AV-Comparatives: OS Credential Dumping 2022 - LSASS Memory Test

Discussion in 'other anti-virus software' started by guest, Sep 8, 2022.

  1. guest

    guest Guest

    LSASS credential-dumping security
    September 8, 2022
    (PDF): https://www.av-comparatives.org/wp-content/uploads/2022/09/avc_sp_lsass_ms_2022.pdf
     
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    OK, so all of the tested solutions are pretty good at protecting against credential dumping.
     
  3. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,644
    Location:
    USA
    Looks like they were all 100% effective. So not really something to worry about I guess.
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Actually, seem like hackers have figured out a way to bypass protection, see quote.

    https://www.microsoft.com/security/...ng-dev-0270-phosphorus-ransomware-operations/
     
  5. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,644
    Location:
    USA
  6. Nightwalker

    Nightwalker Registered Member

    Joined:
    Nov 7, 2008
    Posts:
    1,387
    I agree, if someone already has this kind of access the security already failed.
     
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    I have to disagree, because that's where behavior blockers come into play. So even if AV is already bypassed, it's supposed to block usage of LOLBins to dump LSASS credentials. That's why I have always been fascinated by behavior blockers because they are supposed to protect the system post execution, while it's the job of AV to block the malware from running at all, in other words pre execution. Of course, in big corporations behavior blocking is done with so called EDR systems.
     
  8. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,644
    Location:
    USA
    Even if I were to agree that a behavior blocker is a good thing after you are already exploited, if they can write to HKLM they can fully take over the entire machine on the next reboot if they inserted the correct things into the registry. There is no good enough protection after the fact. A full re-image is in order ASAP.
     
  9. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    No, that's not the way I understood it. The biggest problem is not adding certain regkeys, it's the LOLBins that are then used to steal credentials, this should be tackled by BB's. Of course you can also monitor regkeys, but there are too many that can be abused, just look at AutoRuns. And this would result in too many alerts which leads to alert fatigue, so you need to find the right balance.
     
  10. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,644
    Location:
    USA
    I don't disagree but I don't think I am effectively communicating my point. HKLM requires admin privilege. If you can write to it then you have already exploited the machine with admin privileges. You already have full control at this point. Your security solution has failed and someone has admin abilities on your system. If they want to steal data and they know how they can probably get it regardless.
     
  11. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Yes but that's what I'm trying to explain, behavior blockers like Win Defender ATP should be able to tackle this even if the attackers already has admin privileges. In this particular attack they try to disable Win Defender AV and Windows Firewall and use LOLBins to perform many malicious actions, and this is exactly what EDR's should be able to spot.

    So just because remote attackers have infiltrated quite deeply into the computer network and have admin access on many endpoints, doesn't always mean it's game over. But of course securing a computer network is way more complex than securing home user PC's, I'm fully aware of that. But behavior blockers should be able to tackle malware even if they have admin privileges, that's my point.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.