Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/11/2013
05:12 PM
50%
50%

Tech Insight: Viral Arms Race Brings New, Better Evasion

New malware advances focus on evading security researchers and automated analysis sandboxes

Sophisticated threats and APT have become such a focal point of the security industry that we hardly hear about the most common threat facing enterprises -- malware in the form of viruses, botnets, and worms. If you listen to the marketing coming from security vendors, then you might get the impression that these are issues of the past because everyone is scared of targeted attacks. No one, except antivirus vendors, is talking about the thousands of new infections occurring every day across corporate desktops.

The truth is, talking about defending against run-of-the-mill malware isn't sexy and doesn't sell products. Sticking your head in the sand only exacerbates the problem, however, because these threats are not going away, and malware authors are getting better. These authors keep making malware stealthier and finding new ways to profit on old attacks while we're doing our best at defending our networks, yet being told by antivirus vendors that they've got it covered.

Cryptolocker has been the most recent eye-opener that non-targeted malware is still a real problem for many companies. These same companies that thought they had their corporate data protected by keeping their antivirus products up to date are getting hosed by a single user opening up the wrong e-mail attachment. In the case of Cryptolocker, Office documents and other file types on the local hard drive and connected network share are now encrypted using public key cryptography. Unless the ransom is paid using Bitcoin or Money, only the malware author can decrypt the files.

The use of public key crypto is only one of the interesting advances in recent iterations of such malware as Zeus, Andromeda, Vertexnet, and Cidox. Unlike Robert Tappan Morris' Morris Worm from 25 years ago, today's malware isn't part of a failed informal research project. Instead, malware authors are out to make money, and to do that, they must write resilient, stealthy software. Most of the newly observed techniques are focused on more effective persistence mechanisms, evading analysis by security researchers and detection like malware sandboxes such as Anubis and Cuckoo.

The more basic features are simply clever tricks to help malicious PDFs evade detection so they're more likely to end up in users' inboxes where they'll open and infect their computers. HTTP Host header spoofing has helped malicious traffic look legitimate when the HTTP requests are actually part of the Cidox command-and-control framework.

But the advances don't stop there. McAfee has identified several several different pieces of malware that have added new polymorphic capabilities that do more than just modify their binaries a few times a day or each time they're run. The changes include modification of known data and executable procedures, like opcodes, for the prologue and epilogue sequences to evade signature-based detection.

According to a recent report from malware analysis appliance vendor FireEye, more malware samples are including abilities to defeat file-based sandboxes used to analyze and detect malware. In addition to the typical virtual machine-based detection where malware will change its behavior when running in a virtual machine, new variants are monitoring for human interaction before executing their full malicious payload. Two methods outlined in the FireEye paper are watching for user clicks and displaying dialog boxes that require a user to click. Once the malware is satisfied a normal user is executing it, it proceeds to carry out its true purpose.

As we've seen with the average malware infection, protection measures shouldn't stop at just keeping antivirus up to date and ensuring backups are working. Defensive capabilities must be layered so that even if one system gets compromised, it does not impact every other system. Going back to traditional security tenets such as implementing network segmentation and the principal of least privilege, can have a significant impact in limiting the damage that an infected machine can do.

The "Twenty Critical Security Controls for Effective Cyber Defense," published by the SANS Institute, is an excellent framework for building the necessary defenses to protect against malware attacks. In addition to malware protections and data recovery capabilities, the controls promote controlled use of administrative privileges, boundary defense, secure network design, secure endpoint configuration, and much more.

However, one area not covered in detail, but certainly appropriate when discussing the method of propagation for many of today's malware attacks, is user awareness. It is a touchy subject because many security pundits state that any attempts to educate and train users on security is a lost cause. They say the money is best spent elsewhere, but how can that be when desktops and laptops are getting infected even when antivirus, Internet security gateways, and other controls are in place?

User awareness efforts don't need to be expensive and time-consuming in order to be effective. One of the most useful methods is to reinforce common sense computer use, such as not opening attachments from people you weren't expecting to receive attachments from -- such as the more believable phishing messages sourced by the Cutwail botnet that look like legitimate flight and hotel notifications yet contain a malicious attachment.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11937
PUBLISHED: 2020-08-06
In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1.
CVE-2020-15114
PUBLISHED: 2020-08-06
In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of requesting i...
CVE-2020-15136
PUBLISHED: 2020-08-06
In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints func...
CVE-2020-15701
PUBLISHED: 2020-08-06
An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.1...
CVE-2020-15702
PUBLISHED: 2020-08-06
TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges....