Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/11/2013
05:12 PM
50%
50%

Tech Insight: Viral Arms Race Brings New, Better Evasion

New malware advances focus on evading security researchers and automated analysis sandboxes

Sophisticated threats and APT have become such a focal point of the security industry that we hardly hear about the most common threat facing enterprises -- malware in the form of viruses, botnets, and worms. If you listen to the marketing coming from security vendors, then you might get the impression that these are issues of the past because everyone is scared of targeted attacks. No one, except antivirus vendors, is talking about the thousands of new infections occurring every day across corporate desktops.

The truth is, talking about defending against run-of-the-mill malware isn't sexy and doesn't sell products. Sticking your head in the sand only exacerbates the problem, however, because these threats are not going away, and malware authors are getting better. These authors keep making malware stealthier and finding new ways to profit on old attacks while we're doing our best at defending our networks, yet being told by antivirus vendors that they've got it covered.

Cryptolocker has been the most recent eye-opener that non-targeted malware is still a real problem for many companies. These same companies that thought they had their corporate data protected by keeping their antivirus products up to date are getting hosed by a single user opening up the wrong e-mail attachment. In the case of Cryptolocker, Office documents and other file types on the local hard drive and connected network share are now encrypted using public key cryptography. Unless the ransom is paid using Bitcoin or Money, only the malware author can decrypt the files.

The use of public key crypto is only one of the interesting advances in recent iterations of such malware as Zeus, Andromeda, Vertexnet, and Cidox. Unlike Robert Tappan Morris' Morris Worm from 25 years ago, today's malware isn't part of a failed informal research project. Instead, malware authors are out to make money, and to do that, they must write resilient, stealthy software. Most of the newly observed techniques are focused on more effective persistence mechanisms, evading analysis by security researchers and detection like malware sandboxes such as Anubis and Cuckoo.

The more basic features are simply clever tricks to help malicious PDFs evade detection so they're more likely to end up in users' inboxes where they'll open and infect their computers. HTTP Host header spoofing has helped malicious traffic look legitimate when the HTTP requests are actually part of the Cidox command-and-control framework.

But the advances don't stop there. McAfee has identified several several different pieces of malware that have added new polymorphic capabilities that do more than just modify their binaries a few times a day or each time they're run. The changes include modification of known data and executable procedures, like opcodes, for the prologue and epilogue sequences to evade signature-based detection.

According to a recent report from malware analysis appliance vendor FireEye, more malware samples are including abilities to defeat file-based sandboxes used to analyze and detect malware. In addition to the typical virtual machine-based detection where malware will change its behavior when running in a virtual machine, new variants are monitoring for human interaction before executing their full malicious payload. Two methods outlined in the FireEye paper are watching for user clicks and displaying dialog boxes that require a user to click. Once the malware is satisfied a normal user is executing it, it proceeds to carry out its true purpose.

As we've seen with the average malware infection, protection measures shouldn't stop at just keeping antivirus up to date and ensuring backups are working. Defensive capabilities must be layered so that even if one system gets compromised, it does not impact every other system. Going back to traditional security tenets such as implementing network segmentation and the principal of least privilege, can have a significant impact in limiting the damage that an infected machine can do.

The "Twenty Critical Security Controls for Effective Cyber Defense," published by the SANS Institute, is an excellent framework for building the necessary defenses to protect against malware attacks. In addition to malware protections and data recovery capabilities, the controls promote controlled use of administrative privileges, boundary defense, secure network design, secure endpoint configuration, and much more.

However, one area not covered in detail, but certainly appropriate when discussing the method of propagation for many of today's malware attacks, is user awareness. It is a touchy subject because many security pundits state that any attempts to educate and train users on security is a lost cause. They say the money is best spent elsewhere, but how can that be when desktops and laptops are getting infected even when antivirus, Internet security gateways, and other controls are in place?

User awareness efforts don't need to be expensive and time-consuming in order to be effective. One of the most useful methods is to reinforce common sense computer use, such as not opening attachments from people you weren't expecting to receive attachments from -- such as the more believable phishing messages sourced by the Cutwail botnet that look like legitimate flight and hotel notifications yet contain a malicious attachment.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-20092
PUBLISHED: 2021-05-13
File Upload vulnerability exists in ArticleCMS 1.0 via the image upload feature at /admin by changing the Content-Type to image/jpeg and placing PHP code after the JPEG data, which could let a remote malicious user execute arbitrary PHP code.
CVE-2020-21342
PUBLISHED: 2021-05-13
Insecure permissions issue in zzcms 201910 via the reset any user password in /one/getpassword.php.
CVE-2020-25713
PUBLISHED: 2021-05-13
A malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common.
CVE-2020-27823
PUBLISHED: 2021-05-13
A flaw was found in OpenJPEG’s encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2020-27830
PUBLISHED: 2021-05-13
A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.