Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

5/21/2019
10:00 AM
Liron Barak
Liron Barak
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Old Threats Are New Again

They may look familiar to you, and that isn't a coincidence. New threats are often just small twists on old ones.

Cyberattackers are often thought to be tech experts. Cyberattackers understand security vulnerabilities and loopholes that most people don't understand. However, the reality of a cyberattacker is that most are not that specialized — they bypass security solutions through small adjustments to already well-known attacks. By simply leveraging an already established attack sample that is available on the Web, hackers can and do consistently and efficiently modify attacks in order to stay one step ahead of their targets' security solutions. In fact, some malware strains have been designed to automatically modify themselves to avoid signature-based security offerings.

Even sandboxing security solutions — which involve opening suspect files in a controlled environment — are not deterring the ever-increasing rate of email attacks. Because sandboxing solutions have become popular among security practitioners, hackers have also developed sandbox-evasion techniques. Some of these techniques are quite straightforward, such as using the sleep mode to avoid scan detection. And some techniques involve more advanced tools such as sandbox presence detection, where malware runs "clean" code when a sandbox is detected.

In addition, most sandboxes run on machines with low processor counts, RAM, etc. This helps malware detect the difference between an actual computer and a sandbox. A lack of USB ports, small hard drives, no personal files, and no mail client can indicate a sandbox. Once the malware identifies the sandbox, specific techniques are then designed to evade detection. As a dynamic solution, sandboxes offer a way of effectively scanning a file to detect malware.

The bottom line is that as a general rule, today's security solutions rely on past attack experiences to identify present-day threats and ultimately often come up short when it comes to heading off the next hacker attack. Here are a couple of examples of how attackers make minor adjustments in order to take advantage of their targets.

GandCrab Ransomware
GandCrab is a Trojan horse that encrypts files on a targeted computer and follows up with a demand for payment to decrypt them. GandCrab's creators used phishing emails to transmit ransomware and infect systems. These attackers have continued to evolve and adapt to avoid detection, bypass security solutions, and get its victims into mistakenly install ransomware onto their systems.

Between the end of January and September 2018, GandCrab has been updated five times. This agile approach has allowed its creators to stay one step ahead of security solutions and profit on the unsuspecting. 

Emotet Malware
Recently, a new version of Emotet malware surfaced following a short period of inactivity. This marked the introduction of yet another iteration in a series of modifications that started back in 2014.

Emotet first emerged as an info-stealing Trojan aimed at financial credentials and proprietary data. Able to learn from experience, it has continually improved and increased in effectiveness and popularity. This most recent variant has developed a new capability allowing it to avoid detection by most security filters. In addition, Emotet is becoming stronger, more destructive, and costly to organizations and individual users.

Attackers are able to modify their techniques so quickly that it is impossible for organizations to be able to pinpoint what they are going to do next. They shouldn't try, either. What they should do is acknowledge that they need to stay vigilant and that these malicious actors, their viruses, and their profiteering are constantly fought against. Organizations must adapt and evolve themselves, by taking a proactive approach, embracing and implementing security solutions that are attack-agnostic. 

With this strategy, organizations can detect and block viruses, no matter what kind of virus or malware is embedded in them, even if it changes or strengthens over time. This kind of approach provides more comprehensive data security than currently available.

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Liron Barak, CEO and Co-Founder of BitDam, has over 10 years of experience dealing with the most sophisticated cyber threats and exploitation techniques. Prior to founding BitDam, Liron served in Unit 8200 of the Israeli Intelligence Corps, where she managed teams of highly ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
IftahB624
50%
50%
IftahB624,
User Rank: Author
9/1/2019 | 6:40:40 AM
Absolutely Correct
Wre keep on seeing similar attach scenarios repeat again and again, which is probably a good sign that they are still working well.
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
A Patriotic Solution to the Cybersecurity Skills Shortage
Adam Benson, Senior VP, Vrge Strategies,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12777
PUBLISHED: 2020-08-10
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.
CVE-2020-12778
PUBLISHED: 2020-08-10
Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.
CVE-2020-12779
PUBLISHED: 2020-08-10
Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.
CVE-2020-12780
PUBLISHED: 2020-08-10
A security misconfiguration exists in Combodo iTop, which can expose sensitive information.
CVE-2020-12781
PUBLISHED: 2020-08-10
Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.