Bypassing Malware Defenses

نویسندگان

  • Morton Christiansen
  • Carlos Cid
چکیده

While most other areas of penetration testing are well understood, and their methodologies well documented, little information regarding testing and bypassing malware defenses is available in the public domain. Still, malware incidents remain the most expensive type of incidents caused by outsiders, while also being the most frequent type of incidents occurring to organizations. In addition, since malware payloads are normally executed on internal networks, bypassing most firewall restrictions, they do tend to be the weapon of choice for targeted attacks. Malware is used to perform multiple offensive activities: launching distributed denial of service attacks (DDoS), collecting classified information, etc. Consequently, testing and understanding the efficiency and configurations of malware defense systems is of uttermost importance. Firstly, the paper describes how host-based anti-virus signatures can be bypassed. The paper illustrates that known malware may sometimes bypass host-based anti-virus systems (AVs), even when the piece of malware has not been modified to do so. Secondly, we show how changing the signatures of known pieces of malware may help the adversary bypass most signature-based AVs and some behavior-based AVs. Techniques such as hex editing, repacking and reverse engineering are demonstrated to this end. Thirdly, we demonstrate how a new piece of malware, which bypasses all of the 42 AV products included in the test set and is able to use the target organization’s internal

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Browsers Defenses against Phishing, Spoofing and Malware 1 Ssl-based Logon

Web users are increasingly victims of phishing, spoofing and malware attacks. In this article, we discuss existing and proposed defense mechanisms. We highlight the vulnerabilities of current defenses, and the challenges of validating and adopting new defenses.

متن کامل

MalwareD: A study on network and host based defenses that prevent malware from accomplishing its goals

Computers pose a risk to companies due to the nature of the information they store. Most organizations battle computer based threats on a daily basis. Malware is the attacker’s vehicle. It is diverse, evolving, and capable of any attack a programmer can dream up. Routing, DNS and the principle of least privilege are three critical defenses to combat malicious software. Enterprises who tune thes...

متن کامل

MalwareD: A study on network and host based defenses that prevent malware from accomplishing its goals

Computers pose a risk to companies due to the nature of the information they store. Most organizations battle computer based threats on a daily basis. Malware is the attacker’s vehicle. It is diverse, evolving, and capable of any attack a programmer can dream up. Routing, DNS and the principle of least privilege are three critical defenses to combat malicious software. Enterprises who tune thes...

متن کامل

MalwareD: A study on network and host based defenses that prevent malware from accomplishing its goals

Computers pose a risk to companies due to the nature of the information they store. Most organizations battle computer based threats on a daily basis. Malware is the attacker’s vehicle. It is diverse, evolving, and capable of any attack a programmer can dream up. Routing, DNS and the principle of least privilege are three critical defenses to combat malicious software. Enterprises who tune thes...

متن کامل

Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models

Recently researchers have proposed using deep learning-based systems for malware detection. Unfortunately, all deep learning classification systems are vulnerable to adversarial attacks where miscreants can avoid detection by the classification algorithm with very few perturbations of the input data. Previous work has studied adversarial attacks against static analysisbased malware classifiers ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015