Malware Abuses Windows Atom Tables for Novel Code Injection Technique

Discussion in 'malware problems & news' started by Minimalist, Oct 27, 2016.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
  3. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    http://blog.ensilo.com/atombombing-a-code-injection-that-bypasses-current-security-solutions

    https://breakingmalware.com/injection-techniques/atombombing-brand-new-code-injection-for-windows/
     
  4. emmjay

    emmjay Registered Member

    Joined:
    Jan 26, 2010
    Posts:
    1,548
    Location:
    Triassic
    This is going to be interesting. MS can not patch it as Atom Tables are so interwoven into the OS (all versions). A Windows rewrite may be the only option according to some researchers. If this exploit is as potent as the reports say it is, it makes all Windows versions vulnerable - now the most insecure OS out there!!! Though a stretch to say so, it is not a good message for Enterprises, Business, Education, Governments and consumers.

    If the bad guys get hold of this en masse it has the possibility of doing widespread damage. Windows users would have to go offline to avoid the exploit. Security programs and firewalls will not stop the execution of the exploit.

    It is now a wait and see game.
     
    Last edited: Oct 29, 2016
  5. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  6. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    I've read that some certain AV's and HIPS can already spot it, but I don't have any more info. According to Erik Loman, HMPA should be able to stop it because this attack uses ROP in order to inject code.
     
  7. emmjay

    emmjay Registered Member

    Joined:
    Jan 26, 2010
    Posts:
    1,548
    Location:
    Triassic
    It is good news that they have narrowed it down this quickly. I do not know of any AVs that can detect a ROP chain exploit, much less prevent it. HIPS can detect ROP exploitation and prevent shell code execution, so can anti-exploit security products.

    @Rasheed187. HMPA would be a candidate, as well as MBAE and EMET. I see online that others are claiming they can also prevent it. Unfortunately, not too many 'average Joes' use HIPS or AE security products to protect their systems.
     
  8. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Yes, I assume some advanced HIPS for the corporate market will probably spot it. Perhaps they don't block the code injection itself, but monitor certain API's inside process memory for modification.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.