Protect Against Attack

Protect Against Attack

Stop theft of credit card and other biographical data

<p>The one thing consistent about malware attacks   is that they continue to change quite   a bit as time goes by. Initially, many attacks   were unstructured and untargeted, indiscriminately   honing in on large numbers of   hosts in an attempt to find their vulnerabilities.   The outcome of these initial attacks was often simple   defacement or destruction of data with very few of the overall   volume of these attacks covered in the news.   </p> <p>Fast forward to 2014.   </p> <p>The goals of attackers have shifted away from basic defacement   (“smash-and-grab” approach of rapid infection) with a   decided move towards stealth, driven by financial gain or data   theft. This shift was generated from the theft of credit card and   other biographical data, and has driven up the creation of new   malware, the number of breaches and the total cost of a breach.</p> <p><strong>Recent Breach Statistics</strong> </p> <p>Indications from the AV-TEST Institute (www.av-test.org) demonstrate   where the amount of created malware increased to over   30 million in 2012. Currently, however, this institute registers   more than 200,000 new malicious programs every day. This rapid   increase in new malware has had a major impact on breaches, as   well. Verizon research shows that 69 percent of breaches during   2011 incorporated malware. </p> <p>Looking at the financial side of the equation, the 2013   Ponemon Institute shows companies paying as much as $199   per record with total costs as high as $5.4 million for a breach in   the United States. Tracking from 2005 to present, Privacy Rights   Clearinghouse shows nearly 622 million (621,955,664 to be exact)   records compromised from 4,088 data breaches that were made   public in the United States. </p> <p>While the financial loss from handling record breaches is   staggering, the additional loss from the fraudulent use of any   breached data records is significant. LexisNexis shows $21 billion   in losses due to identity fraud in 2012, adding to the trend   that this is worse, not better. One only needs to look at the 2013   Thanksgiving Target breach as evidence. </p> <p><strong>Weapons-Grade Malware Lying in Wait</strong> </p> <p>So far, we have only talked about information covering breaches   that have become public and the creation of known malware.   But, there is also a large amount of unknown, weapons-grade   malware, elevated to a quality level that allows it to be used in   advanced targeted attacks, lying in stealth-mode, waiting for   instructions. </p> <p>These new attacks are now highly targeted, using code that   has been QA-tested to levels that rival many commercial applications.   This level of QA has allowed attacks to now use multiple   code modules that can be updated or swapped out via built-in,   command-and-control channels. </p> <p>Each module has its own task, for example, profiling systems   to help in the identification of target systems that report back   on potential targets. Other modules add evasion and protection   capabilities. These modules can locate security or monitoring systems   that can potentially detect, disable or feed them false information   to allow the malware to remain undetected. If a module   cannot handle a given defense, other modules can be loaded to   breach profiled targets, collect targeted information or deliver   some destructive payload. </p> <p><strong>New Options in Malware</strong> </p> <p>The options are constantly expanding with examples such as   Stuxnet, Duqu, Flame, and PlugX showing what can be done.   Although not all unknown malware is as complex as a Stuxnet,   it will still use various techniques of its more complex brethren. </p> <p>This new malware is not just used by cybercriminals. A recent   report shows that the NSA has 50,000 or more hosts where   they have installed malicious software on systems belonging to   telecommunications providers and others around the globe. This   software has been designed to remain dormant until the NSA   calls it into action through an established command-and-control   channel. Once the sleeper agent is called-to-action, it can collect   personal data and feed that information back to the NSA, be   updated with new functionality or execute other tasks based on   installed modules in the malware. </p> <p>New forms of detection have come about to detect these new   forms of attacks. </p> <p><strong>APT – A New Type of Security System</strong> </p> <p>Moving away from the traditional signature matching of antivirus   software that we all hopefully have installed, new protection   systems must be able to protect against the quantity and voracity   of unknown threats. This new type of security system, advanced   protection system (APT) or advanced malware protection system,   has been adopted faster than any other security technology. </p> <p>Instead of focusing on the signatures of known malware, these   new systems focus on behavior analysis to determine if a file is   malicious. Each file is run in an advanced malware analysis system   that opens the file and uses either operating system calls or   CPU emulation to collect and then analyze the needed behaviors   to determine maliciousness. While traditional systems will monitor   basic behaviors such as windows registry changes, file activity   and more, CPU emulation can detect advanced forms of evasion   along with a broader set of behaviors. </p> <p>Some basic behaviors that would typically indicate malicious   behaviors include file and settings changes. The basic behaviors   in this sample would normally be enough for this file to be suspicious   while the additional, advanced behaviors of disabling Windows   security center and updates, and system error reporting,   two examples of evasive behaviors, place this file firmly in the   malicious category. The attack finishes with trying to steal passwords.   Currently, when Lastline analyzes a sample containing   one of these three advanced behavior types, they are split between   13 percent disable, 31 percent evasion and 56 percent steal. </p> <p>Enterprise Strategy Group (ESG) asked 198 security professionals   at companies of at least 1,000 employees if their organizations   had deployed network anti-malware technology; 52 percent   were doing pilots, with 13 percent looking to deploy within the   next 24 months. Not only are a high number of companies now   deploying these solutions, 74 percent have increased their budget   significantly or at least somewhat as a direct response to APTs   over the past two years. Fifty-five percent of enterprises claimed   that they have allocated budget dollars specifically for one of   these new anti-malware technologies. </p> <p>In today’s malware environment, the challenge is less about   tackling the known malware with traditional security technologies   and more about how to effectively protect against unknown   advanced malware. The challenge and opportunity for security   professionals will be on using practical technologies, like advanced   malware analysis systems, that go beyond traditional sandboxing   and specialized staff that are well-trained and equipped to defend against today’s bad guys.</p>The one thing consistent about malware attacks is that they continue to change quite a bit as time goes by. Initially, many attacks were unstructured and untargeted, indiscriminately honing in on large numbers of hosts in an attempt to find their vulnerabilities. The outcome of these initial attacks was often simple defacement or destruction of data with very few of the overall volume of these attacks covered in the news.

Fast forward to 2014.

The goals of attackers have shifted away from basic defacement (“smash-and-grab” approach of rapid infection) with a decided move towards stealth, driven by financial gain or data theft. This shift was generated from the theft of credit card and other biographical data, and has driven up the creation of new malware, the number of breaches and the total cost of a breach.

Recent Breach Statistics

Indications from the AV-TEST Institute (www.av-test.org) demonstrate where the amount of created malware increased to over 30 million in 2012. Currently, however, this institute registers more than 200,000 new malicious programs every day. This rapid increase in new malware has had a major impact on breaches, as well. Verizon research shows that 69 percent of breaches during 2011 incorporated malware.

Looking at the financial side of the equation, the 2013 Ponemon Institute shows companies paying as much as $199 per record with total costs as high as $5.4 million for a breach in the United States. Tracking from 2005 to present, Privacy Rights Clearinghouse shows nearly 622 million (621,955,664 to be exact) records compromised from 4,088 data breaches that were made public in the United States.

While the financial loss from handling record breaches is staggering, the additional loss from the fraudulent use of any breached data records is significant. LexisNexis shows $21 billion in losses due to identity fraud in 2012, adding to the trend that this is worse, not better. One only needs to look at the 2013 Thanksgiving Target breach as evidence.

Weapons-Grade Malware Lying in Wait

So far, we have only talked about information covering breaches that have become public and the creation of known malware. But, there is also a large amount of unknown, weapons-grade malware, elevated to a quality level that allows it to be used in advanced targeted attacks, lying in stealth-mode, waiting for instructions.

These new attacks are now highly targeted, using code that has been QA-tested to levels that rival many commercial applications. This level of QA has allowed attacks to now use multiple code modules that can be updated or swapped out via built-in, command-and-control channels.

Each module has its own task, for example, profiling systems to help in the identification of target systems that report back on potential targets. Other modules add evasion and protection capabilities. These modules can locate security or monitoring systems that can potentially detect, disable or feed them false information to allow the malware to remain undetected. If a module cannot handle a given defense, other modules can be loaded to breach profiled targets, collect targeted information or deliver some destructive payload.

New Options in Malware

The options are constantly expanding with examples such as Stuxnet, Duqu, Flame, and PlugX showing what can be done. Although not all unknown malware is as complex as a Stuxnet, it will still use various techniques of its more complex brethren.

This new malware is not just used by cybercriminals. A recent report shows that the NSA has 50,000 or more hosts where they have installed malicious software on systems belonging to telecommunications providers and others around the globe. This software has been designed to remain dormant until the NSA calls it into action through an established command-and-control channel. Once the sleeper agent is called-to-action, it can collect personal data and feed that information back to the NSA, be updated with new functionality or execute other tasks based on installed modules in the malware.

New forms of detection have come about to detect these new forms of attacks.

APT – A New Type of Security System

Moving away from the traditional signature matching of antivirus software that we all hopefully have installed, new protection systems must be able to protect against the quantity and voracity of unknown threats. This new type of security system, advanced protection system (APT) or advanced malware protection system, has been adopted faster than any other security technology.

Instead of focusing on the signatures of known malware, these new systems focus on behavior analysis to determine if a file is malicious. Each file is run in an advanced malware analysis system that opens the file and uses either operating system calls or CPU emulation to collect and then analyze the needed behaviors to determine maliciousness. While traditional systems will monitor basic behaviors such as windows registry changes, file activity and more, CPU emulation can detect advanced forms of evasion along with a broader set of behaviors.

Some basic behaviors that would typically indicate malicious behaviors include file and settings changes. The basic behaviors in this sample would normally be enough for this file to be suspicious while the additional, advanced behaviors of disabling Windows security center and updates, and system error reporting, two examples of evasive behaviors, place this file firmly in the malicious category. The attack finishes with trying to steal passwords. Currently, when Lastline analyzes a sample containing one of these three advanced behavior types, they are split between 13 percent disable, 31 percent evasion and 56 percent steal.

Enterprise Strategy Group (ESG) asked 198 security professionals at companies of at least 1,000 employees if their organizations had deployed network anti-malware technology; 52 percent were doing pilots, with 13 percent looking to deploy within the next 24 months. Not only are a high number of companies now deploying these solutions, 74 percent have increased their budget significantly or at least somewhat as a direct response to APTs over the past two years. Fifty-five percent of enterprises claimed that they have allocated budget dollars specifically for one of these new anti-malware technologies.

In today’s malware environment, the challenge is less about tackling the known malware with traditional security technologies and more about how to effectively protect against unknown advanced malware. The challenge and opportunity for security professionals will be on using practical technologies, like advanced malware analysis systems, that go beyond traditional sandboxing and specialized staff that are well-trained and equipped to defend against today’s bad guys.

This article originally appeared in the February 2014 issue of Security Today.

Featured

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3