SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
The Modern Malware Review
Analysis of New and Evasive Malware in Live Enterprise Networks | 1st Edition, March 2013
THE MODERN MALWARE REVIEW | MARCH 2013
PAGE 2
TABLE OF CONTENTS
Background and Goals	 3
	 A Focus on Actionable Research	 3
	 Separating the Known-Unknowns from the Unknown-Unknowns	 3
	 About the Data and the Methodology	 4
	 About WildFire	 5
Summary of Key Findings	 5
Web Traffic Is Where the Problems Are	 5
	 90% of Unknown Malware Delivered Via Web-Browsing	 6
	 5 Days to Coverage for Email, 20 Days For Everything Else	 7
	 Challenges of Web-Based Malware	 8
	 Conclusions and Recommendations	 8
Identifiers in Unknown Malware	 9
	 40% of Samples Retained Identifiers in the Payload	 9
	 30% of Samples Generated Custom or Unknown Traffic	 10
	 Suspicious Malware Traffic	 11
	 Summary, Conclusions and Recommendations	 12
Malware Traffic on Non-Standard Ports	 13
	FTP	 13
	 Web Browsing	 13
	 Custom and Unknown TCP and UDP	 14
	 HTTP Proxy	 14
Malware Behaviors on the Host	 15
	 Analysis Avoidance	 16
	Persistence	 17
	 Hacking and Data Theft	 17
Summary	18
PAGE 3
BACKGROUND AND GOALS
The Modern Malware Review presents an analysis of 3 months of malware data derived from
more than 1,000 live customer networks using WildFire™
(Palo Alto Networks™
feature for
detecting and blocking new and unknown malware). The review focuses on malware samples
that were initially undetected by industry-leading antivirus products.
A FOCUS ON ACTIONABLE RESEARCH
The goal of focusing on unknown or undetected malware is not to point out deficiency in traditional
antivirus solutions—but rather to better understand the problems, and hopefully identify practices
that can help. As such, the report provides analysis of the malware, but also includes recommen-
dations based on the findings. Some of these recommendations are common sense, and we don’t
propose they are a panacea for modern malware and APTs. The goal is simply to share information
that can help security teams be more proactive in their fight against modern malware and
advanced threats.
SEPARATING THE KNOWN-UNKNOWNS FROM THE UNKNOWN-UNKNOWNS
Part of the problem when talking about advanced malware is agreeing what we really mean by
modern malware. There is an incredible amount of malware diversity even when we focus on new
and unknown malware. There are highly sophisticated, highly targeted sources of custom malware
and APTs (e.g. APT1, Stuxnet, and Flame). But there are also legions of more traditional malware
operations that generate malware at scale that are also able to get by traditional defenses (e.g.
Zeus, Zero Access, Kelihos). Both of these categories present security risks that need to be managed,
but obviously vary considerably in volume and the risk posed to the enterprise.
The latter, more common type of malware stands to potentially overwhelm security teams if each
new variant of known malware requires a manual response from the security team. If too much
“normal” malware goes undetected, then security teams will obviously have a very difficult time
finding the truly targeted and unique threats in their networks. As a result we believe that it’s crucial
for enterprises to reduce the overall volume of infections from variants of known malware, so
that security teams have the time to focus on the most serious and targeted threats.
One of the key values of being able to analyze real-world malware at a large scale is the ability
to distinguish between common and repeated threats and those that are unique. As such, in the
report we take a look both at the large-scale trends, but also at some of the samples that quite
literally were exceptional. We hope the results of this analysis will help security managers to
not only reduce the impact of the “known-unknowns”, but also to reveal the presence of the
“unknown-unknowns” as well.
ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS
PAGE 4
ABOUT THE DATA AND THE METHODOLOGY
Malware samples were collected in live enterprise networks as part of the WildFire functionality
for controlling modern malware. As part of our normal analysis we test malware samples collected
by WildFire against fully updated antivirus products from 6 industry-leading enterprise antivirus
vendors. This review focuses solely on all malware collected in a 3-month period that initially
had no coverage from any of the tested vendors. This included more than 26,000 malware samples.
Again, the intent is not to point out that some malware gets by traditional antivirus, but rather to
provide actionable insight into the problem – what malware strategies are the most successful,
why, and how can security teams do to respond.
Summary of Data Sources
n	 3 months of WildFire data.
n	 1,000+ live enterprise networks.
n	 Samples were tested against 6 fully-updated, industry-leading antivirus products.
n	 26,000+ samples had no coverage at the time they were detected in live enterprise networks.
For the 26,000+ unknown/undetected samples, we used the application level visibility of the next-
generation firewall in conjunction with the behavioral analysis of WildFire to provide as complete
a view as possible of the malware lifecycle. This includes:
n	 An application level analysis of the infecting malware session: Samples were originally captured
by the Palo Alto Networks firewall within customer deployments. Any infecting binaries were
uploaded to Palo Alto Networks WildFire malware analysis cloud for further investigation. In
most cases, binaries were accompanied by data concerning the infecting session such as a web-
browsing session to provide insight into the infection strategy used by the attacker. It is
important to note that these are only infection attempts observed by the firewall and does not
mean that the infection was successful on the actual target.
n	 The behavior of the malware on the host: After the initial collection of the malware, all further
analysis was performed in the WildFire cloud. This includes an active analysis of the malware
in a virtualized host environment, allowing Palo Alto Networks to observe exactly how the
sample behaves on a target and any techniques used by the malware.
n	 An application level analysis of traffic generated by malware: The vast majority of modern
malware will make use of a network to steal data, orchestrate an ongoing attack against the
network or download additional malicious payloads. For this reason, we closely analyzed the
traffic generated by the malware itself in order to better understand the techniques used by
malware to communicate.
THE MODERN MALWARE REVIEW | MARCH 2013
PAGE 5
ABOUT WILDFIRE
WildFire is an optional feature of Palo Alto Networks next-generation firewall that enables users
to detect and block new and otherwise unknown malware. The solution leverages the firewall to
look within network traffic for files that are unknown (neither known good, nor known bad). When
an unknown file is detected, the file is copied and executed in Palo Alto Networks cloud-based
environment where the file can be analyzed as malicious or benign based on the behavior of the
malware. When a malicious file is detected, WildFire generates new protections based on the internal
identifiers within the malware, which are delivered back to the firewall where enforcement occurs.
SUMMARY OF KEY FINDINGS
1.	 THE WEB IS THE FRONT LINE OF THE FIGHT AGAINST UNKNOWN MALWARE
n	 90% of fully undetected malware was delivered via web-browsing.
n	 It took antivirus vendors 4 times as long to detect malware from web-based applications
	 as opposed to email (20 days for web, 5 days for email).
2.	 FTP WAS OBSERVED TO BE EXCEPTIONALLY HIGH-RISK
n	 Samples from FTP were unique (94% of samples were seen only once).
n	 Samples from FTP were rarely gained coverage by AV (95% never gained coverage).
n	 Highly evasive and port independent—97% of FTP samples used only non-standard ports.
3.	 AN OPPORTUNITY TO TAKE ACTION – 70% OF MALWARE SHOWED INDICATORS IN THE
	 PAYLOAD OR TRAFFIC
n	 40% of unknown samples were related based on specific identifiers in the malware header and body.
	 ❑	 A single indicator was linked to more than 1,200 unique SHA values.
n	 30% of samples were observed to generate custom UDP or TCP traffic.
	 ❑	 Custom or unknown traffic was the 3rd most common type of traffic generated by malware,
		 trailing only web-browsing and DNS traffic.
n	 More than 30% of samples connected to new or unknown destinations on the Internet.
	 ❑	 Unregistered or newly registered domains.
	 ❑	 Newly registered DNS servers or dynamic DNS domains.
4.	 MALWARE SPENDS SIGNIFICANT EFFORT AVOIDING SECURITY
n	 52% of observed malware behaviors focused on evading security or analysis, compared to only
	 15% focused on hacking and data theft.
n	 Attempting a long sleep to avoid analysis was the #1 most common malware behavior overall.
ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS
WEB TRAFFIC IS WHERE THE PROBLEMS ARE
It isn’t enough to simply know that there are threats that get by our traditional security. If we are
going to actually improve in this area, then we need to learn what makes these more modern classes
of malware different and how they actually work. In this section, we start with the basics and set
out to get a better understanding of the characteristics of this malware and how it gets delivered.
Since the nascent days of the Internet, email has been the vector of choice for attackers delivering
malware to a target, but that trend is rapidly changing. While email certainly continues to be a
major source of malware, attackers are increasingly turning to real-time, web-enabled applications
to deliver malware that is undetectable by traditional antivirus solutions. These real-time
applications provide practical and technical advantages for an attacker, and the data shows that
they are disproportionally successful at avoiding traditional antivirus as compared to email.
To better understand this phenomenon, we regularly test all malware samples captured by WildFire
against fully updated antivirus products from 6 leading antivirus vendors. This provides a simple
method for identifying malware samples that are undetectable by traditional AV, and thus pose
particular risk to an enterprise. Over a 3-month period, WildFire analyzed 68,047 samples that
were determined to be malware, and roughly 40% of those samples (26,363) were not detected by
any of the tested antivirus products at the time the samples were captured in customer networks.
90% OF UNKNOWN MALWARE DELIVERED VIA WEB-BROWSING
Given that the samples were captured by the firewall, we were able to identify the application
that carried the malware. While web-browsing was found to be the leading source of malware
both in terms of total malware* as well as undetected malware, the application mix was very
different between the two groups. For example, SMTP accounted for 25% of the total malware,
but only 2% of the fully undetected malware. Comparatively, web-browsing dominated both
categories, accounting for 68% of total malware, but over 90% of undetected samples. This
clearly shows that unknown malware is disproportionally more likely to be delivered from
the web as opposed to email.
All Malware Detected by WildFire All Malware Detected by WildFire - No Coverage
68,047 Malware Samples 26,363 Malware Samples
68% Delivered via Web-Browsing 90% Delivered via Web-Browsing
25% Delivered via Email 2% Delivered via Email
	 			
PAGE 6
THE MODERN MALWARE REVIEW | MARCH 2013
* Note:
It is important to remember
that all malware analyzed for
this report was captured by
customer firewalls, and may
not represent all email-borne
malware depending on where
the firewall is deployed. As
such, the data should be used
to show which applications are
relatively the most successful
at delivering unknown malware,
not which delivers the most
total volume of malware.
PAGE 7
5 DAYS TO COVERAGE FOR EMAIL, 20 DAYS FOR EVERYTHING ELSE
To extend the analysis, we continually retest newly identified samples on a daily basis (for
up to 30 days) to observe how industry coverage changes over time. This showed that not
only are traditional AV solutions far less likely to detect malware outside of email, but also
it takes far longer to get coverage. For unknown malware delivered by email, it took an
average of 5 days for vendors to provide coverage compared to an average of 20 days for
other applications, with many samples remaining undetected for the entire 31 day period.
Several applications delivered samples that remained undetected for 30 days or more, but
had far fewer samples. Social media and file-sharing were common vectors in this category.
The fact that these applications were used rarely by malware should not be confused with
being low-risk. The more rare sources of malware were also more unique and often targeted
in nature. The chart below shows a list of specific applications and their relative times to
coverage by traditional antivirus. Applications with significantly high times-to-detection
should be closely monitored by security teams. FTP had the ignominious distinction of
being both a common source of unknown malware as well as one of the sources that
rarely received coverage.
ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS
PAGE 8
CHALLENGES OF WEB-BASED MALWARE
There are a variety of reasons why web-based malware presents such a challenge for traditional
antivirus products. First, web-browsing and other web-based applications are real-time by nature,
unlike email where a malicious file can be analyzed at rest on a mail server. This has the effect
of significantly shrinking the timescale in which detection and enforcement decisions must be
made. However a potentially more significant factor is that web-based malware easily leverages
server-side polymorphism, which simply means that the webserver that delivers the malware can
automatically re-encode the malware payload to appear unique. This has the effect of generating
vast amounts of unique malware on demand, which vastly reduces the likelihood that AV vendors
will be able to capture the sample and create a signature. This is obviously very different from email-
based malware, which are often sent out in bulk and are easily captured by antivirus vendors.
CONCLUSIONS AND RECOMMENDATIONS
In order to better address unknown malware, we first have to better understand where our traditional
defenses are failing. The data shows that web-based applications are significantly more successful
at both avoiding traditional antivirus and remaining unknown for extended periods of time. This
means that organizations need to continue to expand their anti-malware strategies to include
real-time network-based controls designed for these threats. These controls can come in a variety
forms that are not limited to next-generation firewalls. In the coming sections, we will dig deeper
into more specific indicators and techniques that can be put to use. However, at an architectural
level, organizations should consider the following steps, if not already implemented.
n	 Bring antimalware technologies into the network: For many years, antimalware technologies
lived on the desktop and network security lived in the network. The data shows that malware
has found particular success by moving to a more real-time use of the network, and as such
security teams should expect and be prepared to enforce at the network as well. This means
that we will need to not only incorporate antimalware technologies in new places, but we
must also do it at new speeds.
n	 Expect unknowns, and add the ability to definitively identify malware: Unknown malware is
rapidly becoming normal and not the exception, and security must acknowledge this shift. The
malware in this report was identified by actively executing unknown samples in order to see
what they actually do. While this is not the only solution to the problem, the more important
point is that teams need an automated way to determine if unknown files are malicious or
benign that can be integrated into large networks.
n	 Real-time detection and blocking whenever possible: In many ways security has experienced a
regression from a mindset focused on prevention to one based on detection. Detection is always
the important first step, but prevention is key to a manageable security process. Malware is
being generated at scale by malicious web-servers, with each variant being slightly unique. If
each one of these variants requires a manual response, then security staff will remain behind
the curve, and have little chance of catching the more truly targeted and sophisticated attacks.
We will address some first steps and strategies in the coming sections.
THE MODERN MALWARE REVIEW | MARCH 2013
n	 Enforce User and Application-based Controls on Applications That Can Transfer Files:
Organizations should attempt to reduce their exposure and attack surface based on user and
application controls in addition to improving the ability to detect and block unknown malware.
For example, HTTP-proxies were a common source of malware. Organizations should ensure
that only their corporate proxies are allowed and end-users are prevented from using their
own web-proxies, which are often used to circumvent security policy. In the case of Facebook,
teams may allow Facebook, but specifically limit the Facebook file transfer feature. Such
basic steps can limit some of the exposure to both generic and targeted malware entering
the network.
IDENTIFIERS IN UNKNOWN MALWARE
While malware has proven the ability to avoid traditional AV signatures, the news is not all bad. Our
analysis combined an application level analysis of malware traffic (both inbound and outbound),
the malware payload itself, as well as the malware behavior on a virtual host to find patterns that
can be used to reduce an organization’s exposure to unknown malware. Our analysis shows that
of the more than 26,000 malware samples analyzed, 70% retained distinct identifiers or behaviors
that can be useful for real-time control and blocking. While every indicator will not be appropriate
for every network, the goal is simply to provide the research that security managers can adapt to
their environments.
40% OF SAMPLES RETAINED ACTIONABLE IDENTIFIERS IN THE PAYLOAD
Even though when malware is modified in order to change the hash value of the file, the data shows
that unique internal identifiers remained visible in more than 40% of the samples, which can be
used to block malware downloads in real time. In short, a single signature was found to be able
to protect against multiple variants of undetected malware each with unique sha256 values. This
trend was consistent across web-browsing and other web-based applications that pose the greatest
challenge to traditional antivirus products.
The identifiers were specifically visible in the header and body of the infecting file. This is significant
because many network-based antimalware solutions will identify malware based on a hash value
or URI, which would likely be ineffective in these cases. While blocking 40% of unknown malware
does not solve the problem, it is encouraging to see techniques that can potentially reduce the
volume of unknown malware, especially from web-based sources.
n	 26,363 total unique malware samples (SHA256).
n	 1,575 unique identifiers were observed in more than 1 piece of malware.
n	 These identifiers were observed in 10,616 unique malware samples.
n	 40% of total unique malware had the potential to be blocked.
PAGE 9
ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS
70% of unknown
malware retained
potentially action-
able identifiers in
either the malware
payload or traffic.
30% OF SAMPLES GENERATED CUSTOM OR UNKNOWN TRAFFIC
As malware has evolved, it has grown more and more dependent on the ability to infect, persist and
manage itself over a network. In this regard, an understanding of how malware communicates
is just as important as understanding the behaviors of the malware on the host. By combining
information captured at the enterprise firewall in conjunction with traffic analyzed in the WildFire
virtual environment, we were able to establish a very complete and unique view into malware traffic.
Again, the analysis was focused on the more than 26,000 samples that were initially undetected by
antivirus, with a particular focus on evasive techniques observed in the malware traffic as well as
distinguishing characteristics in the traffic that can provide an indicator of a threat or compromise.
One of the most common malware indicators was the use of customized traffic by malware. Malware
will often customize well-known protocols for their own purposes. This may include modifying
standard protocols such as HTTP or DNS, but peer-to-peer, instant messaging and remote desktop
protocols and applications are common targets as well. Any type of application that provides
communication, resilience and the ability to transfer files is potentially valuable to malware.
Since the next-generation firewall positively classifies all traffic, its relatively easy to identify custom
or unknown traffic in the network. Complementary studies in the Palo Alto Networks Application
Usage and Threat Report have clearly shown a strong correlation between custom traffic and malware,
and that trend held true in this study. Custom TCP and UDP counted as one of the most commonly
identified behaviors observed in malware, as well as some of the most commonly generated traffic
overall.
n	 30% of unknown malware samples generated unknown traffic. This was the 4th most common
malware behavior out of more than 100 observed behaviors.
n	 Custom/Unknown Traffic was the 3rd most common traffic type behind only web-browsing
and DNS.
PAGE 10
THE MODERN MALWARE REVIEW | MARCH 2013
One of the most
common malware
indicators was the
use of customized
traffic by malware.
SUSPICIOUS MALWARE TRAFFIC
In addition to looking at the actual malware traffic, it is often helpful to look at where the malware
is coming from and going to. Identifying domains and sites that have served malware has been a
long-standing component of URL filtering solutions. To stay ahead of these solutions, malware
operators will generate custom domains for the attacks, use large numbers of essentially disposable
domains, as well as dynamic DNS and fast-flux domains in order to avoid be blocked. As part
of the analysis we tracked the number of samples that connected to these domains as well as
samples that connected to known malware sites.
n	 33% of samples connected new domains, DNS or fast-flux: Newly registered domains,
fast-flux domains and dynamic DNS can be also be blocked or blocked in conjunction with
custom traffic or other indicators.
n	 20% of samples generated emails: These samples were observed direct email connections over
the network. As a result, network policy should only allow email protocols to and from the
corporate mail server, and block direct email to the Internet.
n	 12% used HTTP-POST: HTTP-POST methods are very common in malware, but are also
often used by web-applications. As a result, teams will likely not want to block HTTP-POST
altogether, but it may make sense to block going to unregistered or newly registered domains.
PAGE 11
ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS
While security teams
may not want to
block all traffic to
and from a new
domain, they may
want to enforce
tighter controls
such never allowing
executables from
these sites.
SUMMARY, CONCLUSIONS AND RECOMMENDATIONS
The analysis showed that while malware may be unknown to traditional security solutions, identifiers
still remain. These identifiers can present in the payload of the malware itself or in the network
traffic that the malware generates. Some indicators can be conclusive on their own, while others
may be best used in conjunction with additional indicators. The suggestions below, should be used as
general guidance, but will obviously need to be customized to the realities of a particular network.
n	 Stream-based analysis of file headers and payloads for malicious indicators: Needless to say
that recognizing and blocking variants of malware in real-time is far preferable to detecting a
remediating. The data shows that at least 40% of unknown malware were observable variants.
This puts a very high priority on analyzing the actual malware payload, and timely delivery of
newly identified malware intelligence.
n	 Establish and update a solid baseline for the network: Malware behaviors are often (but not
always) anomalous, and these behaviors can be used to root out unknown malware quickly.
However, malware techniques and strategies will always change, and as such it is critical to know
what is normal for your network as opposed to the industry in general. A detailed baseline can
provide the point of reference that exposes malware.
n	 Investigate and remediate unknown traffic: Unknown or custom traffic can be several things in
addition to malware. As part of establishing a baseline, security teams should seek out unknown
traffic and identify it conclusively going forward. It should quickly be possible to reduce the
amount of unknown traffic to very low levels, where malware can easily be identified.
n	 Restrict rights to unknown, newly registered domains and dynamic DNS domains: The Internet
is obviously a dynamic place, and it may not be that uncommon to encounter an unclassified
or new domain. So while security teams may not want to block all traffic to and from a new
domain, they may want to enforce tighter controls such never allowing executables from these
sites, decrypt SSL traffic for inspection, or blocking HTTP-POSTs to these unknown sites.
n	 Only allow email traffic to the corporate email server: A significant number of malware samples
generated email directly to destination on the Internet. This is very common behavior among
spamming botnets, and behavior that can be easily controlled. Email traffic that does not go
to the corporate email server can be easily blocked, and any users sending such traffic can be
investigated as a potential malware infection.
 
PAGE 12
THE MODERN MALWARE REVIEW | MARCH 2013
MALWARE TRAFFIC ON NON-STANDARD PORTS
Malware was observed sending traffic over non-standard ports in both inbound and outbound
traffic. The prevalence of this non-standard behavior varied widely by application as shown
below. Using non-standard ports can allow malware to evade some security measures, which
look for specific types of threats on particular ports. Non-SSL traffic on port 443 was the most
common non-standard traffic behavior. This makes sense given that port 443 is almost always
allowed on a network, and some organizations will not inspect traffic on 443 assuming that it
is encrypted.
The section below provides a summary of some of the more significant types of malware traffic
including the relative use of non-standard ports:
FTP
FTP was one of the most interesting and concerning applications that we observed in the course
of the report. It was the 4th most common source of unknown malware, the malware it delivered
was rarely detected (average of 30 days out of 31), and almost always operated on a non-standard
port. FTP is of course very flexible and light-weight, making it a powerful tool for attackers that
may not get the attention it deserves from security teams.
n	 Observed FTP traffic on 237 non-standard ports (neither side of the connection using port
20 or 21).
n	 97% of malware FTP sessions went over non-standard ports.
n	 Led all applications in terms of non-standard behavior.
WEB BROWSING
Web-browsing was the workhorse application for unknown malware throughout the lifecycle. It
was #1 source of malware, and the #1 type of traffic generated by malware. It was also observed to
be one of applications used extensively for downloading additional payloads to the host. Malware
delivered by web-browsing took 20 days on average in order to gain coverage. However, web-
browsing on non-standard ports was relatively rare, accounting for only about 10% of sessions
and 14% of bandwidth.
n	 Observed web traffic on 90 non-standard web ports (server operating on a port other than
port 80).
n	 Relatively uncommon, accounting for only 10% of malware web-browsing sessions.
n	 Use of non-standard ports was slightly higher for browsing sessions that downloaded data.
Non-standard ports accounted for 14% of downloaded bandwidth related to web browsing.
ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS
Non-SSL traffic
on port 443 was
the most common
non-standard
port behavior.
FTP was the most
evasive application
in terms port eva-
sion, and had one
of the lowest detec-
tion rates in terms
of malware.
PAGE 13
PAGE 14
THE MODERN MALWARE REVIEW | MARCH 2013
CUSTOM AND UNKNOWN TCP AND UDP
Custom traffic was predictably heavily tied to the traffic generated by the malware itself. Custom
traffic was the 3rd most common traffic type after web-browsing and DNS. The use of non-standard
ports varied considerably between TCP and UDP, with about half of unknown TCP using seemingly
random ports and UDP staying on well-known ports.
n	 Observed custom TCP traffic on 19 non-standard ports (server operating on a port other
than web, mail or proxy ports).
n	 43% of unknown TCP traffic was observed on ports not associated with any well-known
applications.
n	 Conversely, custom-UDP was found exclusively on well-known ports 53, 80, and 443.
HTTP PROXY
HTTP-Proxy traffic was the 2nd most common source of unknown malware after web-browsing.
Proxies showed behavior very similar to web-browsing in terms of time to detection, requiring
19 days for coverage on average. Proxies were more likely to use non-standard ports that simple
web-browsing (17% for proxies, 10% for web-browsing).
n	 Observed HTTP-Proxy traffic on 29 non-standard web ports (server operating on a port other
than port 80, 443, 1080, 3128, 8000, 8080).
n	 Accounted for 17% of malware http-proxy sessions.
ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS
PAGE 15
MALWARE BEHAVIORS ON THE HOST
Needless to say, a great deal of the malware life-cycle is focused on the infected host. Malware must
be able to persist on the target for it to be useful in a long-term attack, and this requires the malware
to blend in on the host while avoiding or disabling any security measures present. In total, behaviors
designed to avoid analysis and persist on the host accounted for more than half of the behaviors
observed by malware.
As part of analyzing potential malware, WildFire will execute a sample file and observe it for
more than 100 malicious or suspicious behaviors. These behaviors have been broadly categorized
as follows:
n	 Analysis Avoidance: Specific steps to avoid analysis either in a malware sandbox or other security
solution (e.g. attempt to sleep for a long period of time).
n	 Persistence: This includes a variety of tasks required for the malware to exist on the host for
long periods including how the malware will be run the host and avoid host-based security.
n	 Hacking: These behaviors are directed outside of the infected host and typically involve
fingerprinting the surrounding network, and identifying nearby vulnerable hosts.
n	 Data Theft: Traffic that is specifically observed stealing information from the compromised
host such as passwords or simply device configuration information.
n	 Outbound Communication: Includes malware command-and-control and a variety of behaviors
referenced in the previous section concerning malware traffic
The table below shows the percentage of behaviors observed in each category.
PAGE 16
THE MODERN MALWARE REVIEW | MARCH 2013
ANALYSIS AVOIDANCE
Analysis avoidance behaviors were some of the most common behaviors observed, yet were the
least diverse. In short, we observed a handful of techniques in a large percentage of samples.
The attempt by the malware to sleep (avoid executing initially to avoid attention) was the most
common avoidance behavior and also the most common behavior overall regardless of category.
Code injection was observed in 13.5 percent of samples. This technique is notable in particular
because it allows malware to hide within another running process. This has the effect of the malware
out of view if a user checks the task manager and can also foil some attempts at application
white-listing on the host.
While quite rare, it was interesting to see malware that attempted to check its external IP address.
This likely indicates an attempt by the malware to determine if it is truly in the target network
or if its network connection is being proxied.
PERSISTENCE
The Persistence category was one of the most active categories of behaviors as malware employed a
wide variety of techniques to remain embedded on the host. In all WildFire observed more than
26 persistence behaviors. Common strategies where to invade or overwrite key components or
directories of the operating system, configuring the malware to run automatically when the host
is booted up and disabling host security components.
The attempt by the
malware to sleep
(avoid executing
initially to avoid
attention) was the
most common
avoidance behavior
and also the most
common behavior
overall regardless
of category.
ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS
PAGE 17
Some behaviors were rare, but still quite notable. A small number of samples were observed to
infect the Master Boot Record, which is a key requirement for a bootkit. Other rare but interesting
behavior altered the host to prevent a system restore, ensuring the infected system couldn’t be
rolled back to a good state. Other modifications included tampering with operating system to
allow files to be run even with invalid signatures.
HACKING AND DATA THEFT
While persistence and avoidance are means to an end, hacking and data-theft are the ends.
Predictably, this category was highly varied in terms of observed behaviors. Given the preponderance
of malware delivered via web-browsing, it was not surprising to see the browser as a common
target. Theft of passwords stored in the browser and manipulation of cookies were both
common behaviors.
3300 Olcott Street
Santa Clara, CA 95054
Main:	+1.408.573.4000
Sales:	 +1.866.320.4788 		
Support:	+1.866.898.9087
www.paloaltonetworks.com
Copyright ©2013, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks,
the Palo Alto Networks Logo, PAN-OS, App-ID and Panorama are trademarks of
Palo Alto Networks, Inc. All specifications are subject to change without notice.
Palo Alto Networks assumes no responsibility for any inaccuracies in this document
or for any obligation to update information in this document. Palo Alto Networks
reserves the right to change, modify, transfer, or otherwise revise this publication
without notice. PAN_TMMR_032213
THE MODERN MALWARE REVIEW | MARCH 2013
SUMMARY
Malware has become the key enabler for modern sophisticated attacks due to its ability to avoid
traditional antivirus solutions, and provide a persistent internal foothold for long-term information
attack once inside. As attackers and malware evolve, so to must our security responses. Modern
malware presents a unique challenge in that the most sophisticated attacks will continue to require
trained and diligent security professionals to investigate and analyze. On the other hand, the sheet
volume of unknown malware can easily overwhelm even well-staffed security teams. As a result,
security must aggressively seek out methods to automate the blocking of unknown malware
wherever possible, while actively investigating the unknowns that get through. This report has
hopefully provided some insight into the nature of the unknown malware problem, and provided
some basic steps that security teams can use to protect their networks.
ABOUT PALO ALTO NETWORKS
Palo Alto Networks is the network security company. Its next-generation firewalls enable
unprecedented visibility and granular policy control of applications and content—by user, not
just IP address – at up to 20Gbps with no performance degradation. Based on patent-pending
App-ID™
technology, Palo Alto Networks firewalls accurately identify and control applications—
regardless of port, protocol, evasive tactic or SSL encryption—and scan content to stop threats
and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain
complete visibility and control, while significantly reducing total cost of ownership through device
consolidation. Most recently, Palo Alto Networks has enabled enterprises to extend this same
network security to remote users with the release of GlobalProtect™
and to combat targeted
malware with its WildFire service. For more information, visit www.paloaltonetworks.com.

Contenu connexe

Tendances

CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA InfographicBlue Coat
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Hands on Security, Disrupting the Kill Chain, SplunkLive! AustinHands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Hands on Security, Disrupting the Kill Chain, SplunkLive! AustinSplunk
 
Aoa report trap_x_medjack.2
Aoa report trap_x_medjack.2Aoa report trap_x_medjack.2
Aoa report trap_x_medjack.2Andrey Apuhtin
 
The Value of Multi-scanning
The Value of Multi-scanningThe Value of Multi-scanning
The Value of Multi-scanningOPSWAT
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detectionChong-Kuan Chen
 
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKDATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKRobert Anderson
 
Machine learning cybersecurity boon or boondoggle
Machine learning cybersecurity boon or boondoggleMachine learning cybersecurity boon or boondoggle
Machine learning cybersecurity boon or boondogglePriyanka Aash
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisIan G
 
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
Using Hackers’ Own Methods and Tools to Defeat Persistent AdversariesUsing Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
Using Hackers’ Own Methods and Tools to Defeat Persistent AdversariesEC-Council
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 ReportFortis
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning TechnologyOPSWAT
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
Apt zero day malware
Apt zero day malwareApt zero day malware
Apt zero day malwareaspiretss
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceResilient Systems
 
Check point 2015-securityreport
Check point 2015-securityreportCheck point 2015-securityreport
Check point 2015-securityreportEIINSTITUT
 

Tendances (18)

CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA Compliance
 
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Hands on Security, Disrupting the Kill Chain, SplunkLive! AustinHands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
 
Aoa report trap_x_medjack.2
Aoa report trap_x_medjack.2Aoa report trap_x_medjack.2
Aoa report trap_x_medjack.2
 
The Value of Multi-scanning
The Value of Multi-scanningThe Value of Multi-scanning
The Value of Multi-scanning
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detection
 
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKDATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
 
Machine learning cybersecurity boon or boondoggle
Machine learning cybersecurity boon or boondoggleMachine learning cybersecurity boon or boondoggle
Machine learning cybersecurity boon or boondoggle
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and Analysis
 
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
Using Hackers’ Own Methods and Tools to Defeat Persistent AdversariesUsing Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 Report
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning Technology
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
Apt zero day malware
Apt zero day malwareApt zero day malware
Apt zero day malware
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
 
Check point 2015-securityreport
Check point 2015-securityreportCheck point 2015-securityreport
Check point 2015-securityreport
 

En vedette

Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxRahul Mohandas
 
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015 Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015 Lastline, Inc.
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security EvasionInvincea, Inc.
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Pluribus One
 
Classification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining ApproachClassification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining Approachijsrd.com
 
MAD: A Middleware Framework for Multi-Step Attack Detection
MAD: A Middleware Framework for Multi-Step Attack DetectionMAD: A Middleware Framework for Multi-Step Attack Detection
MAD: A Middleware Framework for Multi-Step Attack DetectionPanagiotis Papadopoulos
 
Comparative Study of Mod Security (Autosaved)
Comparative Study of Mod Security (Autosaved)Comparative Study of Mod Security (Autosaved)
Comparative Study of Mod Security (Autosaved)Dashti Abdullah
 
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna Lastline, Inc.
 
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareUsing Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareLastline, Inc.
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseLuca Simonelli
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionLastline, Inc.
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh
 
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016bugcrowd
 
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Hollow Process Injection - Reversing and Investigating Malware Evasive TacticsHollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Hollow Process Injection - Reversing and Investigating Malware Evasive Tacticssecurityxploded
 

En vedette (15)

Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
 
PPT
PPTPPT
PPT
 
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015 Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
 
Classification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining ApproachClassification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining Approach
 
MAD: A Middleware Framework for Multi-Step Attack Detection
MAD: A Middleware Framework for Multi-Step Attack DetectionMAD: A Middleware Framework for Multi-Step Attack Detection
MAD: A Middleware Framework for Multi-Step Attack Detection
 
Comparative Study of Mod Security (Autosaved)
Comparative Study of Mod Security (Autosaved)Comparative Study of Mod Security (Autosaved)
Comparative Study of Mod Security (Autosaved)
 
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
 
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareUsing Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and Defense
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade Detection
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016
 
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Hollow Process Injection - Reversing and Investigating Malware Evasive TacticsHollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
 

Similaire à The modern-malware-review-march-2013

Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:Nancy Nimmegeers
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internetUltraUploader
 
OSB340R: Disrupting an Advanced Attack
OSB340R: Disrupting an Advanced AttackOSB340R: Disrupting an Advanced Attack
OSB340R: Disrupting an Advanced AttackIvanti
 
OSB340: Disrupting an Advanced Attack
OSB340: Disrupting an Advanced AttackOSB340: Disrupting an Advanced Attack
OSB340: Disrupting an Advanced AttackIvanti
 
Assessing the Effectiveness of Antivirus Solutions
Assessing the Effectiveness of Antivirus SolutionsAssessing the Effectiveness of Antivirus Solutions
Assessing the Effectiveness of Antivirus SolutionsImperva
 
Hii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsHii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsAnatoliy Tkachev
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat FireEye, Inc.
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityOnline Business
 
Presentatie Kaspersky over Malware trends en statistieken, 26062015
Presentatie Kaspersky over Malware trends en statistieken, 26062015Presentatie Kaspersky over Malware trends en statistieken, 26062015
Presentatie Kaspersky over Malware trends en statistieken, 26062015SLBdiensten
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015Andreanne Clarke
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionBitglass
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfitsamuamit11
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
Sammanfattning av 2014 Trustwave Global Security Report
Sammanfattning av 2014 Trustwave Global Security Report Sammanfattning av 2014 Trustwave Global Security Report
Sammanfattning av 2014 Trustwave Global Security Report Inuit AB
 

Similaire à The modern-malware-review-march-2013 (20)

Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
 
OSB340R: Disrupting an Advanced Attack
OSB340R: Disrupting an Advanced AttackOSB340R: Disrupting an Advanced Attack
OSB340R: Disrupting an Advanced Attack
 
OSB340: Disrupting an Advanced Attack
OSB340: Disrupting an Advanced AttackOSB340: Disrupting an Advanced Attack
OSB340: Disrupting an Advanced Attack
 
Assessing the Effectiveness of Antivirus Solutions
Assessing the Effectiveness of Antivirus SolutionsAssessing the Effectiveness of Antivirus Solutions
Assessing the Effectiveness of Antivirus Solutions
 
Hii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsHii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutions
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
Presentatie Kaspersky over Malware trends en statistieken, 26062015
Presentatie Kaspersky over Malware trends en statistieken, 26062015Presentatie Kaspersky over Malware trends en statistieken, 26062015
Presentatie Kaspersky over Malware trends en statistieken, 26062015
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Malware detection
Malware detectionMalware detection
Malware detection
 
Sammanfattning av 2014 Trustwave Global Security Report
Sammanfattning av 2014 Trustwave Global Security Report Sammanfattning av 2014 Trustwave Global Security Report
Sammanfattning av 2014 Trustwave Global Security Report
 

Plus de Комсс Файквэе

Rp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xgRp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xgКомсс Файквэе
 
Hta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingHta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingКомсс Файквэе
 

Plus de Комсс Файквэе (20)

Ksb 2013 ru
Ksb 2013 ruKsb 2013 ru
Ksb 2013 ru
 
Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013
 
Rp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xgRp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xg
 
Apwg trends report_q2_2013
Apwg trends report_q2_2013Apwg trends report_q2_2013
Apwg trends report_q2_2013
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
Scimp paper
Scimp paperScimp paper
Scimp paper
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Hta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingHta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijacking
 
Analitika web 2012_positive_technologies
Analitika web 2012_positive_technologiesAnalitika web 2012_positive_technologies
Analitika web 2012_positive_technologies
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
B intelligence report-08-2013.en-us
B intelligence report-08-2013.en-usB intelligence report-08-2013.en-us
B intelligence report-08-2013.en-us
 
Dtl 2013 q2_home.1.2
Dtl 2013 q2_home.1.2Dtl 2013 q2_home.1.2
Dtl 2013 q2_home.1.2
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
Kaspersky lab av_test_whitelist_test_report
Kaspersky lab av_test_whitelist_test_reportKaspersky lab av_test_whitelist_test_report
Kaspersky lab av_test_whitelist_test_report
 
Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2
 
Panda labs annual-report-2012
Panda labs annual-report-2012Panda labs annual-report-2012
Panda labs annual-report-2012
 
H02 syllabus
H02 syllabusH02 syllabus
H02 syllabus
 
Course reader-title
Course reader-titleCourse reader-title
Course reader-title
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 

Dernier

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

The modern-malware-review-march-2013

  • 1. The Modern Malware Review Analysis of New and Evasive Malware in Live Enterprise Networks | 1st Edition, March 2013
  • 2. THE MODERN MALWARE REVIEW | MARCH 2013 PAGE 2 TABLE OF CONTENTS Background and Goals 3 A Focus on Actionable Research 3 Separating the Known-Unknowns from the Unknown-Unknowns 3 About the Data and the Methodology 4 About WildFire 5 Summary of Key Findings 5 Web Traffic Is Where the Problems Are 5 90% of Unknown Malware Delivered Via Web-Browsing 6 5 Days to Coverage for Email, 20 Days For Everything Else 7 Challenges of Web-Based Malware 8 Conclusions and Recommendations 8 Identifiers in Unknown Malware 9 40% of Samples Retained Identifiers in the Payload 9 30% of Samples Generated Custom or Unknown Traffic 10 Suspicious Malware Traffic 11 Summary, Conclusions and Recommendations 12 Malware Traffic on Non-Standard Ports 13 FTP 13 Web Browsing 13 Custom and Unknown TCP and UDP 14 HTTP Proxy 14 Malware Behaviors on the Host 15 Analysis Avoidance 16 Persistence 17 Hacking and Data Theft 17 Summary 18
  • 3. PAGE 3 BACKGROUND AND GOALS The Modern Malware Review presents an analysis of 3 months of malware data derived from more than 1,000 live customer networks using WildFire™ (Palo Alto Networks™ feature for detecting and blocking new and unknown malware). The review focuses on malware samples that were initially undetected by industry-leading antivirus products. A FOCUS ON ACTIONABLE RESEARCH The goal of focusing on unknown or undetected malware is not to point out deficiency in traditional antivirus solutions—but rather to better understand the problems, and hopefully identify practices that can help. As such, the report provides analysis of the malware, but also includes recommen- dations based on the findings. Some of these recommendations are common sense, and we don’t propose they are a panacea for modern malware and APTs. The goal is simply to share information that can help security teams be more proactive in their fight against modern malware and advanced threats. SEPARATING THE KNOWN-UNKNOWNS FROM THE UNKNOWN-UNKNOWNS Part of the problem when talking about advanced malware is agreeing what we really mean by modern malware. There is an incredible amount of malware diversity even when we focus on new and unknown malware. There are highly sophisticated, highly targeted sources of custom malware and APTs (e.g. APT1, Stuxnet, and Flame). But there are also legions of more traditional malware operations that generate malware at scale that are also able to get by traditional defenses (e.g. Zeus, Zero Access, Kelihos). Both of these categories present security risks that need to be managed, but obviously vary considerably in volume and the risk posed to the enterprise. The latter, more common type of malware stands to potentially overwhelm security teams if each new variant of known malware requires a manual response from the security team. If too much “normal” malware goes undetected, then security teams will obviously have a very difficult time finding the truly targeted and unique threats in their networks. As a result we believe that it’s crucial for enterprises to reduce the overall volume of infections from variants of known malware, so that security teams have the time to focus on the most serious and targeted threats. One of the key values of being able to analyze real-world malware at a large scale is the ability to distinguish between common and repeated threats and those that are unique. As such, in the report we take a look both at the large-scale trends, but also at some of the samples that quite literally were exceptional. We hope the results of this analysis will help security managers to not only reduce the impact of the “known-unknowns”, but also to reveal the presence of the “unknown-unknowns” as well. ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS
  • 4. PAGE 4 ABOUT THE DATA AND THE METHODOLOGY Malware samples were collected in live enterprise networks as part of the WildFire functionality for controlling modern malware. As part of our normal analysis we test malware samples collected by WildFire against fully updated antivirus products from 6 industry-leading enterprise antivirus vendors. This review focuses solely on all malware collected in a 3-month period that initially had no coverage from any of the tested vendors. This included more than 26,000 malware samples. Again, the intent is not to point out that some malware gets by traditional antivirus, but rather to provide actionable insight into the problem – what malware strategies are the most successful, why, and how can security teams do to respond. Summary of Data Sources n 3 months of WildFire data. n 1,000+ live enterprise networks. n Samples were tested against 6 fully-updated, industry-leading antivirus products. n 26,000+ samples had no coverage at the time they were detected in live enterprise networks. For the 26,000+ unknown/undetected samples, we used the application level visibility of the next- generation firewall in conjunction with the behavioral analysis of WildFire to provide as complete a view as possible of the malware lifecycle. This includes: n An application level analysis of the infecting malware session: Samples were originally captured by the Palo Alto Networks firewall within customer deployments. Any infecting binaries were uploaded to Palo Alto Networks WildFire malware analysis cloud for further investigation. In most cases, binaries were accompanied by data concerning the infecting session such as a web- browsing session to provide insight into the infection strategy used by the attacker. It is important to note that these are only infection attempts observed by the firewall and does not mean that the infection was successful on the actual target. n The behavior of the malware on the host: After the initial collection of the malware, all further analysis was performed in the WildFire cloud. This includes an active analysis of the malware in a virtualized host environment, allowing Palo Alto Networks to observe exactly how the sample behaves on a target and any techniques used by the malware. n An application level analysis of traffic generated by malware: The vast majority of modern malware will make use of a network to steal data, orchestrate an ongoing attack against the network or download additional malicious payloads. For this reason, we closely analyzed the traffic generated by the malware itself in order to better understand the techniques used by malware to communicate. THE MODERN MALWARE REVIEW | MARCH 2013
  • 5. PAGE 5 ABOUT WILDFIRE WildFire is an optional feature of Palo Alto Networks next-generation firewall that enables users to detect and block new and otherwise unknown malware. The solution leverages the firewall to look within network traffic for files that are unknown (neither known good, nor known bad). When an unknown file is detected, the file is copied and executed in Palo Alto Networks cloud-based environment where the file can be analyzed as malicious or benign based on the behavior of the malware. When a malicious file is detected, WildFire generates new protections based on the internal identifiers within the malware, which are delivered back to the firewall where enforcement occurs. SUMMARY OF KEY FINDINGS 1. THE WEB IS THE FRONT LINE OF THE FIGHT AGAINST UNKNOWN MALWARE n 90% of fully undetected malware was delivered via web-browsing. n It took antivirus vendors 4 times as long to detect malware from web-based applications as opposed to email (20 days for web, 5 days for email). 2. FTP WAS OBSERVED TO BE EXCEPTIONALLY HIGH-RISK n Samples from FTP were unique (94% of samples were seen only once). n Samples from FTP were rarely gained coverage by AV (95% never gained coverage). n Highly evasive and port independent—97% of FTP samples used only non-standard ports. 3. AN OPPORTUNITY TO TAKE ACTION – 70% OF MALWARE SHOWED INDICATORS IN THE PAYLOAD OR TRAFFIC n 40% of unknown samples were related based on specific identifiers in the malware header and body. ❑ A single indicator was linked to more than 1,200 unique SHA values. n 30% of samples were observed to generate custom UDP or TCP traffic. ❑ Custom or unknown traffic was the 3rd most common type of traffic generated by malware, trailing only web-browsing and DNS traffic. n More than 30% of samples connected to new or unknown destinations on the Internet. ❑ Unregistered or newly registered domains. ❑ Newly registered DNS servers or dynamic DNS domains. 4. MALWARE SPENDS SIGNIFICANT EFFORT AVOIDING SECURITY n 52% of observed malware behaviors focused on evading security or analysis, compared to only 15% focused on hacking and data theft. n Attempting a long sleep to avoid analysis was the #1 most common malware behavior overall. ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS
  • 6. WEB TRAFFIC IS WHERE THE PROBLEMS ARE It isn’t enough to simply know that there are threats that get by our traditional security. If we are going to actually improve in this area, then we need to learn what makes these more modern classes of malware different and how they actually work. In this section, we start with the basics and set out to get a better understanding of the characteristics of this malware and how it gets delivered. Since the nascent days of the Internet, email has been the vector of choice for attackers delivering malware to a target, but that trend is rapidly changing. While email certainly continues to be a major source of malware, attackers are increasingly turning to real-time, web-enabled applications to deliver malware that is undetectable by traditional antivirus solutions. These real-time applications provide practical and technical advantages for an attacker, and the data shows that they are disproportionally successful at avoiding traditional antivirus as compared to email. To better understand this phenomenon, we regularly test all malware samples captured by WildFire against fully updated antivirus products from 6 leading antivirus vendors. This provides a simple method for identifying malware samples that are undetectable by traditional AV, and thus pose particular risk to an enterprise. Over a 3-month period, WildFire analyzed 68,047 samples that were determined to be malware, and roughly 40% of those samples (26,363) were not detected by any of the tested antivirus products at the time the samples were captured in customer networks. 90% OF UNKNOWN MALWARE DELIVERED VIA WEB-BROWSING Given that the samples were captured by the firewall, we were able to identify the application that carried the malware. While web-browsing was found to be the leading source of malware both in terms of total malware* as well as undetected malware, the application mix was very different between the two groups. For example, SMTP accounted for 25% of the total malware, but only 2% of the fully undetected malware. Comparatively, web-browsing dominated both categories, accounting for 68% of total malware, but over 90% of undetected samples. This clearly shows that unknown malware is disproportionally more likely to be delivered from the web as opposed to email. All Malware Detected by WildFire All Malware Detected by WildFire - No Coverage 68,047 Malware Samples 26,363 Malware Samples 68% Delivered via Web-Browsing 90% Delivered via Web-Browsing 25% Delivered via Email 2% Delivered via Email PAGE 6 THE MODERN MALWARE REVIEW | MARCH 2013 * Note: It is important to remember that all malware analyzed for this report was captured by customer firewalls, and may not represent all email-borne malware depending on where the firewall is deployed. As such, the data should be used to show which applications are relatively the most successful at delivering unknown malware, not which delivers the most total volume of malware.
  • 7. PAGE 7 5 DAYS TO COVERAGE FOR EMAIL, 20 DAYS FOR EVERYTHING ELSE To extend the analysis, we continually retest newly identified samples on a daily basis (for up to 30 days) to observe how industry coverage changes over time. This showed that not only are traditional AV solutions far less likely to detect malware outside of email, but also it takes far longer to get coverage. For unknown malware delivered by email, it took an average of 5 days for vendors to provide coverage compared to an average of 20 days for other applications, with many samples remaining undetected for the entire 31 day period. Several applications delivered samples that remained undetected for 30 days or more, but had far fewer samples. Social media and file-sharing were common vectors in this category. The fact that these applications were used rarely by malware should not be confused with being low-risk. The more rare sources of malware were also more unique and often targeted in nature. The chart below shows a list of specific applications and their relative times to coverage by traditional antivirus. Applications with significantly high times-to-detection should be closely monitored by security teams. FTP had the ignominious distinction of being both a common source of unknown malware as well as one of the sources that rarely received coverage. ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS
  • 8. PAGE 8 CHALLENGES OF WEB-BASED MALWARE There are a variety of reasons why web-based malware presents such a challenge for traditional antivirus products. First, web-browsing and other web-based applications are real-time by nature, unlike email where a malicious file can be analyzed at rest on a mail server. This has the effect of significantly shrinking the timescale in which detection and enforcement decisions must be made. However a potentially more significant factor is that web-based malware easily leverages server-side polymorphism, which simply means that the webserver that delivers the malware can automatically re-encode the malware payload to appear unique. This has the effect of generating vast amounts of unique malware on demand, which vastly reduces the likelihood that AV vendors will be able to capture the sample and create a signature. This is obviously very different from email- based malware, which are often sent out in bulk and are easily captured by antivirus vendors. CONCLUSIONS AND RECOMMENDATIONS In order to better address unknown malware, we first have to better understand where our traditional defenses are failing. The data shows that web-based applications are significantly more successful at both avoiding traditional antivirus and remaining unknown for extended periods of time. This means that organizations need to continue to expand their anti-malware strategies to include real-time network-based controls designed for these threats. These controls can come in a variety forms that are not limited to next-generation firewalls. In the coming sections, we will dig deeper into more specific indicators and techniques that can be put to use. However, at an architectural level, organizations should consider the following steps, if not already implemented. n Bring antimalware technologies into the network: For many years, antimalware technologies lived on the desktop and network security lived in the network. The data shows that malware has found particular success by moving to a more real-time use of the network, and as such security teams should expect and be prepared to enforce at the network as well. This means that we will need to not only incorporate antimalware technologies in new places, but we must also do it at new speeds. n Expect unknowns, and add the ability to definitively identify malware: Unknown malware is rapidly becoming normal and not the exception, and security must acknowledge this shift. The malware in this report was identified by actively executing unknown samples in order to see what they actually do. While this is not the only solution to the problem, the more important point is that teams need an automated way to determine if unknown files are malicious or benign that can be integrated into large networks. n Real-time detection and blocking whenever possible: In many ways security has experienced a regression from a mindset focused on prevention to one based on detection. Detection is always the important first step, but prevention is key to a manageable security process. Malware is being generated at scale by malicious web-servers, with each variant being slightly unique. If each one of these variants requires a manual response, then security staff will remain behind the curve, and have little chance of catching the more truly targeted and sophisticated attacks. We will address some first steps and strategies in the coming sections. THE MODERN MALWARE REVIEW | MARCH 2013
  • 9. n Enforce User and Application-based Controls on Applications That Can Transfer Files: Organizations should attempt to reduce their exposure and attack surface based on user and application controls in addition to improving the ability to detect and block unknown malware. For example, HTTP-proxies were a common source of malware. Organizations should ensure that only their corporate proxies are allowed and end-users are prevented from using their own web-proxies, which are often used to circumvent security policy. In the case of Facebook, teams may allow Facebook, but specifically limit the Facebook file transfer feature. Such basic steps can limit some of the exposure to both generic and targeted malware entering the network. IDENTIFIERS IN UNKNOWN MALWARE While malware has proven the ability to avoid traditional AV signatures, the news is not all bad. Our analysis combined an application level analysis of malware traffic (both inbound and outbound), the malware payload itself, as well as the malware behavior on a virtual host to find patterns that can be used to reduce an organization’s exposure to unknown malware. Our analysis shows that of the more than 26,000 malware samples analyzed, 70% retained distinct identifiers or behaviors that can be useful for real-time control and blocking. While every indicator will not be appropriate for every network, the goal is simply to provide the research that security managers can adapt to their environments. 40% OF SAMPLES RETAINED ACTIONABLE IDENTIFIERS IN THE PAYLOAD Even though when malware is modified in order to change the hash value of the file, the data shows that unique internal identifiers remained visible in more than 40% of the samples, which can be used to block malware downloads in real time. In short, a single signature was found to be able to protect against multiple variants of undetected malware each with unique sha256 values. This trend was consistent across web-browsing and other web-based applications that pose the greatest challenge to traditional antivirus products. The identifiers were specifically visible in the header and body of the infecting file. This is significant because many network-based antimalware solutions will identify malware based on a hash value or URI, which would likely be ineffective in these cases. While blocking 40% of unknown malware does not solve the problem, it is encouraging to see techniques that can potentially reduce the volume of unknown malware, especially from web-based sources. n 26,363 total unique malware samples (SHA256). n 1,575 unique identifiers were observed in more than 1 piece of malware. n These identifiers were observed in 10,616 unique malware samples. n 40% of total unique malware had the potential to be blocked. PAGE 9 ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS 70% of unknown malware retained potentially action- able identifiers in either the malware payload or traffic.
  • 10. 30% OF SAMPLES GENERATED CUSTOM OR UNKNOWN TRAFFIC As malware has evolved, it has grown more and more dependent on the ability to infect, persist and manage itself over a network. In this regard, an understanding of how malware communicates is just as important as understanding the behaviors of the malware on the host. By combining information captured at the enterprise firewall in conjunction with traffic analyzed in the WildFire virtual environment, we were able to establish a very complete and unique view into malware traffic. Again, the analysis was focused on the more than 26,000 samples that were initially undetected by antivirus, with a particular focus on evasive techniques observed in the malware traffic as well as distinguishing characteristics in the traffic that can provide an indicator of a threat or compromise. One of the most common malware indicators was the use of customized traffic by malware. Malware will often customize well-known protocols for their own purposes. This may include modifying standard protocols such as HTTP or DNS, but peer-to-peer, instant messaging and remote desktop protocols and applications are common targets as well. Any type of application that provides communication, resilience and the ability to transfer files is potentially valuable to malware. Since the next-generation firewall positively classifies all traffic, its relatively easy to identify custom or unknown traffic in the network. Complementary studies in the Palo Alto Networks Application Usage and Threat Report have clearly shown a strong correlation between custom traffic and malware, and that trend held true in this study. Custom TCP and UDP counted as one of the most commonly identified behaviors observed in malware, as well as some of the most commonly generated traffic overall. n 30% of unknown malware samples generated unknown traffic. This was the 4th most common malware behavior out of more than 100 observed behaviors. n Custom/Unknown Traffic was the 3rd most common traffic type behind only web-browsing and DNS. PAGE 10 THE MODERN MALWARE REVIEW | MARCH 2013 One of the most common malware indicators was the use of customized traffic by malware.
  • 11. SUSPICIOUS MALWARE TRAFFIC In addition to looking at the actual malware traffic, it is often helpful to look at where the malware is coming from and going to. Identifying domains and sites that have served malware has been a long-standing component of URL filtering solutions. To stay ahead of these solutions, malware operators will generate custom domains for the attacks, use large numbers of essentially disposable domains, as well as dynamic DNS and fast-flux domains in order to avoid be blocked. As part of the analysis we tracked the number of samples that connected to these domains as well as samples that connected to known malware sites. n 33% of samples connected new domains, DNS or fast-flux: Newly registered domains, fast-flux domains and dynamic DNS can be also be blocked or blocked in conjunction with custom traffic or other indicators. n 20% of samples generated emails: These samples were observed direct email connections over the network. As a result, network policy should only allow email protocols to and from the corporate mail server, and block direct email to the Internet. n 12% used HTTP-POST: HTTP-POST methods are very common in malware, but are also often used by web-applications. As a result, teams will likely not want to block HTTP-POST altogether, but it may make sense to block going to unregistered or newly registered domains. PAGE 11 ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS While security teams may not want to block all traffic to and from a new domain, they may want to enforce tighter controls such never allowing executables from these sites.
  • 12. SUMMARY, CONCLUSIONS AND RECOMMENDATIONS The analysis showed that while malware may be unknown to traditional security solutions, identifiers still remain. These identifiers can present in the payload of the malware itself or in the network traffic that the malware generates. Some indicators can be conclusive on their own, while others may be best used in conjunction with additional indicators. The suggestions below, should be used as general guidance, but will obviously need to be customized to the realities of a particular network. n Stream-based analysis of file headers and payloads for malicious indicators: Needless to say that recognizing and blocking variants of malware in real-time is far preferable to detecting a remediating. The data shows that at least 40% of unknown malware were observable variants. This puts a very high priority on analyzing the actual malware payload, and timely delivery of newly identified malware intelligence. n Establish and update a solid baseline for the network: Malware behaviors are often (but not always) anomalous, and these behaviors can be used to root out unknown malware quickly. However, malware techniques and strategies will always change, and as such it is critical to know what is normal for your network as opposed to the industry in general. A detailed baseline can provide the point of reference that exposes malware. n Investigate and remediate unknown traffic: Unknown or custom traffic can be several things in addition to malware. As part of establishing a baseline, security teams should seek out unknown traffic and identify it conclusively going forward. It should quickly be possible to reduce the amount of unknown traffic to very low levels, where malware can easily be identified. n Restrict rights to unknown, newly registered domains and dynamic DNS domains: The Internet is obviously a dynamic place, and it may not be that uncommon to encounter an unclassified or new domain. So while security teams may not want to block all traffic to and from a new domain, they may want to enforce tighter controls such never allowing executables from these sites, decrypt SSL traffic for inspection, or blocking HTTP-POSTs to these unknown sites. n Only allow email traffic to the corporate email server: A significant number of malware samples generated email directly to destination on the Internet. This is very common behavior among spamming botnets, and behavior that can be easily controlled. Email traffic that does not go to the corporate email server can be easily blocked, and any users sending such traffic can be investigated as a potential malware infection.   PAGE 12 THE MODERN MALWARE REVIEW | MARCH 2013
  • 13. MALWARE TRAFFIC ON NON-STANDARD PORTS Malware was observed sending traffic over non-standard ports in both inbound and outbound traffic. The prevalence of this non-standard behavior varied widely by application as shown below. Using non-standard ports can allow malware to evade some security measures, which look for specific types of threats on particular ports. Non-SSL traffic on port 443 was the most common non-standard traffic behavior. This makes sense given that port 443 is almost always allowed on a network, and some organizations will not inspect traffic on 443 assuming that it is encrypted. The section below provides a summary of some of the more significant types of malware traffic including the relative use of non-standard ports: FTP FTP was one of the most interesting and concerning applications that we observed in the course of the report. It was the 4th most common source of unknown malware, the malware it delivered was rarely detected (average of 30 days out of 31), and almost always operated on a non-standard port. FTP is of course very flexible and light-weight, making it a powerful tool for attackers that may not get the attention it deserves from security teams. n Observed FTP traffic on 237 non-standard ports (neither side of the connection using port 20 or 21). n 97% of malware FTP sessions went over non-standard ports. n Led all applications in terms of non-standard behavior. WEB BROWSING Web-browsing was the workhorse application for unknown malware throughout the lifecycle. It was #1 source of malware, and the #1 type of traffic generated by malware. It was also observed to be one of applications used extensively for downloading additional payloads to the host. Malware delivered by web-browsing took 20 days on average in order to gain coverage. However, web- browsing on non-standard ports was relatively rare, accounting for only about 10% of sessions and 14% of bandwidth. n Observed web traffic on 90 non-standard web ports (server operating on a port other than port 80). n Relatively uncommon, accounting for only 10% of malware web-browsing sessions. n Use of non-standard ports was slightly higher for browsing sessions that downloaded data. Non-standard ports accounted for 14% of downloaded bandwidth related to web browsing. ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS Non-SSL traffic on port 443 was the most common non-standard port behavior. FTP was the most evasive application in terms port eva- sion, and had one of the lowest detec- tion rates in terms of malware. PAGE 13
  • 14. PAGE 14 THE MODERN MALWARE REVIEW | MARCH 2013 CUSTOM AND UNKNOWN TCP AND UDP Custom traffic was predictably heavily tied to the traffic generated by the malware itself. Custom traffic was the 3rd most common traffic type after web-browsing and DNS. The use of non-standard ports varied considerably between TCP and UDP, with about half of unknown TCP using seemingly random ports and UDP staying on well-known ports. n Observed custom TCP traffic on 19 non-standard ports (server operating on a port other than web, mail or proxy ports). n 43% of unknown TCP traffic was observed on ports not associated with any well-known applications. n Conversely, custom-UDP was found exclusively on well-known ports 53, 80, and 443. HTTP PROXY HTTP-Proxy traffic was the 2nd most common source of unknown malware after web-browsing. Proxies showed behavior very similar to web-browsing in terms of time to detection, requiring 19 days for coverage on average. Proxies were more likely to use non-standard ports that simple web-browsing (17% for proxies, 10% for web-browsing). n Observed HTTP-Proxy traffic on 29 non-standard web ports (server operating on a port other than port 80, 443, 1080, 3128, 8000, 8080). n Accounted for 17% of malware http-proxy sessions.
  • 15. ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS PAGE 15 MALWARE BEHAVIORS ON THE HOST Needless to say, a great deal of the malware life-cycle is focused on the infected host. Malware must be able to persist on the target for it to be useful in a long-term attack, and this requires the malware to blend in on the host while avoiding or disabling any security measures present. In total, behaviors designed to avoid analysis and persist on the host accounted for more than half of the behaviors observed by malware. As part of analyzing potential malware, WildFire will execute a sample file and observe it for more than 100 malicious or suspicious behaviors. These behaviors have been broadly categorized as follows: n Analysis Avoidance: Specific steps to avoid analysis either in a malware sandbox or other security solution (e.g. attempt to sleep for a long period of time). n Persistence: This includes a variety of tasks required for the malware to exist on the host for long periods including how the malware will be run the host and avoid host-based security. n Hacking: These behaviors are directed outside of the infected host and typically involve fingerprinting the surrounding network, and identifying nearby vulnerable hosts. n Data Theft: Traffic that is specifically observed stealing information from the compromised host such as passwords or simply device configuration information. n Outbound Communication: Includes malware command-and-control and a variety of behaviors referenced in the previous section concerning malware traffic The table below shows the percentage of behaviors observed in each category.
  • 16. PAGE 16 THE MODERN MALWARE REVIEW | MARCH 2013 ANALYSIS AVOIDANCE Analysis avoidance behaviors were some of the most common behaviors observed, yet were the least diverse. In short, we observed a handful of techniques in a large percentage of samples. The attempt by the malware to sleep (avoid executing initially to avoid attention) was the most common avoidance behavior and also the most common behavior overall regardless of category. Code injection was observed in 13.5 percent of samples. This technique is notable in particular because it allows malware to hide within another running process. This has the effect of the malware out of view if a user checks the task manager and can also foil some attempts at application white-listing on the host. While quite rare, it was interesting to see malware that attempted to check its external IP address. This likely indicates an attempt by the malware to determine if it is truly in the target network or if its network connection is being proxied. PERSISTENCE The Persistence category was one of the most active categories of behaviors as malware employed a wide variety of techniques to remain embedded on the host. In all WildFire observed more than 26 persistence behaviors. Common strategies where to invade or overwrite key components or directories of the operating system, configuring the malware to run automatically when the host is booted up and disabling host security components. The attempt by the malware to sleep (avoid executing initially to avoid attention) was the most common avoidance behavior and also the most common behavior overall regardless of category.
  • 17. ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS PAGE 17 Some behaviors were rare, but still quite notable. A small number of samples were observed to infect the Master Boot Record, which is a key requirement for a bootkit. Other rare but interesting behavior altered the host to prevent a system restore, ensuring the infected system couldn’t be rolled back to a good state. Other modifications included tampering with operating system to allow files to be run even with invalid signatures. HACKING AND DATA THEFT While persistence and avoidance are means to an end, hacking and data-theft are the ends. Predictably, this category was highly varied in terms of observed behaviors. Given the preponderance of malware delivered via web-browsing, it was not surprising to see the browser as a common target. Theft of passwords stored in the browser and manipulation of cookies were both common behaviors.
  • 18. 3300 Olcott Street Santa Clara, CA 95054 Main: +1.408.573.4000 Sales: +1.866.320.4788 Support: +1.866.898.9087 www.paloaltonetworks.com Copyright ©2013, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks, the Palo Alto Networks Logo, PAN-OS, App-ID and Panorama are trademarks of Palo Alto Networks, Inc. All specifications are subject to change without notice. Palo Alto Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Palo Alto Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. PAN_TMMR_032213 THE MODERN MALWARE REVIEW | MARCH 2013 SUMMARY Malware has become the key enabler for modern sophisticated attacks due to its ability to avoid traditional antivirus solutions, and provide a persistent internal foothold for long-term information attack once inside. As attackers and malware evolve, so to must our security responses. Modern malware presents a unique challenge in that the most sophisticated attacks will continue to require trained and diligent security professionals to investigate and analyze. On the other hand, the sheet volume of unknown malware can easily overwhelm even well-staffed security teams. As a result, security must aggressively seek out methods to automate the blocking of unknown malware wherever possible, while actively investigating the unknowns that get through. This report has hopefully provided some insight into the nature of the unknown malware problem, and provided some basic steps that security teams can use to protect their networks. ABOUT PALO ALTO NETWORKS Palo Alto Networks is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content—by user, not just IP address – at up to 20Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications— regardless of port, protocol, evasive tactic or SSL encryption—and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. Most recently, Palo Alto Networks has enabled enterprises to extend this same network security to remote users with the release of GlobalProtect™ and to combat targeted malware with its WildFire service. For more information, visit www.paloaltonetworks.com.