Connect with us

Featured

Old Malware, New Tricks

Published

on

There’s been an explosion in new malware over the past two years. But how new is this malware, really? How serious is the threat, and how should it be countered?  DOROS HADJIZENONOS of Check Point South Africa looks at the issues.|There’s been an explosion in new malware over the past two years. But how new is this malware, really? How serious is the threat, and how should it be countered?  DOROS HADJIZENONOS of Check Point South Africa looks at the issues.

Taking the path of least resistance is natural – it’s why rivers flow around mountains, and electricity finds the easiest route to earth.  It also explains why there has been such an explosion in new malware in the past couple of years.  While there remains a select handful of coders who will painstakingly develop sophisticated, advanced and complex new threats the vast majority of would-be hackers are taking a much easier route to achieve their goals.

They’ve seen the rewards that are possible from a malware attack, and they’re also aware of the easily-available tools that automate the assembly of new malware, or enable small modifications to existing malware types, rendering them undetectable by conventional antivirus products.  The result is that malicious code is now being mass-produced and unleashed on an industrial scale, by people with little or no coding skills.

In fact, Check Point’s latest annual Security Report shows that more unknown malware has been found in the past two years than in the previous 10 years combined.  While new malware introductions were relatively static in 2010 and 2011, at 18 million per year, this nearly doubled to 34 million in 2012, rose to 83 million in 2013, and reached 142 million in 2014.  What’s worse is the speed at which this is occurring.  On average, organisations were downloading 106 unknown malware types every hour – that’s 48 times more than in 2013.

In a majority of cases, these were existing, known types of malicious files that had simply been modified with minor alterations to a couple of lines of their code – literally, old malware with a new trick, that enabled it to bypass even the most up-to-date antivirus detection.

Building a better trap

To avoid being fooled by these new tricks, an additional method of detection known as threat emulation, or sandboxing, is recommended.  Early versions of this technology worked by intercepting suspicious files as they arrived at the organisation’s gateway, and inspected their contents in a virtualised, quarantined area (the sandbox) for any unusual behaviour, in real time.  If the file’s behavior was found to be malicious, for example attempting to make abnormal registry changes or network connections, it would be quarantined, preventing the infection from reaching the network.

While this approach considerably boosts malware detection rates, criminals have already recognised that the technology is deployed on a percentage of networks, and have responded by implementing further evasion techniques.  As such, a next-generation approach is being introduced:  CPU-level sandboxing.  This enables a deeper, more insightful look at a suspicious file’s activity.

It takes advantage of the fact that there are only a handful of exploitation methods that can be used to download malware and execute it on a host PC.  As it operates at the chip level, below the application or operating system layers, CPU-level sandboxing detects the use of malware exploitation methods by examining activity on the CPU, and the execution flow at the assembly code level while the exploit occurs.  As a result, it strips away any disguises applied to the malware, and pre-empts the possibility of hackers evading detection.

While the speed and accuracy of detection make CPU-level sandboxing a powerful method for detecting unknown attacks, especially existing malware that has been altered using obfuscation tools, it also enables detection of the far more sophisticated (and much rarer) zero-day exploits.  Zero-day malware is effectively hand-built to exploit software vulnerabilities that vendors aren’t even aware of yet.  The ability to block both common and rare, targeted attacks adds a strong, extra defensive layer to organisations’ networks.

Taking the sting from malware

Taking this approach a step further, another emerging threat prevention technique can combine with OS- and CPU-level sandboxing, to virtually eliminate the risk of threats.  This technique is called threat extraction.

It involves a direct approach to threat removal:  as the majority of malware is distributed in infected documents (our Security Report shows that 55% of all infected files were PDFs or Office files), then all documents arriving at an organisation by email should be intercepted, and content that is identified as malware, such as macros, embedded objects and files, and external links, removed.  The threat-free document can then be reconstructed with known safe elements, and forwarded to the intended user, either in the original format or as a locked-down PDF, according to the organisation’s policies.

With the pace of malware attacks showing no signs of slowing down and the evasion techniques and tricks used by malware authors always evolving, the technology deployed to keep businesses secure also needs to evolve, to keep them ahead of new threats.  What was cutting edge in 2014 will simply be the standard for 2015.

* Doros Hadjizenonos, Country Manager, Check Point South Africa

Featured

AppDate: Shedding light in our times of darkness

SEAN BACHER’S app roundup highlights two load-shedding apps, along with South AfriCAM, NBA 2K Mobile, Virgin Mobile’s Spot 3.0 and SwiftKey.

Published

on

Load Shedding Notifier

With all the uncertainty about when South Africans will next be plunged into darkness by Eskom, the Load Shedding Notifier tries its best to keep up with Eskom’s schedule. The app is very simple to use. Download it, type an area in and click the save button. The app automatically tells you what load shedding stage Eskom is on, the times you can expect to start lighting candles and for how long to burn them.

Multiple areas can be added and one can switch between the different stages to see how each one will affect a certain area.

A grid status is also displayed, showing how strained the country’s electrical network is.

Platform: Android and iOS

Expect to pay: A free download

Stockists: Visit the store linked to your device

EskomSePush Load Shedding App

EskomSePush does much the same as the Load Shedding Notifier, but allows multiple cities to be tracked. However, they may just want to rethink the name of the app if they want wider respectability.

Platform: Android and iOS

Expect to pay: A free download

Stockists: Visit the store linked to your device

South AfriCAM

South AfriCAM enables users to add branded stickers and frames from popular lifestyle magazine titles to their posts, including Huisgenoot, YOU, Drum, Move!, TRUE LOVE, Women’s Health and Men’s Health. 

In the process, they can earn JETPoints for their social influence: through the app’s built-in JET8 social currency, users are rewarded for their engagement. For every in-app like, comment, and share, users earn JETPoints, which can be used to redeem products online or over the counter across more than 2 500 retail stores in South Africa. Users are additionally awarded JETPoints for cross-posting onto external social media networks.

Platform: Android and iOS

Expect to pay: A free download

Stockists: Visit the store linked to your device

Click here to read about console quality graphics on a mobile phone, Virgin Money payments made easier, and an app that redesigns the keyboard.

Previous Page1 of 2

Continue Reading

Featured

Drones to drive
Western Cape agritech

Aerobotics is set to change how farmers treat their crops by using drones and machine learning, writes BRYAN TURNER.

Published

on

The Western Cape is poised to be a hotbed of innovation in the agritech sector, with drone piloting set to playing a major role in in the tech start-up scene.

This is the view of Tim Willis, chief operating officer of pioneering drone company Aerobotics, a Cape Town drone company recognised as a world leader in agritech.

“Drone piloting is a key skill that feeds into the value chain of the budding 4th Industrial Revolution,” said Willis. “Cape Town and the Western Cape is uniquely positioned to be the melting pot for innovation in the agritech sector, as a leading agricultural exporter and a hub for creative tech start-ups.”

He was speaking at AeroCon, a drone expo organised by Aerobotics and held in Johannesburg this week aimed at providing opportunities for drone pilots to apply their skills in South Africa, and to show how drones are being used to collect data on crops. 

The event was supported by the South African Civil Aviation Authority (SACAA), Wesgro, PROMMAC, MicaSense, and Rectron, among other

“We’re starting to sign up farmers across the country,” said Willis. “It’s exciting because farmers are starting to use drone technology on their farms. When a farmer wants a drone flown, they want it flown [now] so it’s important for us to capture that data as quickly as possible to show that drones are fast and effective.”

According to aerobotics, drone technology can help farmers reduce pesticide use on their crops by up to 30%. The result is environmentally friendly farming, reducing stressed crops and a healthier harvest. 

“We use aerial imagery from drones to recreate a 3D model of every single tree on a farmer’s orchard,” said Willis. “We’ve done this for millions of trees and it starts to give the farmers metrics of what they’re doing. We provide them with the health of the trees, the height, the volume, the canopy area, which enable the farms to make decisions on what to do next.”

Click here to read more about AeroCon and what it offers to those wanting to get into the drone industry.

Previous Page1 of 2

Continue Reading

Trending

Copyright © 2018 World Wide Worx