Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Government-Grade Stealth Malware In Hands Of Criminals
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
theb0x
50%
50%
theb0x,
User Rank: Ninja
7/28/2014 | 5:01:28 PM
Government-Grade? Lol.
To me government-grade sounds outdated. Polymorphic Shellcode has been around a long time and is by far the most difficult to detect. Most IDSs contain signatures for commonly used strings within shellcode. It also hides the commonly used strings within shellcode, making shellcode signatures useless and can be different everyime it is sent. A properly tripple encoded attack vector generated from Metasploit drops directly into RAM bypassing any system security with full kernel level privileges. The best part is there is no cure for this attack method.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
7/22/2014 | 10:33:35 AM
Re: Government-grade? Is that a new explanation on criminal intent by governments?
I wonder how long until a real war is started as a result of a cyber attack.  Unfortunately, I think it is only a matter of time.

Once that happens, then there will be a cyber warfare treaty.
chriscinfosec
50%
50%
chriscinfosec,
User Rank: Apprentice
7/22/2014 | 9:32:53 AM
Re: from which nation-state?
That makes sense.. the evasion/rootkit technique is very sophisticated (nation-state) but the payloads weren't (organized crime trying to make money).  We see similar things at Invincea as part of our "malware genome" analysis to determine if a malware sample is part of a larger family of malware.  In the cases where the malware is similar, the differences are usually which C&C server it's connecting to and the packing technique.
ArneN455
50%
50%
ArneN455,
User Rank: Apprentice
7/22/2014 | 9:06:24 AM
Re: Government-grade? Is that a new explanation on criminal intent by governments?
That could be an idea, ofcourse, but my opinion, that I really wanted to point out, is that many more governements than people are aware of, are in fact dealing in criminal activity!

And it seem like the us-governement, is in the absolute front of this activity. With Mr. Cheney as the dark lord. And todays president started as this mass murderers apprentice!
GonzSTL
50%
50%
GonzSTL,
User Rank: Ninja
7/18/2014 | 2:20:37 PM
Re: Government-grade? Is that a new explanation on criminal intent by governments?
That is unlikely to happen. Governments will always secretively want to know what goes on in other governments or organizations. Those clandestine activities have been happening ever since there were governments, so don't expect those to go away anytime soon. After all, there is some validity in wanting to spy on other governments or organizations in the interests of national defense, or other self interests. I am neither condoning or condemning their use; I'm just being pragmatic and realistic.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/18/2014 | 2:17:13 PM
Re: from which nation-state?
I guess another possibility would be that they somehow got a sample and reverse-engineered it...but it's probably more likely they got it under the table somehow.
Sara Peters
50%
50%
Sara Peters,
User Rank: Author
7/18/2014 | 2:13:50 PM
Re: from which nation-state?
@Kelly   Yeah, I keep thinking that the criminals have it because the government agents gave it to them. It seems like an awfully cynical viewpoint, but governments make deals with criminals all the time.
Sara Peters
0%
100%
Sara Peters,
User Rank: Author
7/18/2014 | 1:54:31 PM
Re: Government-grade? Is that a new explanation on criminal intent by governments?
@ArneN455 "Government criminal-ware is being spread to other criminals. What about NOT making it in the first place?"  That's a fair question. Do you think we need to have some kind of arms treaty that applies to the use of cyberweaponry?
ArneN455
50%
50%
ArneN455,
User Rank: Apprentice
7/18/2014 | 10:11:56 AM
Government-grade? Is that a new explanation on criminal intent by governments?
Government criminal-ware is being spread to other criminals. What about NOT making it in the first place? ALL those malwares are made with criminal intention, government, or not government!
GonzSTL
0%
100%
GonzSTL,
User Rank: Ninja
7/18/2014 | 9:13:37 AM
Government grade malware
So really, since it is so difficult to detect, the most effective way to combat this is through effective awareness training. After all, isn't a user's insecure practice the way malware enters a system in the first place?
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-4020
PUBLISHED: 2021-11-27
janus-gateway is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-23654
PUBLISHED: 2021-11-26
This affects all versions of package html-to-csv. When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this a malicious actor can embed or generate a malicious link or execute commands via C...
CVE-2021-43785
PUBLISHED: 2021-11-26
@joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious...
CVE-2021-43776
PUBLISHED: 2021-11-26
Backstage is an open platform for building developer portals. In affected versions the auth-backend plugin allows a malicious actor to trick another user into visiting a vulnerable URL that executes an XSS attack. This attack can potentially allow the attacker to exfiltrate access tokens or other se...
CVE-2021-41243
PUBLISHED: 2021-11-26
There is a Potential Zip Slip Vulnerability and OS Command Injection Vulnerability on the management system of baserCMS. Users with permissions to upload files may upload crafted zip files which may execute arbitrary commands on the host operating system. This is a vulnerability that needs to be add...