Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

5/21/2019
10:00 AM
Liron Barak
Liron Barak
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Old Threats Are New Again

They may look familiar to you, and that isn't a coincidence. New threats are often just small twists on old ones.

Cyberattackers are often thought to be tech experts. Cyberattackers understand security vulnerabilities and loopholes that most people don't understand. However, the reality of a cyberattacker is that most are not that specialized — they bypass security solutions through small adjustments to already well-known attacks. By simply leveraging an already established attack sample that is available on the Web, hackers can and do consistently and efficiently modify attacks in order to stay one step ahead of their targets' security solutions. In fact, some malware strains have been designed to automatically modify themselves to avoid signature-based security offerings.

Even sandboxing security solutions — which involve opening suspect files in a controlled environment — are not deterring the ever-increasing rate of email attacks. Because sandboxing solutions have become popular among security practitioners, hackers have also developed sandbox-evasion techniques. Some of these techniques are quite straightforward, such as using the sleep mode to avoid scan detection. And some techniques involve more advanced tools such as sandbox presence detection, where malware runs "clean" code when a sandbox is detected.

In addition, most sandboxes run on machines with low processor counts, RAM, etc. This helps malware detect the difference between an actual computer and a sandbox. A lack of USB ports, small hard drives, no personal files, and no mail client can indicate a sandbox. Once the malware identifies the sandbox, specific techniques are then designed to evade detection. As a dynamic solution, sandboxes offer a way of effectively scanning a file to detect malware.

The bottom line is that as a general rule, today's security solutions rely on past attack experiences to identify present-day threats and ultimately often come up short when it comes to heading off the next hacker attack. Here are a couple of examples of how attackers make minor adjustments in order to take advantage of their targets.

GandCrab Ransomware
GandCrab is a Trojan horse that encrypts files on a targeted computer and follows up with a demand for payment to decrypt them. GandCrab's creators used phishing emails to transmit ransomware and infect systems. These attackers have continued to evolve and adapt to avoid detection, bypass security solutions, and get its victims into mistakenly install ransomware onto their systems.

Between the end of January and September 2018, GandCrab has been updated five times. This agile approach has allowed its creators to stay one step ahead of security solutions and profit on the unsuspecting. 

Emotet Malware
Recently, a new version of Emotet malware surfaced following a short period of inactivity. This marked the introduction of yet another iteration in a series of modifications that started back in 2014.

Emotet first emerged as an info-stealing Trojan aimed at financial credentials and proprietary data. Able to learn from experience, it has continually improved and increased in effectiveness and popularity. This most recent variant has developed a new capability allowing it to avoid detection by most security filters. In addition, Emotet is becoming stronger, more destructive, and costly to organizations and individual users.

Attackers are able to modify their techniques so quickly that it is impossible for organizations to be able to pinpoint what they are going to do next. They shouldn't try, either. What they should do is acknowledge that they need to stay vigilant and that these malicious actors, their viruses, and their profiteering are constantly fought against. Organizations must adapt and evolve themselves, by taking a proactive approach, embracing and implementing security solutions that are attack-agnostic. 

With this strategy, organizations can detect and block viruses, no matter what kind of virus or malware is embedded in them, even if it changes or strengthens over time. This kind of approach provides more comprehensive data security than currently available.

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Liron Barak, CEO and Co-Founder of BitDam, has over 10 years of experience dealing with the most sophisticated cyber threats and exploitation techniques. Prior to founding BitDam, Liron served in Unit 8200 of the Israeli Intelligence Corps, where she managed teams of highly ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
Cognitive Bias Can Hamper Security Decisions
Kelly Sheridan, Staff Editor, Dark Reading,  6/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7472
PUBLISHED: 2019-06-15
The "Count per Day" plugin before 3.2.6 for WordPress allows XSS via the wp-admin/?page=cpd_metaboxes daytoshow parameter.
CVE-2019-12839
PUBLISHED: 2019-06-15
In OrangeHRM 4.3.1 and before, there is an input validation error within admin/listMailConfiguration (txtSendmailPath parameter) that allows authenticated attackers to achieve arbitrary command execution.
CVE-2019-12840
PUBLISHED: 2019-06-15
In Webmin through 1.910, any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges via the data parameter to update.cgi.
CVE-2019-12835
PUBLISHED: 2019-06-15
formats/xml.cpp in Leanify 0.4.3 allows for a controlled out-of-bounds write in xml_memory_writer::write via characters that require escaping.
CVE-2019-12830
PUBLISHED: 2019-06-15
In MyBB before 1.8.21, an attacker can exploit a parsing flaw in the Private Message / Post renderer that leads to [video] BBCode persistent XSS to take over any forum account, aka a nested video MyCode issue.