Researchers at the University of Texas at Dallas say they have created a piece of malware that can pull together normally benign code from other programs to avoid detection.
The researchers – Vishwath Mohan and Kevin W. Hamlen – are calling the malware ‘Frankenstein’, after the fictional character of the same name. According to a paper by the duo, Frankenstein changes the game for authors of metamorphic malware who are accustomed to rewriting code so that each variant is different from the last. Instead, Frankenstein uses instructions from non-malicious programs that are considered safe by security programs, which the researchers contend makes it more difficult for “feature-based malware detectors to reliably use those byte sequences as a signature to detect malware.”
“The instruction sequence harvesting process leverages recent advances in gadget discovery for return-oriented programming,” according to a paper the researchers released describing their findings. “Preliminary tests show that mining just a few local programs is sufficient to provide enough gadgets to implement arbitrary functionality.”
The research was funded in part by the U.S. Air Force Office of Science Research. The two detailed their findings at the 6th USENIX Workshop on Offensive Technologies (WOOT) in Bellevue, WA, earlier this month.
“Rather than recompiling the code purely randomly during propagation, which leads to diverse but potentially distinguishable binary features, our system searches non-malicious programs on the local system for byte sequences that function as the building blocks for semantically equivalent but syntactically new copies,” the researchers noted in the paper. “Our experiments showed that mining a few files is both sufficient to obtain high mutant diversity, and fast enough to be a practical mutation strategy.”
“By creating new copies entirely from byte sequences obtained from benign files,” the paper continues, “we argue that it becomes significantly more difficult for defenders to infer adequate signatures that reliably distinguish malware from non-malware on victim systems. In particular, signatures that include feature-whitelisting are less effective against our framework than against more conventional forms of obfuscation.”
The paper can be downloaded here.
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Comcast Wants a Slice of the Enterprise Cybersecurity Business
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- New York Attorney General Fines Vendor for Illegally Promoting Spyware
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Cyber Insights 2023 | Zero Trust and Identity and Access Management
- Cyber Insights 2023 | The Coming of Web3
- European Police Arrest 42 After Cracking Covert App
