Every day thousands of endpoints are compromised by hackers, whether they are beginners or professionals hired by governments. And it’s the latter that we’re interested in today: Advanced Persistent Threats (APTs). These advanced and persistent threats compromise machines to steal trade secrets and political secrets or disrupt a country’s entire power grid.
This is because these hackers use techniques that allow them to bypass historical antivirus programs that simply compare files’ signature to a database of known malicious files. This also means that any new strain of the virus will strike with force before it is recognized, analyzed, and passed on to all antivirus vendors for blocking. This is not the only weakness: to compare the signature, a file must be dropped. However, many techniques are available to ignore this point and perform malicious actions directly in memory, known as “file–less“ attacks, because they do not drop files but now execute commands.
Regardless of these advanced threats, legacy antivirus software lacks a crucial point in today’s security environment: correlation. We study and analyze attacks on a peer-to-peer basis, without a global view of the entire fleet. It is complex and time-consuming to recover the initial infection path.
Nevertheless, antivirus programs, and especially next-gen programs that do more than just compare files, can still block a considerable amount of malware. Many opportunists reuse or buy malware and vulnerabilities. We can always find some of them exploiting vulnerabilities that are more than 10 years old!