Anti-theft software poses cybersecurity risk: Kaspersky

Anti-theft software poses cybersecurity risk: Kaspersky

Millions of computers at risk of being hijacked by cyber attackers

Kaspersky Lab's research has revealed millions of computers running anti-theft software could be at risk of being hijacked by cyber attackers.

Kaspersky Lab’s security research team has published a report which highlights that the weak implementation of anti-theft software marketed by Absolute Software can turn a useful defensive utility into a powerful instrument for cyber attackers.

The focus of the research was the Absolute Computrace agent that resides in the firmware, or PC ROM BIOS, of modern laptops and desktops.

The major reason for this research project was the discovery of the Computrace agent running on several private computers of Kaspersky Lab’s researchers and corporate computers without prior authorisation.

Kaspersky Lab’s principal security researcher, Vitaly Kamluk, said: “Powerful actors with the ability to tap fiber optics can potentially hijack computers running Absolute Computrace,” he said.

“This software can be used to deploy spyware implants.”

While Computrace is a legitimate product, some owners of the systems claimed that they had never installed, activated or knew of the software’s presence on their machines, according to the report.

Kamluk said that millions of computers were running Absolute Computrace software and that a large number of the users might be unaware that the software is activated and running.

“Who had reason to activate Computrace on all those computers? Are they being monitored by an unknown actor?,” he said.

According to Kamluk, most traditional pre-installed software packages can be permanently removed or disabled by the user; however Computrace is designed to survive professional system cleanup and even hard disk replacement.

The network protocol used by the Computrace small agent provides basic features for remote code execution.

The protocol doesn't require using any encryption or authentication of the remote server, which creates many opportunities for remote attacks in a hostile network environment.

Kamluk software said Absolute Computrace software must use authentication and encryption mechanisms.

“It is the responsibility of the software manufacturer to notify users and explain how the software can be deactivated and disabled,” he said.

“Otherwise, these orphaned agents will keep on running unnoticed and provide a possibility for remote exploitation.”

Computrace executables are currently white-listed by most anti-malware companies.

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags BIOSKaspersky Lab’s principal security researcher Vitaly KamlukAbsolute Computrace


Show Comments