Shortly after publishing my review of Tiranium Premium Security 2014,
I got a message from a researcher using the handle Malware1. He claimed
that Tiranium abused various online malware-checking websites to
bolster its detection rate. His note included links to videos showing an
older version of the software connecting to VirusTotal,
in particular (though he admitted there is no longer a direct
connection). He also supplied what he said were a number of emails from
VirusTotal to Tiranium demanding they stop abusing the service.
I checked with VirusTotal, but my contact declined to comment for publication. I had to determine for myself whether this was true, and whether it constituted a problem if so.
What Is VirusTotal
For those who aren't familiar with it, VirusTotal's public face is a website where you can upload a file to see if it's malicious. The site first generates a hash for the file—a unique mathematical fingerprint. If the hash is already in its database (and most are) it returns the stored results. If not, it checks the file with about 50 major antivirus engines, reporting which flagged the file as malicious. Google acquired VirusTotal about two years ago.
The service goes beyond simply checking files. According to its website, "VirusTotal's mission is to help in improving the antivirus and security industry and make the internet a safer place through the development of free tools and services." That same page states that "None of the services or applications publicly offered on this site should be used in commercial products, commercial services or for any business purpose. In the same way, none of the services should be used as a substitute for security products."
In other words, a product that simply used VirusTotal's results without independently verifying that the file is malicious would be violating the terms of service. And indeed, a controversial test by Kaspersky Lab several years ago showed that blindly using detection from the website is a bad idea.
Digging With WireShark
According to Malware1, Tiranium first checks a suspect file using its locally installed client. If there's no match, it checks the file's hash on VirusTotal. Only if it gets no results from VirusTotal does it invoke its own behavioral cloud scanner.
To start my investigation, I created brand-new modified versions of my current malware collection, changing the filenames, altering the file size, and tweaking some non-executable bytes. I checked the hash of each file against VirusTotal, to be sure all were absent from the database.
With the WireShark network traffic tracing utility running, I launched a Tiranium scan of the folder containing these files. Strangely, the scan ran for hours but never finished, and the count of files scanned never changed from its initial zero. I learned later that this was because the behavioral cloud server was down for several hours.
Indeed, perusing the WireShark log I could see that Tiranium tried again and again to upload files to the behavioral cloud, each attempt ending in an error. What I did not find was any evidence of a direct connection to VirusTotal, or to any of the other services that had allegedly been used in the past.
Circumstantial Evidence
I moved some of my test files to another folder and submitted them to VirusTotal for checking. In every case a majority of the antivirus engines detected them as malicious; some got near-unanimous recognition as malware.
As soon as all the files were processed by VirusTotal, I immediately scanned the folder with Tiranium. This time it recognized those files as malware right away. When I scanned the remaining files, the ones I hadn't uploaded, the scan stuck, as before. While there was still no direct connection from my computer to VirusTotal, it seems I had established a clear chain of causality.
Maybe It's OK?
I reached out to my connections in the antivirus industry to see what they thought. One researcher pointed out that antivirus companies can contract with VirusTotal to automatically receive any sample that others detected but their product missed. However, that didn't seem to describe the situation I observed.
More importantly, my Tiranium contact confirmed the use of VirusTotal. "VirusTotal has specific terms of use," he said. "They're sending samples to companies. Tiranium is one of the companies analyzing that, like all others." He went on to note that the time to analyze new samples can vary. "Sometimes this will take hours, sometime minutes, sometime days," he said.
Or Maybe Not
The VirusTotal credits page lists all vendors who have "integrated a product, tool or resource in VirusTotal, or have contributed somehow." These vendors have signed an agreement that includes a set of best practices. Tiranium is not among the companies listed. It's not receiving samples from VirusTotal, so its use is not "like all the others."
I've determined to my own satisfaction that the emails supplied by Malware1 telling Tiranium to stop misusing VirusTotal are real. I've seen evidence that at one time the application itself connected directly to VirusTotal for information, which is definitely abuse. But is its current incarnation stealing the work of other vendors, as Malware1 contends? I can't say definitively, but my trust is definitely shaken.
Potentially Unwanted?
Apparently I'm not alone. In a discussion on the well-regarded Wilders Security forum, several members express concern about the product. In fact, at the time of this discussion about eight months ago, a number of well-known antivirus products detected Tiranium as a "potentially unwanted application" that should be removed.
Even now, Kaspersky detects one of Tiranium's two main files as malware, and ESET detects them both. Fortinet identifies Tiranium's website as malicious, as does Webroot's BrightCloud service.
Shady Behaviors
I pointed out this detection to my Kaspersky contact and asked if he could explain why Tiranium was flagged as malware. He dug into the question with significantly more skill than I could muster, and came up with a lot. "They're using more than five different obfuscators to obfuscate their code and there's no digital signature," he said "It's a little crazy and looks far from legit." There's no smoking gun here, but these and other malware-like behaviors were sufficient to get the product flagged. He also found traffic from the server referencing VT (VirusTotal), Anubis, and VirScan, suggesting some kind of reliance on third-party sources.
The BrightCloud folks couldn't pinpoint the reason that Tiranium's website got flagged as risky. However, they pointed out that Tiranium's IP address is shared with quite a few phishing websites. Google's safe browsing page for the olympe.in domain used by Tiranium had some alarming news: "Of the 1341 pages we tested on the site over the past 90 days, 13 page(s) resulted in malicious software being downloaded and installed without user consent."
I said in my review that Tiranium is a good first effort, but not ready to challenge our several Editors' Choice antivirus products. I now feel that the company needs to both improve the product and regain my trust with professionalism and transparency. Fix the spelling and grammar errors, ditch the obfuscation, digitally sign the executable files, and make sure it integrates with Windows's Action Center. Refrain from any use of third-party products that isn't fully transparent. Separate Web hosting from servers that host malware. For now, I recommend that you stick with our Editors' Choice antivirus products.
I checked with VirusTotal, but my contact declined to comment for publication. I had to determine for myself whether this was true, and whether it constituted a problem if so.
What Is VirusTotal
For those who aren't familiar with it, VirusTotal's public face is a website where you can upload a file to see if it's malicious. The site first generates a hash for the file—a unique mathematical fingerprint. If the hash is already in its database (and most are) it returns the stored results. If not, it checks the file with about 50 major antivirus engines, reporting which flagged the file as malicious. Google acquired VirusTotal about two years ago.
The service goes beyond simply checking files. According to its website, "VirusTotal's mission is to help in improving the antivirus and security industry and make the internet a safer place through the development of free tools and services." That same page states that "None of the services or applications publicly offered on this site should be used in commercial products, commercial services or for any business purpose. In the same way, none of the services should be used as a substitute for security products."
In other words, a product that simply used VirusTotal's results without independently verifying that the file is malicious would be violating the terms of service. And indeed, a controversial test by Kaspersky Lab several years ago showed that blindly using detection from the website is a bad idea.
Digging With WireShark
According to Malware1, Tiranium first checks a suspect file using its locally installed client. If there's no match, it checks the file's hash on VirusTotal. Only if it gets no results from VirusTotal does it invoke its own behavioral cloud scanner.
To start my investigation, I created brand-new modified versions of my current malware collection, changing the filenames, altering the file size, and tweaking some non-executable bytes. I checked the hash of each file against VirusTotal, to be sure all were absent from the database.
With the WireShark network traffic tracing utility running, I launched a Tiranium scan of the folder containing these files. Strangely, the scan ran for hours but never finished, and the count of files scanned never changed from its initial zero. I learned later that this was because the behavioral cloud server was down for several hours.
Indeed, perusing the WireShark log I could see that Tiranium tried again and again to upload files to the behavioral cloud, each attempt ending in an error. What I did not find was any evidence of a direct connection to VirusTotal, or to any of the other services that had allegedly been used in the past.
Circumstantial Evidence
I moved some of my test files to another folder and submitted them to VirusTotal for checking. In every case a majority of the antivirus engines detected them as malicious; some got near-unanimous recognition as malware.
As soon as all the files were processed by VirusTotal, I immediately scanned the folder with Tiranium. This time it recognized those files as malware right away. When I scanned the remaining files, the ones I hadn't uploaded, the scan stuck, as before. While there was still no direct connection from my computer to VirusTotal, it seems I had established a clear chain of causality.
Maybe It's OK?
I reached out to my connections in the antivirus industry to see what they thought. One researcher pointed out that antivirus companies can contract with VirusTotal to automatically receive any sample that others detected but their product missed. However, that didn't seem to describe the situation I observed.
More importantly, my Tiranium contact confirmed the use of VirusTotal. "VirusTotal has specific terms of use," he said. "They're sending samples to companies. Tiranium is one of the companies analyzing that, like all others." He went on to note that the time to analyze new samples can vary. "Sometimes this will take hours, sometime minutes, sometime days," he said.
Or Maybe Not
The VirusTotal credits page lists all vendors who have "integrated a product, tool or resource in VirusTotal, or have contributed somehow." These vendors have signed an agreement that includes a set of best practices. Tiranium is not among the companies listed. It's not receiving samples from VirusTotal, so its use is not "like all the others."
I've determined to my own satisfaction that the emails supplied by Malware1 telling Tiranium to stop misusing VirusTotal are real. I've seen evidence that at one time the application itself connected directly to VirusTotal for information, which is definitely abuse. But is its current incarnation stealing the work of other vendors, as Malware1 contends? I can't say definitively, but my trust is definitely shaken.
Potentially Unwanted?
Apparently I'm not alone. In a discussion on the well-regarded Wilders Security forum, several members express concern about the product. In fact, at the time of this discussion about eight months ago, a number of well-known antivirus products detected Tiranium as a "potentially unwanted application" that should be removed.
Even now, Kaspersky detects one of Tiranium's two main files as malware, and ESET detects them both. Fortinet identifies Tiranium's website as malicious, as does Webroot's BrightCloud service.
Shady Behaviors
I pointed out this detection to my Kaspersky contact and asked if he could explain why Tiranium was flagged as malware. He dug into the question with significantly more skill than I could muster, and came up with a lot. "They're using more than five different obfuscators to obfuscate their code and there's no digital signature," he said "It's a little crazy and looks far from legit." There's no smoking gun here, but these and other malware-like behaviors were sufficient to get the product flagged. He also found traffic from the server referencing VT (VirusTotal), Anubis, and VirScan, suggesting some kind of reliance on third-party sources.
The BrightCloud folks couldn't pinpoint the reason that Tiranium's website got flagged as risky. However, they pointed out that Tiranium's IP address is shared with quite a few phishing websites. Google's safe browsing page for the olympe.in domain used by Tiranium had some alarming news: "Of the 1341 pages we tested on the site over the past 90 days, 13 page(s) resulted in malicious software being downloaded and installed without user consent."
I said in my review that Tiranium is a good first effort, but not ready to challenge our several Editors' Choice antivirus products. I now feel that the company needs to both improve the product and regain my trust with professionalism and transparency. Fix the spelling and grammar errors, ditch the obfuscation, digitally sign the executable files, and make sure it integrates with Windows's Action Center. Refrain from any use of third-party products that isn't fully transparent. Separate Web hosting from servers that host malware. For now, I recommend that you stick with our Editors' Choice antivirus products.
No comments:
Post a Comment