{"id":11051,"date":"2012-05-08T22:50:59","date_gmt":"2012-05-09T02:50:59","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=11051"},"modified":"2022-08-26T16:26:27","modified_gmt":"2022-08-26T20:26:27","slug":"unknown-malware-rampant-in-enterprise-networks-2","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/unknown-malware-rampant-in-enterprise-networks-2\/","title":{"rendered":"Unknown Malware Rampant in Enterprise Networks"},"content":{"rendered":"<p><a href=\"https:\/\/www.allstatescomputers.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-111585\" title=\"Unknown Malware Rampant in Enterprise Networks\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-28.jpg?resize=88%2C88&#038;ssl=1\" alt=\"Unknown Malware Rampant in Enterprise Networks\" width=\"88\" height=\"88\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-28.jpg?w=116&amp;ssl=1 116w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-28.jpg?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 88px) 100vw, 88px\" \/><\/a><strong>Unknown malware plague enterprise networks<\/strong> according to <a title=\"Network security\" href=\"http:\/\/en.wikipedia.org\/wiki\/Network_security\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">network security<\/a> company <a title=\"Palo Alto Networks\" href=\"http:\/\/www.paloaltonetworks.com\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Palo Alto<\/strong> Networks<\/a>. <em>Help Net Security<\/em> <a title=\"www.net-security.org\" href=\"https:\/\/web.archive.org\/web\/20111225120424\/http:\/\/www.net-security.org:80\/malware_news.php?id=1904\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that Palo Alto Networks found <strong>hundreds of unique, previously unknown malware samples<\/strong> on live networks. Palo Alto Networks conducted the research with their new <a title=\"www.paloaltonetworks.com\" href=\"http:\/\/www.paloaltonetworks.com\/products\/features\/malware-protection.html\" target=\"_blank\" rel=\"noopener noreferrer\">WildFire <strong>malware analysis engine<\/strong><\/a><strong>.<\/strong><\/p>\n<p><em><a href=\"http:\/\/www.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-16482 size-medium\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"paloaltonet_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/paloaltonet_logo-e1565391061571-150x45.gif?resize=150%2C45&#038;ssl=1\" alt=\"\" width=\"150\" height=\"45\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/paloaltonet_logo-e1565391061571.gif?resize=150%2C45&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/paloaltonet_logo-e1565391061571.gif?resize=75%2C22&amp;ssl=1 75w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/em><a title=\"www.darkreading.com\" href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>DarkReading<\/em><\/a> says that the cloud-based WildFire analysis engine found that seven percent of all unknown files analyzed contained<a title=\"arstechnica.com\" href=\"http:\/\/arstechnica.com\/security\/news\/2004\/11\/malware.ars\" target=\"_blank\" rel=\"noopener noreferrer\"> malware<\/a>. WildFire is a new service recently announced by Palo Alto Networks that integrates in-line firewalling with automated <a title=\"zeltser.com\" href=\"http:\/\/zeltser.com\/reverse-malware\/automated-malware-analysis.html\" target=\"_blank\" rel=\"noopener noreferrer\">cloud-based malware analysis<\/a>. Over a three-month period of analyzing unknown files from the Internet entering enterprise networks,the firm discovered more than 700 unique malware samples, 57 percent of which had no coverage by any <a title=\"antivirus\" href=\"https:\/\/web.archive.org\/web\/20151104212014\/http:\/\/download.cnet.com\/windows\/antivirus-software\/\" target=\"_blank\" rel=\"downloadcom noopener noreferrer\">antivirus<\/a> service or were unknown by <a title=\"VirusTotal.com\" href=\"http:\/\/www.virustotal.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Virus Total<\/a> at the time of discovery. Out of all the new malware identified, 15 percent also generated malicious or unknown outbound command and control traffic.<\/p>\n<p>The firewalls identify unknown and potentially malicious files by executing them in a virtual <a title=\"www.us-cert.gov\" href=\"https:\/\/web.archive.org\/web\/20130217051633\/https:\/\/www.us-cert.gov\/reading_room\/USCERT-CloudComputingHuthCebula.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">cloud-based<\/a> environment to expose malicious behavior even if the <a title=\"www.us-cert.gov\" href=\"https:\/\/web.archive.org\/web\/20130220201601\/https:\/\/www.us-cert.gov\/reading_room\/malware-threats-mitigation.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a> has never been seen in the wild before. Wade Williamson, Senior Security Analyst at Palo Alto Networks says, &#8220;WildFire is taking sandbox technology out of the lab and applying it to a real product &#8230; customers can detect and protect themselves against malware using the hardware that they already have deployed today.&#8221;<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-99950 \" title=\"automatically generates new signatures\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robot2.jpg?resize=82%2C104&#038;ssl=1\" alt=\"automatically generates new signatures\" width=\"82\" height=\"104\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robot2.jpg?resize=118%2C150&amp;ssl=1 118w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robot2.jpg?resize=59%2C75&amp;ssl=1 59w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robot2.jpg?w=275&amp;ssl=1 275w\" sizes=\"auto, (max-width: 82px) 100vw, 82px\" \/>For malicious files, <a title=\"investing.businessweek.com\" href=\"http:\/\/investing.businessweek.com\/research\/stocks\/private\/snapshot.asp?privcapId=25460099\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks<\/a> automatically generates new signatures for both the file itself and for any traffic generated by the malicious file. These signatures are then distributed with regular signature updates, as well as providing the user with actionable analysis of exactly how the malware behaves, who was targeted, and what application delivered the threat.<\/p>\n<p>&#8220;I think we were all a bit surprised by the volume and frequency with which we were finding unknown malware in live networks,&#8221; the Senior Security Analyst said. &#8220;U<em>nknown malware often represents the leading edge of an organized attack, so this data really underscores the importance of getting new anti-malware technologies out of the lab and into the hands of IT teams who are on the front lines. The ability to detect, remediate and investigate unknown malware needs to become a practical part of a threat prevention strategy in the same way that <a title=\"Intrusion prevention\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/intrusion-prevention\" target=\"_blank\" rel=\"noopener noreferrer\">IPS<\/a> and <a title=\"searchsecurity.techtarget.com\" href=\"http:\/\/searchsecurity.techtarget.com\/tip\/How-to-reduce-risks-with-URL-filtering\" target=\"_blank\" rel=\"noopener noreferrer\">URL filtering<\/a> are used today.<\/em>&#8221;<\/p>\n<p><a href=\"https:\/\/usa.kaspersky.com\/blog\/misunderstanding_the_cloud\/4441\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-113771\" title=\"Malware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware4-1.jpg?resize=100%2C96&#038;ssl=1\" alt=\"Malware\" width=\"100\" height=\"96\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware4-1.jpg?resize=150%2C144&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware4-1.jpg?resize=75%2C72&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware4-1.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>Palo Alto Networks found that a variety of web applications distributed zero-day malware, in addition to the traditional <a title=\"Hypertext Transfer Protocol\" href=\"https:\/\/www.techopedia.com\/definition\/2336\/hypertext-transfer-protocol-http\" target=\"_blank\" rel=\"techopedia noopener noreferrer\">HTTP<\/a> web-browsing and email traffic commonly associated with malware distribution. WildFire was able to identify specific phishing campaigns based on their affinity for particular applications. One attacker used <a title=\"AOL Mail\" href=\"http:\/\/webmail.aol.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">AOL Mail<\/a> and another used the <a title=\"hotfile.com\" href=\"http:\/\/web.archive.org\/web\/20140329005258\/http:\/\/hotfile.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hotfile<\/a> <a title=\"File hosting service\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/File_hosting_service\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">file hosting service<\/a> as the delivery vector.<\/p>\n<p>&#8220;<em>It&#8217;s important to note this because many enterprises only inspect email or FTP traffic for malware but do not have the ability to scan other applications. Applications that tunnel within HTTP or other protocols can carry malware that will be invisible to a traditional anti-malware solution,<\/em>&#8221; said Williamson. &#8220;<em>These are examples of the big reasons why a lot of malware gets missed &#8211; most enterprises only focus on scanning their corporate email application. To control this problem we need to expand our view to other applications, pull the traffic apart, and go a level deeper in to find out if there&#8217;s a file transfer happening.<\/em>&#8221;<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.circleid.com\/posts\/20111115_taking_the_leap_to_cloud_based_malware_inspection\/\" target=\"_blank\" rel=\"noopener noreferrer\">Taking the Leap to Cloud-Based Malware Inspection<\/a> (circleid.com)<\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20120125033844\/http:\/\/www.allfacebook.com:80\/facebook-work-usage-2011-10\" target=\"_blank\" rel=\"noopener noreferrer\">Debate Over Facebook Use At Work Gets New Compromise From Palo Alto Networks Firewall<\/a> (allfacebook.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/wp.me\/P2wgaW-3H\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a href=\"https:\/\/www.linkedin.com\/in\/rb48334\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 3 months Palo Alto Networks cloud-based WildFire engine found over 700 unique malware samples, 57% of which had no coverage by any antivirus service<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,173,23,687,688,4,877,878],"class_list":["post-11051","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-cloud-computing","tag-malware","tag-network-security","tag-palo-alto-networks","tag-security","tag-virustotal-com","tag-wildfire"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=11051"}],"version-history":[{"count":24,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11051\/revisions"}],"predecessor-version":[{"id":132116,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11051\/revisions\/132116"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=11051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=11051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=11051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}