Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Researchers Use Cloud To Clear Up Malware Evasion

An analysis project surveys the techniques used by malware to evade security software and plans to turn the research into a service to analyze malware

To collect better data on the various evasion techniques used by malware, a group of researchers has created an analysis environment to catalog the specific methods by which malicious programs bypass and evade security software.

   
Click here for more of Dark Reading's Black Hat articles.

The survey of evasion techniques will be presented by Rodrigo Branco, director of vulnerability and malware research for security firm Qualys, at the Black Hat security conference this month. Qualys researchers expect to have 9.5 million malicious and legitimate programs as part of their library of samples, and more than 60 analysis techniques against which to run the samples.

By collecting actual data on which malware samples use which evasion techniques, the researchers will advance the security community's knowledge of malware, Branco says.

"People say there are hundreds of thousands of new samples every day, but when you ask about a specific technique, they just say: 'Yeah, we see it a lot,'" he says. "Everybody is guessing. Where are the numbers?"

The Qualys researchers use static techniques to search out the code that allows a program to evade security software and analysis by reverse-engineering. In cases where the code is obfuscated, the system uses dynamic analysis to test the program. Each of the 60 analysis plug-ins run in the environment, implementing a different detection technique. The goal is to be able to catalog the percentage of malware that uses a specific method for evading security software and reverse-engineering.

"One of the challenges is doing that without running the malware," he says.

Having statistical data on what malware does to evade detection by reverse engineers and malware analysts could be incredibly helpful, says Dean De Beer, chief technology officer for ThreatGRID, a company that provide malware analysis services.

"To folks like myself or researchers that are producing products, having access to this type of content would help us to improve," De Beer says. "Personally, I think it's a great idea.

[ Bouncer, the gatekeeper for the Android app store, looks ready for a rough adolescence, as two groups of security researchers have probed the security service for weaknesses. See Researchers Beat Up Google's Bouncer. ]

The analysis environment will be made available to other computer scientists to study the evasion capabilities of new malware or to test new techniques for detecting malware, Qualys' Branco says. Already, the system runs tools from researchers in Brazil, Germany, India, and the United States.

"Think about any researcher in the world being able to use the machines," Branco says. "Normally they don't have access to millions of samples or to the computer power to analyze the binaries."

Qualys is not the only company looking at specific attributes of malware. ReversingLabs, known for its static malware analysis tools and services, plans to release the File Disinfection Framework (FDF) at Black Hat, as well. The framework's goal is to make developing custom disinfection tools easier by giving security technicians a better tool box.

One interesting by-product of the evasion techniques used by malware is that the more a malicious program attempts to analyze its environment, the more complex its code becomes, and the easier it is to detect, Branco says.

"If we start focusing on detection the anti-[debugging, virtualization, and disassembly] techniques, we might be able to start creating the protection even faster, thus inverting the competition [with the attackers] and forcing them back to not protecting their malware," he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13523
PUBLISHED: 2020-08-04
An exploitable information disclosure vulnerability exists in SoftPerfect’s RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.
CVE-2020-16134
PUBLISHED: 2020-08-04
An issue was discovered on Swisscom Internet Box 2, Internet Box Standard, Internet Box Plus prior to 10.04.38, Internet Box 3 prior to 11.01.20, and Internet Box light prior to 08.06.06. Given the (user-configurable) credentials for the local Web interface or physical access to a device's plus or r...
CVE-2020-16199
PUBLISHED: 2020-08-04
Delta Industrial Automation CNCSoft ScreenEditor, Versions 1.01.23 and prior. Multiple stack-based buffer overflow vulnerabilities may be exploited by processing specially crafted project files, which may allow an attacker to read/modify information, execute arbitrary code, and/or crash the applicat...
CVE-2020-16201
PUBLISHED: 2020-08-04
Delta Industrial Automation CNCSoft ScreenEditor, Versions 1.01.23 and prior. Multiple out-of-bounds read vulnerabilities may be exploited by processing specially crafted project files, which may allow an attacker to read information.
CVE-2020-16203
PUBLISHED: 2020-08-04
Delta Industrial Automation CNCSoft ScreenEditor, Versions 1.01.23 and prior. An uninitialized pointer may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash...