May 30, 2019 By Mark Stone 3 min read

In April, Microsoft released a Windows update that wreaked havoc for anyone with antivirus (AV) software from several developers, including Avast, Avira, ArcaBit, McAfee and Sophos. The Microsoft update reported that some users might experience “slow or unresponsive” machines after the reboot. One AV software vendor even noted that after the update, login times might be prolonged, and in some cases users may be prevented from logging in altogether.

While this may be nothing more than a nuisance from a technical standpoint, from the big-picture perspective, it doesn’t help the perception of most enterprise users that security software only gets in the way of getting things done. Ultimately, if incidents like this persist — and they likely will — our level of threat protection may plummet.

When I read this story, several questions came to mind: What can be done to ensure this doesn’t happen again? How should IT departments react? With whom does the responsibility lie? Is this even a cause for concern?

Complexity Is the Enemy of Security

I reached out to Josh Mayfield, director of security strategy for Absolute, to help answer these questions and provide insight into why this issue is symbolic of a larger-scale problem for the cybersecurity industry. He told me that what kept running through his mind was the notion that complexity is the enemy of security.

“This will happen again because the system has become overly complex,” he said. “There are so many different dependencies, so many intervening links, and many don’t play by the same rulebook.”

When AV software programs are designed independently, it is only natural that there is competition for resources in the zero-sum field in which they are playing. “What’s so critical is that the operating system update will trump all of them,” Mayfield said. “If the update is problematic, there’s no way Microsoft can account for everything out there. When the update comes out, everyone is going to do it. It’s a very complex tangle, and it only exacerbates the problem. Complexity is driving that failure.”

Play (and Test) in the Sandbox

While many cybersecurity threats are preventable, this specific conundrum can complicate matters for IT teams, who will have to install the update. The best way forward could be to deploy sandboxing.

“It doesn’t have to be extraneous; even using 1-5 percent proportion of all your other resources,” Mayfield suggests. “I would encourage people to not only sandbox things and create an environment that mirrors your real environment, but let it run a little bit. There could be initial dormant processes that only awaken after the device is used in a real-world context and representative of your device population.”

Unfortunately, for many organizations the sandboxing process doesn’t last long enough to identify all of the downstream effects of specific resources accurately. And since systems are likely to be compromised on this scale in the future, it appears that we may only see positive change if all players in the cybersecurity industry take more responsibility. However, most industry analysts will agree that, at least in this particular circumstance, Microsoft has ownership of the problem.

Finding a Long-Term Solution for IT Complexity

Where does the responsibility to safeguard the industry lie? For Mayfield, the principle of buyer beware has a key role to play.

“Make sure you’re not going to do something that will harm your IT environment,” he said. “But on the industry side, who is going to own this?”

A lot of culpability falls to the general community of AV software vendors for their myopic thinking. And with so many vulnerabilities out there to patch, this story may only serve as yet another example of IT complexity wreaking havoc until the industry takes action.

“Who is responsible is usually the last one to touch it, and in some cases, it’s the AV agents,” Mayfield said. “We keep adding and adding, and then we wonder why we are in the Gordian knot. But it’s a knot we tied ourselves. The security industry can benefit from an industry that is less self-centered, so things don’t break as often.”

One long-term solution could be increased regulation for cybersecurity products. This will likely introduce some of its own complexities, but in the long run, the safeguards could spare more serious concerns down the road. “We already have regulations for encryption, so why can’t we do this for other protective tools that define the minimum requirements for cyber products?” Mayfield asks.

It’s a great question — and perhaps new regulations could provide some key answers for the whole industry around cybersecurity.

More from Application Security

What’s up India? PixPirate is back and spreading via WhatsApp

8 min read - This blog post is the continuation of a previous blog regarding PixPirate malware. If you haven’t read the initial post, please take a couple of minutes to get caught up before diving into this content. PixPirate malware consists of two components: a downloader application and a droppee application, and both are custom-made and operated by the same fraudster group. Although the traditional role of a downloader is to install the droppee on the victim device, with PixPirate, the downloader also…

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today