Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security IT Technology

75% of Malware Uploaded on 'No-Distribute' Scanners Is Unknown To Researchers (bleepingcomputer.com) 26

Catalin Cimpanu, writing for BleepingComputer: Three-quarters of malware samples uploaded to "no-distribute scanners" are never shared on "multiscanners" like VirusTotal, and hence, they remain unknown, US-based security firm Recorded Future reports, to security firms and researchers for longer periods of time. Although some antivirus products will eventually detect this malware at runtime or at one point or another later in time, this leaves a gap in terms of operational insight for security firms hunting down up-and-coming malware campaigns.
This discussion has been archived. No new comments can be posted.

75% of Malware Uploaded on 'No-Distribute' Scanners Is Unknown To Researchers

Comments Filter:
  • This is news? (Score:4, Informative)

    by slashmydots ( 2189826 ) on Monday June 18, 2018 @04:48PM (#56805350)
    So the title and summary make absolutely no sense. I read the article and they're saying that virus scanners that don't share malware samples with other companies do in fact not share malware samples with other companies? Reeeeeeeally? You don't say.
  • Oh good grief (Score:5, Informative)

    by the_skywise ( 189793 ) on Monday June 18, 2018 @05:22PM (#56805624)
    Can we at least have a summary that's actually a summary of the article and not that poorly written first paragraph which comes off as so much techno-babble?

    A multiscanner is a service like Google's VirusTotal that aggregates antivirus (AV) scanning engines into one big melting pot, allowing users to upload a suspicious file and scan it simultaneously on all the AV engines hosted on the service.

    If at least one of the multiscanner's engines finds the file suspicious, the service shares the result among all AV companies, allowing cyber-security firms insight on new types of malware that their engines are not currently detecting.

    On the other hand, a no-distribute scanner is a service similar to a multiscanner, only that its operators modify the AV engines so they cannot report back to their respective vendors, hence limiting their ability to see the malware uploaded on such a service.

    Although I'm not really sure what the article's point is - that no-distribute scanners are mostly used by criminals and therefore should have an open API? That's like saying speakeasy's during prohibition should've posted their locations on local walls so everybody could share the info!

  • Is this article basically about the fact that people making malware are making more of it then is caught by the average virus detector? Is there a useful quantification here perhaps? not my greatest area off expertise but maybe I missed something.

    • by swb ( 14022 )

      That was my first thought, but upon closer(?) reading it sounds like "security researchers" aren't getting informed of these submissions because some of the scan engine owners are holding back the data.

      I'm trying to decide if "security researchers" means actual people with that as some kind of job title or whether it's small fries who have lost their free data feed.

    • by AHuxley ( 892839 )
      Think of each AV company having a pace and style of their own. When they get something from one of their users they will work on the results in their own time.
      When they are sure they are ready the update is released.
      Until then a lot of other researchers who could have helped work on the same malware have to wait until they too find the same in the wild.
  • Which of course highlights the futility of modern antivirus software. Malware writers will keep tweaking their code 'till Norton, Avast and McAfee check out. This makes the malware undetectable for most users. I just use Windows Defender (solely because it doesn't install any nasty kernel drivers that mess up the OS) and I just don't download unsigned junk or stuff from dubious vendors... Yes I pay for software now...
    • by AHuxley ( 892839 )
      Thats nice if the only way malware gets pushed down into a computer is with users doing "download".br? Malware is pushed down by via ads, sites, networks. No user to download software is needed.
  • by Myself ( 57572 ) on Monday June 18, 2018 @09:06PM (#56806694) Journal

    That article was so horrendous, I'm going to attempt to rewrite it with more context:

    Malware authors want to slip their malware into a victim's PC undetected, which means they need to know, ahead of time, whether it will be detected by antivirus tools. So they scan it with antivirus tools. However, there are so many such tools (and it's difficult to know which one a victim might have), it's time-efficient to centralize the scanning. This is done with a "multiscanner", which is a website that runs a bunch of antivirus tools to inspect any file that a user uploads. The results from the (dozens of) scanning tools are presented to the user in a webpage.

    There are two kinds of multiscanners, however: Those run by/for the "good guys", where Jane Doe can go and upload a fishy file to see what the scan result looks like (as part of deciding whether she wants to run/install/trust it). These scanners send copies of uploaded files (at least, those which smell suspicious to a first-pass heuristic) to antivirus companies so they can be hand-evaluated, and folded into future detection signatures. If a malware author uploads their newest creation to check that it slips through undetected, chances are that a few hours later, that result will change!

    Aaaaand, those run by/for the "bad guys", which work just the same way, except they don't send copies of the fishy files back to AV companies. This is most useful to malware authors who want to make sure their payloads are still stealthy, without tipping their hand to the AV companies. Just like the other multiscanners, this type presents the results to a user in a web page.

    In either case, the link to the results page contains the checksum of the submitted file; it's just an easy way for such things to work.

    The article's central point is that this latter class of multiscanner is very popular. Sometimes, malware authors will share a link to their results page as a way of asserting that their payload is undetected by any scanners. By skulking around the seedier parts of the internet, looking at malware advertisements, researchers collected a lot of these links, and then looked for the checksums on other multiscanner sites. Only about 25% of them showed up in a timely fashion.

    [Ed. note: This can be improved by you, the reader, by uploading suspicious files to sites like Virustotal.]

    • by CODiNE ( 27417 )

      Interesting right after the news of the recent no-distribute scanner bust I see Dave Aitel asking around on his mailing list for any alternative sites. That's right, there's also "good guys" using these scanners to write up offensive security tools. This just brings back the old argument that it's not the tool which is good or evil but how it's used. (Arguments against offensive security apps notwithstanding)

Happiness is twin floppies.

Working...