{"id":1759,"date":"2011-09-06T18:58:25","date_gmt":"2011-09-06T22:58:25","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=1759"},"modified":"2021-08-03T22:07:28","modified_gmt":"2021-08-04T02:07:28","slug":"malware-in-text","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/malware-in-text\/","title":{"rendered":"Malware in Text"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-9343 size-full\" style=\"border: 0pt none; margin: 0px 3px;\" title=\"malware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/08\/malware-e1561688168140.jpg?resize=116%2C116&#038;ssl=1\" alt=\"\" width=\"116\" height=\"116\" \/>A team of security researchers has engineered a way of hiding malware in sentences that read like English language spam. The research led by\u00a0<a title=\"Dr Josh Mason\" href=\"https:\/\/web.archive.org\/web\/20150625200933\/http:\/\/spar.isi.jhu.edu\/josh\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dr. Josh Mason<\/a> of <a title=\"Johns Hopkins University\" href=\"https:\/\/www.jhu.edu\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Johns Hopkins University<\/a> along with Dr. Sam Small of Johns Hopkins, Dr. Fabian Monrose of the <a title=\"University of North Carolina\" href=\"https:\/\/www.unc.edu\" target=\"_blank\" rel=\"noopener noreferrer\">University of North Carolina<\/a>, and Greg MacManus of <a title=\"iSIGHT Partners\" href=\"https:\/\/web.archive.org\/web\/20200327120232\/http:\/\/isightpartners.com:80\/\" target=\"_blank\" rel=\"noopener noreferrer\">iSIGHT Partners<\/a> outlined the threat in a paper <em>English <a title=\"Shellcode\" href=\"http:\/\/en.wikipedia.org\/wiki\/Shellcode\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Shellcode<\/a> <\/em> (<a title=\"English Shellcode\" href=\"https:\/\/www.cs.jhu.edu\/%7Esam\/ccs243-mason.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>) presented at the 2009 <a title=\"Association for Computing Machinery\" href=\"https:\/\/www.acm.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">ACM<\/a> <a title=\"Conference on Computer and Communications Security\" href=\"https:\/\/www.sigsac.org\/ccs\/CCS2009\/\" target=\"_blank\" rel=\"noopener noreferrer\">Conference on Computer and Communications Security<\/a>. <a title=\"www.computing.co.uk\" href=\"https:\/\/web.archive.org\/web\/20181225030119\/https:\/\/www.computing.co.uk\/ctg\/news\/1847598\/malware-hidden-english-language-text-us-scientists\" target=\"_blank\" rel=\"noopener noreferrer\">According<\/a> to the <a title=\"United Kingdom\" href=\"http:\/\/maps.google.com\/maps?ll=51.5,-0.116666666667&amp;spn=10.0,10.0&amp;q=51.5,-0.116666666667%20%28United%20Kingdom%29&amp;t=h\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">UK&#8217;s<\/a> <em><a title=\"www.computing.co.uk\" href=\"http:\/\/www.computing.co.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\">Computing<\/a>,<\/em> the paper shows hackers could evade anti-virus protection by hiding <a href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Malware\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">malicious code<\/a> in sentences that read like English language spam<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/web.archive.org\/web\/20170628122617\/http:\/\/resources.infosecinstitute.com\/pattern-based-approach-memory-shellcodes-detection\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-94194 aligncenter\" title=\"alphanumeric shellcode\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/textPatternBase15.jpg?resize=348%2C65&#038;ssl=1\" alt=\"alphanumeric shellcode\" width=\"348\" height=\"65\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/textPatternBase15.jpg?resize=150%2C28&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/textPatternBase15.jpg?resize=75%2C14&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/textPatternBase15.jpg?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 348px) 100vw, 348px\" \/><\/a>The article says that attackers could develop a tool that would be the next step in the hacking and virus arms race. Hackers could hide alphanumeric <a title=\"Shellcode\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Shellcode\" target=\"_blank\" rel=\"noopener noreferrer\">shellcode<\/a> in valid files which would activate the malicious payload of a <a title=\"Code injection\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Code_injection\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">code-injection<\/a> attack. This attack vector could give attackers control of system resources, applications, and data on a compromised computer.<\/p>\n<p>The researchers report they can generate English shellcode in less than one hour on standard PC hardware. The text in bold is the instruction set and the plain text is skipped. \u201c<strong>There is a major<\/strong> center of economic activity, suc<strong>h as Star Trek<\/strong>, including The Ed Sullivan <strong>Show<\/strong>. <strong>The former<\/strong> Soviet Union. International organization participation.\u201d<\/p>\n<p>The good news, Dr. Mason said that the widespread use of this attack vector is limited because the alphanumeric character set is much smaller than the set of characters available in Unicode and <a title=\"UTF-8\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/UTF-8\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">UTF-8<\/a> encodings. This means that the set of instructions available for composing alphanumeric shellcode is relatively small. \u201cT<em>here was really not a lot to suggest it could be done because of the restricted instruction set,<\/em>\u201d said Dr. Mason. Long strings of mostly capital letters, for example, would be very suspicious.<\/p>\n<p><em>Computing <\/em>claims the work is a breakthrough. Current network security techniques work on the assumption that the code used in code-injection attacks, where it is delivered and run on victims\u2019 computers, has a different structure to non-executable plain data, such as English prose. If an attacker challenge&#8217;s the assumption that executable code structure is different from non-executable data malware would be almost impossible to detect.<\/p>\n<p><a title=\"Dr Nicolas T Courtois\" href=\"https:\/\/web.archive.org\/web\/20211103031957\/http:\/\/www0.cs.ucl.ac.uk\/staff\/N.Courtois\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dr. Nicolas T Courtois<\/a>, an expert in security and cryptology at <a title=\"University College London\" href=\"https:\/\/www.ucl.ac.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\">University College London<\/a>, said malware deployed in this way would be \u201c<em>hard, if not impossible, to detect reliably.<\/em>\u201d The research is a proof of concept, but Dr. Mason doubts any hackers are using the technique to disguise their code. \u201c<em>I&#8217;d be astounded if anyone is using this method in the real world owing to the amount of engineering it took to pull off,<\/em>\u201d he said. \u201c<em>A lot of people didn&#8217;t think it could be done.<\/em>\u201d<\/p>\n<p>Professor John Walker, managing director of forensics consultancy <a title=\"Secure-Bastion\" href=\"https:\/\/twitter.com\/securebastion\" target=\"_blank\" rel=\"noopener noreferrer\">Secure-Bastion<\/a>, argued the research highlights the flaws in the anti-virus community&#8217;s approach to security exploits. \u201c<em>There is no doubt in my mind that <a title=\"Antivirus software\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Antivirus_software\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">anti-virus software<\/a> as we know it today has gone well past its sell-by date,<\/em>\u201d he said.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/yro.slashdot.org\/story\/11\/07\/22\/1738224\/Malware-Is-a-Disease-Lets-Treat-It-Like-One\" target=\"_blank\" rel=\"noopener noreferrer\">Malware Is a Disease; Let&#8217;s Treat It Like One<\/a> (yro.slashdot.org)<\/li>\n<\/ul>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-9345 alignright\" title=\"Fiorina\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/08\/Fiorina.jpg?resize=109%2C118&#038;ssl=1\" alt=\"Carly Fiorina\" width=\"109\" height=\"118\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/08\/Fiorina.jpg?resize=276%2C300&amp;ssl=1 276w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/08\/Fiorina.jpg?resize=138%2C150&amp;ssl=1 138w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/08\/Fiorina.jpg?w=346&amp;ssl=1 346w\" sizes=\"auto, (max-width: 109px) 100vw, 109px\" \/><\/p>\n<p><em>If this technology gets out in the wild, most experts believe that the current signature-based anti-malware products will miss the attack and leave us all defenseless. Sounds like something the chip makers should be working on. Is this why Intel bought McAfee?<\/em><\/p>\n<p><strong>What do you think?<\/strong><\/p>\n<p><div id=\"polls-13\" class=\"wp-polls\">\n\t<form id=\"polls_form_13\" class=\"wp-polls-form\" action=\"\/index.php\" method=\"post\">\n\t\t<p style=\"display: none;\"><input type=\"hidden\" id=\"poll_13_nonce\" name=\"wp-polls-nonce\" value=\"b3275ace8f\" \/><\/p>\n\t\t<p style=\"display: none;\"><input type=\"hidden\" name=\"poll_id\" value=\"13\" \/><\/p>\n\t\t<p style=\"text-align: left;\"><strong>Can the anti-malware industry adapt to new threats from attachers?<\/strong><\/p><div id=\"polls-13-ans\" class=\"wp-polls-ans\"><ul class=\"wp-polls-ul\">\n\t\t<li><input type=\"radio\" id=\"poll-answer-39\" name=\"poll_13\" value=\"39\" \/> <label for=\"poll-answer-39\">Yes, but they will charge us for it<\/label><\/li>\n\t\t<li><input type=\"radio\" id=\"poll-answer-40\" name=\"poll_13\" value=\"40\" \/> <label for=\"poll-answer-40\">No, but they will charge us for it anyway<\/label><\/li>\n\t\t<\/ul><p style=\"text-align: center;\"><input type=\"button\" name=\"vote\" value=\"   Vote   \" class=\"Buttons\" onclick=\"poll_vote(13);\" onkeypress=\"poll_result(13);\" \/><\/p><p style=\"text-align: center;\"><a href=\"#ViewPollResults\" onclick=\"poll_result(13); return false;\" onkeypress=\"poll_result(13); return false;\" title=\"View Results Of This Poll\">View Results<\/a><\/p><\/div>\n\t<\/form>\n<\/div>\n<div id=\"polls-13-loading\" class=\"wp-polls-loading\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/plugins\/wp-polls\/images\/loading.gif?resize=16%2C16&#038;ssl=1\" width=\"16\" height=\"16\" alt=\"Loading ...\" title=\"Loading ...\" class=\"wp-polls-image\" \/>&nbsp;Loading ...<\/div>\n<strong><br \/>\n<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/wp.me\/P2wgaW-3H\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a href=\"https:\/\/www.linkedin.com\/in\/rb48334\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers prove malware can hide in English language sentences that read like spam to hide viruses from anti-virus protection<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3045,565,746,23,82,421,4,699,810],"class_list":["post-1759","post","type-post","status-publish","format-standard","hentry","category-security","tag-3045","tag-anti-virus","tag-johns-hopkins-university","tag-malware","tag-microsoft","tag-msft","tag-security","tag-shellcode","tag-virus"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=1759"}],"version-history":[{"count":18,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1759\/revisions"}],"predecessor-version":[{"id":132400,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1759\/revisions\/132400"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=1759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=1759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=1759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}