Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/22/2012
06:06 PM
50%
50%

Malware 'Licensing' Could Stymie Automated Analysis

The use of encryption and digital-rights management techniques by the authors of malicious code could make automated analysis of malware take longer and require human intervention more often

While the Flashback Trojan has garnered its share of digital ink for its assault on the Mac OS X operating system, security researchers and computer scientists fear a different aspect of the malware -- its ability to lock itself to a specific infected system.

Click here for more of Dark Reading's Black Hat articles.

Flashback, which started spreading in September, consists of a number of components: a downloader that infects systems, and modules that are fetched from Internet hosts to add functionality to the Trojan. Such a division of labor is standard for botnets and Trojan downloaders. However, the attack tool's use of encryption to bind downloaded modules to the infected system -- similar to how digital-rights-protected content is licensed and bound to a single playback device -- is new.

The problem for security firms and researchers is that encrypted malware makes automated malware analysis much harder, says Paul Royal, a research scientist at the Georgia Institute of Technology's Information Security Center (GTISC).

"Flashback is the first widespread threat we've seen that employs an analysis-resistant technique to evade malware analysis by making execution of the sample dependent on the unique properties on the host that it infects," he says.

Just as defenders are focused on attacking the economics of cybercrime and making online thefts more difficult to conduct, attackers are focusing on raising the effort needed to defend against their attacks. Already, server-side polymorphism, which uses encryption and data-compression techniques to foil static analysis, has reduced the ability of antivirus scanners to detect "new" attacks. (In reality, the attacks are known malware with bits scrambled to evade detection.)

The next steps involve the attacker producing a countermeasure to foil automated dynamic analysis, a method security firms rely on for classifying malware samples found on the Internet and that have attacked customers' systems. The goal is not to prevent analysis of the malware, but to make automated analysis less efficient.

[The weapon of choice for a cyberspy gaining a foothold inside its target traditionally has been the socially engineered email with a malicious link or attachment, but they are increasingly targeting specific, legitimate websites and injecting them with malware. See Cyberspies Target Victims Via 'Strategic' Drive-by Website Attacks.]

In unpublished research, Royal and researchers at Georgia Tech have identified two possible tactics that could significantly slow down analysis: host identity-based encryption (HIE) and instruction-set localization.

HIE uses information found on the infected system to create a key that is used to encrypt, and therefore bind, some of the attack code to the system.

Instruction-set localization, meanwhile, can use information about the network location to create an interpreter that can decrypt commands sent by a command-and-control (C&C) server. The idea is that only infected systems inside the proper network will be able to decode the instructions.

"You don't actually have to bundle your malicious behavior into the executable that is served to a compromised system," Royal says. Instead, the malware is an interpreter of encrypted commands and the malicious actions are taken by the C&C server. "In that way, it's a little bit like platform-as-a-service," he says.

While the research may have pinpointed better ways to cause trouble for automated analysis, security firms have been dealing with such countermeasures for some time, says Liam O Murchu, manager of operations for Symantec's security response group. Many Russian cybercriminals, for example, have avoided infecting systems in Russia by checking for a localized version of Windows. To deal with such issues, Symantec and other companies host their analysis platforms in various countries -- or use network trickery to accomplish the same effect -- and use virtualized systems in a wide variety of languages.

"It's true that it makes things a little bit more difficult," says O Murchu. "But it just means that you need to have a more advanced automated infrastructure to deal with those scenarios."

Attackers are doing a lot of analysis themselves to identify researchers and their automated analysis platforms. They are doing as much work to detect the defenders as the defenders are doing on them, says Dean De Beer, chief technology officer of malware-analysis firm ThreatGrid.

"As the crimeware industry has grown, you see them moving toward active analysis as well, and asking, 'How are the defenders going to try to detect us?'" he says. "That is why we see a lot of creative ways to detect sandboxes and researchers."

Security companies and researchers have a limited menu of countermeasures, GTISC's Royal says. Companies could push the analysis onto the end users' systems, allowing even programs bound to the system to be analyzed. However, most enterprises will not want to allow their systems to be infected, he acknowledges.

A better solution is to try to replicate the manner in which the system got infected. A drive-by download? Go to the same website. An infected e-mail? Open the same attachment. Yet attackers could still use a one-time URL to serve up malware, foiling such defenses.

"That is, unfortunately, part of the asymmetry when we talk about these topics," Royal says. "The attacker has to do very little work to make it difficult for the defender to analyze the attack."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24259
PUBLISHED: 2021-05-05
The “Elementor Addon Elements� WordPress Plugin before 1.11.2 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24260
PUBLISHED: 2021-05-05
The “Livemesh Addons for Elementor� WordPress Plugin before 6.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24261
PUBLISHED: 2021-05-05
The “HT Mega – Absolute Addons for Elementor Page Builder� WordPress Plugin before 1.5.7 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by ...
CVE-2021-24262
PUBLISHED: 2021-05-05
The “WooLentor – WooCommerce Elementor Addons + Builder� WordPress Plugin before 1.8.6 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-priv...
CVE-2021-24263
PUBLISHED: 2021-05-05
The “Elementor Addons – PowerPack Addons for Elementor� WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scriptin...