Tuesday, May 14, 2013

Fight against Cyber criminals' advance malware threat



Damballa® Failsafe, in today’s network environment could be seen as a parallel  'last line of defense' where prevalent security solutions remain hand-cuffed with their known limitations.

Malwares can be broken into categories :

1. Opportunistic and Distributed: These malwares are distributed geographically by various means like traveling-USB(s), dongles, web-downloads(drive-by), malware app like online AV-scan, lottery and money scams etc.
2. Targeted : This is primarily an attempt to focus on marked target, reconnaissance, gather all info, testing analysis, intrude, exploit, ex-filtrate. This is an idea and malware is mere a delivery vehicle. Zero-day malware are one of such type.

Cyber threats’ stages and behaviors:

As the advance threats become more resilient , multi-tiered, focused on survivability, we see them following certain style which is inevitable for their hidden functioning:

Stages to compromise:
1. Recon: Analysis about the target through physical, telephonic, malware-pinching techniques. Cyber criminals do deep study/analysis of the applications/ protocols/ network architecture of the target before invading them.
2. Weaponization: Once the infiltration mechanisms are devised, the droppers are tested to get into the endpoints/servers.
3. Cyber contents either might lure the internal user to open connections which helps penetrate Firewalls/IPS or through sophisticated methods malware will be injected via injection vectors manually. This is known as delivery stage.
4. Exploitation: The dropped malware attaches itself to important OS process to evade being caught at endpoints levels. Like for ex: attaching itself to TCP/IP and NDIS processes where in sniffing tools fails to capture malware hidden packet movements.
* Some malwares, before behaving ensures that they are not being run on VMs, sandbox or where the machine is not to be operated by human being.

Stages leading to business loss, functional/operational loss & brand value loss:
5. Command & Control communication: The dropped malware escalates its privileges to establish CnC for updates of new-codes(to avoid any possible AV detection), new instructions, to forward sensitive data etc.
6.Exfiltrate: This is the last stage, if successful causes huge loss.  This stage ends with malware destroying itself so as to be not caught and can be used again.

Remember, on an average there is a gap of nearly 6 months before the advance malwares are detected.


AV/HIPS, N-IPS/N-IDS, Firewalls, Web security appliances, DLP has limitations(false sense of security against adv. malwares):
1. Antivirus relies on signature to match malwares. A must on all endpoints to meet compliance and protection against known threats but is no-where when comes to unknown threats.
2. Intrusion Prevention System relies on signature/heuristics, anomalies & SPA(protocol profiling, not a true sense DPI). Majorly built to protect against attacks on Operating systems, TCP/IP stack, servers and systems. These threats exploiting at L3/L4 and L7 were addressed but advance threats at L7 which comes in stages and uses the genuine code structure of such protocols do get to perforate inline-IPS. It doesn't save administrators from false-positives & requires baseline for anomalies, not an ache for malwares.
3. Firewall(Network) does packet filtering/inspection and may use application layer intelligence but often suffer from the problem with true sense DPI. There are many genuine app often not adhering to RFC compliance. Attackers might infect such non RFC compliant apps to infect the endpoints.
Next gen malware easily absorbs advantage of state-ful connections and its rapidly changing behavior takes exception to FW policies. UTM solutions which pulls endpoint protection at network layer, but is not at pace of dynamically changing behavior of advance malware.
4. Web security & content filtering, like proxy using black/white list doesn't keep up with DNS fluctuation. Non-browser traffics by-passes proxies to establish CnC communication.
5. DLP helps in data leak/loss inadvertently/on purpose. It doesn't protect against data theft. Advance malwares forwards/steal interesting data by changing the data there by evading scripts/categories of host/network based DLP so that it may not look like business related information. One way is by modulating the data info into sound bites and then demodulating it(can be achieved via .dll file). Malwares opening a backdoor on SSL is beyond understanding of above technologies.
Verizon ‘Data Breach Incident Report’, 2011 states that 28% of Data breaches occurred due to advance malware/targeted attacks.



Damballa® Failsafe automates the discovery of your organization’s highest risk devices under criminal control. Damballa Failsafe provides:
1. Protection against unknown and hidden threats. Earliest possible threat discovery (by means of DNS queries (like fast fluxing and domain fluxing) which targeted malwares uses to update & receive instructions, by DPI of the packet to see non/executables, pdf, binaries etc. Failsafe distinguishes for automated and human driven behavior to look for malware behavior).
2. Protection for any endpoint device.
3. Actionable intelligence for rapid and prioritized incident response with complete forensic analysis.
4. Protection from new and emerging threats in the beginning of malicious communication so you don't have to wait till your IP/sensitive data is at stake.
5. An easy and automated solution for fighting advanced threats.
6. Being out-of-band it remains out of sight of cyber criminals while at any/reconnaissance phase. Addresses and stops malicious malware communication with very high rate of true positive so your security experts concentrate on genuine cyber threats.


Note: Damballa doesn't compete with layered security solutions as discussed above, rather, it address the limitations imposed on their functionality by their means of definition & use.