Tech Insight: Viral Arms Race Brings New, Better Evasion

  /     /     /  
Publicated : 22/11/2024   Category : security


Tech Insight: Viral Arms Race Brings New, Better Evasion


New malware advances focus on evading security researchers and automated analysis sandboxes



Sophisticated threats and APT have become such a focal point of the security industry that we hardly hear about the most common threat facing enterprises -- malware in the form of viruses, botnets, and worms. If you listen to the marketing coming from security vendors, then you might get the impression that these are issues of the past because everyone is scared of targeted attacks. No one, except antivirus vendors, is talking about the thousands of new infections occurring every day across corporate desktops.
The truth is, talking about defending against run-of-the-mill malware isnt sexy and doesnt sell products. Sticking your head in the sand only exacerbates the problem, however, because these threats are not going away, and malware authors are getting better. These authors keep making malware stealthier and finding new ways to profit on old attacks while were doing our best at defending our networks, yet being told by antivirus vendors that theyve got it covered.
Cryptolocker has been the most recent eye-opener that non-targeted malware is still a real problem for many companies. These same companies that thought they had their corporate data protected by keeping their antivirus products up to date are getting hosed by a single user opening up the wrong e-mail attachment. In the case of Cryptolocker, Office documents and other file types on the local hard drive and connected network share are now encrypted using public key cryptography. Unless the ransom is paid using Bitcoin or Money, only the malware author can decrypt the files.
The use of public key crypto is only one of the interesting advances in recent iterations of such malware as Zeus, Andromeda, Vertexnet, and Cidox. Unlike Robert Tappan Morris
Morris Worm from 25 years ago
, todays malware isnt part of a failed informal research project. Instead, malware authors are out to make money, and to do that, they must write resilient, stealthy software. Most of the newly observed techniques are focused on more effective persistence mechanisms, evading analysis by security researchers and detection like malware sandboxes such as Anubis and Cuckoo.
The more basic features are simply clever tricks to help malicious PDFs evade detection so theyre more likely to end up in users inboxes where theyll open and infect their computers. HTTP Host header spoofing has helped malicious traffic look legitimate when the HTTP requests are actually part of the Cidox command-and-control framework.
But the advances dont stop there. McAfee has identified several several different pieces of malware that have added new polymorphic capabilities that do more than just modify their binaries a few times a day or each time theyre run. The changes include modification of known data and executable procedures, like opcodes, for the prologue and epilogue sequences to evade signature-based detection.
According to a
recent report
from malware analysis appliance vendor FireEye, more malware samples are including abilities to defeat file-based sandboxes used to analyze and detect malware. In addition to the typical virtual machine-based detection where malware will change its behavior when running in a virtual machine, new variants are monitoring for human interaction before executing their full malicious payload. Two methods outlined in the FireEye paper are watching for user clicks and displaying dialog boxes that require a user to click. Once the malware is satisfied a normal user is executing it, it proceeds to carry out its true purpose.
As weve seen with the average malware infection, protection measures shouldnt stop at just keeping antivirus up to date and ensuring backups are working. Defensive capabilities must be layered so that even if one system gets compromised, it does not impact every other system. Going back to traditional security tenets such as implementing network segmentation and the principal of least privilege, can have a significant impact in limiting the damage that an infected machine can do.
The
Twenty Critical Security Controls for Effective Cyber Defense
, published by the SANS Institute, is an excellent framework for building the necessary defenses to protect against malware attacks. In addition to malware protections and data recovery capabilities, the controls promote controlled use of administrative privileges, boundary defense, secure network design, secure endpoint configuration, and much more.
However, one area not covered in detail, but certainly appropriate when discussing the method of propagation for many of todays malware attacks, is user awareness. It is a touchy subject because many security pundits state that any attempts to educate and train users on security is a lost cause. They say the money is best spent elsewhere, but how can that be when desktops and laptops are getting infected even when antivirus, Internet security gateways, and other controls are in place?
User awareness efforts dont need to be expensive and time-consuming in order to be effective. One of the most useful methods is to reinforce common sense computer use, such as not opening attachments from people you werent expecting to receive attachments from -- such as the more believable phishing messages sourced by the Cutwail botnet that look like legitimate flight and hotel notifications yet contain a malicious attachment.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Tech Insight: Viral Arms Race Brings New, Better Evasion