This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos On-Access Scanner gets "disabled" by Juniper Networks Host-Checker

I have a VPN connection to a customer of mine. They use the Juniper Networks VPN software. I use Sophos Endpoint v10. When I connect to their network, the Juniper software launches the "Host Checker" app. It successfully detects v10 of Sophos AV as a valid product, so it is clearly updated. However it then deletes the savonaccesscontrol.sys and savonaccessfilter.sys driver files located in C:\Windows\System32\Drivers. This means that the next time I boot my PC the on-access scanner doesn't load, leaving me under-protected, and the next time I try to connect to the Juniper VPN it won't validate me because my Sophos AV product doesn't have on-access scanning enabled. The only fix I have found, is to restore the two files, and then make them read-only so that the Host-Checker cannot delete them.

I have contacted my customer and requested that they reach out to Juniper to find out why this is happening. HOWEVER, I would like to know how it is that the Juniper client was ABLE to delete these files, since I have Tamper Protection turned on! Shouldn't these files be protected?!? This strikes me as a MAJOR flaw in your software, if a malicious app can just disable my on-access AV software!

Thoughts?

:28371


This thread was automatically locked due to age.
Parents
  • Hello TomSadowski,

    you asked for thoughts, so ...

    Guess while "important" files could be locked (doing so for a driver might be tricky - nevertheless the (in)famous sptd.sys does it) it would add quite some complexity. Note that "protecting" just executables or all files is not sufficient, you'd also have to take care of e.g. registry keys. In addition an anti-virus is not static, it should honour legitimate configuration requests and it has to update itself regularly. And it is not guaranteed that what you do doesn't adversely interact with other schemes. As a result "clever" locking mechanisms might mean that you'd have to to go through Safe Mode in case of even a minor hiccup. It's the usual trade-off security vs. usability.
    While it might be alarming that Sophos (or other similar products) can seemingly easily be disabled this falls short of depicting an actual successful attack (which you anyway can't absolutely prevent). Whatever cripples your AV must also do some "useful" (from the point of view of malware) work - and this intention likely makes it suspicious in the first place (it has to come from somewhere and it should be scanned on the way, therefore ...). As an aside - does the Juniper software install and run with the recommended AV settings without triggering an alert (and don't forget that signed applications have slightly more leeway than unknown)? If the malicious component (apart from the "AV disabler") isn't detected it won't have to turn off your AV anyway. Actually in this such a case the fiddling with your AV is counterproductive as it increases the chance of being detected. Ever wondered why "direct" attacks on AV software aren't more widespread?

    Be assured - "self-protection" is something no serious AV vendor has neglected or discarded. But AFAIK no one has come up with a perfect or even satisfying solution (and similarly the "bad guys" haven't been able to build the ultimate weapon).       

    Christian

    :28585
Reply
  • Hello TomSadowski,

    you asked for thoughts, so ...

    Guess while "important" files could be locked (doing so for a driver might be tricky - nevertheless the (in)famous sptd.sys does it) it would add quite some complexity. Note that "protecting" just executables or all files is not sufficient, you'd also have to take care of e.g. registry keys. In addition an anti-virus is not static, it should honour legitimate configuration requests and it has to update itself regularly. And it is not guaranteed that what you do doesn't adversely interact with other schemes. As a result "clever" locking mechanisms might mean that you'd have to to go through Safe Mode in case of even a minor hiccup. It's the usual trade-off security vs. usability.
    While it might be alarming that Sophos (or other similar products) can seemingly easily be disabled this falls short of depicting an actual successful attack (which you anyway can't absolutely prevent). Whatever cripples your AV must also do some "useful" (from the point of view of malware) work - and this intention likely makes it suspicious in the first place (it has to come from somewhere and it should be scanned on the way, therefore ...). As an aside - does the Juniper software install and run with the recommended AV settings without triggering an alert (and don't forget that signed applications have slightly more leeway than unknown)? If the malicious component (apart from the "AV disabler") isn't detected it won't have to turn off your AV anyway. Actually in this such a case the fiddling with your AV is counterproductive as it increases the chance of being detected. Ever wondered why "direct" attacks on AV software aren't more widespread?

    Be assured - "self-protection" is something no serious AV vendor has neglected or discarded. But AFAIK no one has come up with a perfect or even satisfying solution (and similarly the "bad guys" haven't been able to build the ultimate weapon).       

    Christian

    :28585
Children
No Data