Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives  Connecting marketers to our tech communities.
12/15/2015
02:50 PM
Vincent Weafer
Vincent Weafer
Partner Perspectives
100%
0%

Detecting the Undetectable: Windows Registry Attacks

Fileless attacks are becoming more sophisticated, requiring a team of defenses.

Attackers are constantly looking for new ways to evade detection. New malware techniques take advantage of operating system features to inject malicious code into memory or the operating system registry without leaving a file on the disk. Traditional detection tools that rely on analyzing disk files need to be augmented with memory analysis and memory protection mechanisms, behavioral analysis, and broader intelligence sharing.

A current trend in fileless malware attacks is to inject code into the Windows registry. Most of these attacks enter a system as a file or link in an email message; this technique serves to emphasize the continued importance of email scanning and user awareness training. When the link or attachment is clicked, the malware writes its payload into the Windows registry and then disappears.

The payload written into the Windows registry contains a script hidden by several layers of tricks. The script is masked from view by removing the user’s access privileges or including a null character in the registry key name. The script calls a legitimate Windows program such as PowerShell to insert malicious code into the memory space of standard Windows processes such as svchost, dllhost, or regsvr32, so that the code cannot be detected by scans for malicious processes.

Examples that McAfee Labs has seen so far, including Kovter and Powelike, connect with websites and click-through ads, transforming the infected system into a click bot. The more resources the system has, the more ad traffic it generates, and the more money it makes for the criminals. Some analyzed variants have also downloaded ransomware payloads.

Fileless malware registry attacks leave no malware files to scan and no malicious processes to detect. Further, evidence of malicious registry keys is hidden by removing access controls and encrypting the values. Operating system updates and patches will not prevent attack because no vulnerabilities have been targeted. Specific rules are available that write-protect registry keys and processes, but more generic write-protection rules are not advised as many legitimate programs need to make registry changes.

The defense to this and other new types of fileless attacks is not just an updated virus definition file or even a single “silver bullet” tool. We need to look at user and system behavior, not individual devices, files, and processes. Humans are often the weakest defensive link, and this type of attack relies heavily on that vulnerability.

Email and Web gateways can also help protect users from the initial malware. As soon as a malicious link is detected by a gateway, it should not only be shared with others, but a network traffic analysis should scan for recent traffic to the URL to identify computers that may be already infected. Because early emails may get through before the URL is convicted, endpoint security should watch for registry changes, as well as script-based execution of management tools such as PowerShell and Windows Management Instrumentation. Hardware-based memory protection is an emerging security category that brings another layer to the defender’s side. Finally, behavioral analysis will help to quickly contain the infection by identifying infected computers shortly after automated ad clicking begins. Detecting the undetectable requires a team of defenses.

For more information on fileless malware, please visit http://www.mcafee.com/November2015ThreatsReport.

 

Vincent Weafer is Senior Vice President of Intel Security, managing more than 350 researchers across 30 countries. He's also responsible for managing millions of sensors across the globe, all dedicated to protecting our customers from the latest cyber threats. Vincent's team ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
gsatpathy
50%
50%
gsatpathy,
User Rank: Apprentice
1/22/2016 | 4:30:30 AM
Registry Attacks
I feel AV scanner should include scanning the injected system processes. It could reduce such fileless malwares from spreading.
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18214
PUBLISHED: 2019-10-19
The Video_Converter app 0.1.0 for Nextcloud allows denial of service (CPU and memory consumption) via multiple concurrent conversions because many FFmpeg processes may be running at once. (The workload is not queued for serial execution.)
CVE-2019-18202
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
CVE-2019-18209
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
CVE-2019-18198
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
CVE-2019-18197
PUBLISHED: 2019-10-18
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...