Absolute Computrace anti-theft software can be remotely hijacked

Kaspersky Lab’s security research team published a report confirming and demonstrating that the weak implementation of anti-theft software marketed by Absolute Software can turn a useful defensive utility into a powerful utility for cyberattackers.

In a stealthy way, this poor implementation gives attackers full access to millions of users’ computers. The focus of the research was the Absolute Computrace agent that resides in the firmware, or PC ROM BIOS, of modern laptops and desktops.

The major reason for this research project was the discovery of the Computrace agent running on several private computers of Kaspersky Lab’s researchers and corporate computers without prior authorization. While Computrace is a legitimate product developed by Absolute Software, some owners of the systems claimed that they had never installed, activated or had ever known about this software on their machines. Most traditional pre-installed software packages can be permanently removed or disabled by the user; however Computrace is designed to survive professional system cleanup and even hard disk replacement.

A user can mistakenly recognize Computrace as malicious software because it uses so many tricks popular in modern malware: anti-debugging and anti-reverse engineering techniques, injection into memory of other processes, establishment of secret communications, patching system files on disk, keeping configuration files encrypted, and dropping a Windows executable right from the BIOS/firmware.

Statistics:

  • According to Kaspersky’s Security Network, there are approximately 150,000 users who have the Computrace agent running on their machines. The estimated total number of users with the activated Computrace agent may exceed 2 million. It’s unclear how many of those users know about Computrace running on their systems.
  • The majority of such computers are located in The Unites States and Russia.

The network protocol used by the Computrace Small Agent provides basic features for remote code execution. The protocol doesn’t require using any encryption or authentication of the remote server, which creates many opportunities for remote attacks in the hostile network environment.

An attack platform

There is no proof that Absolute Computrace is being used as a platform for attacks. However, experts from several companies see the possibility for attacks; some alarming and unexplained facts of unauthorized Computrace activations make this more and more realistic.

Back in 2009, researchers from Core Security Technologies presented their findings on Absolute Computrace. The researchers warned about the dangers of this technology and how an attacker could modify the system registry to hijack the callbacks from Computrace. An aggressive behavior of the Computrace Agent was a reason why it was detected as malware in the past. According to some reports Computrace was detected by Microsoft as VirTool:Win32/BeeInject. Nevertheless the detection was later removed by Microsoft and some anti-malware vendors. Computrace executables are currently whitelisted by most anti-malware companies.

Don't miss