Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Customised malware attacks grow increasingly widespread

Antivirus software struggles to keep up with new security threats

Article comments

The rising popularity of custom malware and the inability of antivirus software to keep pace poses potent challenges for enterprises trying to keep their systems secure.

It's no secret that the goal of modern malware writers is to create attack software that is stealthy and flows undetected for as long a period of time as possible. However, what's increasingly startling is how pervasive custom malware has become as part of traditional attacks.

"The advanced attack is getting more pervasive," says Shawn Moyer, managing principal at security services firm Accuvant Labs. "In our engagements and my conversations with peers we are dealing with more organisations that are grappling with international infiltration," he says. "Every network we monitor, every large customer, has some kind of customised malware infiltrating data somewhere. I imagine anybody in the global 2,500 has this problem."

Not all of the code slipping on by security defenses is customised malware. Consider the Prioxer backdoor Trojan discovered by Symantec. The Trojan does many of the things a typical Trojan would do, such as drop a .dll file, operate command and control through IRC channels. However, because of some trickery between the cached version of the infected file on disk, the Trojan that resides in memory is essentially invisible to the system.

All of this supports a report released by NSS Labs last week that found many antivirus applications fail to find malware that attempts to infect systems through multiple entry points, such as email or USB drives. The independent testing company evaluated the effectiveness of 10 popular antivirus applications against multi-vector attacks (malware delivered from the web, email, network file sharing and USB flash drives), memory-only attacks and anti-evasion techniques.

The report, titled Socially-Engineered Malware Via Multiple Attack Vectors, found that antivirus applications that find malware at one point-of-entry may not detect it in another. For example, a web download could be missed if downloaded from a USB drive or network file server.

The report found that antivirus products miss between 10 percent and 60 percent of the evasions most often used by attackers. Furthermore, less than a third of the tested vendors had protection for memory-only malware, leaving a significant evasion gap in their products.

Typically, according to the report, these evasion techniques include placing a wrapper or a disguise that are applied to exploits and malware in an attempt to thwart detection. "An exploit that is detected by a security product can be modified by an evasion technique to still get through to the target - if the intermediary security product does not have the appropriate anti-evasion capability," the report stated.

None of that surprises Moyer. "It's fairly trivial to customise an exploit to bypass 70 percent of the time. I do it all of the time on engagements," Moyer says.

How important is it for antimalware software to be able to stop each and every attack? Stewart has some sobering news about what the attackers do once they gain any kind of foothold. "They'll conduct a lot of network probing. They'll look for vulnerable network servers, web servers, SQL servers and other areas where they can gain another foothold: weak passwords. File shares, and they'll go from there. Moving point to point and extract whatever data they can," he says.


Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *