Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Research from Palo Alto Networks Shows Malware Fight Falling Short

New research from Palo Alto Networks underscores just how much malware may be slipping by enterprise defenses.

New research from Palo Alto Networks underscores just how much malware may be slipping by enterprise defenses.

According to research gathered during a three-month period using the company’s new WildFire malware analysis engine, 57 percent of the more than 700 unique malware samples they discovered entering enterprise networks had no signatures and was unknown to the security industry.

Unidentified Malware“I think we were all a bit surprised by the volume and frequency with which we were finding unknown malware in live networks,” said Wade Williamson, senior security analyst at Palo Alto Networks, in a statement. “Unknown malware often represents the leading edge of an organized attack, so this data really underscores the importance of getting new anti-malware technologies out of the lab and into the hands of IT teams who are on the front lines.”

The inability of signatures to keep up with the creation of malware on their own has been an oft-repeated theme the past few years. With millions of new malware samples being created every year, vendors have begun embracing a mix of solutions, ranging from whitelisting to approaches that utilize the cloud.

Part of Palo Alto’s solution to this problem is WildFire, which helps identify unknown malicious files by executing them in a virtual cloud-based environment or “sandbox” in an attempt to identify malicious behavior.

Also in its research, Palo Alto found that zero-day malware was distributed by a wide variety of Web applications, in addition to the traditional HTTP web-browsing and email traffic commonly associated with malware distribution. This builds off the company’s May 2011 Application Usage and Risk Report, researchers found that traffic from browser-based file sharing applications was observed on the 91 percent of 1,253 enterprise networks analyzed from October 2010 to April 2011.

“It’s important to note this, because many enterprises only inspect email or FTP traffic for malware but do not have the ability to scan other applications,” Williamson noted. “Applications that tunnel within HTTP or other protocols can carry malware that will be invisible to a traditional anti-malware solution. These are examples of the big reasons why a lot of malware gets missed – most enterprises only focus on scanning their corporate email application.”

Related Reading: Getting Your Hands Dirty in the Fight on Modern Malware

Related Reading: An Introduction to Modern Malware 

Advertisement. Scroll to continue reading.

Related Reading: Using Network Segmentation to Protect the Modern Enterprise Network

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.