Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/18/2013
04:30 PM
50%
50%

3 Steps To Secure Your Business In A Post-Signature World

From fully undetectable malware to low-volume targeted trojans, digital threats frequently do not have a signature, but companies can still prepare

While phishing, reconnaissance scans, social engineering, and other opportunistic attacks still comprise the lion's share of malicious activity seen by most companies, a growing proportion of attacks are able to evade signature-based defenses. Cybercriminals using fully undetectable (FUD) services can create variants that are unrecognizable to antivirus programs, and targeted attacks increasingly use custom-built malware designed to tiptoe past the target's defenses.

Click here for more articles from Dark Reading.
Click here to register to attend Interop.

To find advanced malware, companies have to look for indicators of compromise that might not initially appear to be connected to a malware infection or each other, says CP Morey, vice president of product marketing at security firm Sourcefire. For example, callbacks to unknown servers along with the installation of an unknown application and high utilization on a machine might not pass the threshold that requires investigation, but together they should set off an alert, he says.

"Traditional security technologies, or a signature-based approach, is like looking for a smoking gun -- it's pretty obvious when you find that at the scene of a crime," Morey says. "Advanced malware, and its indicators of compromise, are more like the Golden Gun from the Bond films: It was made up of a cigarette case, a lighter, a cuff link, a fountain pen, and some other stuff. By themselves, all seemed like no big deal, but when Bond assembled them, they became a gun."

At the Interop conference at the end of September, Morey will discuss approaches to detecting increasingly sophisticated malware, as well as the more run-of-the-mill malicious programs that are still able to escape detection. He and other security experts offered some first steps for firms.

1. Look for bad behavior
Companies should make sure they are looking for suspicious behaviors, both on employees' desktops and in how employees' systems are accessing network resources. Sandboxing, where new files and program are first opened in a virtual environment, essentially looks for bad behavior that could signal maliciousness.

"Behavioral analysis is a really critical piece in detecting that last 'X' percent," says Michael Sutton, vice president of security research for Zscaler, which provides security for endpoints through a cloud service. "There will always be a chunk of stuff that cannot be detected through signature-based approaches."

[Why some industries are staring down the barrel, but still don't know it, putting others at risk. See Advanced Threats, Imagination, And Perception.]

Yet signature-based security is necessary as well. Many threats -- such as purely social engineering or phishing attacks -- likely cannot be detected by behavioral software, he says. In addition, behavioral analysis can detect new threats, but unless it is tied to other information about what is happening across the network, companies may not know whether the attack was successful or how deeply it penetrated the network.

"It is not able to tell me what happened there after," Sutton says. "So it is important that behavioral analysis is not done in isolation."

2. Get fuzzy, but not cute
Companies can also make use of machine learning and techniques that take a page from the attacker's playbook: fuzzing.

With fuzzing, an attacker varies an input in random ways to see whether it impacts a specific system: Putting random files into Microsoft Word, for example, can produce crashes and illuminate exploitable vulnerabilities. Using a complementary technique, Sourcefire essentially fuzzes a signature to detect the offspring of known malware.

"We take a known fingerprint for a malware sample and vary it using mathematical algorithms," Sourcefire's Morey says.

3. Prepare for compromise
Finally, companies need to prepare for the inevitable compromise. While having good defenses can make attackers' jobs more difficult, it is nearly impossible to keep every attacker out.

Yet companies with a good defense in-depth approach focus on detecting and responding to successful attacks as well, says Michael Lloyd, chief technology officer for RedSeal Networks, a network management and security firm. Saudi Aramco is a good example of a company that -- through planning or luck -- succeeded against its attackers, he says.

"They were attacked with a very well-designed payload ,which did some damage, but it did not disrupt their ability to deliver oil," Lloyd says. "In those terms, Saudi Aramco really succeeded in defending their business; they kept operating as a business, even after someone threw a very malicious attack at them."

Companies should practice moving from the detection of suspicious activity to responding to the possible malicious attack, Morey agrees.

"What you do during and after an attack nowadays is just as important as what you do before," he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/30/2020
6 Ways Passwords Fail Basic Security Tests
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/28/2020
'Act of War' Clause Could Nix Cyber Insurance Payouts
Robert Lemos, Contributing Writer,  10/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Measure and Reduce Cybersecurity Risk in Your Organization
In this Tech Digest, we examine the difficult practice of measuring cyber-risk that has long been an elusive target for enterprises. Download it today!
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4588
PUBLISHED: 2020-10-30
IBM i2 iBase 8.9.13 could allow an attacker to upload arbitrary executable files which, when executed by an unsuspecting victim could result in code execution. IBM X-Force ID: 184579.
CVE-2020-4584
PUBLISHED: 2020-10-30
IBM i2 iBase 8.9.13 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 184574.
CVE-2020-7759
PUBLISHED: 2020-10-30
The package pimcore/pimcore from 6.7.2 and before 6.8.3 are vulnerable to SQL Injection in data classification functionality in ClassificationstoreController. This can be exploited by sending a specifically-crafted input in the relationIds parameter as demonstrated by the following request: http://v...
CVE-2020-7760
PUBLISHED: 2020-10-30
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vu...
CVE-2020-27014
PUBLISHED: 2020-10-30
Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash. An attacker must first obtain the ability to execute high-privileged code on the targ...