Enhancing Malware Detection Doug Cooke Director Sales Engineering

  • Slides: 16
Download presentation
Enhancing Malware Detection Doug Cooke Director, Sales Engineering Canada January 19, 2022

Enhancing Malware Detection Doug Cooke Director, Sales Engineering Canada January 19, 2022

Malware Evolution Floppy disk attacks 1992 -3 File infectors, macro viruses Spy, Adware Obfuscation

Malware Evolution Floppy disk attacks 1992 -3 File infectors, macro viruses Spy, Adware Obfuscation Email worms 1998 Early Days Autorun worms Web 2. 0 attacks 2002 2005 Aurora, Conflicker 2008 Financially Motivated Poly patching Trojans Hacktivism 2010 Stux. Net, Shamoon 2012 Targeted Attacks Future

Time To React Time to React Floppy disk attacks 1992 -3 File infectors, macro

Time To React Time to React Floppy disk attacks 1992 -3 File infectors, macro viruses Spy, Adware Obfuscation Email worms 1998 Early Days Autorun worms Web 2. 0 attacks 2002 2005 Aurora, Conflicker 2008 Financially Motivated Poly patching Trojans Hacktivism 2010 Stux. Net, Shamoon 2012 Targeted Attacks Future

Case Study: What is Project Blitzkrieg • Code name for a Mc. Afee Labs

Case Study: What is Project Blitzkrieg • Code name for a Mc. Afee Labs project monitoring an attack against NA banking community • RAS identified the malware as belonging to the Gozi family and labeled it Prinimalka • Man in the Middle attack targeting banking customers • Banks security measures could not detect or prevent • Incorporates “web injects” – code injected into the browser based on URL • Campaign of attacks started in Spring 2012, continued activity with new variants had continued into 2013. How can we monitor these attack campaigns? How quickly can we identify Patient Zero and stop propagation?

Four Phases of an Attack First Contact Local Execution Physical Access Exploit Establish Presence

Four Phases of an Attack First Contact Local Execution Physical Access Exploit Establish Presence Malicious Activity Download Malware Propagation Bot Activities Unsolicited Message Escalate Privilege Social Engineering Malicious Website Network Access How the attacker first crosses path with target. Adware & Scareware Persist on System Configuration Error How the attacker gets code running first time on target machine Self-Preservation How the attacker persists code on the system, to survive reboot, stay hidden, Hide from user and security software Identity & Financial Fraud Tampering The business logic, what the attacker wants to accomplish, steal passwords, bank fraud, purchase Fake AV

Four Phases of an Attack Example: Fake AV First Contact Local Execution Physical Access

Four Phases of an Attack Example: Fake AV First Contact Local Execution Physical Access Exploit Establish Presence Malicious Activity Download Malware Propagation Bot Activities Unsolicited Message Escalate Privilege Social Engineering Malicious Website Adware & Scareware Persist on System Network Access Configuration Error How the attacker first crosses path with target. How the attacker gets code running first time on target machine Self-Preservation How the attacker persists code on the system, to survive reboot, stay hidden, Hide from user and security software Identity & Financial Fraud Tampering The business logic, what the attacker wants to accomplish, steal passwords, bank fraud, purchase Fake AV

Phase Protection Methods First Contact Local Execution Establish Presence Malicious Activity On Access Scanning

Phase Protection Methods First Contact Local Execution Establish Presence Malicious Activity On Access Scanning File Scanning Write Blocking Website Filtering Endpoint Health Rootkit Prevention Physical File Transfer Firewall Web Filtering Email Filtering Buffer Overflow Prevention Whitelisting Behavioral Prevention Change Protection

Evolution of Content Time to Protect Reactive Signatures Months 1992 -3 1998 Early Days

Evolution of Content Time to Protect Reactive Signatures Months 1992 -3 1998 Early Days Hours Days 2002 2005 2008 Financially Motivated 2010 2012 Targeted Attacks Future

Evolution of Content Reactive Signatures 1992 -3 1998 Early Days Signatures + Cloud Reputation

Evolution of Content Reactive Signatures 1992 -3 1998 Early Days Signatures + Cloud Reputation 2002 2005 2008 Financially Motivated 2010 2011 Targeted Attacks Future

Cloud Based Reputation Malicious Code – Anti-Malware – Anti-Spyware – Whitelisting Network IPS Web

Cloud Based Reputation Malicious Code – Anti-Malware – Anti-Spyware – Whitelisting Network IPS Web Gateway File, Mail IP, Domain Geo Location Servers Mail Gateway Mobility Protection – Anti Malware ATMs Network Mobile Devices Hashed File Look Ups Malicious Code – Anti-Malware – Anti-Spyware – Whitelisting Workstations IP and Domain Reputation Queries Time to Protect – Minutes! Internet

Evolution of Content Reactive Signatures 1992 -3 1998 Early Days Signatures + Cloud Reputation

Evolution of Content Reactive Signatures 1992 -3 1998 Early Days Signatures + Cloud Reputation 2002 2005 2008 Financially Motivated Signatures + Cloud Reputation + Telemetry 2010 2011 Targeted Attacks Future

US Campaign (victims) – Oct 1 st – Nov 30 th, 2012

US Campaign (victims) – Oct 1 st – Nov 30 th, 2012

Distribution of C&C Servers

Distribution of C&C Servers

Adding Context to the Content • Leverage 100 M+ consumers base plus opt-in enterprises

Adding Context to the Content • Leverage 100 M+ consumers base plus opt-in enterprises • Enhanced scanning engines to collect further data during scanning activities – HASH of malware file & originating IP – file paths, processes, features of the file etc. – upload suspicious file • Enhanced scanning drivers allow specific data to be pulled from specific types of malware – e. g. Blitzkrieg – establish cloud based data for FI to monitor attacking IPs – e. g. Spy. Eye - pull institution specific data from java scripts • The enriched data introduces the opportunity for greater analysis and correlation of collected data • Expose this data to customers through a service offering Access to Zero Day Attacks as Quickly as Possible

Getting Out in Front!

Getting Out in Front!

Summary • Will use these talking point for previous slide • The malware community

Summary • Will use these talking point for previous slide • The malware community will continue to find creative approaches to wreak havoc around the computing community. • New technologies (whitelisting etc. ) will help but the opportunity still exists to leverage more sophisticated detection capabilities. • Pulling contextual information from active systems will enhance the effectiveness of cloud based reputation databases.