Vulnerability Management, Patch/Configuration Management

Credential Exfiltration Possible With Check Point ZoneAlarm Driver Bug

Threat actors have abused the vulnerable vsdatant.sys kernel-level driver within the Check Point ZoneAlarm antivirus version released in 2016 to exfiltrate account credentials as part of a Bring Your Own Vulnerable Driver attack, according to Hackread.

Malicious emails have been sent by attackers to spread a dropper that runs a script deploying the vulnerable driver, which enables Core Isolation disruption and process protection removal before facilitating user credential theft, a report from Venak Security showed.

High-level kernel privileges and a valid digital signature in vsdatant.sys allowed malicious code persistence while circumventing extended detection and response systems, said Venak Security researchers.

These findings were acknowledged by Check Point, which emphasized that the security issue has not been present in ZoneAlarm or Harmony Endpoint releases since 2017.

"For full protection, we recommend users ensure they are running the most recent version of Check Point ZoneAlarm or Check Point Harmony Endpoint, which includes enhanced safeguards against BYOVD-style attacks," said a Check Point spokesperson.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.