where encrypted signatures are downloaded from Kaspersky&rsquo;s update servers (e.g., dnl-03.geo.kaspersky.com) and stored temporarily in <code>/private/tmp/temporaryFolder/updates/kdb/i386/</code>.</li>
<li>Attacker discovers that signature updates are installed to <code>/Library/Application Support/Kaspersky Lab/KAV/Bases/KLAVA/</code>.</li>
<li>Attacker notes the signatures are stored in a cache file <code>kavbase_00000000</code> which is exclusively opened by the <code>kav</code> daemon.</li>
<li>Attacker bypasses the need to decrypt the signature database by interacting with signatures in memory.</li>
<li>Attacker crafts a custom signature designed to detect specific classification markers within documents, demonstrating the potential for exfiltration of sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful crafting and deployment of a malicious signature within a subverted anti-virus product could enable the unauthorized detection and exfiltration of documents containing specific classification markers. While the blog post does not detail a real-world attack or any victims, it highlights a potential vulnerability in anti-virus architectures that could be exploited by malicious actors. If successful, sensitive or classified documents could be identified, copied, and sent to attacker-controlled systems without the user&rsquo;s knowledge or consent.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for suspicious network connections originating from anti-virus processes to unusual or external domains, based on the <code>network_connection</code> category and <code>product: windows</code> log source.</li>
<li>Implement a detection rule (like the example Sigma rule provided) to alert on unauthorized file access or modification attempts to anti-virus signature directories such as <code>/Library/Application Support/Kaspersky Lab/KAV/Bases/KLAVA/</code>, as identified in the attack chain.</li>
<li>Monitor for processes interacting with Kaspersky&rsquo;s signature cache file (<code>/Library/Application Support/Kaspersky Lab//KAV/Bases/Cache/kavbase_00000000</code>), using a <code>file_event</code> category log source and a process monitoring tool like Sysmon or auditd.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>anti-virus</category><category>reverse-engineering</category><category>signature-analysis</category><category>macos</category></item></channel></rss>