Commercial ‘malware’ production

2010-12-01

Gunter Ollmann

Damballa, USA
Editor: Helen Martin

Abstract

‘The development and application of sophisticated malware ... already exists within the commercial realm.’ Gunter Ollmann, Damballa


As an industry we spend a lot of time tracking and discussing the criminals that manufacture malware. While, from a technological point of view, a remote management tool is typically indistinguishable from a remote access trojan, intent is the guide we use to label the trojan as malicious and the management tool as benign.

As threats morph, our industry undergoes periodic changes in the way in which we categorize both the software agents we’re expected to protect against and the labels we apply to their authors. Today, we’re being asked to make the call on ‘designer malware’ – in particular, the product of professional security consulting companies.

For a number of years, the call for commercial-grade malware – whether delivered as construction tools or as proof-of-concept code – has been increasing. What was once a hushed offering from boutique penetration testing companies has entered into the standard service offerings of several mainstream security consulting firms.

Obviously, there is great breadth in the classes and usage of ‘commercial-grade malware’ (for want of a better name). Traditionally, boutique security consulting companies have constructed their own malware for two primary purposes: as a stable platform for weaponized exploits, and as a delivery vehicle for proof-of-concept penetrations. While various government agencies and departments have often been the consumers of these specialized products, there is an increasing call for such penetration testing services in the commercial market.

Enterprise customers are looking for new, more exhaustive methods to test the strength of their business systems and products. Perimeter defences such as anti-virus gateways and content filters are now fair game and, in order to test them successfully, targeted delivery of bespoke malware and tuned exploit platforms is required. Much of this is driven by the need to verify the claims of security vendors that employ ‘pre-emptive’ technologies and other broad-spectrum protection engines.

What this all means is that the production of sophisticated malware is no longer entirely within the realms of criminals (if it ever was). Security consultants are generating their own custom malware agents and specifically tuning their exploits to defeat the defences uncovered during a penetration test. These consulting deliverables are often of a much higher calibre and sophistication than the average piece of malware circulating the Internet. As a consequence, we must be careful in how we label and react to the newest threats we encounter in the anti-malware business. We will also have to be more vigilant in identifying specific targeted attacks.

We know from past experience that it’s easy for proof-of-concept malware to escape confinement – whether that be through poor coding of worm functionality, unexpected recipients, failure to clean up afterwards, or merely because a sample was passed to the security vendor at the conclusion of the engagement. The result is a new family of malware or exploit technique causing a fire-drill response from the security vendor.

Then, of course, there’s the issue of research-driven malware. For example, a customer hires a consulting company to review the security of cellular picocell appliances from four different manufacturers. After several months of research, multiple vulnerabilities are uncovered and a proof-of-concept delivery sample is made (e.g. a worm that exploits the vulnerabilities). That piece of malware is the property of the customer, so we have to hope that the commissioner of the research was reputable.

The point of all this is that commercial ‘malware’ production is here to stay. As an industry, we need to recognize that malware is a tool used by criminal and legitimate businesses. The development and application of sophisticated malware – such as worms with ‘zero-day’ exploits that target specific classes of embedded devices – already exists within the commercial realm. As a consequence, we can expect to see more sophisticated malware coming from a broader spectrum of vectors which may not always be a ‘threat’ in the classic sense.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.