Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

4/29/2013
05:11 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Mobile AV Apps Fail To Detect Disguised Malware

Researchers test popular mobile antivirus apps on ability to detect repackaged, transformed versions of known Android malware

Ten of the top commercial Android antivirus software products were beaten by common malware obfuscation methods, according to new research.

Researchers from Northwestern University and North Carolina State University for one year tested popular mobile AV apps for Android on their ability to detect malware that uses evasion techniques, such as changing up the code or morphing a malware sample. Polymorphism can be as simple as changing the order of the code and data files or just renaming the file, or as complex as changing the appearance of the code but not its behavior.

The researchers -- Yan Chen and Vaibhav Rastogi of Northwestern and Xuxian Jiang of NC State -- used a homegrown prototype malware obfuscation/transformation tool called DroidChameleon in their experiment, which ran from February 2012 until February 2013. The tool automatically transformed known Android malware families, including DroidDream, Geinimi, Fakeplayer, Bserv, BaseBridge, and Plankton, to test the mettle of the AV programs.

The bad news: The researchers were able to cheat all of the AV products they tested, including AVG Antivirus, Symantec Norton Mobile Security, Lookout Mobile Security, ESET Mobile Security, Dr. Web AntiVirus Light, Kaspersky Mobile Security, Trend Micro Security Personal Ed, ESTSoft ALYac Android, Zoner Antivirus Free, and Webroot Security & Antivirus.

The good news is that the tools appear to be getting better at detecting malware that uses basic transformation/obfuscation techniques, such as repacking or reassembling the malware, via unzip or rezip, for example. These methods don't change the code, just the packaging. In 2012, 45 percent of the AV signatures failed to detect malware that used such basic transformation techniques, but this year only 16 percent of them have missed "trivially" transformed malware samples so far, the researchers say.

"There are some things that vendors could improve, and there also are some fundamental problems with [their] resilience [against] these [polymorphic malware] attacks, says Chen, associate professor in electrical engineering and computer science at Northwestern. "We have seen dramatic improvement for the past year" in detecting malware with rudimentary transformation.

"The result that we have here certainly indicates improvement: Anti-malware tools do not succumb as frequently to such trivial transformations. However, this is far from good. As long as anti-malware tools continue to use content-based signatures, evading them is really easy," Chen says.

Today's mobile AV signatures are based on byte patterns in the malware, and malware writers can easily evade AV tools by changing those bytes, according to the researchers. Some 90 percent of the malware signatures studied by the researchers don't use static analysis of the byte-level code. Dr. Web was the only AV product employing static analysis, they say.

"The main problem with such signatures is that they are based on patterns of bytes in the malware. These bytes can, however, easily be changed without altering the functionality. Another way to say this is there could be many differently written pieces of program code that all do the same thing," Yan says. AV technology must evolve to semantics-based detection, which analyzes the functionality in an app.

But at least one mobile vendor contends that the experiment by Northwestern and NC State doesn't reflect real-world threats.

"These recent test results are not representative of the current threat landscape that Symantec customers would be exposed to. For example, Norton Mobile Security protects against real-world threats that are known to alter their code, and these threats were not used in the test," a Symantec spokesperson says. "Symantec constantly researches potential future advancements in attacker strategies and continually monitors the threat landscape, evaluating and evolving our protection capabilities for our mobile products to protect customers accordingly."

Tim Wyatt, director of security engineering for Lookout, says the research demonstrates the challenges of securing mobile devices today, noting that the research focuses on the endpoint piece of the puzzle.

"The testing performed by Northwestern/NC State confirms what we already know: Detection of unknown and/or highly customized malware is a challenge for traditional endpoint security. This challenge is magnified by the constraints of mobile platforms," Wyatt says. "This study focused on the endpoint side of the problem, and we believe that a comprehensive approach to addressing these challenges combines presence on the endpoint with powerful back-end analysis and continuous monitoring of endpoint health."

[Mobile attack vectors are becoming lucrative for the bad guys. Is your enterprise ready to stop them? See Trends In Mobile Device Threats.]

Mobile malware, meanwhile, is skyrocketing: According to a recent report by NQ Mobile, more than 65,000 mobile malware threats were discovered in 2012, a 163 percent increase from the previous year. And 95 percent of the malware was exploiting the Android operating system, either via application repackaging, malicious URLs, or SMS phishing a.k.a. SMiShing.

The malware boom resulted in some 32.8 million Androids getting infected in 2012, a 200 percent increase from 2011.

NC State's Jiang says mobile security is evolving, and it's not just an AV issue. "Users need to be cautious about what kind of app they download. A centralized [and authorized] app store is one way to mitigate this threat, [as is] static analysis," he says. "Malware mostly [comes] through app stores."

Google's Bouncer scanning of apps is a good step, he says, as well as next-generation mobile security features, such as sandboxing. Samsung, for example, has developed the KNOX partitioning feature for sandboxing apps, which could help better lock down mobile devices, Xuxian says.

But the "stock" Android OS does not allow AV products the appropriate privileges to perform behavioral monitoring of code, Chen notes. "Smartphone manufacturers can certainly add their own features to secure mobile devices," he says. "The highest impact however, in my opinion, would be when Android, as developed by Google, itself had these security features. Then, every Android device, regardless of the vendor, would have such features. There are steps being made in this direction: SELinux additions in Android 4.2 are an example of this."

The researchers say they hope their findings spur improvement in mobile malware detection. Their goal wasn't to call out the best AV solutions, they say, and their research didn't cover signature database coverage or resource use on the phones, or SMS spam-filtering or lost device functions. "Evaluating these functionalities remains beyond the scope of this paper," they wrote in their "Evaluating Android Anti-malware Against Transformation Attacks" paper, which is available here (PDF) for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Wirelessroamer
50%
50%
Wirelessroamer,
User Rank: Apprentice
5/1/2013 | 2:05:32 PM
re: Mobile AV Apps Fail To Detect Disguised Malware
Great report but why the surprise? Trend Micro Symantec and others were predicting the exponential growth of Android Malware when it was at 400% a month over a year ago. I have been advised directly by Google executives and also seen it declared publically that "Google have no plans to secure the Android OS". As an open Unix derivative it is insecurable without help from the underlying hardware. AV products have to be installed and secured to the device features before the device attaches to the App store.... Intel's Mobile Android implementation has McAfee security on board (they acquired McAfee) but it is not turned on because "nobody is interested in security".The function of most of this malware is to collect personal data for organised criminals to use for targeted attacks or access Privileged Accounts. Malware is only one of many vulnerabilities (Location and Context Tracking, DLNA in the home, Watermarked Jpeg files, Social Networking, Vendor "spyware", Augmented reality etc etc.)

We need to make these phones safe "out of the box" and raise awareness as soon as possible.
Logan
50%
50%
Logan,
User Rank: Apprentice
4/30/2013 | 8:11:12 PM
re: Mobile AV Apps Fail To Detect Disguised Malware
Definitely unsettling, but I still think the threat of mobile malware is blown out of proportion. App storefronts and ad networks are really stepping up to filter apps and ads and rid them of malware before they reach our phones. Do some get past these filters? Yes. But for the most part, mobile users are NOT facing imminent danger. From Google Play to Airpush, the war against malware isn't being lost - http://blog.airpush.com/how-ai...
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
4/30/2013 | 3:37:46 AM
re: Mobile AV Apps Fail To Detect Disguised Malware
Inorder to stay safe from these kinds of serious problems its good to go with a good av for mobile too, I presently use CMS(Comodo Mobile Security) which is very safe and secure in safeguarding my mobile from any internet attacks!
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4147
PUBLISHED: 2019-09-16
IBM Sterling File Gateway 2.2.0.0 through 6.0.1.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 158413.
CVE-2019-5481
PUBLISHED: 2019-09-16
Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.
CVE-2019-5482
PUBLISHED: 2019-09-16
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
CVE-2019-15741
PUBLISHED: 2019-09-16
An issue was discovered in GitLab Omnibus 7.4 through 12.2.1. An unsafe interaction with logrotate could result in a privilege escalation
CVE-2019-16370
PUBLISHED: 2019-09-16
The PGP signing plugin in Gradle before 6.0 relies on the SHA-1 algorithm, which might allow an attacker to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.