Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

5/21/2019
10:00 AM
Liron Barak
Liron Barak
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Old Threats Are New Again

They may look familiar to you, and that isn't a coincidence. New threats are often just small twists on old ones.

Cyberattackers are often thought to be tech experts. Cyberattackers understand security vulnerabilities and loopholes that most people don't understand. However, the reality of a cyberattacker is that most are not that specialized — they bypass security solutions through small adjustments to already well-known attacks. By simply leveraging an already established attack sample that is available on the Web, hackers can and do consistently and efficiently modify attacks in order to stay one step ahead of their targets' security solutions. In fact, some malware strains have been designed to automatically modify themselves to avoid signature-based security offerings.

Even sandboxing security solutions — which involve opening suspect files in a controlled environment — are not deterring the ever-increasing rate of email attacks. Because sandboxing solutions have become popular among security practitioners, hackers have also developed sandbox-evasion techniques. Some of these techniques are quite straightforward, such as using the sleep mode to avoid scan detection. And some techniques involve more advanced tools such as sandbox presence detection, where malware runs "clean" code when a sandbox is detected.

In addition, most sandboxes run on machines with low processor counts, RAM, etc. This helps malware detect the difference between an actual computer and a sandbox. A lack of USB ports, small hard drives, no personal files, and no mail client can indicate a sandbox. Once the malware identifies the sandbox, specific techniques are then designed to evade detection. As a dynamic solution, sandboxes offer a way of effectively scanning a file to detect malware.

The bottom line is that as a general rule, today's security solutions rely on past attack experiences to identify present-day threats and ultimately often come up short when it comes to heading off the next hacker attack. Here are a couple of examples of how attackers make minor adjustments in order to take advantage of their targets.

GandCrab Ransomware
GandCrab is a Trojan horse that encrypts files on a targeted computer and follows up with a demand for payment to decrypt them. GandCrab's creators used phishing emails to transmit ransomware and infect systems. These attackers have continued to evolve and adapt to avoid detection, bypass security solutions, and get its victims into mistakenly install ransomware onto their systems.

Between the end of January and September 2018, GandCrab has been updated five times. This agile approach has allowed its creators to stay one step ahead of security solutions and profit on the unsuspecting. 

Emotet Malware
Recently, a new version of Emotet malware surfaced following a short period of inactivity. This marked the introduction of yet another iteration in a series of modifications that started back in 2014.

Emotet first emerged as an info-stealing Trojan aimed at financial credentials and proprietary data. Able to learn from experience, it has continually improved and increased in effectiveness and popularity. This most recent variant has developed a new capability allowing it to avoid detection by most security filters. In addition, Emotet is becoming stronger, more destructive, and costly to organizations and individual users.

Attackers are able to modify their techniques so quickly that it is impossible for organizations to be able to pinpoint what they are going to do next. They shouldn't try, either. What they should do is acknowledge that they need to stay vigilant and that these malicious actors, their viruses, and their profiteering are constantly fought against. Organizations must adapt and evolve themselves, by taking a proactive approach, embracing and implementing security solutions that are attack-agnostic. 

With this strategy, organizations can detect and block viruses, no matter what kind of virus or malware is embedded in them, even if it changes or strengthens over time. This kind of approach provides more comprehensive data security than currently available.

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Liron Barak, CEO and Co-Founder of BitDam, has over 10 years of experience dealing with the most sophisticated cyber threats and exploitation techniques. Prior to founding BitDam, Liron served in Unit 8200 of the Israeli Intelligence Corps, where she managed teams of highly ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
IftahB624
50%
50%
IftahB624,
User Rank: Author
9/1/2019 | 6:40:40 AM
Absolutely Correct
Wre keep on seeing similar attach scenarios repeat again and again, which is probably a good sign that they are still working well.
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13157
PUBLISHED: 2019-11-22
nsGreen.dll in Naver Vaccine 2.1.4 allows remote attackers to overwrite arbitary files via directory traversal sequences in a filename within nsz archive.
CVE-2012-2079
PUBLISHED: 2019-11-22
A cross-site request forgery (CSRF) vulnerability in the Activity module 6.x-1.x for Drupal.
CVE-2019-11325
PUBLISHED: 2019-11-21
An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.
CVE-2019-18887
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. The UriSigner was subject to timing attacks. This is related to symfony/http-kernel.
CVE-2019-18888
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. T...