Attackers packing, or compressing, malicious code to make it more difficult to detect and analyze may have to invent a new technique to smuggle their wares inside the corporate gateway.Encryption, compression and other code modifications are making it harder to analyze malicious code, which ultimately increases the challenge of protecting systems against malware, said Lenny Zeltser, a volunteer handler at the SANS Internet Storm Center and the information security practice leader at Gemini Systems in New York. “It seems that virtual machine detection is gaining popularity among malware authors, as part of other self-defense techniques, such as detecting the presence of a debugger and other malware analysis tools,” he said.“At the same time, malware analysts are developing more advanced tools and techniques. It’s an arms race,” added Zeltser. First used to smuggle viruses and worms past perimeter security defenses, and later to crash antivirus programs as “decompression bombs,” compressed file formats such as .rar and .zip have made headlines more than once and are once again being used to attack networks. (Decompression bomb is a term coined by AERAsec security consultant Peter Bieringer to identify an attack that caused many popular antivirus engines to crash when they attempted to decompress gigabytes of data and scan thousands of files for malicious code. Such attacks often resulted in a denial-of-service against applications or systems because of processing overload.) In a recent post to the ISC Handler’s Diary, Zeltser notes that a malicious program compressed by a commercial packer, in this case Themida, was captured in the ISC honey pot. He adds that malware can use virtual machine detection as a self-defense mechanism because the program can refuse to run in the presence of virtualization software, such as VMware, which is often used by malware analysts. Though they aren’t a new threat, it now appears that there may be ways to thwart such attacks.Zeltser recommends patching for the malicious code so that the routine never executes, or modifying VMware instances to make it more difficult for the malicious program to detect that it’s running in a virtual machine.Two ISC readers took it a step further and suggested developing a mechanism to configure non-virtualized systems to look like virtual machines. Zeltser said, “This approach could fool malicious software into thinking that it’s running in an analyst’s environment, and it would refuse to run. This might be an effective way to immunize your systems against certain infections, making it less useful for malware to check whether it’s running within VMware.” -Shawna McAlearneyRelated Link:• Microsoft OS Exploited by Attack Code Keep checking in at our Security Feed page for updated news coverage. Related content opinion Preparing for the post-quantum cryptography environment today It’s a mistake to put off the creation of precautions against quantum threats, no matter how far in the future you might think quantum computing will become a reality. By Christopher Burgess Sep 26, 2023 5 mins CSO and CISO Encryption Threat and Vulnerability Management feature What is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management? By Matthew Tyson Sep 26, 2023 12 mins Cryptocurrency Cryptocurrency Cryptocurrency news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Government Incident Response news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe