Fileless malware detection

Discussion in 'other anti-malware software' started by aigle, Dec 3, 2014.

  1. ZeroVulnLabs

    ZeroVulnLabs Developer (aka "pbust")

    Joined:
    Mar 5, 2012
    Posts:
    1,189
    Location:
    USA
    When we tested the standard Duqu 1 against the old ZVL ExploitShield, it prevented the infection thanks to Layer3. The TTF kernel exploit of course still got through, but at least the payload's malicious action was blocked. But of course there's ways around that.
     
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    There is no way to prevent attacks on the Windows OS kernel AFAIK, so that's always a problem. On the other hand, I can't imagine that it's easy to bypass HIPS and HIDS (Intrusion Detection), and if so, they should step up their game. Because at one point, HIPS/HIDS will probably notify you of suspicious behavior, although it's harder to detect in-memory malware.

    That's nice to know. I guess most malware writers will not put much effort in trying to bypass standard exploit mitigations.
     
  3. ropchain

    ropchain Registered Member

    Joined:
    Mar 26, 2015
    Posts:
    335
    Well, actually I took the piece of advise to disable the embedding of fonts from the MS14-058 advisory (The cve-2014-4148 patch) itself. ;)

    https://technet.microsoft.com/en-us/library/security/ms14-058.aspx --> Look at the 'Workarounds' section for CVE-2014-4148. Denying access to t2embed.dll seems to prevent the embedding of fonts and thus prevents an exploitation attempt in the first place. But indeed, there are no easy ways to mitigate other kernel vulnerabilities. (Although KASLR, SMEP and Null Deference Protection present in Windows 8.1 make exploiting kernel vulnerabilities quite a bit harder)

    I cannot comment on the HIPS part.

    Most vulnerabilities and exploits are not developed by malware writers themselves, but by 3rd party suppliers. One of the most notorious one was the Elderwood project.
     
  4. AutoCascade

    AutoCascade Registered Member

    Joined:
    Feb 16, 2014
    Posts:
    741
    Location:
    United States
  5. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Yes correct, I meant exploit writers.

    HIPS and HIDS are big business, and everyone claiming they are able to stop and detect the most sophisticated attacks. So I really wonder what type of software Kaspersky was using. Just take a look at this list: http://cybersecurityventures.com/cybersecurity-500/
     
  6. ropchain

    ropchain Registered Member

    Joined:
    Mar 26, 2015
    Posts:
    335
    Well, of course every company is going to say that they protect against the most sophisticated threats, but in reality it would be very hard to test such claims. It's not about what you've found (Kaspersky is great at publishing reports about APTs for example) but about what you've missed and it will always be a battle between independent testers and PR when it comes done to the verification of these kind of claims.
     
  7. True, only we don't know what we miss, so like black hole researchers have to look at other events to get clues. Therefore I decided to do a small field test, everone can replicate, I googled on "exploit" "Advanced Persistent Threat" and Surfed to the CERT-EU news monitor and searched using the same keywords.

    This non-scientific scan of resulting pages gave me the impresssion that

    Google, FireEye, Kapersky and Trend Micro dominate news items relating to exploit/APT scoops found in other software, not their own.

    When they reveal more scoops, it is reasonable to assume they put more effort into it (and this circumstantial evidence builds a case that to assume they are also better at protecting against those threats). Is this congruent with the opinion/impression of forum members?
     
    Last edited by a moderator: Jun 16, 2015
  8. ropchain

    ropchain Registered Member

    Joined:
    Mar 26, 2015
    Posts:
    335
    Well, definitely FireEye and Kaspersky. But Google and Trend Micro not so much if you would ask me.
     
  9. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    FireEye, Kaspersky and TM release a lot of news and analysis of APTs. IMO it's a marketing thing more than anything else.
    Also who decides what is APT and what "regular" infection/intrusion?
     
  10. Fileless malware is sort of self explaining, but APT (advanced persistent threat) is both mentioned in targetted cyber attacks and advanced staged (multi step) intrusions of context aware exploit kits, so I don't know :cautious:
     
  11. Nightwalker

    Nightwalker Registered Member

    Joined:
    Nov 7, 2008
    Posts:
    1,387
    Google seems to be in the right direction with Project Zero.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.