In April, Microsoft released a Windows update that wreaked havoc for anyone with antivirus (AV) software from several developers, including Avast, Avira, ArcaBit, McAfee and Sophos. The Microsoft update reported that some users might experience “slow or unresponsive” machines after the reboot. One AV software vendor even noted that after the update, login times might be prolonged, and in some cases users may be prevented from logging in altogether.

While this may be nothing more than a nuisance from a technical standpoint, from the big-picture perspective, it doesn’t help the perception of most enterprise users that security software only gets in the way of getting things done. Ultimately, if incidents like this persist — and they likely will — our level of threat protection may plummet.

When I read this story, several questions came to mind: What can be done to ensure this doesn’t happen again? How should IT departments react? With whom does the responsibility lie? Is this even a cause for concern?

Complexity Is the Enemy of Security

I reached out to Josh Mayfield, director of security strategy for Absolute, to help answer these questions and provide insight into why this issue is symbolic of a larger-scale problem for the cybersecurity industry. He told me that what kept running through his mind was the notion that complexity is the enemy of security.

“This will happen again because the system has become overly complex,” he said. “There are so many different dependencies, so many intervening links, and many don’t play by the same rulebook.”

When AV software programs are designed independently, it is only natural that there is competition for resources in the zero-sum field in which they are playing. “What’s so critical is that the operating system update will trump all of them,” Mayfield said. “If the update is problematic, there’s no way Microsoft can account for everything out there. When the update comes out, everyone is going to do it. It’s a very complex tangle, and it only exacerbates the problem. Complexity is driving that failure.”

Play (and Test) in the Sandbox

While many cybersecurity threats are preventable, this specific conundrum can complicate matters for IT teams, who will have to install the update. The best way forward could be to deploy sandboxing.

“It doesn’t have to be extraneous; even using 1-5 percent proportion of all your other resources,” Mayfield suggests. “I would encourage people to not only sandbox things and create an environment that mirrors your real environment, but let it run a little bit. There could be initial dormant processes that only awaken after the device is used in a real-world context and representative of your device population.”

Unfortunately, for many organizations the sandboxing process doesn’t last long enough to identify all of the downstream effects of specific resources accurately. And since systems are likely to be compromised on this scale in the future, it appears that we may only see positive change if all players in the cybersecurity industry take more responsibility. However, most industry analysts will agree that, at least in this particular circumstance, Microsoft has ownership of the problem.

Finding a Long-Term Solution for IT Complexity

Where does the responsibility to safeguard the industry lie? For Mayfield, the principle of buyer beware has a key role to play.

“Make sure you’re not going to do something that will harm your IT environment,” he said. “But on the industry side, who is going to own this?”

A lot of culpability falls to the general community of AV software vendors for their myopic thinking. And with so many vulnerabilities out there to patch, this story may only serve as yet another example of IT complexity wreaking havoc until the industry takes action.

“Who is responsible is usually the last one to touch it, and in some cases, it’s the AV agents,” Mayfield said. “We keep adding and adding, and then we wonder why we are in the Gordian knot. But it’s a knot we tied ourselves. The security industry can benefit from an industry that is less self-centered, so things don’t break as often.”

One long-term solution could be increased regulation for cybersecurity products. This will likely introduce some of its own complexities, but in the long run, the safeguards could spare more serious concerns down the road. “We already have regulations for encryption, so why can’t we do this for other protective tools that define the minimum requirements for cyber products?” Mayfield asks.

It’s a great question — and perhaps new regulations could provide some key answers for the whole industry around cybersecurity.

More from Application Security

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities.Figure 1 — Exploitation timelineHowever, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack surfaces can…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers

Overview In this post, IBM Security X-Force Red offensive hackers analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities. Over the last few years, public accounts have increasingly shown that less sophisticated attackers are using this technique to achieve their objectives. It is therefore important that we put a spotlight on this capability and learn more about its potential impact. Specifically, in this post, we will evaluate how Kernel post-exploitation can be used…

Detecting the Undetected: The Risk to Your Info

IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories that usually contain some sort of sensitive information or credentials including web and login data from Chrome, Firefox, and Microsoft Edge. In other instances, they…