[OPLIN 4cast] OPLIN 4cast #344: Basic protection

Editor editor at oplin.org
Wed Jul 24 10:30:09 EDT 2013


Email not displaying correctly? View it in your browser. 
<http://www.oplin.org/4cast/>
OPLIN 4Cast

OPLIN 4cast #344: Basic protection
July 24th, 2013

virusThere was an interesting posting on the /codeinsecurity/ blog a 
little over a month ago, which we didn't see until recently, called "The 
anti-virus age is over 
<http://codeinsecurity.wordpress.com/2012/06/13/the-anti-virus-age-is-over/>." 
The author, Graham Sutherland, argues that anti-virus (AV) programs 
cannot keep up with all the new types of malware in circulation and 
should just be considered "...a filter for the most basic attacks." We 
know a lot of libraries still depend primarily on AV software for 
protection, so it seemed like it might be worthwhile to look this week 
at some of those new types of malware mentioned by Mr. Sutherland. 
(We've put the names of the malware types in bold.)

  * What is a polymorphic virus?
    <http://www.wisegeek.org/what-is-a-polymorphic-virus.html>
    (wiseGEEK) "Human viruses are infamous for being able to mutate
    rapidly to avoid detection and prevent the buildup of immunities,
    and when a computer virus has a similar trait, the results can be
    unpleasant for computer users. It can be difficult to mount an
    adequate defense against a *polymorphic virus*, even with excellent
    antivirus software which has been designed to attempt to detect such
    viruses."
  * Advanced Persistent Threats: The new reality
    <http://www.darkreading.com/vulnerability/advanced-persistent-threats-the-new-real/240154502>
    (Dark Reading/Michael Cobb) "What is an *APT*? Though the term
    originally referred to nation-states engaging in cyber espionage,
    APT techniques are also being used by cybercriminals to steal data
    from businesses for financial gain. What distinguishes an APT from
    other threats is that it is targeted, persistent, evasive and
    advanced. Unlike the majority of malware, which randomly infects any
    computer vulnerable to a given exploit, APTs target specific
    organizations with the purpose of stealing specific data or causing
    specific damage. The Conficker worm, for example, used many advanced
    techniques but did not target a particular organization. It infected
    millions of computers in more than 200 countries. In contrast,
    Stuxnet was designed to target a certain type, a certain brand and a
    certain model of control system."
  * Advanced Persistent Threats get more advanced, persistent and
    threatening
    <http://www.theregister.co.uk/2013/04/04/apt_trends_fireeye/> (The
    Register/John Leyden) "Attackers are getting even smarter by coming
    up with sneakier way to evade detection. For example, FireEye has
    uncovered examples of malware
    <http://www.fireeye.com/blog/technical/malware-research/2013/04/trojan-apt-banechant-in-memory-trojan-that-observes-for-multiple-mouse-clicks.html>
    that execute only when users move a mouse, a tactic which could dupe
    current sandbox detection systems since the malware doesn't generate
    any activity. In addition, malware writers have also incorporated
    virtual machine detection as a means to frustrate security analysis
    of their wares and DLL files to improve persistence. By avoiding the
    more common .exe file type, attackers using DLL files stand a better
    chancing of avoiding detection for longer."
  * New course teaches techniques for detecting the most sophisticated
    malware in RAM only
    <http://www.networkworld.com/newsletters/techexec/2013/032213bestpractices.html>
    (Network World/Linda Musthaler) "The part of The Invisible Man is
    now being played by highly sophisticated malware that is
    *memory-resident* only. Because it only exists in RAM, the malware
    never gets written to disk, which is where you would normally look
    for most kinds of malware. It's a real challenge to find the malware
    in RAM until you follow the subtle clues that indicate something is
    there that shouldn't be there."

*/Sandbox fact:/*

One article above mentions a "sandbox." Anti-virus software can 
sometimes combat difficult malware by using a virtual environment 
(sandbox) on a computer to run and test code from untrusted sources 
before it is installed for actual use.
------------------------------------------------------------------------
The */OPLIN 4cast/* is a weekly compilation of recent headlines, topics, 
and trends that could impact public libraries. You can subscribe to it 
in a variety of ways, such as:

  * *RSS feed.* You can receive the OPLIN 4cast via RSS feed by
    subscribing to the following URL:
    http://www.oplin.org/4cast/index.php/?feed=rss2.
  * *Live Bookmark.* If you're using the Firefox web browser, you can go
    to the 4cast website (http://www.oplin.org/4cast/) and click on the
    orange "radio wave" icon on the right side of the address bar. In
    Internet Explorer 7, click on the same icon to view or subscribe to
    the 4cast RSS feed.
  * *E-mail.* You can have the OPLIN 4cast delivered via e-mail (a'la
    OPLINlist and OPLINtech) by subscribing to the 4cast mailing list at
    http://mail.oplin.org/mailman/listinfo/OPLIN4cast.


OPLIN 4Cast
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20130724/98d43d03/attachment-0003.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: kubrickheader.jpg
Type: image/jpeg
Size: 38379 bytes
Desc: not available
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20130724/98d43d03/attachment-0003.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: virus.png
Type: image/png
Size: 37045 bytes
Desc: not available
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20130724/98d43d03/attachment-0003.png>


More information about the OPLIN4cast mailing list