Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
RSA Warns Of Zero Detection Trojan
Newest First  |  Oldest First  |  Threaded View
theb0x
theb0x,
User Rank: Ninja
12/2/2015 | 10:29:53 AM
Re: "Transparent"
It's because of how the exploit drops directly into RAM bypassing any security software. This teqnique is nothing new. The dropper can be encoded dozens of times to such a point that even using the most advanced file heuristic analysis it goes undetected.  It also has polymorphic properties so it is capable of self modifying it's own code to further evade detection. This makes signature based detection also useless. Another method used is covert application channels where shell code is injected into a file such as calc.exe or system file and the digital file signature is also forged. All connections established by the RAT are fully encrypted utilizing Reverse_TCP connection method. Because the infected system is 'phoning home' it in most cases is allowed through the firewall. One way to prevent this connection attempt is to have proper implicit deny ACLs in place. However, one would have to be able to monitor and identify the outgoing encrypted traffic or any network traffic for that matter and verifiy it is in fact legitimate. Constant whitelisting would need to be properly applied without the distruption of 'Normal' traffic. I do not see any practical solution to this in the near future.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
11/27/2015 | 11:49:36 PM
Re: "Transparent"
The transparency or "invisibility" comes through the faulty certificate and, possibly, from other characteristics that make it behave like an innocent file.
RyanSepe
RyanSepe,
User Rank: Ninja
11/25/2015 | 11:24:28 AM
Security Measures
What security measures and best practices should be used for a trojan that is detectable only via network forensics and specialized tools that are capable of detecting suspicious activity on endpoint systems? Also, what are these "specialized tools"?
RyanSepe
RyanSepe,
User Rank: Ninja
11/25/2015 | 11:22:33 AM
"Transparent"
What makes GlassRat "transparent"?


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-38235
PUBLISHED: 2022-08-16
XPDF commit ffaf11c was discovered to contain a segmentation violation via DCTStream::getChar() at /xpdf/Stream.cc.
CVE-2022-38236
PUBLISHED: 2022-08-16
XPDF commit ffaf11c was discovered to contain a global-buffer overflow via Lexer::getObj(Object*) at /xpdf/Lexer.cc.
CVE-2022-38237
PUBLISHED: 2022-08-16
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::readScan() at /xpdf/Stream.cc.
CVE-2022-38238
PUBLISHED: 2022-08-16
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::lookChar() at /xpdf/Stream.cc.
CVE-2022-36141
PUBLISHED: 2022-08-16
SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::MethodBody::write(SWF::Writer*, SWF::Context*).