Which type of antimalware software recognizes various characteristics of known malware files

Introduction

Cameron Malin, ... James Aquilina, in Linux Malware Incident Response, 2013

Applying Forensics to Malware

Which type of antimalware software recognizes various characteristics of known malware files
Forensic analysis of malware requires an understanding of how to distinguish class from individuating characteristics of malware.

Class Versus Individuating Characteristics

It is simply not possible to be familiar with every kind of malware in all of its various forms.

Best investigative effort will include a comparison of unknown malware with known samples, as well as the conduct of preliminary analysis designed not just to identify the specimen, but how best to interpret it.

Although libraries of malware samples currently exist in the form of antivirus programs and hash sets, these resources are far from comprehensive.

Individual investigators instead must find known samples to compare with evidence samples and focus on the characteristics of files found on the compromised computer to determine what tools the intruder used. Further, deeper examination of taxonomic and phylogenetic relationships between malware specimens may be relevant to classify a target specimen and determine if it belongs to a particular malware “family.”

Once an exemplar is found that resembles a given piece of digital evidence, it is possible to classify the sample. John Thornton describes this process well in “The General Assumptions and Rationale of Forensic Identification”:22

In the “identification” mode, the forensic scientist examines an item of evidence for the presence or absence of specific characteristics that have been previously abstracted from authenticated items. Identifications of this sort are legion, and are conducted in forensic laboratories so frequently and in connection with so many different evidence categories that the forensic scientist is often unaware of the specific steps that are taken in the process. It is not necessary that those authenticated items be in hand, but it is necessary that the forensic scientist have access to the abstracted information. For example, an obscure 19th Century Hungarian revolver may be identified as an obscure 19th Century Hungarian revolver, even though the forensic scientist has never actually seen one before and is unlikely ever to see one again. This is possible because the revolver has been described adequately in the literature and the literature is accessible to the scientist. Their validity rests on the application of established tests which have been previously determined to be accurate by exhaustive testing of known standard materials.

In the “comparison” mode, the forensic scientist compares a questioned evidence item with another item. This second item is a “known item.” The known item may be a standard reference item which is maintained by the laboratory for this purpose (e.g. an authenticated sample of cocaine), or it may be an exemplar sample which itself is a portion of the evidence in a case (e.g. a sample of broken glass or paint from a crime scene). This item must be in hand. Both questioned and known items are compared, characteristic by characteristic, until the examiner is satisfied that the items are sufficiently alike to conclude that they are related to one another in some manner.

In the comparison mode, the characteristics that are taken into account may or may not have been previously established. Whether they have been previously established and evaluated is determined primarily by (1) the experience of the examiner, and (2) how often that type of evidence is encountered. The forensic scientist must determine the characteristics to be before a conclusion can be reached. This is more easily said than achieved, and may require de novo research in order to come to grips with the significance of observed characteristics. For example, a forensic scientist compares a shoe impression from a crime scene with the shoes of a suspect. Slight irregularities in the tread design are noted, but the examiner is uncertain whether those features are truly individual characteristics unique to this shoe, or a mold release mark common to thousands of shoes produced by this manufacturer. Problems of this type are common in the forensic sciences, and are anything but trivial.

The source of a piece of malware is itself a unique characteristic that may differentiate one specimen from another.

Being able to show that a given sample of digital evidence originated on a suspect’s computer could be enough to connect the suspect with the crime.

The denial of service attack tools that were used to attack Yahoo! and other large Internet sites, for example, contained information useful in locating those sources of attacks.

As an example, IP addresses and other characteristics extracted from a distributed denial of service attack tool are shown in Fig. I.1.

Which type of antimalware software recognizes various characteristics of known malware files

Figure I.1. Individuating characteristics in suspect malware.

The sanitized IP addresses at the end indicated where the command and control servers used by the malware were located on the Internet, and these command and control systems may have useful digital evidence on them.

Class characteristics may also establish a link between the intruder and the crime scene. For instance, the “t0rn” installation file contained a username and port number selected by the intruder shown in Fig. I.2.

Which type of antimalware software recognizes various characteristics of known malware files

Figure I.2. Class characteristics in suspect malware.

If the same characteristics are found on other compromised hosts or on a suspect’s computer, these may be correlated with other evidence to show that the same intruder was responsible for all of the crimes and that the attacks were launched from the suspect’s computer. For instance, examining the computer with IP address 192.168.0.7 used to break into 192.168.0.3 revealed the following traces (Fig. I.3) that help establish a link.

Which type of antimalware software recognizes various characteristics of known malware files

Figure I.3. Examining multiple victim systems for similar artifacts.

Be aware that malware developers continue to find new ways to undermine forensic analysis. For instance, we have encountered the following antiforensic techniques in Linux malware (although this list is by no means exhaustive and will certainly develop with time):

Multicomponent

Conditional and obfuscated code

Packing and encryption

Detection of debuggers, disassemblers, and virtual environments

Stripping symbolic and debug information during the course of compiling an ELF file

A variety of tools and techniques are available to digital investigators to overcome these antiforensic measures, many of which are detailed in this book. Note that advanced antiforensic techniques require knowledge and programming skills that are beyond the scope of this book. More in-depth coverage of reverse engineering is available in The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler.23

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124095076000042

Introduction

In Malware Forensics Field Guide for Linux Systems, 2014

Class Versus Individuating Characteristics

▸ It is simply not possible to be familiar with every kind of malware in all of its various forms.

Best investigative effort will include a comparison of unknown malware with known samples, as well as the conduct of preliminary analysis designed not just to identify the specimen, but how best to interpret it.

Although libraries of malware samples currently exist in the form of anti-virus programs and hashsets, these resources are far from comprehensive.

Individual investigators instead must find known samples to compare with evidence samples and focus on the characteristics of files found on the compromised computer to determine what tools the intruder used. Further, deeper examination of taxonomic and phylogenetic relationships between malware specimens may be relevant to classify a target specimen and determine if it belongs to a particular malware “family.”

▸ Once an exemplar is found that resembles a given piece of digital evidence, it is possible to classify the sample. John Thornton describes this process well in “The General Assumptions and Rationale of Forensic Identification”:44

In the “identification” mode, the forensic scientist examines an item of evidence for the presence or absence of specific characteristics that have been previously abstracted from authenticated items. Identifications of this sort are legion, and are conducted in forensic laboratories so frequently and in connection with so many different evidence categories that the forensic scientist is often unaware of the specific steps that are taken in the process. It is not necessary that those authenticated items be in hand, but it is necessary that the forensic scientist have access to the abstracted information. For example, an obscure 19th Century Hungarian revolver may be identified as an obscure 19th Century Hungarian revolver, even though the forensic scientist has never actually seen one before and is unlikely ever to see one again. This is possible because the revolver has been described adequately in the literature and the literature is accessible to the scientist. Their validity rests on the application of established tests which have been previously determined to be accurate by exhaustive testing of known standard materials.

In the “comparison” mode, the forensic scientist compares a questioned evidence item with another item. This second item is a “known item.” The known item may be a standard reference item which is maintained by the laboratory for this purpose (e.g. an authenticated sample of cocaine), or it may be an exemplar sample which itself is a portion of the evidence in a case (e.g., a sample of broken glass or paint from a crime scene). This item must be in hand. Both questioned and known items are compared, characteristic by characteristic, until the examiner is satisfied that the items are sufficiently alike to conclude that they are related to one another in some manner.

In the comparison mode, the characteristics that are taken into account may or may not have been previously established. Whether they have been previously established and evaluated is determined primarily by (1) the experience of the examiner, and (2) how often that type of evidence is encountered. The forensic scientist must determine the characteristics to be before a conclusion can be reached. This is more easily said than achieved, and may require de novo research in order to come to grips with the significance of observed characteristics. For example, a forensic scientist compares a shoe impression from a crime scene with the shoes of a suspect. Slight irregularities in the tread design are noted, but the examiner is uncertain whether those features are truly individual characteristics unique to this shoe, or a mold release mark common to thousands of shoes produced by this manufacturer. Problems of this type are common in the forensic sciences, and are anything but trivial.

▸ The source of a piece of malware is itself a unique characteristic that may differentiate one specimen from another.

Being able to show that a given sample of digital evidence originated on a suspect’s computer could be enough to connect the suspect with the crime.

The denial of service attack tools that were used to attack Yahoo! and other large Internet sites, for example, contained information useful in locating those sources of attacks.

As an example, IP addresses and other characteristics extracted from a distributed denial of service attack tool are shown in Figure I.5.

Which type of antimalware software recognizes various characteristics of known malware files

FIGURE I.5. Individuating characteristics in suspect malware

The sanitized IP addresses at the end indicated where the command and control servers used by the malware were located on the Internet, and these command and control systems may have useful digital evidence on them.

▸ Class characteristics may also establish a link between the intruder and the crime scene. For instance, the “t0rn” installation file contained a username and port number selected by the intruder shown in Figure I.6.

Which type of antimalware software recognizes various characteristics of known malware files

FIGURE I.6. Class characteristics in suspect malware

▸ If the same characteristics are found on other compromised hosts or on a suspect’s computer, these may be correlated with other evidence to show that the same intruder was responsible for all of the crimes and that the attacks were launched from the suspect’s computer. For instance, examining the computer with IP address 192.168.0.7 used to break into 192.168.0.3 revealed the following traces (Figure I.7) that help establish a link.

Which type of antimalware software recognizes various characteristics of known malware files

FIGURE I.7. Examining multiple victim systems for similar artifacts

▸ Be aware that malware developers continue to find new ways to undermine forensic analysis. For instance, we have encountered the following anti-forensic techniques in Linux malware (although this list is by no means exhaustive and will certainly develop with time):

Multicomponent

Conditional and obfuscated code

Packing and encryption

Detection of debuggers, disassemblers, and virtual environments

Stripping symbolic and debug information during the course of compiling an ELF file

▸ A variety of tools and techniques are available to digital investigators to overcome these anti-forensic measures, many of which are detailed in this book. Note that advanced anti-forensic techniques require knowledge and programming skills that are beyond the scope of this book. More in-depth coverage of reverse engineering is available in The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler.45 A number of other texts provide details on programming rootkits and other malware.46

From Malware Analysis to Malware Forensics

The blended malware threat has arrived; the need for in-depth, verifiable code analysis and formalized documentation has arisen, and a new forensic discipline has emerged.

▸ In the good old days, digital investigators could discover and analyze malicious code on computer systems with relative ease. UNIX rootkits like t0rnkit did little to undermine forensic analysis of the compromised system. Because the majority of malware functionality was easily observable, there was little need for a digital investigator to perform in-depth analysis of the code. In many cases, someone in the information security community would perform a basic functional analysis of a piece of malware and publish it on the Web.

▸ While the malware of yesteryear neatly fell into distinct categories based upon functionality and attack vector (viruses, worms, Trojan Horses), today’s malware specimens are often modular, multifaceted, and known as blended-threats because of their diverse functionality and means of propagation.47 And, as computer intruders become more cognizant of digital forensic techniques, malicious code is increasingly designed to obstruct meaningful analysis.

▸ By employing techniques that thwart reverse engineering, encode and conceal network traffic, and minimize the traces left on file systems, malicious code developers are making both discovery and forensic analysis more difficult. This trend started with kernel loadable rootkits on UNIX and has evolved into similar concealment methods on Windows and Linux systems.

▸ Today, various forms of malware are proliferating, automatically spreading (worm behavior), providing remote control access (Trojan horse/backdoor behavior), and sometimes concealing their activities on the compromised host (rootkit behavior). Furthermore, malware has evolved to pollute cross-platform, cloud, and BYOD environments; undermine security measures; disable anti-virus tools; and bypass firewalls by connecting from within the network to external command and control servers.

▸ One of the primary reasons that developers of malicious code are taking such extraordinary measures to protect their creations is that, once the functionality of malware has been decoded, digital investigators know what traces and patterns to look for on the compromised host and in network traffic. In fact, the wealth of information that can be extracted from malware has made it an integral and indispensable part of intrusion investigation and identity theft cases. In many cases, little evidence remains on the compromised host and the majority of useful investigative information lies in the malware itself.

▸ The growing importance of malware analysis in digital investigations, and the increasing sophistication of malicious code, has driven advances in tools and techniques for performing surgery and autopsies on malware. As more investigations rely on understanding and counteracting malware, the demand for formalization and supporting documentation has grown. The results of malware analysis must be accurate and verifiable, to the point that they can be relied on as evidence in an investigation or prosecution. As a result, malware analysis has become a forensic discipline—welcome to the era of malware forensics.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597494700020015

Most Attacks Are Targeted

Bill Gardner, in Building an Information Security Awareness Program, 2014

Common Attack Vectors: Common Results

The common attack vectors in Operation Aurora, Operating Shady RAT, and the targeted attacks against RSA and defense contractors where they all used highly targeted spear phishing to infect the organizations with previously unknown malware, which then siphoned confidential information and intellectual property out of each organization. The other commonality is that these organizations have spent millions, if not tens of millions, of dollars on antivirus, intrusion detection systems, instruction prevention systems, and other information security defenses and they had been circumvented by someone inside of the organization by simply opening a link or an attachment contained in an e-mail, which leads to the compromise of their entire enterprise networks.

All organizations no matter how large or small contain information that is of interest to attackers, and attackers will use any means possible to get to that information. Smaller breaches go unreported because the organization does not know they have been breached or they don’t want to admit to business partners and customers that they have lost data. The goal of state breach notification laws was to address the part of the problem of underreporting. Just because your organization might be small or midsized doesn’t mean that you don’t have information of value. In fact, like most organizations, it is likely that your security program is underbudgeted and understaffed while attackers are well funded and fully staffed by highly trained staff. You are being targeted. Implementing a security awareness program is your best defense against these well-funded, determined attackers.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124199675000041

Mining Android Apps for Anomalies

Konstantin Kuznetsov, ... Andreas Zeller, in The Art and Science of Analyzing Software Data, 2015

10.6 Conclusion and Future Work

By clustering apps according to description topics and identifying outliers by API usage within each cluster, our CHABADA approach effectively identifies applications whose behavior would be unexpected given their description. In [1] we identified several examples of false and misleading advertising; and as a side effect, obtained a novel effective detector for yet unknown malware. This chapter presented several improvements on the original technique and thus introduces a more powerful malware detector.

In the future we plan to provide better techniques to cluster applications according to their descriptions. This should improve the ability of CHABADA to identify relevant abnormal behaviors. Furthermore, we plan to integrate dynamic information in the approach, thus overcoming the known limitations of static analysis.

The dataset we used for our evaluation, as well as a list of more detailed results, are available on the CHABADA website: http://www.st.cs.uni-saarland.de/appmining/chabada/.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124115194000100

Botnet Detection: Tools and Techniques

Craig A. Schiller, ... Michael Cross, in Botnets, 2007

Intrusion Detection

Which type of antimalware software recognizes various characteristics of known malware files

Intrusion detection systems (IDSes) are either host or network based. A NIDS should focus on local and outgoing traffic flows as well as incoming Internet traffic, whereas a HIDS can pick up symptoms of bot activity at a local level that can't be seen over the network.

Which type of antimalware software recognizes various characteristics of known malware files

At either level, an IDS can focus on either anomaly detection or signature detection, though some are more or less hybrid.

Which type of antimalware software recognizes various characteristics of known malware files

IDS is important, but it should be considered part of an Internet prevention system strategy, whether it's part of a full-blown commercial system or one element of a multilayered defense.

Which type of antimalware software recognizes various characteristics of known malware files

Virus detection is, or should be, an understatement: It should sit at all levels of the network, from the perimeter to the desktop, and include preventative and recovery controls, not just detection.

Which type of antimalware software recognizes various characteristics of known malware files

Antivirus is capable of detecting a great deal more than simple viruses and is not reliant on simple detection of static strings. Scanners can detect known malware with a very high degree of accuracy and can cope with a surprisingly high percentage of unknown malware, using heuristic analysis.

Which type of antimalware software recognizes various characteristics of known malware files

However, bots are capable of not only sophisticated evasion techniques but present dissemination-related difficulties that aren't susceptible to straightforward technical solutions at the code analysis level.

Which type of antimalware software recognizes various characteristics of known malware files

There is a place for open-source antivirus as a supplement to commercial solutions, but it's not a direct replacement; it can't cover the same range of threats (especially older threats), even without considering support issues.

Which type of antimalware software recognizes various characteristics of known malware files

Snort is a signature-based NIDS with a sophisticated approach to rule sets, in addition to its capabilities as a packet sniffer and logger.

Which type of antimalware software recognizes various characteristics of known malware files

As well as writing your own Snort signatures, you can tap into a rich vein of signatures published by a huge group of Snort enthusiasts in the security community.

Which type of antimalware software recognizes various characteristics of known malware files

The flexibility of the signature facility is illustrated by four example signatures, one of which could almost be described as adding a degree of anomaly detection to the rule set.

Which type of antimalware software recognizes various characteristics of known malware files

Tripwire is an integrity management tool that uses a database of file signatures (message digests or checksums, not attack signatures) to detect suspicious changes to files.

Which type of antimalware software recognizes various characteristics of known malware files

The database can be kept more secure by keeping it on read-only media and using MD5 or snefru message digests.

Which type of antimalware software recognizes various characteristics of known malware files

The open-source version of Tripwire is limited in the platforms it covers. If the devices you want to protect are all POSIX compliant and you're not bothered about value-adds like support and enterprise-level management, and if you're happy to do some DIY, it might do very well.

Which type of antimalware software recognizes various characteristics of known malware files

Ken Thompson's “Reflections on Trusting Trust” makes the point that you can't have absolute trust in any code you didn't build from scratch yourself, including your compiler. This represents a weakness in an application that relies for its effectiveness on being installed to an absolutely clean environment.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978159749135850007X

Building a Sandbox

In Virtualization for Security, 2009

Solutions Fast Track

Sandbox Background

Which type of antimalware software recognizes various characteristics of known malware files

Sandboxes are a common tool in security/malware research; they allow the execution of unknown software in a controlled, restricted and monitored environment

Which type of antimalware software recognizes various characteristics of known malware files

CWSandbox is example of a sandbox tool for automatic behavior analysis of Windows executables; the functionality of a sandbox is achieved by taking the following steps:

1

The initial malware process is created by the starter application cwsandbox.exe.

2

cwmonitor.dll is injected into each monitored process.

3

The DLL installs API hooks for all important functions of the Windows API.

4

If a new process is started by the malware or an existing one is infected, this process is also monitored.

5

After a customizable time all monitored processes are terminated/stopped.

6

A high-level summarized analysis report is created of all the monitored actions.

7

The network traffic is examined, important Web protocols (HTTP, FTP, IRC, and so on) are recognized and all relevant protocol data is reported (username, password, and so on).

Existing Sandbox Implementations

Which type of antimalware software recognizes various characteristics of known malware files

Norman SandBox was developed by Norman AS. at http://sandbox.norman.no.

Which type of antimalware software recognizes various characteristics of known malware files

TTAnalyze was developed by Ulrich Bayer, Ikarus Software GmbH, in cooperation with the Technical University of Vienna.

Which type of antimalware software recognizes various characteristics of known malware files

In Chas Tomlin's Sandnet the malicious software is executed on a real Windows system, not on an emulated or simulated one.

Which type of antimalware software recognizes various characteristics of known malware files

Truman is tThe Reusable Unknown Malware Analysis Net, by Joe Stewart from LURHQ.

Which type of antimalware software recognizes various characteristics of known malware files

CWSandbox is from the diploma thesis of Carsten Willems.

Describing CWSandbox

Which type of antimalware software recognizes various characteristics of known malware files

CWSandbox is an application for the automatic behavior analysis of malware. This dynamic analysis is performed by executing the malicious application in a controlled environment and catching all relevant of its calls to the Windows API

Which type of antimalware software recognizes various characteristics of known malware files

CWSandbox is designed to attach reporting tools to malware. It is not designed to block malicious activity of the malware. You are responsible for blocking any outbound traffic that may result from executing the malware.

Which type of antimalware software recognizes various characteristics of known malware files

Malware may be able to detect the presence of a virtual environment by checking specific registry entries, the list of running processes or system services, or typical behavior of the system. Many detection methods are known for the popular VMware product. The website www.trapkit.de describes a lot of them and also offers the tools scoopy doo and jerry for that purpose. Joanna Rutkowska described a generic approach to VM detection which she called redpill. Redpill checks the IDT address retrieved when running in a virtual machine since it is different to that in a real system. This trick works with any virtualization software.

Which type of antimalware software recognizes various characteristics of known malware files

Sandbox technology can be extended to serve as a tool for automatic collection and analysis of malware, as in Automated Analysis Suite (AAS).

Which type of antimalware software recognizes various characteristics of known malware files

AAS uses a database to store malware samples and the corresponding created analysis reports

Which type of antimalware software recognizes various characteristics of known malware files

AAS integrates the honeypot tool Nepenthes for automatic malware collection

Which type of antimalware software recognizes various characteristics of known malware files

Additionally, malware can be submitted via a PHP-based Web interface

Which type of antimalware software recognizes various characteristics of known malware files

AAS embeds CWSandbox for automatic analysis.

Creating a Live DVD with VMware and CWSandbox

Which type of antimalware software recognizes various characteristics of known malware files

Once you have created a sandbox, you can turn that implementation into a bootable DVD so that you can take the sandbox into the field.or distribute the tool to a classroom of students to give them hands-on malware analysis experience.

Frequently Asked Questions

Q:

What kind of things can you find using sandbox technology?

A:

You are only limited by the instruments that you attach to the malware. You can learn the ip addresses of FQDN of different members of a botnet, the identity of command and control servers, malicious code download servers, the nickname, userid and password of bot command and control servers, unpacked and unencrypted versions of stealth malware, the filenames of files that are part of the malicious system, a list of all files opened by the malware, and more.

Q:

I really like the Live DVD idea. How can I create my own Live-CDs and DVDs using other content?

A:Instructions for creating your own Live-CDs and DVDs can be found on howtoforge. We used a how-to written by Falko Timme, “Creating Your Own Custom Ubuntu 7.10 Or Linux Mint 4.0 Live-CD With Remastersys,” Copyright © 2008 HowtoForge.

Q:

What does virtualization do for Sandbox technology?

A:

Virtualization makes it possible for a security investigator to try multiple tests on a malware sample without having to wipe the test system's hard drive between test sessions. Without virtualization, the measures to ensure integrity could be provided using reverting tools such as DeepFreeze, Partimage, or hardware restore solutions. The virtual environment permits investigators to create several members of a network to examine the interaction of a botnet.

Q:

I don't want to give away my licensed copies of Windows or Cwsandbox. How do I create a Live DVD that doesn't include my license keys?

A:

You can use SYSPREP and the process located http://www.uea.ac.uk/itcs/software/xp/xp-sysprep.html to remove the product keys so that a new owner of the DVD can use their own product keys. If you created the image file after you install the sandbox but before you enter the license, then the new owner of the DVD will need to provide their own license or add a different sandbox product.

Notes

1

For more information go to http://sandbox.norman.no/pdf/03%20sandboxwhitepaper.pdf.

2

This utility saves/restores hard disc partitions in many formats to an image file (see www.partimage.org).

3

This tool is for resetting your computer to its original state (see www.faronics.com/html/deepfreeze.asp).

4

Right-click on free space on /dev/sda or /dev/had to create partitons in the free space.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597493055000037

Malware Attacks

Carl Timm, Richard Perez, in Seven Deadliest Social Network Attacks, 2010

Protecting Yourself

Malware, XSS, and CSRF are not just going to go away. These types of attacks are always changing and becoming more prevalent everyday. With the advent of Social Network sites, attackers now have another medium to deploy malware and perform XSS and CSRF exploits.

The sheer number of users that frequent these sites, tied to the trust associated with them, make social networks a very attractive medium for attackers. Social networks are not going to go away, and we are not just going to stop using them. So, we better figure out how to protect ourselves while using them.

This section is going to be divided into three parts: Malware Defense, Cross-Site Scripting Defense, and Cross-Site Request Forgery Defense. In each section, we will explore the different countermeasures available to us to mitigate these different attacks.

Mitigating Malware

As we've learned, there is a vast variety of malware. The question is, “How can we protect ourselves?” The first and foremost way to protect ourselves is through knowledge. That's a pretty vague statement, isn't it? What is meant by this statement is to keep yourself up-to-date on the different malware currently running rampant. This can be accomplished by reading trade magazines, attending courses on hacking techniques, and frequenting sites such as CERT at www.cert.org, to name a few.

Knowledge is the first step in any defense. Malware becomes really interesting. There really are two types of malware we need to protect ourselves against. There is malware that is known and malware that isn't known. Protecting ourselves against known malware isn't all that complicated. We can utilize the following steps to protect ourselves against known malware. We will include some additional items for corporations:

Don't click on unknown links.

Never open e-mail attachments from people you don't know.

Do not accept friends you don't know.

Do not use applications you are not familiar with.

Ensure you configure your privacy settings.

Install and run antivirus software.

Keep antivirus software up-to-date with the latest signature updates.

All downloaded files should be scanned by antivirus software prior to opening it or running it.

Install and run antispyware software.

Keep the signature files for antispyware software up-to-date.

Utilize the most up-to-date patches for your software.

Do not use any storage media that has been used in another computer, unless you are certain the computer is free of viruses and will not pass the virus on to your system.

Install and run local firewalls on your desktops and laptops.

Additional items for corporations:

Implement a security awareness program.

Utilize network-based intrusion detection/prevention systems at entry points to your environment and around critical systems.

Utilize host-based intrusion detection/prevention software on your critical servers.

Utilize Web filtering proxies to limit the Web sites employees can visit.

Utilize Web malware filtering to scan traffic for malware and inappropriate links.

Limit the use of instant messaging software.

Limit the use of peer-to-peer networks.

This list is only a portion of the tools that can be used to protect a corporation. To truly implement security in a corporate environment, one will first need to create a security-to-policy that states the corporation's view on security.

Tip

It may be a little confusing to differentiate between malware detection software and antivirus software. Antivirus software is primarily utilized to scan a hard disk for viruses, worms, and Trojan horses, and removes, fixes, or isolates any threats that are found. Antispyware software scans your hard disk and registry for traces of spyware and adware and then either removes them or prompts the user to remove them. The real difference between antivirus and antispyware lies in what the software is looking for. Today antivirus software is offered with add-ons for antispyware, and antispyware software is offered with add-ons for antivirus. However, it is still recommended to install one antivirus software and a different antispyware software.

As simple and sensible as these protection mechanisms may seem, guess what? A good number of people still do not utilize them. What's harder to defend against is unknown malware. Unknown malware is just that malware that has not been discovered yet. These types of attacks are known as zero-day attacks. This means that no signatures exist for such antivirus and antispyware software. Also, once new malware has been detected, there is still a lag period between the time it is detected and when the signature is available. So, how can we protect ourselves against this unknown malware?

There are a multitude of methods and products that can be utilized in the defense of unknown malware. Some of the more common methods include the following:

Utilize network-based intrusion prevention systems.

Utilize host-based intrusion prevention software.

Restrict administrative rights.

Utilize products that can implement blacklist and whitelist. A blacklist is a list of sites that are not trusted, whereas a whitelist is a list of trusted sites.

Disable active content, such as activeX.

Utilize multiple versions of antivirus and antispyware software. What one vendor's software misses the other may detect.

Lock down USB ports. USB drives used on other devices may contain viruses.

Disable unneeded services. Attackers are aware of the different default services running on operating systems. They can use these services as a means of infecting a system. Disabling unneeded services will reduce one's chance of being infected.

Warning

Intrusion prevention systems use an anomaly-based method to detect zero-day attacks. The way this works is by placing the intrusion prevention system in what is commonly referred to as “learning mode.” During learning mode the system learns what the “normal” communications are in the environment. Once moved from “learn mode” to “protect mode,” the system will allow “normal” communications and prevent the anomaly traffic. This sounds good in theory; however, what the system considers “normal” communications may not be what your company considers “normal” communications. If this is the case, a large amount of company traffic could be blocked. So, when implementing intrusion prevention systems, the results of the learn mode should be reviewed and tweaked to match the actual “normal” traffic for your environment.

Once again, this list is only a list of some of the most common mitigation techniques. It is by no means an exhaustive list and should not be taken that way. Implementing these techniques will reduce the chance of infection; however, it will not eliminate the possibility. Nothing can ever guarantee that one will not become infected.

Mitigating Cross-Site Scripting Attacks

XSS is a very nasty attack technique. As mentioned earlier, a good amount of the mitigation of XSS resides with the social networks. However, we are not going to leave the end user hanging out to dry. There are still some things we can do to help protect ourselves. To begin with we need to do all of the following:

Disable scripting when it is not required.

Disable cookies.

Disable active content, such as activeX.

Do not ever trust links to other sites that you don't know if they are safe or not.

Do not ever trust links in e-mails that you don't know if they are safe or not.

Do not follow links from sites that lead to security-sensitive pages involving personal or business information unless you truly trust them.

Only access sites through their site directly and not through any third-party sites.

Utilize desktop firewalls.

Utilize host-based intrusion prevention software.

This list is just a list of the some of the things one can do to help reduce their risks of encountering an XSS attack. A company can help in mitigating XSS by performing the following:

Implement application layer firewalls.

Implement network-based intrusion prevention systems.

Implement Web content filters.

Disallow the use of instant messaging.

Implement application layer proxies.

Disallow the use of peer-to-peer software use.

Performing application vulnerability scans.

Performing application code reviews.

These are just mitigation techniques that can be utilized to reduce one's chance of being hit by an XSS attack. The unfortunate reality is that there is little the user can do, except by being smart about what they are doing. It really falls on the Web sites and social networks to make sure that they have reviewed their code for vulnerabilities, implemented the proper filters, and other mitigation techniques, such as application firewalls.

Mitigating Cross-Site Request Forgery Attacks

These are the worst types of attacks in some people's eyes. They are able to access information that you have opened in another browser, such as your bank account information. Guess what? Once again, unfortunately, there is not a whole lot we can do from the end user standpoint to protect ourselves. We can implement everything we discussed earlier, such as:

Not clicking on links we don't trust.

Not opening e-mail we did not expect to receive.

Disabling active content.

Disabling scripts.

There are a few additional items we can do in addition to all of the mitigation techniques we have already discussed:

Do not connect to other sites while being connected to your bank account.

Do not connect to other sites while being connected to your trading account.

Logout of the account.

Limit your time and activity on sites.

Log in to your accounts, get done what you need to, and then disconnect.

Once again, these are common sense items we should all follow. However, most of us have our Facebook, Twitter, MySpace, and bank account sites up all at the same time. Oh yeah, let's not forget that we opened another window to do some browsing. This is nothing more than a recipe for disaster.

Epic Fail

There was a friend, whose name we won't mention, that fell victim to a CSRF attack. This friend had implemented every security precaution you could think of, dual forms of antivirus and spyware protection, as well as desktop firewall with some host-based intrusion prevention options. However, this friend managed to lose $1,000.00. This friend was paying his bills through his online bank account when he received an e-mail from a friend telling him to check this site about a place they were going to visit. Little did either of them know that this site had a CSRF attack placed on it. When my friend visited the site, the attack proceeded and the money ended up being sent as a payment from his account to a company overseas for “services rendered.” He was able to get his money back by calling the fraud department and explaining what had happened. However, it took a while and was a really big pain. This just goes to show it can happen to anyone.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597495455000021

Malware detection employed by visualization and deep neural network

Anson Pinhero, ... AnanthaKrishnan S, in Computers & Security, 2021

2.1 Similarity based malware detection techniques

Zhong et al. (2012) created a feature database based on the analysis of known malware programs. In the case of unknown malware, these functions are compared to the content of the database to determine the family it belongs to. Authors use a filtering algorithm based on one-class SVM to calculate similarity . Finally, they carried out an experiment with 113 malware samples. They observed that their approach consumes less time for similarity calculation. B. Kang et al. Kang et al. (2012) propose a malware classification method, that is based on block comparison , and identifies the core parts of binaries that can represent a family of malware, and thus reduce the overhead of using the whole file.

Andro-profiler (Jang et al., 2016) is a behavior-based mobile malware detector. It executes malicious application on emulator to extract integrated system logs. Then, generates behavior profiles by analyzing the system logs. It compares the behavior profile of malicious application with representative behavior profiles for each malware family using a weighted similarity matching technique. Other authors proposed (Taheri et al., 2019) four malware detection techniques using Hamming distance which are first nearest neighbors (FNN), all nearest neighbors (ANN), weighted all nearest neighbors (WANN), and k-medoid based nearest neighbors (KMNN). They evaluated these techniques on three datasets with benign and malware Android apps like Drebin, Contagio and Genome. They tested their models on features like API, intent and permissions of the three datasets. Using API as features, they achieved higher accuracy compared to other state of art methods.

Read full article

URL: https://www.sciencedirect.com/science/article/pii/S0167404821000717

A survey on machine learning-based malware detection in executable files

Jagsir Singh, Jaswinder Singh, in Journal of Systems Architecture, 2021

7 Future directive

Now the question is how to develop a malware classifier which can cope with these issues. As we know continuously, malware analysts analyze the malware samples and keep updating the malware detection system to stop the malware attacks. Presently, only signature-based techniques are almost helpless to detect new malware. Therefore another approach is behaviour-based malware detection which gives hope for handling new malware. So we will develop a hybrid framework, not like previously proposed hybrid techniques. This proposed technique will be implemented using two-layered architecture. At the first level, signature-based malware detection will be done, if it does not succeed than performs the second level using the behaviour-based analysis techniques. The first layer can easily detect known and simple unobfuscated malware while dynamic analysis can predict the unknown malware using the run-time feature of that. And at the occurrence of each new malware, the database will be updated which can be further used to predict future malware. Fig. 9 shows the framework of the malware detection system.

In this technique, the dynamic analysis will be performed using both automatic sandboxing (like Cuckoo sandbox) and various dynamic analysis tools like Ollydbg, Regshot, Wireshark and ProcMon for gathering runtime features. And, the static analysis will be done using tools like PExplorer, Peview, PeId and IDA pro to extract static features like strings, imports, exports, etc. Then, malware classifiers will be trained using machine learning algorithms. This technique will inherit advantages of signature-based and behaviour-based technique by detecting known malware efficiently and detecting unknown malware using runtime behaviour, In addition to this, during the static and dynamic analysis, we will apply anti-obfuscation techniques for analyzing malware samples properly. It is merely achievable after analyzing malware and benign samples using static and dynamic malware analysis techniques.

Table 12. Chronological study of various famous malware.

YearMalware attacks
1986 Virus IBM-PC Brain virus was released
1987 Jerusalem virus was developed to destroy the files on every Friday. It was the first time based triggered malware.
1988 The very famous Morris Worm was created. It spread all over world though internet
1991 Michelangelo virus was designed to infect the DOS operating system.
1999 In this year more advanced malware such as Melissa Worm, Happy99 virus and Kak worm was developed. These malware were spread by internet users,
2000 A VBScript worm, ILOVEYOU infected the millions of Windows operation systems.
2001 CodeRed worm affected computer system by exploiting the buffer overflow vulnerability and Anna Kournikova email worm affected the email server system all over the world. Also, Nimda malware was released in 2001 which affect the window based computer systems.
2002–2003 Through this period, internet users got affected by unnecessary pop-up and malicious JavaScripts code. In these years, social engineering spams and worms started appearing for stealing credit card details. Few notable worms like Slammer and Blaster were created which slowed down the internet services to user and executed DoS attacks.
2004 MyDoom, Netsky and Bagle email worms were created in the steam of competition between the authors. It actually helped to improve the email filtering and scanning systems at that time.
2005 Sony rootkit malware was created which led to develop the modern day rootkit malware.
2006 A variety of monetary scams like lottery, phishing and Nigerian 419 scams were widespread during this time.
2007 Websites were compromised in large part of globe like crimeware kit was used to execute the exploits on the internet. Some famous compromised websites were The Sun, Miami Dolphins Stadium, MySpace, Photobucket and the India Times. SQL injection attack also had begun by end of this year.
2008 At this time, websites hacking and stealing FTP credentials took off place. Not only websites, PCs had been compromised and controls of them were taken to perform malicious activities without user knowledge. In June 2008, Asprox botnet (a network of compromised PCs) executed a SQL Injection attack and claimed that Walmart is victim of SQL injection attack.
2009 Gumblar malware infected windows systems which were the running the older version of OS. This weakness of older system led to create a botnet of such users.
2010 In this year a very famous cyber attack Stuxnet was done which gave news to world that what a malware attack can do to damage the industrial or any organization systems with just one click. It was so destructive which damages Iranian nuclear centrifuges. It is viewed as one of most advanced type of malware ever created in history.
2011 Trojan horse called Zero access was created for Window systems. It had been downloaded in the system through botnet. It was kept hidden in the operating system using rootkits and spread via bitcoin mining software.
2012 Shamoon attacked the computers of energy sector and CrySyS malware was very complex malware cited by Cybersecurity lab. Also, flame malware was very popular malware for cyber espionage especially in the Asia continent.
2013 It was the rising time of ransomware malware. CryptoLocker Trojan horse encrypted the users files and demanded to pay a ransom for getting the decryption key. Other malware like Gameover Zeus employed keystroke logging for stealing the login credentials of the users
2014 Regin Trojan horse was developed for mass surveillance and espionage purpose in UK and US.
2016 Locky ransomware encrypted the data of million computers in the Europe. Mirai executed very destructive DDoS attack on the various well
2017 WannaCry, one of very destructive ransomware attack happened on 12th May, 2017. It encrypted the data of million users from more than 150 countries. It did the damages of millions of dollars. In this year another ransomware Petya was released which was the advanced version of previous ransomware Petya(2016).
2018–20 In this period various crypto miners and ransomware were developed like SamSam ransomware, COVID19 RAT, Clop ransomware, Cyborg ransomware, etc.

The aim of this proposed technique to bridge the gap between signature-based and behaviour-based techniques. The development of the two-layered model of hybrid technique will provide the real-time implementation of the malware detection system. Also, with the application of multiple ML algorithms will give more resilience to the hybrid model against adversarial machine learning.

Read full article

URL: https://www.sciencedirect.com/science/article/pii/S1383762120301442

A survey of malware detection in Android apps: Recommendations and perspectives for future research

Asma Razgallah, ... Kobra Khanmohammadi, in Computer Science Review, 2021

2.3 Other methods

Finally, we list in a third category static methods that do not squarely fall into API or source code analysis.

2.3.1 DroidRanger

The DroidRanger tool [33] detects the characteristic behaviors present in malware from several malicious families. It relies on a crawler to collect Android applications from existing Android markets and stores them in a local repository. For each application collected, DroidRanger extracts the fundamental properties associated with each application (requested permissions, author information, etc.) and organizes them into a central database.

DroidRanger performs two distinct detection processes. The first, for known malware, is based on a permission-based behavioral footprint. The second, for previously unknown malware, is based on a heuristic analysis of the app’s behavior, as reconstructed from the bytecode and the manifest file. Suspicious applications are then executed and monitored to verify if they actually display malicious behavior at runtime. If this is the case, the associated behavioral fingerprint will be extracted and included in the first detection process’ database.

This study was tested on the most popular applications of the year 2011, and yielded positive results. However, DroidRanger only covers free applications and only five Android markets, with a false negative rate of 4.2%.

2.3.2 DREBIN

Arp et al. created DREBIN [4], a tool that performs malware detection on the results of a static analysis of the applications. DREBIN’s feature set appears to be one of the most thorough of all the works we have surveyed. In all, they create 8 feature sets for each app, using data from the Android manifest file (including permissions, components and requested hardware), and from the decompiled .dex file (including selected API calls and network addresses). The entire feature set is constructed in linear time, without necessitating complex static analysis such as data flow analysis.

Detection is then performed using SVMs. In order to maintain a lightweight footprint on the end-users’ device, training is not performed on the smartphone itself. Instead, the classifier is trained offline, and the only resulting model is passed to the user. In order to provide explanations for its results, DREBIN’s classifier is trained not only to detect, but also to identify the features that lead to the application being flagged as malware. From these, DREBIN constructs a parametrized sentence that explain the reason of the verdict to the user.

DREBIN was tested using 131611 benign apps coming from the GooglePlay Store, as well as two other markets (one Chinese and one Russian), and 5560 malware samples from the Android Malware Genome Project [34]. It obtained a detection rate of 93%, with only 1% of false-positives, outperforming several anti-virus software on the same dataset.

Read full article

URL: https://www.sciencedirect.com/science/article/pii/S1574013720304585

Which type of antimalware software detects and mitigates malware by recognizing general features shared by various types of malware?

Malwarebytes is an example of an antimalware tool that handles detection and removal of malware. It can remove malware from Windows, macOS, Android and iOS platforms. Malwarebytes can scan a user's registry files, running programs, hard drives and individual files.

Which antimalware software approach can recognize?

What type of antimalware program is able to detect viruses by recognizing various characteristics of a known malware file? Using a signature-based approach, host security software can detect viruses and malware by recognizing various characteristics of known malware files.

What is malware protection software?

What is antimalware (anti-malware)? Antimalware is a type of software program created to protect information technology (IT) systems and individual computers from malicious software, or malware. Antimalware programs scan a computer system to prevent, detect and remove malware.

What are anti

Comodo for example contains BOClean Anti-Malware Protection Software. It's an advanced security feature that destroys malware as soon as it enters the computer. Trend Micro has a sandbox where suspicious files are analyzed. Kaspersky has a Security Cloud that adapts to your browsing habits to keep you protected.