Hard Target: Fileless Malware

Discussion in 'malware problems & news' started by itman, Apr 25, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    https://threatpost.com/hard-target-fileless-malware/125054/
     
  2. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    Wow another PowerShell attack vector. That is where Appguard comes in handy.
     
  3. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Interestingly, one of Kaspersky's mitigation recommendations was to start monitoring outbound firewall connections for processes that normally do not do Internet activity such as notepad.exe and calc.exe. Guess they also have "thrown in the towel" as to preventing all fileless malware.
     
  4. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Appguard and ERP's vulnerable apps. Absolutely essentials these days.
     
  5. guest

    guest Guest

    +1
     
  6. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    AppGuard does not block "fileless" or in-memory-only malware; AppGuard prevents persistence mechanisms, blocks tampering with protected areas of the registry, and works to block any payload.

    Technically, "fileless" malware is a misnomer. They just mean no files dropped to the hard drive. However, the system has to be altered in some fashion to obtain persistence - whether it is creating persistence via the registry or by some other means.

    First, there has to be a successful exploit of a targeted vulnerable program - like a browser - or the user has to run a malicious program.

    As far as PowerShell, it doesn't matter how it is run - whether via the Shell, a *.dll, or an executable, and whatever language mode - it will run Guarded and so will children. The execution of scripts is blocked.

    So the deck is stacked in favor of the AppGuard user against fileless malware.
     
  7. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,240
    Location:
    Among the gum trees
    Or you could use VoodooShield:

    https://www.wilderssecurity.com/threads/voodooshield.313706/page-630#post-2670410
     
  8. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I assume that is equally true if it's not a guarded app, but it is in the user list set to yes?
     
  9. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Not all fileless malware needs to maintain persistence. A recent example is fileless ransomware. Once it encrypts your files, it's job is done.
     
  10. guest

    guest Guest

    Regarding AppGuard:
    Guarded Applications have write-access to the User Space and can delete files from the user.
    The access to the registry was blocked, persistance mechanisms were blocked, access to C:\Windows & C:\Program Files\ was blocked, but the files from the user are gone or encrypted...
    The user should not forget to make use of the "Protected/Private"-folder feature of AppGuard. Now important files can't be modified from Guarded Applications.
     
  11. guest

    guest Guest

    Anyway, every decent AG's users should be in Lockdown Mode and shouldn't mistaken Guarded Apps as a sandbox, it just restrict the Apps to reach some areas.
     
  12. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    +2
     
  13. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    It's been months... I can't remember precisely what I did, but when I tested it, it worked as expected. It's something I have to revisit at some point.
     
  14. TomAZ

    TomAZ Registered Member

    Joined:
    Feb 27, 2010
    Posts:
    1,131
    Location:
    USA
    Not too long ago, someone posted an 'expanded' ERP vulnerable process list. Where can I find that?
     
  15. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    @Peter2150

    I reviewed what I did.

    An un-convoluted answer that does not cover all the permutations in detail = "Yes."
     
  16. Nightwalker

    Nightwalker Registered Member

    Joined:
    Nov 7, 2008
    Posts:
    1,387
    What about anti-exploits? Does MBAE and Hitman Pro Alert protect against those attacks?
     
  17. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590

    ROFL. So instead of a "straight forward" answer, this is a curved answer. Anyway thanks for confirming.
     
  18. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    ~ Removed Off Topic Remarks ~

    In this case "Yes" is a lazy answer to save me from typing out a long, convoluted reply that covers all the low-down, nitty-gritty.
     
    Last edited by a moderator: Apr 29, 2017
  19. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    http://www.securityweek.com/evolution-and-escalation-two-key-cyber-threat-trends
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.