linux operating commands and unix operating commands

Obfuscation: The Art of Creating Undetectable Malware


 
Thread Tools Search this Thread
# 1  
Old 01-05-2009
Obfuscation: The Art of Creating Undetectable Malware



Do not expect that your system would start misbehaving once it is infected by a malware. Malwares can perform their functions without showing any symptoms for days, months or years. New malwares are capable of hiding themselves even from powerful Antivirus scan engines. They can also perform their jobs without affecting the normal functionalities of the system.

Obfuscation helps malware writers to hide the malicious code on their programs. There are different types of obfuscation techniques like polymorphism, runtime packing, junk code injection etc. Obfuscation can also be as simple as code transposition or renaming the variable.

Obfuscation makes it time-consuming for an Antivirus program to analyze a malware program and when obfuscation is combined with encryption, it makes the malware more resistant to analysis. And it would be difficult for an Antivirus program to detect malicious code in an obfuscated program.

When we analyze the latest malware threats, what we can see is most of the recent malwares are variants of old malware programs. When you insert junk code into a malware program, the pattern and execution methods might change but the functionality would be the same. And an Antivirus scan engine would find it difficult to detect any matching patterns in the signature database.

A malware writer can create a malware program and then by inserting junk code into it he can create 100 unique malwares with the same functionality. And when you use encryption and runtime packaging, it makes more difficult for an anti virus scan engine to detect matching patterns in the malware code. Some Antivirus software use sandboxing technique to detect malicious functions in a obfuscated programs. But we should also understand that new malwares are intelligent enough to detect a sandbox environment and they can change the behavior during runtime.

Application Authentication: First line of defense against Obfuscation

Instead of analyzing the code patterns, Antivirus software should be using application fingerprinting and authentication methods to identify genuine applications.

The simple rule of security should always be - Deny every thing and only allow authenticated/authorized applications to execute and access the data. Application authentication should be the first line of defense against malwares and Anti-Malware softwares should be able to provide this functionality.





Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. UNIX for Beginners Questions & Answers

Help to remove malware

hello I hope you have a good day, no question is because a few days ago I did a malware scan to my debian and showed me that I have malware, and searched and not found how I can eliminate it, would be useful if someone knows how to You can delete or uninstall, thank you very much (2 Replies)
Discussion started by: asoh65
2 Replies

2. Shell Programming and Scripting

Traceback spammers using an obfuscation of their URL

I have on occasion been forced to divulge my address to the odd enterprise, here and there. Some time later I've mysteriously found myself on the receiving end of spam. I have a plan to copy said enterprise's domain or part thereof to a bash terminal and obfuscate it, then paste the obfuscated... (2 Replies)
Discussion started by: nohspamjose
2 Replies

3. Shell Programming and Scripting

Obfuscation Part II.

Hi guys... This sure is gonna raise a few eyebrows. Further to my shell obfuscation ideas from a previous post this is a derivative with ideas that work. Firstly the file 'obfuscate_master.sh' is created and the access rights changed to the owner only. It is called in ths particular case... (0 Replies)
Discussion started by: wisecracker
0 Replies

4. Solaris

nic card undetectable in solaris X86

Hi All, I am unable to detect NIC card in solaris 10 installed on X86 system after installation, every thing is installed properly, i have check bios settings in which it is detectable. I suspect we have selected NETWORKED option as NO during installation.How to conform whether we have selected... (6 Replies)
Discussion started by: ravijanjanam12
6 Replies

5. UNIX Desktop Questions & Answers

Virus and Malware

How do i manage virus and melware in Unix ? (2 Replies)
Discussion started by: Suriano10
2 Replies

6. Shell Programming and Scripting

String hash/obfuscation in ksh

I have a vendor that needs to install a set of scripts (written in korn) that will be run as root through crontab every day. This set of scripts will need to ssh as root to other servers without getting challenged for user name or password. So I have set up ssh key pairing and authorized_keys... (2 Replies)
Discussion started by: StHalcyon
2 Replies
Login or Register to Ask a Question