Skip to main content

Overriding Data Loss Prevention Controls via Misconfigurations and Endpoint Security Bypass

Illustration of Overriding Data Loss Prevention Controls via Misconfigurations and Endpoint Security Bypass
Dominik Antończak

Data Loss Prevention (DLP) solutions are often implemented in corporate environments to prevent unauthorized exfiltration of intellectual property, code, and other sensitive materials. These systems typically rely on a combination of monitoring, filtering, and dynamic rule enforcement to detect any suspicious attempt to copy critical files to unapproved external devices or cloud-based services.

Introduction

During a recent security audit, however, we identified a misconfiguration within a client’s DLP environment that allowed an auditor to systematically copy data to an unrecognized USB device. Notably, this occurred despite the presence of alerts indicating that such activity should have been prohibited.

This finding revealed serious gaps in the way the DLP mechanisms were deployed and validated. Although the system flagged certain files - namely, those containing IP addresses - it did not consistently block, quarantine, or otherwise prevent the exfiltration of several other files. Furthermore, attempts to transfer docker images and other archived materials were executed successfully, doubting efficacy of the data protection controls in place.

A closer examination of the environment showed that a combination of DLP policy oversights and partial file deletion strategies contributed to the inconsistent nature of the protection mechanisms. In addition, analysis suggested that the DLP solution might be vulnerable to a brute-force which forcefully terminated its processes, disabling any enforcement. This article discusses the root causes, the methods used to confirm the vulnerability, and relevant recommendations to ensure a proper remediation.

Observations from the audit

During the initial phase of our audit, we have started from verifying whether the DLP system prevented the unauthorized transfer of sensitive files. The client’s workstation was preloaded with an active DLP agent that restricted copying data to unrecognized USB drives. Testing involved inserting a USB drive not listed in the company’s approved hardware inventory, then attempting to copy various file types onto the device.

The first unusual finding was that while some files were indeed blocked or corrupted (especially those containing patterns matching IP addresses), most other files were transferred successfully. This included documents, compressed archives, and other artifacts that should have been classified as sensitive and restricted. The client’s security team believed the DLP solution would intercept all such attempts, but the logs and real-time notifications showed only some detection events.

Additionally, during deeper analysis, we discovered that the DLP system’s default policy definitions contained partial blocking rules. Only files matching specific known signatures or certain predefined patterns were prioritized for active blocking. Consequently, “neutral” file types or those not explicitly flagged by the signature-based detection process were transferred to the USB device undisturbed. The DLP agent did log certain events internally, but these were not escalated, leading to a false sense of security on the part of the organization.

Another area of concern was the DLP’s inability to handle docker image archives. By utilizing Docker’s native commands (docker save and docker load), the auditor compiled a web application image, stored it in a TAR archive, and easily transferred it to the unapproved USB drive. Even though an error message (“Operation not allowed”) appeared, the process continued not disturbed, and the file ended up on the USB drive. The DLP system not only failed to stop this transfer, but it also presented misleading feedback to the user, which could be exploited by malicious actors.

Technical analysis and Proof of Concept

To provide concrete evidence of the flaw, the following proof of concept was conducted. With basic access to the workstation, the auditor confirmed that Docker was installed and that images were stored locally:

Docker images verification

The auditor proceeded to save a docker image into a TAR file named backup-webapi.tar:

Docker save command

Next, the TAR file was moved to a mounted USB drive located at /media/REDACTED/9C94-6B94/. Despite the console output displaying an error message suggesting the operation was disallowed, the file indeed appeared in the destination directory:

File transfer to USB

Upon restoring the file on the auditor’s own system using docker load, it became evident that the TAR archive was fully copied. Additional attempts employing commands like cp and the graphical file explorer further confirmed that no consistent DLP mechanism prevented data exfiltration of this nature.

Docker load verification

File explorer verification

Curiously, the DLP agent sporadically deleted or corrupted certain files, often based on the presence of IP addresses or other patterns in the content. However, those interventions were incomplete and highly unpredictable. Once the docker images and similarly structured archives were not flagged by the signatures or policies in place, they effectively bypassed the DLP mechanism entirely. From a forensic perspective, this partial blocking mechanism can create a misleading environment where an organization believes certain controls are effective, while critical data in alternative formats continues to leak without detection.

Retest and ESET integration challenges

To determine whether subsequent changes addressed the vulnerability, a second retest was performed. The client had integrated an additional layer of security through ESET, which seemingly blocked unknown USB devices by default. Although this system provided some enhanced protection in theory, the auditor discovered a straightforward method to bypass the restrictions.

Using a simple one-liner script, the auditor repeatedly scanned system processes for “ESET” and forcefully terminated them:

ESET process termination

By constantly restarting the kill sequence, the ESET application was effectively prevented from running. As a direct consequence, the attempted blockade of USB devices was disabled, allowing data transfers to proceed without any problems. Moreover, the repeated termination of ESET processes caused near-complete system instability for the security application, rendering it incapable of performing any real-time scanning or device control.

ESET disabled verification

In essence, a mechanism designed to lock down USB ports failed under active interference from a simple script, thereby illustrating that security solutions relying solely on continuous background processes can be defeated with minimal effort if self-defense mechanisms are absent.

Further analysis suggested that ESET’s self-protection features were not fully engaged, or else they were configured in a manner that did not resist repeated termination attempts. This raised a larger concern: robust self-defense in security tools is critical for preventing exactly this scenario. Without such measures, threat actors with minimal local privileges can eliminate protective services long enough to exfiltrate critical information or execute malicious payloads.

Conclusion

The audit demonstrated that organizational reliance on data loss prevention measures can be misleading when the technology is not properly configured, validated, and reinforced against active tampering. The tested DLP solution exhibited inconsistent behavior, sometimes deleting files based on certain signatures, yet completely ignoring other sensitive archives such as docker images. This vulnerability allows attackers to move valuable data onto external drives without detection. Equally concerning is the ability to disable supplementary defenses like ESET through a simple loop that terminates its processes, an approach that reveals inadequate self-protection capabilities.

Preventing similar vulnerabilities requires a careful review of DLP policies to ensure that all relevant file formats, archiving methods, and exfiltration vectors are covered. Equally important is enhancing endpoint security solutions so that they cannot be bypassed.

Ultimately, organizations should adopt a layered security approach, rather than relying solely on single-point defenses, to ensure that data remains protected under both typical and “hostile” scenarios.

Other Insights

Illustration of Unrestricted File Upload Leading to Arbitrary Code Execution and NTLM Hash Disclosure

Unrestricted File Upload Leading to Arbitrary Code Execution and NTLM Hash Disclosure

Dominik Antończak

During a security audit, I found a critical vulnerability in the file upload mechanism of an application designed to receive user-submitted requests. This vulnerability enables attackers to upload and subsequently execute malicious files on the server with administrative privileges. Furthermore, it allows a maliciously crafted PDF file to steal the NTLM hash of the user who opens it, potentially enabling lateral movement and privilege escalation within the infrastructure. This write-up provides technical details, a proof of concept (PoC), and recommended remediation strategies.

READ article
Illustration of Exploiting improper password reset token validation – an uncommon authentication flaw enabling account takeover

Exploiting improper password reset token validation – an uncommon authentication flaw enabling account takeover

PIOTR ĆWIKLIŃSKI

During a security audit of a web application, I discovered an uncommon flaw in the password reset mechanism. Due to insufficient server-side validation, the application failed to properly verify the presence and validity of a reset token, which is a core element of any secure password recovery flow. This oversight made it possible for an attacker to bypass the verification process entirely and reset the password of any user, ultimately leading to full account takeover.

READ article
Illustration of Denial of Service attack via web cache poisoning – Vulnerability Analysis

Denial of Service attack via web cache poisoning – Vulnerability Analysis

Mikołaj Pudlicki

During security tests, a critical vulnerability was discovered in the tested application. This issue allows an attacker to block access to the application. The problem is caused by incorrect cache handling. Web cache poisoning is an attack where an attacker exploits the caching mechanism to store altered or malicious responses in a cache entry, forcing the website to serve harmful HTTP responses to its users. When improperly implemented, caching mechanisms significantly increase the risk of for example denial of service (DoS) conditions, by serving incorrect cached responses to legitimate users.

READ article
A professional cybersecurity consultant ready to assist with your inquiry.

Any questions?

Happy to get a call or email
and help!