Fileless malware

From Wikipedia, the free encyclopedia
  (Redirected from Advanced volatile threat)
Jump to navigation Jump to search

Fileless malware is a variant of computer related malicious software that exists exclusively as a computer memory-based artifact i.e. in RAM.

It does not write any part of its activity to the computer's hard drive meaning that it's very resistant to existing Anti-computer forensic strategies that incorporate file-based whitelisting, signature detection, hardware verification, pattern-analysis, time-stamping, etc., and leaves very little by way of evidence that could be used by digital forensic investigators to identify illegitimate activity.

As malware of this type is designed to work in-memory, its longevity on the system exists only until the system is rebooted.

Definition[edit]

Fileless malware is sometimes considered synonymous with in-memory malware as both perform their core functionalities without writing data to disk during the lifetime of their operation. This has led some commentators to claim that this variant strain is nothing new and simply a “redefinition of the well-known term, memory resident virus”,[1] whose pedigree can be traced back to the 1980s with the birth of the Lehigh Virus that was developed by the originator of the term, Fred Cohen, and became influential with his paper on the topic.[2]

This synonymy is however incorrect. Although the aforementioned behavioral execution environment is the same, in both cases i.e. both malware variants are executed in system memory, the crucial differentiation is the method of inception and prolongation. Most malware’s infection vector involves some writing to the hard disk,[3] in order for it to be executed, whose origin could take the form of an infected file attachment, external media device e.g. USB, peripheral, mobile phone etc., browser drive-by, side-channel etc.

Each of the aforementioned methods has to have contact with the host system’s hard drive, in some form or another, meaning that even when employing the stealthiest anti-forensic methods, some form of the infected residue will be left on the host media.

Fileless malware on the other hand, from the point of inception until process termination (usually by way of a system reboot), aims never to have its contents written to disk. Its purpose is to reside in volatile system areas such as the system registry, in-memory processes and service areas.[4]

History[edit]

Fileless malware is an evolutionary strain of malicious software that has taken on a steady model of self-improvement/enhancement with a drive towards clearly defined focused attack scenarios, whose roots can be traced back to the Terminate Stay Resident/Memory resident viral programs,[5] how, once they were launched, would reside in memory awaiting a system interrupt before gaining access to their control flow; examples of which were seen in viruses such as Frodo, The Dark Avenger, Number of the Beast.[6]

These techniques evolved by way of Temporary Memory Resident viruses[7] and were seen in famous examples such as: Anthrax, Monxla[8] and took on their truer "fileless" nature by way of in-memory injected network viruses/worms such as CodeRed and Slammer.

More modern evolutionary incarnations of which have been seen in viruses such as Stuxnet, Duqu, Poweliks,[9] Phasebot[10] etc.

Recent developments[edit]

On February 8, 2017 Kaspersky Lab's Global Research & Analysis Team published a report titled: "Fileless attacks against enterprise networks"[11] which implicates variants of this type of malware, and its latest incarnations, affecting 140 enterprise networks across the globe with banks, telecommunication companies and government organisations being the top targets.

The report details how a variant of fileless malware is using PowerShell scripts (located within the Microsoft Windows Registry system) to launch an attack against a suspect’s machine leveraging a common attack framework called Metasploit with supporting attack tools such as Mimikatz[12] and leveraging standard Windows utilities such as ‘SC’ and ‘NETSH’ to assist with lateral movement.

The malware was only detected after a bank identified the Metasploit Meterpreter code operating in physical memory on a central domain controller (DC).[13]

Kaspersky Labs is not the only company to have identified such emerging trends, with most of the principal IT security anti-malware companies coming forward with similar findings: Symantec,[14] Trend Micro,[15] McAfee Labs, Cybereason,[16] etc.

Digital forensics[edit]

The emergence of malware that operate in a fileless way presents a major problem to digital forensic investigators, whose reliance on being able to obtain digital artifacts from a crime scene is critical to ensuring chain of custody and producing evidence that is admissible in a court of law.

Many well-known digital forensic process models such as: Casey 2004, DFRWS 2001, NIJ 2004, Cohen 2009,[17] all embed either an examination and/or analysis phase into their respective models, implying that evidence can be obtained/collected/preserved by some mechanism.

This point is enforced further when considering the standard operating procedures of digital investigators and how they should deal with a running computer at a crime scene. Traditional methods direct the investigator to:

  • Do not, in any circumstances, switch the computer on
  • Make sure that the computer is switched off – some screen savers may give the appearance that the computer is switched off, but hard drive and monitor activity lights may indicate that the machine is switched on.
  • Remove the main power source battery from laptop computers.
  • Unplug the power and other devices from sockets on the computer itself

(Taken from ACPO_guidelines_computer_evidence[18])

Fileless malware usurps this model as evidence acquisition can only take place against a memory image that has been obtained from a live running system that is to be investigated. This method, can itself, compromise the acquired hosts' memory image and render legal admissibility questionable, or at the very least, instill enough reasonable doubt that the weight of the evidence presented may be drastically reduced, increasing the chances that Trojan Horse or SODDI defences may be used more effectively.

This renders this type of malware extremely attractive to adversaries wishing to secure a foothold in a network, perform difficult to trace lateral movement and do so in a quick and silent manner, rendering standard forensic investigatory practices ill-prepared for this threat.[19][20][21][22]

Legal admissibility[edit]

As this form of malware can undermine the capability of a digital investigator to ensure rigorous adherence to evidence collection and the securing of a crime scene, fileless malware will present a significant problem to legal prosecutions when trying to ensure data hasn’t had its integrity compromised during acquisition.

External links[edit]

References[edit]

  1. ^ "Advanced volatile threat: New name for old malware technique?". CSO. CSO. Retrieved 20 February 2017.
  2. ^ "Computer Viruses - Theory and Experiments". University of Michigan. Retrieved 20 February 2017.
  3. ^ Sharma, S (2013). "Terminate and Stay Resident Viruses" (PDF). International Journal of Research in Information Technology. 1 (11): 201–210.
  4. ^ "A Disembodied Threat". Kaspersky Lab Business. Kaspersky Lab. Retrieved 20 February 2017.
  5. ^ "The Art of Computer Virus Research and Defense: Memory-Resident Viruses". Retrieved 20 February 2017.
  6. ^ "The Number of the Beast". FireEye.
  7. ^ "The Art of Computer Virus Research and Defense: Temporary Memory-Resident Viruses". Retrieved 20 February 2017.
  8. ^ "What is Monxla - Monxla Information and Removal". antivirus.downloadatoz.com.
  9. ^ "Trojan.Poweliks". www.symantec.com.
  10. ^ "Phasebot, the fileless malware sold in the underground". Security Affairs. 23 April 2015.
  11. ^ "Fileless attacks against enterprise networks". Secure List. Secure List. Retrieved 20 February 2017.
  12. ^ "mimikatz". GitHub wiki.
  13. ^ "Fileless attacks against enterprise networks". Secure List. Secure List. Retrieved 20 February 2017.
  14. ^ "Trojan.Poweliks". www.symantec.com. Symantec.
  15. ^ "TROJ_PHASE.A - Threat Encyclopedia". www.trendmicro.com.
  16. ^ www.cybereason.com/fileless-malware-an-evolving-threat-on-the-horizon[dead link]
  17. ^ Casey, Eoghan (2010). Digital evidence and computer crime : forensic science, computers and the Internet (3rd ed.). London: Academic. p. 189. ISBN 0123742684.
  18. ^ "ACPO: Good Practice Guide for Computer-Based Electronic Evidence" (PDF). The Crown Prosecution Service. Association of Chief Police Officers. Retrieved 20 February 2017.
  19. ^ "POWELIKS Levels Up With New Autostart Mechanism". Trend Micro. Trend Micro. Retrieved 20 February 2017.
  20. ^ "Anti-Forensic Malware Widens Cyber-Skills Gap". InfoSecurity Magazine. InfoSecurity Magazine. Retrieved 20 February 2017.
  21. ^ "Without a Trace: Fileless Malware Spotted in the Wild". Trend Micro. Trend Micro. Retrieved 20 February 2017.
  22. ^ "New Invisible 'File-Less' Cyber Malware Poses 'Unique Worldwide Threat'". Sputnik news. Sputnik news. Retrieved 20 February 2017.