Google Reports How Web Attackers Evade Malware Detection
Data gathered from Google's Safe Browsing API service reveals drive-by infections most common, with IP cloaking on the rise.
Attackers increasingly are engaging in IP cloaking to infect Web visitors, where they bypass malware detection systems by serving them clean pages while they drop malware on visitors to the site, according to a new report by Google's security team.
"Over the years, we have seen more malicious sites engaging in IP cloaking. To bypass the cloaking defense, we run our scanners in different ways to mimic regular user traffic," said Lucas Ballard and Niels Provos of the Google Security Team, in a blog post yesterday.
Google's research is based on more than four years of data gathered from its Safe Browsing API service. Google's Safe Browsing API is an online database that contains known malware-rigged Web pages and phishing sites. Chrome, as well as Mozilla's Firefox and Apple's Safari browsers, use the database, as well.
The search engine giant's analysis of the malware-evasion methods used by the bad guys is based on 160 million Web pages hosted on some 8 million sites.
As of summer 2010, 160,000 or so websites were employing cloaking domains, according to Google's report, which covers five years of data. This technique peaked two years ago, when there were some 200,000 websites with IP cloaking, up from more than 50,000 earlier that year. "That peak coincides with a large-scale attack, where thousands of sites were infected to redirect to gumblar.cn, which actively cloaked our scanners," Google says in its report. "Although the increase in the graph is partly due to improved detection of cloaking domains in our system, we believe that it is representative of the general state of cloaking."
Attackers are also using social engineering and drive-by downloads, according to Google. Socially engineered Web attacks try to lure a user into following a link or downloading software.
Read the rest of this article on Dark Reading.
At a full-day virtual event, InformationWeek and Dark Reading editors will talk with security experts about the causes and mistakes that lead to security breaches, both from the technology perspective and from the people perspective. It happens Aug. 25. Register now.
About the Author
You May Also Like
Harnessing the Power of Automation to Boost Enterprise Cybersecurity
Oct 3, 2024DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024