Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security //

Windows

10/3/2018
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Microsoft Is Waking Up to 'Fileless' Malware Threats

It took a while, but Microsoft's security engineers are starting to address concerns about 'fileless' malware. Redmond is looking to build additional defenses into Windows Defender ATP.

In a blog post this week, Microsoft acknowledged the rise of so-called "fileless" malware. This sort of malware does not use a physical file on the victim machine to run the malicious code.

Since this type of malware typically loads in the context of some legitimate process, usually triggered by some type of social engineering to get the victim to activate the malicious script -- an example is wscript.exe -- it does not require the creation of a disk file.

With no creation means, the antivirus is not get triggered when the malware strikes.

Not only that, but it will usually leave no trace on the disk after the "run and done," such that forensic analysis will find limited evidence of the malware, if any.

Great for the malware, bad for the security team.

Redmond realizes it will take some new tools to deal with this, and engineers there think Windows Defender ATP will have to go beyond file scanning as it grows. The company believes that new areas to look at will include behavior monitoring, memory scanning, as well as boot sector protection.

The Microsoft blog describes one example called Sharpshooter. The Sharpshooter technique was documented and published by MDSec in 2017.

It describes the process of Microsoft's efforts needing to go wide:

When the Sharpshooter technique became public, we knew it was only a matter time before it would be used it in attacks. We implemented a detection algorithm based on runtime activity rather than on the static script. In other words, the detection is effective against the Sharpshooter technique itself, thus against new and unknown threats that implement the technique.

The ability to generalize malware behavior of a script without having to do the static script analysis is a big win.

The engineers add their response, "targets a generic malicious behavior (a fingerprint of the malicious fileless technique). Script engines have the capability to log the APIs called by a script at runtime. This API logging is dynamic and is therefore not hindered by obfuscation: a script can hide its code, but it cannot hide its behavior."

When they tried it out, it worked better than they thought it would.

Besides nabbing the behavior that they thought would be there, they also found "a very stealthy .NET executable. The malware payload downloads data from its command-and-control (C&C) server via the TXT records of DNS queries. In particular, it downloads the initialization vector and decryption key necessary to decode the core of the malware."

While they think they found a penetration exercise here, the ability to find all these instantiations shows that behavior-based API approaches definitely have their place in the security struggle. It shows you things that could be otherwise missed.

But memory scanning and boot sector routines will also be necessary, according to Microsoft.

Windows Defender ATP will be faced with a host of challenges. By opening up its toolbox so it can respond to ever-changing malware can only be beneficial.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17366
PUBLISHED: 2020-08-05
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate...
CVE-2020-9036
PUBLISHED: 2020-08-05
Jeedom through 4.0.38 allows XSS.
CVE-2020-15127
PUBLISHED: 2020-08-05
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flip...
CVE-2020-15132
PUBLISHED: 2020-08-05
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that th...
CVE-2020-7298
PUBLISHED: 2020-08-05
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.