• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Antivirus For Linux • Security  /  CertLock Trojan can disable your antivirus software
CertLock Trojan can disable your antivirus software
13 June 2017

CertLock Trojan can disable your antivirus software

Written by Rajib Singha
Rajib Singha
Antivirus For Linux, Security

An antivirus software keeps your computer safe from malware, viruses, online threats, and suspicious or harmful elements. Although bypassing this protective guard is a difficult task for attackers, they never stop trying to do so. Recently, we came across a malware that is designed to interfere with the infected system’s security software by disallowing its certificate. This malware is called CertLock.

The Infection Chain

CertLock enters into the victim’s system by bundling itself with other free software. On an infected system, when the user tries to access their installed security software, they come across an error message saying that the access is blocked by Windows. The malware also blocks new installation of security programs in infected systems. Without any security, these systems are left defenseless and hence stay completely at the mercy of the attacker.

CertLock manipulates the Windows feature of system certificates. These certificates are trusted by the operating system and can be used by applications to make themselves trustworthy. In this case, the attacker added certificates of the security software to a special registry of Windows, which prevents programs signed with that certificate from getting executed on the system.

These certificates are added under the below registry entry:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates

A certificate’s key is added to the above registry with a certificate value in a blob.

Any software with certificates registered under the above key is not recognized as a trusted publisher and this prevents its installation or execution in the infected machine.

Fig 1: Added security vendor’s certificates
Fig 1. Added security vendor’s certificates

Seqrite Detection

CertLock does not affect the functioning of an installed Seqrite product nor can it block any new installations.

Seqrite’s Behavior Detection System successfully detects and blocks CertLock for performing any malicious activity.

certlock_seqrite
Fig 2. Seqrite Behavior Detection System detection for CertLock

 

Seqrite detects the malicious files of CertLock malware with signature-based detection as ‘Trojan.CertLock’.

Steps to stay safe against malware such as CertLock

  • Free software, especially those with unverified publishers are usually used by attackers to spread malware. Always go for genuine and licensed software.
  • Use a security software that offers multilayered protection. Keep the software updated to stay safe from the latest and emerging threats.
  • Always keep your Operating System and programs patched with the latest updates.

Acknowledgement

Subject Matter Expert

  • Prashil Moon | Quick Heal Security Labs

 Previous PostDealing with Insider Threats: A Brief Guide for CISOs
Next Post  5 Cyber Attacks that Shook the World
Rajib Singha

About Rajib Singha

Rajib is an IT security news junkie and a computer security blogger at Quick Heal. He is passionate about promoting cybersecurity awareness, content and digital...

Articles by Rajib Singha »

Related Posts

  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
  • How the Recent Health Insurance Data Breach Could Affect You – and What You Can Do About It

    October 14, 2024
  • Defending against APT attacks with endpoint security

    How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

    September 27, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies