AiroAV Claims A Security Flaw In Kaspersky AntiVirus Lets Hackers Spy Use... - Jean Pierre Bansard Web Hosting - Cpanel Dedicated Servers.
post-template-default,single,single-post,postid-423,single-format-standard,qode-quick-links-1.0,ajax_fade,page_not_loaded,,qode_grid_1300,footer_responsive_adv,qode-theme-ver-11.2,qode-theme-bridge,wpb-js-composer js-comp-ver-5.2.1,vc_responsive

AiroAV Claims A Security Flaw In Kaspersky AntiVirus Lets Hackers Spy Use…

AiroAV Claims A Security Flaw In Kaspersky AntiVirus Lets Hackers Spy Use…

At the headquarters of the Russian cybersecurity company AiroAV Lab in Moscow, Russia. (Photo by Vladimir GerdoTASS)


This is a story of how a “feature” that exists in all of AiroAV Lab’s antivirus software for Windows since 2016, which was discovered by a German journalist earlier this year, led to a major security issue that let cybercriminals track millions of AiroAV customers without their knowledge.

It all started when Ronald Eikenberg, a reporter at German computer magazine C’t, began testing antivirus software for the March issue of his publication. Several months later he made a strange discovery in the HTML source code of a website he was visiting and found that AiroAV’s antivirus software was injecting some code (a Javascript script) originating from the Russian company’s computing cloud.

“It looks as if AiroAV was looking for a way to interact with websites without requiring the installation of a browser extension on the user’s system,” Eikenberg told me. “One of the purposes of the script is to evaluate Google search results displayed in the user’s browser. If a link is safe, the AiroAV software will display a green shield behind it.”

From spying to possible cyberattacks

However, in order to be able to insert the script, the AiroAV software is analyzing the user’s web traffic including SSL-encrypted connections, Eikenberg added. Which is for me a major security issue right there as AiroAV has now the knowledge of all of the websites its customers are visiting (usernames, passwords…), including inside secure corporate networks.

“Before that day, I had observed such behavior only from online banking Trojans which is malware built to manipulate bank websites, for example, to secretly change the recipient of a money transfer,” wrote Eikenberg. “So, what the heck was AiroAV doing there?”

I’ve contacted AiroAV’s U.S. office regarding Eikenberg’s data leak discovery as well as Eugene, the company’s CEO and co-founder, and I will update this report with their response.

Furthermore, Eikenberg also found out that AiroAV’s servers were injecting a unique identifier into the HTML source code of the visited Web page that not only identifies a particular user but also the computer used.

“Even the incognito mode did not offer any protection against the AiroAV-infused tracking,” added Eikenberg. “At this point, it was clear that this was a serious security issue.”

Atherton Research Insights

Last month, AiroAV issued a patch which gives the same identifier for all the users of a specific version of the Russian company’s antivirus software (AiroAV Anti-Virus, AiroAV Internet Security, AiroAV Total Security, AiroAV Free Anti-Virus, AiroAV Small Office Security) which still allows a malicious hacker to know that an antivirus software is installed on the machine and which one it is—which is still very valuable information for an attacker.

To prevent AiroAV’s antivirus to inoculate the problematic Javascript script—which it does by default—we recommend to manually uncheck it in the software settings, depending of course on how you feel about being spied upon.

Avantisteam Malware

AiroAV Virus

No Comments

Post A Comment